{ "data_type": "CVE", "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-27815", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "n/a", "product": { "product_data": [ { "product_name": "Linux Kernel", "version": { "version_data": [ { "version_value": "5.9.6" } ] } } ] } } ] } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "refsource": "MLIST", "name": "[oss-security] 20201201 CVE-2020-27815 Linux kernel: jfs: array-index-out-of-bounds in dbAdjTree", "url": "http://www.openwall.com/lists/oss-security/2020/11/30/5" }, { "refsource": "MLIST", "name": "[oss-security] 20201228 Re: CVE-2020-27815 Linux kernel: jfs: array-index-out-of-bounds in dbAdjTree", "url": "http://www.openwall.com/lists/oss-security/2020/12/28/1" }, { "refsource": "DEBIAN", "name": "DSA-4843", "url": "https://www.debian.org/security/2021/dsa-4843" }, { "refsource": "MLIST", "name": "[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html" }, { "refsource": "MLIST", "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html" }, { "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1897668,", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897668," }, { "refsource": "MISC", "name": "https://www.openwall.com/lists/oss-security/2020/11/30/5,", "url": "https://www.openwall.com/lists/oss-security/2020/11/30/5," }, { "refsource": "MISC", "name": "https://www.openwall.com/lists/oss-security/2020/12/28/1,", "url": "https://www.openwall.com/lists/oss-security/2020/12/28/1," }, { "refsource": "MISC", "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c61b3e4839007668360ed8b87d7da96d2e59fc6c", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c61b3e4839007668360ed8b87d7da96d2e59fc6c" }, { "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210702-0004/", "url": "https://security.netapp.com/advisory/ntap-20210702-0004/" } ] }, "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with the ability to set extended attributes to panic the system, causing memory corruption or escalating privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability." } ] } }