{"id":"USN-4999-1","summary":"linux, linux-aws, linux-aws-5.8, linux-azure, linux-azure-5.8, linux-gcp, linux-gcp-5.8, linux-hwe-5.8, linux-kvm, linux-oracle, linux-oracle-5.8, linux-raspi vulnerabilities","details":"Norbert Slusarek discovered a race condition in the CAN BCM networking\nprotocol of the Linux kernel leading to multiple use-after-free\nvulnerabilities. A local attacker could use this issue to execute arbitrary\ncode. (CVE-2021-3609)\n\nPiotr Krysiuk discovered that the eBPF implementation in the Linux kernel\ndid not properly enforce limits for pointer operations. A local attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2021-33200)\n\nMathy Vanhoef discovered that the Linux kernel’s WiFi implementation did\nnot properly clear received fragments from memory in some situations. A\nphysically proximate attacker could possibly use this issue to inject\npackets or expose sensitive information. (CVE-2020-24586)\n\nMathy Vanhoef discovered that the Linux kernel’s WiFi implementation\nincorrectly handled encrypted fragments. A physically proximate attacker\ncould possibly use this issue to decrypt fragments. (CVE-2020-24587)\n\nMathy Vanhoef discovered that the Linux kernel’s WiFi implementation\nincorrectly handled certain malformed frames. If a user were tricked into\nconnecting to a malicious server, a physically proximate attacker could use\nthis issue to inject packets. (CVE-2020-24588)\n\nKiyin (尹亮) discovered that the NFC LLCP protocol implementation in the\nLinux kernel contained a reference counting error. A local attacker could\nuse this to cause a denial of service (system crash). (CVE-2020-25670)\n\nKiyin (尹亮) discovered that the NFC LLCP protocol implementation in the\nLinux kernel did not properly deallocate memory in certain error\nsituations. A local attacker could use this to cause a denial of service\n(memory exhaustion). (CVE-2020-25671, CVE-2020-25672)\n\nKiyin (尹亮) discovered that the NFC LLCP protocol implementation in the\nLinux kernel did not properly handle error conditions in some situations,\nleading to an infinite loop. A local attacker could use this to cause a\ndenial of service. (CVE-2020-25673)\n\nMathy Vanhoef discovered that the Linux kernel’s WiFi implementation\nincorrectly handled EAPOL frames from unauthenticated senders. A physically\nproximate attacker could inject malicious packets to cause a denial of\nservice (system crash). (CVE-2020-26139)\n\nMathy Vanhoef discovered that the Linux kernel’s WiFi implementation did\nnot properly verify certain fragmented frames. A physically proximate\nattacker could possibly use this issue to inject or decrypt packets.\n(CVE-2020-26141)\n\nMathy Vanhoef discovered that the Linux kernel’s WiFi implementation\naccepted plaintext fragments in certain situations. A physically proximate\n attacker could use this issue to inject packets. (CVE-2020-26145)\n\nMathy Vanhoef discovered that the Linux kernel’s WiFi implementation could\nreassemble mixed encrypted and plaintext fragments. A physically proximate\nattacker could possibly use this issue to inject packets or exfiltrate\n selected fragments. (CVE-2020-26147)\n\nOr Cohen discovered that the SCTP implementation in the Linux kernel\ncontained a race condition in some situations, leading to a use-after-free\ncondition. A local attacker could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2021-23133)\n\nPiotr Krysiuk and Benedict Schlueter discovered that the eBPF\nimplementation in the Linux kernel performed out of bounds speculation on\npointer arithmetic. A local attacker could use this to expose sensitive\ninformation. (CVE-2021-29155)\n\nManfred Paul discovered that the extended Berkeley Packet Filter (eBPF)\nimplementation in the Linux kernel contained an out-of-bounds\nvulnerability. A local attacker could use this issue to execute arbitrary\ncode. (CVE-2021-31440)\n\nPiotr Krysiuk discovered that the eBPF implementation in the Linux kernel\ndid not properly prevent speculative loads in certain situations. A local\nattacker could use this to expose sensitive information (kernel memory).\n(CVE-2021-31829)\n","modified":"2026-04-27T16:03:38.830281909Z","published":"2021-06-23T02:52:44Z","related":["UBUNTU-CVE-2020-24586","UBUNTU-CVE-2020-24587","UBUNTU-CVE-2020-24588","UBUNTU-CVE-2020-25670","UBUNTU-CVE-2020-25671","UBUNTU-CVE-2020-25672","UBUNTU-CVE-2020-25673","UBUNTU-CVE-2020-26139","UBUNTU-CVE-2020-26141","UBUNTU-CVE-2020-26145","UBUNTU-CVE-2020-26147","UBUNTU-CVE-2021-23133","UBUNTU-CVE-2021-29155","UBUNTU-CVE-2021-31440","UBUNTU-CVE-2021-31829","UBUNTU-CVE-2021-33200","UBUNTU-CVE-2021-3609"],"upstream":["CVE-2020-24586","CVE-2020-24587","CVE-2020-24588","CVE-2020-25670","CVE-2020-25671","CVE-2020-25672","CVE-2020-25673","CVE-2020-26139","CVE-2020-26141","CVE-2020-26145","CVE-2020-26147","CVE-2021-23133","CVE-2021-29155","CVE-2021-31440","CVE-2021-31829","CVE-2021-33200","CVE-2021-3609","UBUNTU-CVE-2020-24586","UBUNTU-CVE-2020-24587","UBUNTU-CVE-2020-24588","UBUNTU-CVE-2020-25670","UBUNTU-CVE-2020-25671","UBUNTU-CVE-2020-25672","UBUNTU-CVE-2020-25673","UBUNTU-CVE-2020-26139","UBUNTU-CVE-2020-26141","UBUNTU-CVE-2020-26145","UBUNTU-CVE-2020-26147","UBUNTU-CVE-2021-23133","UBUNTU-CVE-2021-29155","UBUNTU-CVE-2021-31440","UBUNTU-CVE-2021-31829","UBUNTU-CVE-2021-33200","UBUNTU-CVE-2021-3609"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4999-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-24586"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-24587"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-24588"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-25670"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-25671"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-25672"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-25673"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-26139"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-26141"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-26145"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-26147"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3609"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-23133"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-29155"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-31440"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-31829"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-33200"}],"affected":[{"package":{"name":"linux-aws-5.8","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/linux-aws-5.8@5.8.0-1038.40~20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.8.0-1038.40~20.04.1"}]}],"versions":["5.8.0-1035.37~20.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-aws-5.8-cloud-tools-5.8.0-1038","binary_version":"5.8.0-1038.40~20.04.1"},{"binary_name":"linux-aws-5.8-headers-5.8.0-1038","binary_version":"5.8.0-1038.40~20.04.1"},{"binary_name":"linux-aws-5.8-tools-5.8.0-1038","binary_version":"5.8.0-1038.40~20.04.1"},{"binary_name":"linux-buildinfo-5.8.0-1038-aws","binary_version":"5.8.0-1038.40~20.04.1"},{"binary_name":"linux-cloud-tools-5.8.0-1038-aws","binary_version":"5.8.0-1038.40~20.04.1"},{"binary_name":"linux-headers-5.8.0-1038-aws","binary_version":"5.8.0-1038.40~20.04.1"},{"binary_name":"linux-image-5.8.0-1038-aws","binary_version":"5.8.0-1038.40~20.04.1"},{"binary_name":"linux-modules-5.8.0-1038-aws","binary_version":"5.8.0-1038.40~20.04.1"},{"binary_name":"linux-modules-extra-5.8.0-1038-aws","binary_version":"5.8.0-1038.40~20.04.1"},{"binary_name":"linux-tools-5.8.0-1038-aws","binary_version":"5.8.0-1038.40~20.04.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4999-1.json","cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-24586"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-24587"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-24588"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-25670"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-25671"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-25672"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-25673"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-26139"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-26141"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-26145"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-26147"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2021-3609"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-23133"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-29155"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-31440"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-31829"}],"ecosystem":"Ubuntu:20.04:LTS"}}},{"package":{"name":"linux-azure-5.8","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/linux-azure-5.8@5.8.0-1036.38~20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.8.0-1036.38~20.04.1"}]}],"versions":["5.8.0-1033.35~20.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-azure-5.8-cloud-tools-5.8.0-1036","binary_version":"5.8.0-1036.38~20.04.1"},{"binary_name":"linux-azure-5.8-headers-5.8.0-1036","binary_version":"5.8.0-1036.38~20.04.1"},{"binary_name":"linux-azure-5.8-tools-5.8.0-1036","binary_version":"5.8.0-1036.38~20.04.1"},{"binary_name":"linux-buildinfo-5.8.0-1036-azure","binary_version":"5.8.0-1036.38~20.04.1"},{"binary_name":"linux-cloud-tools-5.8.0-1036-azure","binary_version":"5.8.0-1036.38~20.04.1"},{"binary_name":"linux-headers-5.8.0-1036-azure","binary_version":"5.8.0-1036.38~20.04.1"},{"binary_name":"linux-image-unsigned-5.8.0-1036-azure","binary_version":"5.8.0-1036.38~20.04.1"},{"binary_name":"linux-modules-5.8.0-1036-azure","binary_version":"5.8.0-1036.38~20.04.1"},{"binary_name":"linux-modules-extra-5.8.0-1036-azure","binary_version":"5.8.0-1036.38~20.04.1"},{"binary_name":"linux-tools-5.8.0-1036-azure","binary_version":"5.8.0-1036.38~20.04.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4999-1.json","cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-24586"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-24587"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-24588"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-25670"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-25671"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-25672"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-25673"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-26139"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-26141"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-26145"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-26147"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2021-3609"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-23133"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-29155"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-31440"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-31829"}],"ecosystem":"Ubuntu:20.04:LTS"}}},{"package":{"name":"linux-gcp-5.8","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/linux-gcp-5.8@5.8.0-1035.37~20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.8.0-1035.37~20.04.1"}]}],"versions":["5.8.0-1032.34~20.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-buildinfo-5.8.0-1035-gcp","binary_version":"5.8.0-1035.37~20.04.1"},{"binary_name":"linux-gcp-5.8-headers-5.8.0-1035","binary_version":"5.8.0-1035.37~20.04.1"},{"binary_name":"linux-gcp-5.8-tools-5.8.0-1035","binary_version":"5.8.0-1035.37~20.04.1"},{"binary_name":"linux-headers-5.8.0-1035-gcp","binary_version":"5.8.0-1035.37~20.04.1"},{"binary_name":"linux-image-unsigned-5.8.0-1035-gcp","binary_version":"5.8.0-1035.37~20.04.1"},{"binary_name":"linux-modules-5.8.0-1035-gcp","binary_version":"5.8.0-1035.37~20.04.1"},{"binary_name":"linux-modules-extra-5.8.0-1035-gcp","binary_version":"5.8.0-1035.37~20.04.1"},{"binary_name":"linux-tools-5.8.0-1035-gcp","binary_version":"5.8.0-1035.37~20.04.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4999-1.json","cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-24586"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-24587"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-24588"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-25670"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-25671"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-25672"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-25673"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-26139"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-26141"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-26145"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-26147"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2021-3609"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-23133"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-29155"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-31440"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-31829"}],"ecosystem":"Ubuntu:20.04:LTS"}}},{"package":{"name":"linux-hwe-5.8","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/linux-hwe-5.8@5.8.0-59.66~20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.8.0-59.66~20.04.1"}]}],"versions":["5.8.0-23.24~20.04.1","5.8.0-25.26~20.04.1","5.8.0-28.30~20.04.1","5.8.0-29.31~20.04.1","5.8.0-31.33~20.04.1","5.8.0-33.36~20.04.1","5.8.0-34.37~20.04.2","5.8.0-36.40~20.04.1","5.8.0-38.43~20.04.1","5.8.0-40.45~20.04.1","5.8.0-41.46~20.04.1","5.8.0-43.49~20.04.1","5.8.0-44.50~20.04.1","5.8.0-45.51~20.04.1","5.8.0-48.54~20.04.1","5.8.0-49.55~20.04.1","5.8.0-50.56~20.04.1","5.8.0-53.60~20.04.1","5.8.0-55.62~20.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"block-modules-5.8.0-59-generic-64k-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"block-modules-5.8.0-59-generic-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"block-modules-5.8.0-59-generic-lpae-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"crypto-modules-5.8.0-59-generic-64k-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"crypto-modules-5.8.0-59-generic-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"crypto-modules-5.8.0-59-generic-lpae-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"dasd-extra-modules-5.8.0-59-generic-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"dasd-modules-5.8.0-59-generic-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"fat-modules-5.8.0-59-generic-64k-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"fat-modules-5.8.0-59-generic-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"fat-modules-5.8.0-59-generic-lpae-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"fb-modules-5.8.0-59-generic-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"firewire-core-modules-5.8.0-59-generic-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"floppy-modules-5.8.0-59-generic-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"fs-core-modules-5.8.0-59-generic-64k-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"fs-core-modules-5.8.0-59-generic-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"fs-core-modules-5.8.0-59-generic-lpae-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"fs-secondary-modules-5.8.0-59-generic-64k-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"fs-secondary-modules-5.8.0-59-generic-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"fs-secondary-modules-5.8.0-59-generic-lpae-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"input-modules-5.8.0-59-generic-64k-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"input-modules-5.8.0-59-generic-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"input-modules-5.8.0-59-generic-lpae-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"ipmi-modules-5.8.0-59-generic-64k-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"ipmi-modules-5.8.0-59-generic-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"ipmi-modules-5.8.0-59-generic-lpae-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"kernel-image-5.8.0-59-generic-64k-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"kernel-image-5.8.0-59-generic-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"kernel-image-5.8.0-59-generic-lpae-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"linux-buildinfo-5.8.0-59-generic","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"linux-buildinfo-5.8.0-59-generic-64k","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"linux-buildinfo-5.8.0-59-generic-lpae","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"linux-buildinfo-5.8.0-59-lowlatency","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"linux-cloud-tools-5.8.0-59-generic","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"linux-cloud-tools-5.8.0-59-lowlatency","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"linux-headers-5.8.0-59-generic","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"linux-headers-5.8.0-59-generic-64k","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"linux-headers-5.8.0-59-generic-lpae","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"linux-headers-5.8.0-59-lowlatency","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"linux-hwe-5.8-cloud-tools-5.8.0-59","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"linux-hwe-5.8-cloud-tools-common","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"linux-hwe-5.8-headers-5.8.0-59","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"linux-hwe-5.8-source-5.8.0","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"linux-hwe-5.8-tools-5.8.0-59","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"linux-hwe-5.8-tools-common","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"linux-hwe-5.8-tools-host","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"linux-hwe-5.8-udebs-generic","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"linux-hwe-5.8-udebs-generic-64k","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"linux-hwe-5.8-udebs-generic-lpae","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"linux-image-5.8.0-59-generic","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"linux-image-5.8.0-59-generic-lpae","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"linux-image-unsigned-5.8.0-59-generic","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"linux-image-unsigned-5.8.0-59-generic-64k","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"linux-image-unsigned-5.8.0-59-lowlatency","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"linux-modules-5.8.0-59-generic","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"linux-modules-5.8.0-59-generic-64k","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"linux-modules-5.8.0-59-generic-lpae","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"linux-modules-5.8.0-59-lowlatency","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"linux-modules-extra-5.8.0-59-generic","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"linux-tools-5.8.0-59-generic","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"linux-tools-5.8.0-59-generic-64k","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"linux-tools-5.8.0-59-generic-lpae","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"linux-tools-5.8.0-59-lowlatency","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"md-modules-5.8.0-59-generic-64k-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"md-modules-5.8.0-59-generic-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"md-modules-5.8.0-59-generic-lpae-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"message-modules-5.8.0-59-generic-64k-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"message-modules-5.8.0-59-generic-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"mouse-modules-5.8.0-59-generic-64k-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"mouse-modules-5.8.0-59-generic-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"mouse-modules-5.8.0-59-generic-lpae-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"multipath-modules-5.8.0-59-generic-64k-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"multipath-modules-5.8.0-59-generic-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"multipath-modules-5.8.0-59-generic-lpae-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"nfs-modules-5.8.0-59-generic-64k-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"nfs-modules-5.8.0-59-generic-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"nfs-modules-5.8.0-59-generic-lpae-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"nic-modules-5.8.0-59-generic-64k-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"nic-modules-5.8.0-59-generic-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"nic-modules-5.8.0-59-generic-lpae-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"nic-pcmcia-modules-5.8.0-59-generic-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"nic-shared-modules-5.8.0-59-generic-64k-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"nic-shared-modules-5.8.0-59-generic-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"nic-shared-modules-5.8.0-59-generic-lpae-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"nic-usb-modules-5.8.0-59-generic-64k-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"nic-usb-modules-5.8.0-59-generic-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"nic-usb-modules-5.8.0-59-generic-lpae-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"parport-modules-5.8.0-59-generic-64k-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"parport-modules-5.8.0-59-generic-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"parport-modules-5.8.0-59-generic-lpae-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"pata-modules-5.8.0-59-generic-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"pcmcia-modules-5.8.0-59-generic-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"pcmcia-storage-modules-5.8.0-59-generic-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"plip-modules-5.8.0-59-generic-64k-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"plip-modules-5.8.0-59-generic-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"plip-modules-5.8.0-59-generic-lpae-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"ppp-modules-5.8.0-59-generic-64k-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"ppp-modules-5.8.0-59-generic-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"ppp-modules-5.8.0-59-generic-lpae-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"sata-modules-5.8.0-59-generic-64k-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"sata-modules-5.8.0-59-generic-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"sata-modules-5.8.0-59-generic-lpae-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"scsi-modules-5.8.0-59-generic-64k-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"scsi-modules-5.8.0-59-generic-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"scsi-modules-5.8.0-59-generic-lpae-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"serial-modules-5.8.0-59-generic-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"storage-core-modules-5.8.0-59-generic-64k-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"storage-core-modules-5.8.0-59-generic-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"storage-core-modules-5.8.0-59-generic-lpae-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"usb-modules-5.8.0-59-generic-64k-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"usb-modules-5.8.0-59-generic-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"usb-modules-5.8.0-59-generic-lpae-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"virtio-modules-5.8.0-59-generic-64k-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"virtio-modules-5.8.0-59-generic-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"vlan-modules-5.8.0-59-generic-64k-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"vlan-modules-5.8.0-59-generic-di","binary_version":"5.8.0-59.66~20.04.1"},{"binary_name":"vlan-modules-5.8.0-59-generic-lpae-di","binary_version":"5.8.0-59.66~20.04.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4999-1.json","cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-24586"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-24587"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-24588"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-25670"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-25671"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-25672"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-25673"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-26139"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-26141"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-26145"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-26147"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2021-3609"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-23133"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-29155"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-31440"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-31829"}],"ecosystem":"Ubuntu:20.04:LTS"}}},{"package":{"name":"linux-oracle-5.8","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/linux-oracle-5.8@5.8.0-1033.34~20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.8.0-1033.34~20.04.1"}]}],"versions":["5.8.0-1031.32~20.04.2"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"linux-buildinfo-5.8.0-1033-oracle","binary_version":"5.8.0-1033.34~20.04.1"},{"binary_name":"linux-headers-5.8.0-1033-oracle","binary_version":"5.8.0-1033.34~20.04.1"},{"binary_name":"linux-image-unsigned-5.8.0-1033-oracle","binary_version":"5.8.0-1033.34~20.04.1"},{"binary_name":"linux-modules-5.8.0-1033-oracle","binary_version":"5.8.0-1033.34~20.04.1"},{"binary_name":"linux-modules-extra-5.8.0-1033-oracle","binary_version":"5.8.0-1033.34~20.04.1"},{"binary_name":"linux-oracle-5.8-headers-5.8.0-1033","binary_version":"5.8.0-1033.34~20.04.1"},{"binary_name":"linux-oracle-5.8-tools-5.8.0-1033","binary_version":"5.8.0-1033.34~20.04.1"},{"binary_name":"linux-tools-5.8.0-1033-oracle","binary_version":"5.8.0-1033.34~20.04.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4999-1.json","cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-24586"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-24587"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-24588"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-25670"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-25671"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-25672"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-25673"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-26139"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-26141"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-26145"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-26147"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2021-3609"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-23133"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-29155"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-31440"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-31829"}],"ecosystem":"Ubuntu:20.04:LTS"}}}],"schema_version":"1.7.5"}