{"id":"USN-4949-1","summary":"linux, linux-aws, linux-azure, linux-gcp, linux-hwe-5.8, linux-kvm, linux-oracle, linux-raspi vulnerabilities","details":"Ryota Shiga discovered that the eBPF implementation in the Linux kernel did\nnot properly verify that a BPF program only reserved as much memory for a\nring buffer as was allocated. A local attacker could use this to cause a\ndenial of service (system crash) or execute arbitrary code. (CVE-2021-3489)\n\nManfred Paul discovered that the eBPF implementation in the Linux kernel\ndid not properly track bounds on bitwise operations. A local attacker could\nuse this to cause a denial of service (system crash) or execute arbitrary\ncode. (CVE-2021-3490)\n\nBilly Jheng Bing-Jhong discovered that the io_uring implementation of the\nLinux kernel did not properly enforce the MAX_RW_COUNT limit in some\nsituations. A local attacker could use this to cause a denial of service\n(system crash) or execute arbitrary code. (CVE-2021-3491)\n\nIt was discovered that the Nouveau GPU driver in the Linux kernel did not\nproperly handle error conditions in some situations. A local attacker could\nuse this to cause a denial of service (system crash). (CVE-2020-25639)\n\nOlivier Benjamin, Norbert Manthey, Martin Mazein, and Jan H. Schönherr\ndiscovered that the Xen paravirtualization backend in the Linux kernel did\nnot properly propagate errors to frontend drivers in some situations. An\nattacker in a guest VM could possibly use this to cause a denial of service\n(host domain crash). (CVE-2021-26930)\n\nJan Beulich discovered that multiple Xen backends in the Linux kernel did\nnot properly handle certain error conditions under paravirtualization. An\nattacker in a guest VM could possibly use this to cause a denial of service\n(host domain crash). (CVE-2021-26931)\n\nIt was discovered that the fastrpc driver in the Linux kernel did not\nprevent user space applications from sending kernel RPC messages. A local\nattacker could possibly use this to gain elevated privileges.\n(CVE-2021-28375)\n\nIt was discovered that the Freescale Gianfar Ethernet driver for the Linux\nkernel did not properly handle receive queue overrun when jumbo frames were\nenabled in some situations. An attacker could use this to cause a denial of\nservice (system crash). (CVE-2021-29264)\n\nIt was discovered that the USB/IP driver in the Linux kernel contained race\nconditions during the update of local and shared status. An attacker could\nuse this to cause a denial of service (system crash). (CVE-2021-29265)\n\nIt was discovered that the vDPA backend virtio driver in the Linux kernel\ncontained a use-after-free vulnerability. An attacker could use this to\ncause a denial of service (system crash) or possibly execute arbitrary\ncode. (CVE-2021-29266)\n\nIt was discovered that the TIPC protocol implementation in the Linux kernel\ndid not properly validate passed encryption key sizes. A local attacker\ncould use this to cause a denial of service (system crash).\n(CVE-2021-29646)\n\nIt was discovered that a race condition existed in the netfilter subsystem\nof the Linux kernel when replacing tables. A local attacker could use this\nto cause a denial of service (system crash). (CVE-2021-29650)\n","modified":"2026-02-10T04:42:12Z","published":"2021-05-11T22:37:17Z","related":["UBUNTU-CVE-2020-25639","UBUNTU-CVE-2021-26930","UBUNTU-CVE-2021-26931","UBUNTU-CVE-2021-28375","UBUNTU-CVE-2021-29264","UBUNTU-CVE-2021-29265","UBUNTU-CVE-2021-29266","UBUNTU-CVE-2021-29646","UBUNTU-CVE-2021-29650","UBUNTU-CVE-2021-3489","UBUNTU-CVE-2021-3490","UBUNTU-CVE-2021-3491"],"upstream":["CVE-2020-25639","CVE-2021-26930","CVE-2021-26931","CVE-2021-28375","CVE-2021-29264","CVE-2021-29265","CVE-2021-29266","CVE-2021-29646","CVE-2021-29650","CVE-2021-3489","CVE-2021-3490","CVE-2021-3491","UBUNTU-CVE-2020-25639","UBUNTU-CVE-2021-26930","UBUNTU-CVE-2021-26931","UBUNTU-CVE-2021-28375","UBUNTU-CVE-2021-29264","UBUNTU-CVE-2021-29265","UBUNTU-CVE-2021-29266","UBUNTU-CVE-2021-29646","UBUNTU-CVE-2021-29650","UBUNTU-CVE-2021-3489","UBUNTU-CVE-2021-3490","UBUNTU-CVE-2021-3491"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4949-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-25639"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3489"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3490"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3491"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-26930"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-26931"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-28375"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-29264"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-29265"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-29266"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-29646"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-29650"}],"affected":[{"package":{"name":"linux-hwe-5.8","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/linux-hwe-5.8@5.8.0-53.60~20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.8.0-53.60~20.04.1"}]}],"versions":["5.8.0-23.24~20.04.1","5.8.0-25.26~20.04.1","5.8.0-28.30~20.04.1","5.8.0-29.31~20.04.1","5.8.0-31.33~20.04.1","5.8.0-33.36~20.04.1","5.8.0-34.37~20.04.2","5.8.0-36.40~20.04.1","5.8.0-38.43~20.04.1","5.8.0-40.45~20.04.1","5.8.0-41.46~20.04.1","5.8.0-43.49~20.04.1","5.8.0-44.50~20.04.1","5.8.0-45.51~20.04.1","5.8.0-48.54~20.04.1","5.8.0-49.55~20.04.1","5.8.0-50.56~20.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"block-modules-5.8.0-53-generic-64k-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"block-modules-5.8.0-53-generic-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"block-modules-5.8.0-53-generic-lpae-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"crypto-modules-5.8.0-53-generic-64k-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"crypto-modules-5.8.0-53-generic-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"crypto-modules-5.8.0-53-generic-lpae-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"dasd-extra-modules-5.8.0-53-generic-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"dasd-modules-5.8.0-53-generic-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"fat-modules-5.8.0-53-generic-64k-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"fat-modules-5.8.0-53-generic-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"fat-modules-5.8.0-53-generic-lpae-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"fb-modules-5.8.0-53-generic-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"firewire-core-modules-5.8.0-53-generic-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"floppy-modules-5.8.0-53-generic-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"fs-core-modules-5.8.0-53-generic-64k-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"fs-core-modules-5.8.0-53-generic-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"fs-core-modules-5.8.0-53-generic-lpae-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"fs-secondary-modules-5.8.0-53-generic-64k-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"fs-secondary-modules-5.8.0-53-generic-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"fs-secondary-modules-5.8.0-53-generic-lpae-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"input-modules-5.8.0-53-generic-64k-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"input-modules-5.8.0-53-generic-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"input-modules-5.8.0-53-generic-lpae-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"ipmi-modules-5.8.0-53-generic-64k-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"ipmi-modules-5.8.0-53-generic-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"ipmi-modules-5.8.0-53-generic-lpae-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"kernel-image-5.8.0-53-generic-64k-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"kernel-image-5.8.0-53-generic-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"kernel-image-5.8.0-53-generic-lpae-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"linux-buildinfo-5.8.0-53-generic"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"linux-buildinfo-5.8.0-53-generic-64k"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"linux-buildinfo-5.8.0-53-generic-lpae"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"linux-buildinfo-5.8.0-53-lowlatency"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"linux-cloud-tools-5.8.0-53-generic"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"linux-cloud-tools-5.8.0-53-lowlatency"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"linux-headers-5.8.0-53-generic"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"linux-headers-5.8.0-53-generic-64k"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"linux-headers-5.8.0-53-generic-lpae"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"linux-headers-5.8.0-53-lowlatency"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"linux-hwe-5.8-cloud-tools-5.8.0-53"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"linux-hwe-5.8-cloud-tools-common"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"linux-hwe-5.8-headers-5.8.0-53"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"linux-hwe-5.8-source-5.8.0"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"linux-hwe-5.8-tools-5.8.0-53"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"linux-hwe-5.8-tools-common"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"linux-hwe-5.8-tools-host"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"linux-hwe-5.8-udebs-generic"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"linux-hwe-5.8-udebs-generic-64k"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"linux-hwe-5.8-udebs-generic-lpae"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"linux-image-5.8.0-53-generic"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"linux-image-5.8.0-53-generic-lpae"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"linux-image-unsigned-5.8.0-53-generic"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"linux-image-unsigned-5.8.0-53-generic-64k"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"linux-image-unsigned-5.8.0-53-lowlatency"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"linux-modules-5.8.0-53-generic"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"linux-modules-5.8.0-53-generic-64k"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"linux-modules-5.8.0-53-generic-lpae"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"linux-modules-5.8.0-53-lowlatency"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"linux-modules-extra-5.8.0-53-generic"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"linux-tools-5.8.0-53-generic"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"linux-tools-5.8.0-53-generic-64k"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"linux-tools-5.8.0-53-generic-lpae"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"linux-tools-5.8.0-53-lowlatency"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"md-modules-5.8.0-53-generic-64k-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"md-modules-5.8.0-53-generic-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"md-modules-5.8.0-53-generic-lpae-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"message-modules-5.8.0-53-generic-64k-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"message-modules-5.8.0-53-generic-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"mouse-modules-5.8.0-53-generic-64k-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"mouse-modules-5.8.0-53-generic-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"mouse-modules-5.8.0-53-generic-lpae-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"multipath-modules-5.8.0-53-generic-64k-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"multipath-modules-5.8.0-53-generic-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"multipath-modules-5.8.0-53-generic-lpae-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"nfs-modules-5.8.0-53-generic-64k-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"nfs-modules-5.8.0-53-generic-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"nfs-modules-5.8.0-53-generic-lpae-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"nic-modules-5.8.0-53-generic-64k-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"nic-modules-5.8.0-53-generic-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"nic-modules-5.8.0-53-generic-lpae-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"nic-pcmcia-modules-5.8.0-53-generic-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"nic-shared-modules-5.8.0-53-generic-64k-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"nic-shared-modules-5.8.0-53-generic-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"nic-shared-modules-5.8.0-53-generic-lpae-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"nic-usb-modules-5.8.0-53-generic-64k-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"nic-usb-modules-5.8.0-53-generic-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"nic-usb-modules-5.8.0-53-generic-lpae-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"parport-modules-5.8.0-53-generic-64k-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"parport-modules-5.8.0-53-generic-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"parport-modules-5.8.0-53-generic-lpae-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"pata-modules-5.8.0-53-generic-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"pcmcia-modules-5.8.0-53-generic-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"pcmcia-storage-modules-5.8.0-53-generic-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"plip-modules-5.8.0-53-generic-64k-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"plip-modules-5.8.0-53-generic-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"plip-modules-5.8.0-53-generic-lpae-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"ppp-modules-5.8.0-53-generic-64k-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"ppp-modules-5.8.0-53-generic-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"ppp-modules-5.8.0-53-generic-lpae-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"sata-modules-5.8.0-53-generic-64k-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"sata-modules-5.8.0-53-generic-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"sata-modules-5.8.0-53-generic-lpae-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"scsi-modules-5.8.0-53-generic-64k-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"scsi-modules-5.8.0-53-generic-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"scsi-modules-5.8.0-53-generic-lpae-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"serial-modules-5.8.0-53-generic-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"storage-core-modules-5.8.0-53-generic-64k-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"storage-core-modules-5.8.0-53-generic-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"storage-core-modules-5.8.0-53-generic-lpae-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"usb-modules-5.8.0-53-generic-64k-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"usb-modules-5.8.0-53-generic-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"usb-modules-5.8.0-53-generic-lpae-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"virtio-modules-5.8.0-53-generic-64k-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"virtio-modules-5.8.0-53-generic-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"vlan-modules-5.8.0-53-generic-64k-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"vlan-modules-5.8.0-53-generic-di"},{"binary_version":"5.8.0-53.60~20.04.1","binary_name":"vlan-modules-5.8.0-53-generic-lpae-di"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4949-1.json","cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2020-25639"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2021-3489"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2021-3490"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2021-3491"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2021-26930"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2021-26931"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-28375"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-29264"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-29265"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-29266"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-29646"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-29650"}]}}}],"schema_version":"1.7.3"}