Vulnerability Details : CVE-2020-27815
Potential exploit
A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with the ability to set extended attributes to panic the system, causing memory corruption or escalating privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Vulnerability category: OverflowMemory Corruption
Products affected by CVE-2020-27815
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:aff_a250_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:fas500f_firmware:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-27815
0.18%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 41 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-27815
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.1
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:C |
3.9
|
8.5
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2020-27815
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: secalert@redhat.com (Primary)
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Secondary)
References for CVE-2020-27815
-
https://security.netapp.com/advisory/ntap-20210702-0004/
CVE-2020-27815 Linux Kernel Vulnerability in NetApp Products | NetApp Product SecurityThird Party Advisory
-
https://www.openwall.com/lists/oss-security/2020/12/28/1%2C
oss-security - Re: CVE-2020-27815 Linux kernel: jfs: array-index-out-of-bounds in dbAdjTreeMailing List
-
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
[SECURITY] [DLA 2586-1] linux security updateMailing List;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2020/11/30/5
oss-security - CVE-2020-27815 Linux kernel: jfs: array-index-out-of-bounds in dbAdjTreeExploit;Mailing List;Third Party Advisory
-
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c61b3e4839007668360ed8b87d7da96d2e59fc6c
kernel/git/torvalds/linux.git - Linux kernel source treePatch;Vendor Advisory
-
https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html
[SECURITY] [DLA 2557-1] linux-4.19 security updateMailing List;Third Party Advisory
-
https://www.openwall.com/lists/oss-security/2020/11/30/5%2C
oss-security - CVE-2020-27815 Linux kernel: jfs: array-index-out-of-bounds in dbAdjTreeMailing List
-
https://www.debian.org/security/2021/dsa-4843
Debian -- Security Information -- DSA-4843-1 linuxThird Party Advisory
-
http://www.openwall.com/lists/oss-security/2020/12/28/1
oss-security - Re: CVE-2020-27815 Linux kernel: jfs: array-index-out-of-bounds in dbAdjTreeExploit;Mailing List;Patch;Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1897668%2C
Invalid Bug IDIssue Tracking
Jump to