{"id":"USN-4984-1","summary":"linux, linux-aws, linux-azure, linux-gcp, linux-hwe-5.8, linux-kvm, linux-oracle, linux-raspi vulnerabilities","details":"Jan Beulich discovered that the Xen netback backend in the Linux kernel did\nnot properly handle certain error conditions under paravirtualization. An\nattacker in a guest VM could possibly use this to cause a denial of service\n(host domain crash). (CVE-2021-28038)\n\nIt was discovered that the Realtek RTL8188EU Wireless device driver in the\nLinux kernel did not properly validate ssid lengths in some situations. An\nattacker could use this to cause a denial of service (system crash).\n(CVE-2021-28660)\n\nIt was discovered that the Xen paravirtualization backend in the Linux\nkernel did not properly deallocate memory in some situations. A local\nattacker could use this to cause a denial of service (memory exhaustion).\n(CVE-2021-28688)\n\nIt was discovered that the fuse user space file system implementation in\nthe Linux kernel did not properly handle bad inodes in some situations. A\nlocal attacker could possibly use this to cause a denial of service.\n(CVE-2021-28950)\n\nJohn Stultz discovered that the audio driver for Qualcomm SDM845 systems in\nthe Linux kernel did not properly validate port ID numbers. A local\nattacker could use this to cause a denial of service (system crash) or\npossibly execute arbitrary code. (CVE-2021-28952)\n\nZygo Blaxell discovered that the btrfs file system implementation in the\nLinux kernel contained a race condition during certain cloning operations.\nA local attacker could possibly use this to cause a denial of service\n(system crash). (CVE-2021-28964)\n\nVince Weaver discovered that the perf subsystem in the Linux kernel did not\nproperly handle certain PEBS records properly for some Intel Haswell\nprocessors. A local attacker could use this to cause a denial of service\n(system crash). (CVE-2021-28971)\n\nIt was discovered that the RPA PCI Hotplug driver implementation in the\nLinux kernel did not properly handle device name writes via sysfs, leading\nto a buffer overflow. A privileged attacker could use this to cause a\ndenial of service (system crash) or possibly execute arbitrary code.\n(CVE-2021-28972)\n\nIt was discovered that the Qualcomm IPC router implementation in the Linux\nkernel did not properly initialize memory passed to user space. A local\nattacker could use this to expose sensitive information (kernel memory).\n(CVE-2021-29647)\n\nArnd Bergmann discovered that the video4linux subsystem in the Linux kernel\ndid not properly deallocate memory in some situations. A local attacker\ncould use this to cause a denial of service (memory exhaustion).\n(CVE-2021-30002)\n\nDan Carpenter discovered that the block device manager (dm) implementation\nin the Linux kernel contained a buffer overflow in the ioctl for listing\ndevices. A privileged local attacker could use this to cause a denial of\nservice (system crash). (CVE-2021-31916)\n\nIt was discovered that the CIPSO implementation in the Linux kernel did not\nproperly perform reference counting in some situations, leading to use-\nafter-free vulnerabilities. An attacker could use this to cause a denial of\nservice (system crash) or possibly execute arbitrary code. (CVE-2021-33033)\n\n马哲宇 discovered that the IEEE 1394 (Firewire) nosy packet sniffer driver in\nthe Linux kernel did not properly perform reference counting in some\nsituations, leading to a use-after-free vulnerability. A local attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2021-3483)\n","modified":"2026-02-10T04:42:13Z","published":"2021-06-08T02:05:13Z","related":["UBUNTU-CVE-2021-28038","UBUNTU-CVE-2021-28660","UBUNTU-CVE-2021-28688","UBUNTU-CVE-2021-28950","UBUNTU-CVE-2021-28952","UBUNTU-CVE-2021-28964","UBUNTU-CVE-2021-28971","UBUNTU-CVE-2021-28972","UBUNTU-CVE-2021-29647","UBUNTU-CVE-2021-30002","UBUNTU-CVE-2021-31916","UBUNTU-CVE-2021-33033","UBUNTU-CVE-2021-3483"],"upstream":["CVE-2021-28038","CVE-2021-28660","CVE-2021-28688","CVE-2021-28950","CVE-2021-28952","CVE-2021-28964","CVE-2021-28971","CVE-2021-28972","CVE-2021-29647","CVE-2021-30002","CVE-2021-31916","CVE-2021-33033","CVE-2021-3483","UBUNTU-CVE-2021-28038","UBUNTU-CVE-2021-28660","UBUNTU-CVE-2021-28688","UBUNTU-CVE-2021-28950","UBUNTU-CVE-2021-28952","UBUNTU-CVE-2021-28964","UBUNTU-CVE-2021-28971","UBUNTU-CVE-2021-28972","UBUNTU-CVE-2021-29647","UBUNTU-CVE-2021-30002","UBUNTU-CVE-2021-31916","UBUNTU-CVE-2021-33033","UBUNTU-CVE-2021-3483"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4984-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3483"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-28038"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-28660"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-28688"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-28950"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-28952"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-28964"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-28971"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-28972"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-29647"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-30002"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-31916"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-33033"}],"affected":[{"package":{"name":"linux-hwe-5.8","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/linux-hwe-5.8@5.8.0-55.62~20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.8.0-55.62~20.04.1"}]}],"versions":["5.8.0-23.24~20.04.1","5.8.0-25.26~20.04.1","5.8.0-28.30~20.04.1","5.8.0-29.31~20.04.1","5.8.0-31.33~20.04.1","5.8.0-33.36~20.04.1","5.8.0-34.37~20.04.2","5.8.0-36.40~20.04.1","5.8.0-38.43~20.04.1","5.8.0-40.45~20.04.1","5.8.0-41.46~20.04.1","5.8.0-43.49~20.04.1","5.8.0-44.50~20.04.1","5.8.0-45.51~20.04.1","5.8.0-48.54~20.04.1","5.8.0-49.55~20.04.1","5.8.0-50.56~20.04.1","5.8.0-53.60~20.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"block-modules-5.8.0-55-generic-64k-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"block-modules-5.8.0-55-generic-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"block-modules-5.8.0-55-generic-lpae-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"crypto-modules-5.8.0-55-generic-64k-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"crypto-modules-5.8.0-55-generic-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"crypto-modules-5.8.0-55-generic-lpae-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"dasd-extra-modules-5.8.0-55-generic-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"dasd-modules-5.8.0-55-generic-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"fat-modules-5.8.0-55-generic-64k-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"fat-modules-5.8.0-55-generic-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"fat-modules-5.8.0-55-generic-lpae-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"fb-modules-5.8.0-55-generic-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"firewire-core-modules-5.8.0-55-generic-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"floppy-modules-5.8.0-55-generic-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"fs-core-modules-5.8.0-55-generic-64k-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"fs-core-modules-5.8.0-55-generic-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"fs-core-modules-5.8.0-55-generic-lpae-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"fs-secondary-modules-5.8.0-55-generic-64k-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"fs-secondary-modules-5.8.0-55-generic-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"fs-secondary-modules-5.8.0-55-generic-lpae-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"input-modules-5.8.0-55-generic-64k-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"input-modules-5.8.0-55-generic-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"input-modules-5.8.0-55-generic-lpae-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"ipmi-modules-5.8.0-55-generic-64k-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"ipmi-modules-5.8.0-55-generic-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"ipmi-modules-5.8.0-55-generic-lpae-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"kernel-image-5.8.0-55-generic-64k-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"kernel-image-5.8.0-55-generic-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"kernel-image-5.8.0-55-generic-lpae-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"linux-buildinfo-5.8.0-55-generic","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"linux-buildinfo-5.8.0-55-generic-64k","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"linux-buildinfo-5.8.0-55-generic-lpae","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"linux-buildinfo-5.8.0-55-lowlatency","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"linux-cloud-tools-5.8.0-55-generic","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"linux-cloud-tools-5.8.0-55-lowlatency","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"linux-headers-5.8.0-55-generic","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"linux-headers-5.8.0-55-generic-64k","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"linux-headers-5.8.0-55-generic-lpae","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"linux-headers-5.8.0-55-lowlatency","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"linux-hwe-5.8-cloud-tools-5.8.0-55","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"linux-hwe-5.8-cloud-tools-common","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"linux-hwe-5.8-headers-5.8.0-55","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"linux-hwe-5.8-source-5.8.0","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"linux-hwe-5.8-tools-5.8.0-55","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"linux-hwe-5.8-tools-common","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"linux-hwe-5.8-tools-host","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"linux-hwe-5.8-udebs-generic","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"linux-hwe-5.8-udebs-generic-64k","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"linux-hwe-5.8-udebs-generic-lpae","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"linux-image-5.8.0-55-generic","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"linux-image-5.8.0-55-generic-lpae","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"linux-image-unsigned-5.8.0-55-generic","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"linux-image-unsigned-5.8.0-55-generic-64k","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"linux-image-unsigned-5.8.0-55-lowlatency","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"linux-modules-5.8.0-55-generic","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"linux-modules-5.8.0-55-generic-64k","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"linux-modules-5.8.0-55-generic-lpae","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"linux-modules-5.8.0-55-lowlatency","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"linux-modules-extra-5.8.0-55-generic","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"linux-tools-5.8.0-55-generic","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"linux-tools-5.8.0-55-generic-64k","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"linux-tools-5.8.0-55-generic-lpae","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"linux-tools-5.8.0-55-lowlatency","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"md-modules-5.8.0-55-generic-64k-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"md-modules-5.8.0-55-generic-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"md-modules-5.8.0-55-generic-lpae-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"message-modules-5.8.0-55-generic-64k-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"message-modules-5.8.0-55-generic-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"mouse-modules-5.8.0-55-generic-64k-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"mouse-modules-5.8.0-55-generic-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"mouse-modules-5.8.0-55-generic-lpae-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"multipath-modules-5.8.0-55-generic-64k-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"multipath-modules-5.8.0-55-generic-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"multipath-modules-5.8.0-55-generic-lpae-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"nfs-modules-5.8.0-55-generic-64k-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"nfs-modules-5.8.0-55-generic-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"nfs-modules-5.8.0-55-generic-lpae-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"nic-modules-5.8.0-55-generic-64k-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"nic-modules-5.8.0-55-generic-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"nic-modules-5.8.0-55-generic-lpae-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"nic-pcmcia-modules-5.8.0-55-generic-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"nic-shared-modules-5.8.0-55-generic-64k-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"nic-shared-modules-5.8.0-55-generic-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"nic-shared-modules-5.8.0-55-generic-lpae-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"nic-usb-modules-5.8.0-55-generic-64k-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"nic-usb-modules-5.8.0-55-generic-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"nic-usb-modules-5.8.0-55-generic-lpae-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"parport-modules-5.8.0-55-generic-64k-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"parport-modules-5.8.0-55-generic-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"parport-modules-5.8.0-55-generic-lpae-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"pata-modules-5.8.0-55-generic-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"pcmcia-modules-5.8.0-55-generic-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"pcmcia-storage-modules-5.8.0-55-generic-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"plip-modules-5.8.0-55-generic-64k-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"plip-modules-5.8.0-55-generic-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"plip-modules-5.8.0-55-generic-lpae-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"ppp-modules-5.8.0-55-generic-64k-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"ppp-modules-5.8.0-55-generic-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"ppp-modules-5.8.0-55-generic-lpae-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"sata-modules-5.8.0-55-generic-64k-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"sata-modules-5.8.0-55-generic-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"sata-modules-5.8.0-55-generic-lpae-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"scsi-modules-5.8.0-55-generic-64k-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"scsi-modules-5.8.0-55-generic-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"scsi-modules-5.8.0-55-generic-lpae-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"serial-modules-5.8.0-55-generic-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"storage-core-modules-5.8.0-55-generic-64k-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"storage-core-modules-5.8.0-55-generic-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"storage-core-modules-5.8.0-55-generic-lpae-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"usb-modules-5.8.0-55-generic-64k-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"usb-modules-5.8.0-55-generic-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"usb-modules-5.8.0-55-generic-lpae-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"virtio-modules-5.8.0-55-generic-64k-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"virtio-modules-5.8.0-55-generic-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"vlan-modules-5.8.0-55-generic-64k-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"vlan-modules-5.8.0-55-generic-di","binary_version":"5.8.0-55.62~20.04.1"},{"binary_name":"vlan-modules-5.8.0-55-generic-lpae-di","binary_version":"5.8.0-55.62~20.04.1"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"id":"CVE-2021-3483","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-28038","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-28660","severity":[{"score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-28688","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-28950","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-28952","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-28964","severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-28971","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-28972","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-29647","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-30002","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-31916","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-33033","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4984-1.json"}}],"schema_version":"1.7.3"}