A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with the ability to set extended attributes to panic the system, causing memory corruption or escalating privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
History
21 Nov 2024, 05:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2020/11/30/5 - Exploit, Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2020/12/28/1 - Exploit, Mailing List, Patch, Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1897668%2C - Issue Tracking | |
References | () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c61b3e4839007668360ed8b87d7da96d2e59fc6c - Patch, Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html - Mailing List, Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20210702-0004/ - Third Party Advisory | |
References | () https://www.debian.org/security/2021/dsa-4843 - Third Party Advisory | |
References | () https://www.openwall.com/lists/oss-security/2020/11/30/5%2C - Mailing List | |
References | () https://www.openwall.com/lists/oss-security/2020/12/28/1%2C - Mailing List |
28 Jul 2023, 19:32
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
CWE | ||
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
10 Dec 2021, 19:56
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1897668, - Broken Link, Issue Tracking | |
CPE | cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:aff_a250:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:fas500f:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:fas500f_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:aff_a250_firmware:-:*:*:*:*:*:*:* |
|
CWE | CWE-787 |
03 Jun 2021, 14:29
Type | Values Removed | Values Added |
---|---|---|
References | (DEBIAN) https://www.debian.org/security/2021/dsa-4843 - Third Party Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2020/12/28/1 - Exploit, Mailing List, Patch, Third Party Advisory | |
References | (MISC) https://www.openwall.com/lists/oss-security/2020/11/30/5, - Exploit, Mailing List, Third Party Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2020/11/30/5 - Exploit, Mailing List, Third Party Advisory | |
References | (MISC) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c61b3e4839007668360ed8b87d7da96d2e59fc6c - Patch, Vendor Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html - Mailing List, Third Party Advisory | |
References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1897668, - Broken Link | |
References | (MISC) https://www.openwall.com/lists/oss-security/2020/12/28/1, - Exploit, Mailing List, Patch, Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html - Mailing List, Third Party Advisory | |
CPE | cpe:2.3:o:linux:linux_kernel:5.9.6:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 6.1
v3 : 7.8 |
26 May 2021, 13:33
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-119 |
26 May 2021, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-05-26 13:15
Updated : 2024-11-21 05:21
NVD link : CVE-2020-27815
Mitre link : CVE-2020-27815
CVE.ORG link : CVE-2020-27815
JSON object : View
Products Affected
netapp
- h300s_firmware
- aff_a250_firmware
- h300s
- aff_a250
- h300e_firmware
- h700e_firmware
- h500e_firmware
- h700s
- h300e
- h500e
- h500s_firmware
- fas500f_firmware
- h500s
- fas500f
- h410s_firmware
- h700e
- h410s
- h410c
- h410c_firmware
- h700s_firmware
linux
- linux_kernel
debian
- debian_linux