CVE 2020-27815
A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with the ability to set extended attributes to panic the system, causing memory corruption or escalating privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Related bugs and status
CVE-2020-27815 (Candidate) is related to these bugs:
Bug #1908499: udpgro.sh in net from ubuntu_kernel_selftests seems not reflecting sub-test result
Bug #1909453: S3 stress test fails with amdgpu errors
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1909453 | S3 stress test fails with amdgpu errors | linux-oem-5.6 (Ubuntu) | Undecided | Invalid | ||
1909453 | S3 stress test fails with amdgpu errors | linux-oem-5.6 (Ubuntu Focal) | Undecided | Fix Released | ||
1909453 | S3 stress test fails with amdgpu errors | HWE Next | Undecided | Fix Released |
Bug #1913153: focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow kernel-signoff | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow prepare-package-lrm | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow prepare-package-signed | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | linux-oem-5.6 (Ubuntu Focal) | Medium | Fix Released |
See the
CVE page on Mitre.org
for more details.