{"id":"USN-4751-1","summary":"linux, linux-aws, linux-azure, linux-gcp, linux-hwe-5.8, linux-kvm, linux-oracle, linux-raspi vulnerabilities","details":"It was discovered that the console keyboard driver in the Linux kernel\ncontained a race condition. A local attacker could use this to expose\nsensitive information (kernel memory). (CVE-2020-25656)\n\nMinh Yuan discovered that the tty driver in the Linux kernel contained race\nconditions when handling fonts. A local attacker could possibly use this to\nexpose sensitive information (kernel memory). (CVE-2020-25668)\n\nBodong Zhao discovered a use-after-free in the Sun keyboard driver\nimplementation in the Linux kernel. A local attacker could use this to\ncause a denial of service or possibly execute arbitrary code.\n(CVE-2020-25669)\n\nKiyin (尹亮) discovered that the perf subsystem in the Linux kernel did\nnot properly deallocate memory in some situations. A privileged attacker\ncould use this to cause a denial of service (kernel memory exhaustion).\n(CVE-2020-25704)\n\nJulien Grall discovered that the Xen dom0 event handler in the Linux kernel\ndid not properly limit the number of events queued. An attacker in a guest\nVM could use this to cause a denial of service in the host OS.\n(CVE-2020-27673)\n\nJinoh Kang discovered that the Xen event channel infrastructure in the\nLinux kernel contained a race condition. An attacker in guest could\npossibly use this to cause a denial of service (dom0 crash).\n(CVE-2020-27675)\n\nDaniel Axtens discovered that PowerPC RTAS implementation in the Linux\nkernel did not properly restrict memory accesses in some situations. A\nprivileged local attacker could use this to arbitrarily modify kernel\nmemory, potentially bypassing kernel lockdown restrictions.\n(CVE-2020-27777)\n\nIt was discovered that the jfs file system implementation in the Linux\nkernel contained an out-of-bounds read vulnerability. A local attacker\ncould use this to possibly cause a denial of service (system crash).\n(CVE-2020-27815)\n\nShisong Qin and Bodong Zhao discovered that Speakup screen reader driver in\nthe Linux kernel did not correctly handle setting line discipline in some\nsituations. A local attacker could use this to cause a denial of service\n(system crash). (CVE-2020-27830, CVE-2020-28941)\n\nIt was discovered that a use-after-free vulnerability existed in the\ninfiniband hfi1 device driver in the Linux kernel. A local attacker could\npossibly use this to cause a denial of service (system crash).\n(CVE-2020-27835)\n\nIt was discovered that an information leak existed in the syscall\nimplementation in the Linux kernel on 32 bit systems. A local attacker\ncould use this to expose sensitive information (kernel memory).\n(CVE-2020-28588)\n\nMinh Yuan discovered that the framebuffer console driver in the Linux\nkernel did not properly handle fonts in some conditions. A local attacker\ncould use this to cause a denial of service (system crash) or possibly\nexpose sensitive information (kernel memory). (CVE-2020-28974)\n\nMichael Kurth and Pawel Wieczorkiewicz discovered that the Xen event\nprocessing backend in the Linux kernel did not properly limit the number of\nevents queued. An attacker in a guest VM could use this to cause a denial\nof service in the host OS. (CVE-2020-29568)\n\nOlivier Benjamin and Pawel Wieczorkiewicz discovered a race condition the\nXen paravirt block backend in the Linux kernel, leading to a use-after-free\nvulnerability. An attacker in a guest VM could use this to cause a denial\nof service in the host OS. (CVE-2020-29569)\n\nJann Horn discovered that the tty subsystem of the Linux kernel did not use\nconsistent locking in some situations, leading to a read-after-free\nvulnerability. A local attacker could use this to cause a denial of service\n(system crash) or possibly expose sensitive information (kernel memory).\n(CVE-2020-29660)\n\nJann Horn discovered a race condition in the tty subsystem of the Linux\nkernel in the locking for the TIOCSPGRP ioctl(), leading to a use-after-\nfree vulnerability. A local attacker could use this to cause a denial of\nservice (system crash) or possibly execute arbitrary code. (CVE-2020-29661)\n\nIt was discovered that a race condition existed that caused the Linux\nkernel to not properly restrict exit signal delivery. A local attacker\ncould possibly use this to send signals to arbitrary processes.\n(CVE-2020-35508)\n","modified":"2026-04-27T15:50:16.519228Z","published":"2021-02-25T06:43:06Z","related":["UBUNTU-CVE-2020-25656","UBUNTU-CVE-2020-25668","UBUNTU-CVE-2020-25669","UBUNTU-CVE-2020-25704","UBUNTU-CVE-2020-27673","UBUNTU-CVE-2020-27675","UBUNTU-CVE-2020-27777","UBUNTU-CVE-2020-27815","UBUNTU-CVE-2020-27830","UBUNTU-CVE-2020-27835","UBUNTU-CVE-2020-28588","UBUNTU-CVE-2020-28941","UBUNTU-CVE-2020-28974","UBUNTU-CVE-2020-29568","UBUNTU-CVE-2020-29569","UBUNTU-CVE-2020-29660","UBUNTU-CVE-2020-29661","UBUNTU-CVE-2020-35508"],"upstream":["CVE-2020-25656","CVE-2020-25668","CVE-2020-25669","CVE-2020-25704","CVE-2020-27673","CVE-2020-27675","CVE-2020-27777","CVE-2020-27815","CVE-2020-27830","CVE-2020-27835","CVE-2020-28588","CVE-2020-28941","CVE-2020-28974","CVE-2020-29568","CVE-2020-29569","CVE-2020-29660","CVE-2020-29661","CVE-2020-35508","UBUNTU-CVE-2020-25656","UBUNTU-CVE-2020-25668","UBUNTU-CVE-2020-25669","UBUNTU-CVE-2020-25704","UBUNTU-CVE-2020-27673","UBUNTU-CVE-2020-27675","UBUNTU-CVE-2020-27777","UBUNTU-CVE-2020-27815","UBUNTU-CVE-2020-27830","UBUNTU-CVE-2020-27835","UBUNTU-CVE-2020-28588","UBUNTU-CVE-2020-28941","UBUNTU-CVE-2020-28974","UBUNTU-CVE-2020-29568","UBUNTU-CVE-2020-29569","UBUNTU-CVE-2020-29660","UBUNTU-CVE-2020-29661","UBUNTU-CVE-2020-35508"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4751-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-25656"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-25668"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-25669"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-25704"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-27673"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-27675"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-27777"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-27815"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-27830"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-27835"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-28588"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-28941"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-28974"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-29568"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-29569"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-29660"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-29661"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-35508"}],"affected":[{"package":{"name":"linux-hwe-5.8","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/linux-hwe-5.8@5.8.0-44.50~20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.8.0-44.50~20.04.1"}]}],"versions":["5.8.0-23.24~20.04.1","5.8.0-25.26~20.04.1","5.8.0-28.30~20.04.1","5.8.0-29.31~20.04.1","5.8.0-31.33~20.04.1","5.8.0-33.36~20.04.1","5.8.0-34.37~20.04.2","5.8.0-36.40~20.04.1","5.8.0-38.43~20.04.1","5.8.0-40.45~20.04.1","5.8.0-41.46~20.04.1","5.8.0-43.49~20.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"block-modules-5.8.0-44-generic-64k-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"block-modules-5.8.0-44-generic-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"block-modules-5.8.0-44-generic-lpae-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"crypto-modules-5.8.0-44-generic-64k-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"crypto-modules-5.8.0-44-generic-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"crypto-modules-5.8.0-44-generic-lpae-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"dasd-extra-modules-5.8.0-44-generic-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"dasd-modules-5.8.0-44-generic-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"fat-modules-5.8.0-44-generic-64k-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"fat-modules-5.8.0-44-generic-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"fat-modules-5.8.0-44-generic-lpae-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"fb-modules-5.8.0-44-generic-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"firewire-core-modules-5.8.0-44-generic-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"floppy-modules-5.8.0-44-generic-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"fs-core-modules-5.8.0-44-generic-64k-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"fs-core-modules-5.8.0-44-generic-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"fs-core-modules-5.8.0-44-generic-lpae-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"fs-secondary-modules-5.8.0-44-generic-64k-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"fs-secondary-modules-5.8.0-44-generic-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"fs-secondary-modules-5.8.0-44-generic-lpae-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"input-modules-5.8.0-44-generic-64k-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"input-modules-5.8.0-44-generic-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"input-modules-5.8.0-44-generic-lpae-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"ipmi-modules-5.8.0-44-generic-64k-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"ipmi-modules-5.8.0-44-generic-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"ipmi-modules-5.8.0-44-generic-lpae-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"kernel-image-5.8.0-44-generic-64k-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"kernel-image-5.8.0-44-generic-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"kernel-image-5.8.0-44-generic-lpae-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"linux-buildinfo-5.8.0-44-generic","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"linux-buildinfo-5.8.0-44-generic-64k","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"linux-buildinfo-5.8.0-44-generic-lpae","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"linux-buildinfo-5.8.0-44-lowlatency","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"linux-cloud-tools-5.8.0-44-generic","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"linux-cloud-tools-5.8.0-44-lowlatency","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"linux-headers-5.8.0-44-generic","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"linux-headers-5.8.0-44-generic-64k","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"linux-headers-5.8.0-44-generic-lpae","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"linux-headers-5.8.0-44-lowlatency","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"linux-hwe-5.8-cloud-tools-5.8.0-44","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"linux-hwe-5.8-cloud-tools-common","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"linux-hwe-5.8-headers-5.8.0-44","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"linux-hwe-5.8-source-5.8.0","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"linux-hwe-5.8-tools-5.8.0-44","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"linux-hwe-5.8-tools-common","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"linux-hwe-5.8-tools-host","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"linux-hwe-5.8-udebs-generic","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"linux-hwe-5.8-udebs-generic-64k","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"linux-hwe-5.8-udebs-generic-lpae","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"linux-image-5.8.0-44-generic","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"linux-image-5.8.0-44-generic-lpae","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"linux-image-unsigned-5.8.0-44-generic","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"linux-image-unsigned-5.8.0-44-generic-64k","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"linux-image-unsigned-5.8.0-44-lowlatency","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"linux-modules-5.8.0-44-generic","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"linux-modules-5.8.0-44-generic-64k","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"linux-modules-5.8.0-44-generic-lpae","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"linux-modules-5.8.0-44-lowlatency","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"linux-modules-extra-5.8.0-44-generic","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"linux-tools-5.8.0-44-generic","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"linux-tools-5.8.0-44-generic-64k","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"linux-tools-5.8.0-44-generic-lpae","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"linux-tools-5.8.0-44-lowlatency","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"md-modules-5.8.0-44-generic-64k-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"md-modules-5.8.0-44-generic-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"md-modules-5.8.0-44-generic-lpae-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"message-modules-5.8.0-44-generic-64k-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"message-modules-5.8.0-44-generic-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"mouse-modules-5.8.0-44-generic-64k-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"mouse-modules-5.8.0-44-generic-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"mouse-modules-5.8.0-44-generic-lpae-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"multipath-modules-5.8.0-44-generic-64k-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"multipath-modules-5.8.0-44-generic-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"multipath-modules-5.8.0-44-generic-lpae-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"nfs-modules-5.8.0-44-generic-64k-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"nfs-modules-5.8.0-44-generic-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"nfs-modules-5.8.0-44-generic-lpae-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"nic-modules-5.8.0-44-generic-64k-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"nic-modules-5.8.0-44-generic-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"nic-modules-5.8.0-44-generic-lpae-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"nic-pcmcia-modules-5.8.0-44-generic-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"nic-shared-modules-5.8.0-44-generic-64k-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"nic-shared-modules-5.8.0-44-generic-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"nic-shared-modules-5.8.0-44-generic-lpae-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"nic-usb-modules-5.8.0-44-generic-64k-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"nic-usb-modules-5.8.0-44-generic-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"nic-usb-modules-5.8.0-44-generic-lpae-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"parport-modules-5.8.0-44-generic-64k-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"parport-modules-5.8.0-44-generic-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"parport-modules-5.8.0-44-generic-lpae-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"pata-modules-5.8.0-44-generic-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"pcmcia-modules-5.8.0-44-generic-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"pcmcia-storage-modules-5.8.0-44-generic-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"plip-modules-5.8.0-44-generic-64k-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"plip-modules-5.8.0-44-generic-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"plip-modules-5.8.0-44-generic-lpae-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"ppp-modules-5.8.0-44-generic-64k-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"ppp-modules-5.8.0-44-generic-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"ppp-modules-5.8.0-44-generic-lpae-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"sata-modules-5.8.0-44-generic-64k-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"sata-modules-5.8.0-44-generic-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"sata-modules-5.8.0-44-generic-lpae-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"scsi-modules-5.8.0-44-generic-64k-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"scsi-modules-5.8.0-44-generic-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"scsi-modules-5.8.0-44-generic-lpae-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"serial-modules-5.8.0-44-generic-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"storage-core-modules-5.8.0-44-generic-64k-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"storage-core-modules-5.8.0-44-generic-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"storage-core-modules-5.8.0-44-generic-lpae-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"usb-modules-5.8.0-44-generic-64k-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"usb-modules-5.8.0-44-generic-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"usb-modules-5.8.0-44-generic-lpae-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"virtio-modules-5.8.0-44-generic-64k-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"virtio-modules-5.8.0-44-generic-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"vlan-modules-5.8.0-44-generic-64k-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"vlan-modules-5.8.0-44-generic-di","binary_version":"5.8.0-44.50~20.04.1"},{"binary_name":"vlan-modules-5.8.0-44-generic-lpae-di","binary_version":"5.8.0-44.50~20.04.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4751-1.json","cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2020-25656"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2020-25668"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2020-25669"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2020-25704"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2020-27673"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2020-27675"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2020-27777"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2020-27815"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2020-27830"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2020-27835"},{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2020-28588"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2020-28941"},{"severity":[{"score":"CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2020-28974"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2020-29568"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2020-29569"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2020-29660"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2020-29661"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2020-35508"}]}}}],"schema_version":"1.7.5"}