{"id":"USN-2917-1","summary":"firefox vulnerabilities","details":"Francis Gabriel discovered a buffer overflow during ASN.1 decoding in NSS.\nIf a user were tricked in to opening a specially crafted website, an\nattacker could potentially exploit this to cause a denial of service via\napplication crash, or execute arbitrary code with the privileges of the\nuser invoking Firefox. (CVE-2016-1950)\n\nBob Clary, Christoph Diehl, Christian Holler, Andrew McCreight, Daniel\nHolbert, Jesse Ruderman, Randell Jesup, Carsten Book, Gian-Carlo Pascutto,\nTyson Smith, Andrea Marchesini, and Jukka Jylänki discovered multiple\nmemory safety issues in Firefox. If a user were tricked in to opening a\nspecially crafted website, an attacker could potentially exploit these to\ncause a denial of service via application crash, or execute arbitrary code\nwith the privileges of the user invoking Firefox. (CVE-2016-1952,\nCVE-2016-1953)\n\nNicolas Golubovic discovered that CSP violation reports can be used to\noverwrite local files. If a user were tricked in to opening a specially\ncrafted website with addon signing disabled and unpacked addons installed,\nan attacker could potentially exploit this to gain additional privileges.\n(CVE-2016-1954)\n\nMuneaki Nishimura discovered that CSP violation reports contained full\npaths for cross-origin iframe navigations. An attacker could potentially\nexploit this to steal confidential data. (CVE-2016-1955)\n\nUcha Gobejishvili discovered that performing certain WebGL operations\nresulted in memory resource exhaustion with some Intel GPUs, requiring\na reboot. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit this to cause a denial\nof service. (CVE-2016-1956)\n\nJose Martinez and Romina Santillan discovered a memory leak in\nlibstagefright during MPEG4 video file processing in some circumstances.\nIf a user were tricked in to opening a specially crafted website, an\nattacker could potentially exploit this to cause a denial of service via\nmemory exhaustion. (CVE-2016-1957)\n\nAbdulrahman Alqabandi discovered that the addressbar could be blank or\nfilled with page defined content in some circumstances. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit this to conduct URL spoofing attacks. (CVE-2016-1958)\n\nLooben Yang discovered an out-of-bounds read in Service Worker Manager. If\na user were tricked in to opening a specially crafted website, an attacker\ncould potentially exploit this to cause a denial of service via\napplication crash, or execute arbitrary code with the privileges of the\nuser invoking Firefox. (CVE-2016-1959)\n\nA use-after-free was discovered in the HTML5 string parser. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit this to cause a denial of service via application\ncrash, or execute arbitrary code with the privileges of the user invoking\nFirefox. (CVE-2016-1960)\n\nA use-after-free was discovered in the SetBody function of HTMLDocument.\nIf a user were tricked in to opening a specially crafted website, an\nattacker could potentially exploit this to cause a denial of service via\napplication crash, or execute arbitrary code with the privileges of the\nuser invoking Firefox. (CVE-2016-1961)\n\nDominique Hazaël-Massieux discovered a use-after-free when using multiple\nWebRTC data channels. If a user were tricked in to opening a specially\ncrafted website, an attacker could potentially exploit this to cause a\ndenial of service via application crash, or execute arbitrary code with\nthe privileges of the user invoking Firefox. (CVE-2016-1962)\n\nIt was discovered that Firefox crashes when local files are modified\nwhilst being read by the FileReader API. If a user were tricked in to\nopening a specially crafted website, an attacker could potentially exploit\nthis to execute arbitrary code with the privileges of the user invoking\nFirefox. (CVE-2016-1963)\n\nNicolas Grégoire discovered a use-after-free during XML transformations.\nIf a user were tricked in to opening a specially crafted website, an\nattacker could potentially exploit this to cause a denial of service via\napplication crash, or execute arbitrary code with the privileges of the\nuser invoking Firefox. (CVE-2016-1964)\n\nTsubasa Iinuma discovered a mechanism to cause the addressbar to display\nan incorrect URL, using history navigations and the Location protocol\nproperty. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit this to conduct URL\nspoofing attacks. (CVE-2016-1965)\n\nA memory corruption issues was discovered in the NPAPI subsystem. If\na user were tricked in to opening a specially crafted website with a\nmalicious plugin installed, an attacker could potentially exploit this\nto cause a denial of service via application crash, or execute arbitrary\ncode with the privileges of the user invoking Firefox. (CVE-2016-1966)\n\nJordi Chancel discovered a same-origin-policy bypass when using\nperformance.getEntries and history navigation with session restore. If\na user were tricked in to opening a specially crafted website, an attacker\ncould potentially exploit this to steal confidential data. (CVE-2016-1967)\n\nLuke Li discovered a buffer overflow during Brotli decompression in some\ncircumstances. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit this to cause a denial of\nservice via application crash, or execute arbitrary code with the\nprivileges of the user invoking Firefox. (CVE-2016-1968)\n\nRonald Crane discovered a use-after-free in GetStaticInstance in WebRTC.\nIf a user were tricked in to opening a specially crafted website, an\nattacker could potentially exploit this to cause a denial of service via\napplication crash, or execute arbitrary code with the privileges of the\nuser invoking Firefox. (CVE-2016-1973)\n\nRonald Crane discovered an out-of-bounds read following a failed\nallocation in the HTML parser in some circumstances. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit this to cause a denial of service via application\ncrash, or execute arbitrary code with the privileges of the user invoking\nFirefox. (CVE-2016-1974)\n\nHolger Fuhrmannek, Tyson Smith and Holger Fuhrmannek reported multiple\nmemory safety issues in the Graphite 2 library. If a user were tricked in\nto opening a specially crafted website, an attacker could potentially\nexploit these to cause a denial of service via application crash, or\nexecute arbitrary code with the privileges of the user invoking Firefox.\n(CVE-2016-1977, CVE-2016-2790, CVE-2016-2791, CVE-2016-2792,\nCVE-2016-2793, CVE-2016-2794, CVE-2016-2795, CVE-2016-2796, CVE-2016-2797,\nCVE-2016-2798, CVE-2016-2799, CVE-2016-2800, CVE-2016-2801, CVE-2016-2802)\n","modified":"2026-02-10T04:40:57Z","published":"2016-03-09T15:28:50Z","related":["UBUNTU-CVE-2016-1950","UBUNTU-CVE-2016-1952","UBUNTU-CVE-2016-1953","UBUNTU-CVE-2016-1954","UBUNTU-CVE-2016-1955","UBUNTU-CVE-2016-1956","UBUNTU-CVE-2016-1957","UBUNTU-CVE-2016-1958","UBUNTU-CVE-2016-1959","UBUNTU-CVE-2016-1960","UBUNTU-CVE-2016-1961","UBUNTU-CVE-2016-1962","UBUNTU-CVE-2016-1963","UBUNTU-CVE-2016-1964","UBUNTU-CVE-2016-1965","UBUNTU-CVE-2016-1966","UBUNTU-CVE-2016-1967","UBUNTU-CVE-2016-1968","UBUNTU-CVE-2016-1973","UBUNTU-CVE-2016-1974","UBUNTU-CVE-2016-1977","UBUNTU-CVE-2016-2790","UBUNTU-CVE-2016-2791","UBUNTU-CVE-2016-2792","UBUNTU-CVE-2016-2793","UBUNTU-CVE-2016-2794","UBUNTU-CVE-2016-2795","UBUNTU-CVE-2016-2796","UBUNTU-CVE-2016-2797","UBUNTU-CVE-2016-2798","UBUNTU-CVE-2016-2799","UBUNTU-CVE-2016-2800","UBUNTU-CVE-2016-2801","UBUNTU-CVE-2016-2802"],"upstream":["CVE-2016-1950","CVE-2016-1952","CVE-2016-1953","CVE-2016-1954","CVE-2016-1955","CVE-2016-1956","CVE-2016-1957","CVE-2016-1958","CVE-2016-1959","CVE-2016-1960","CVE-2016-1961","CVE-2016-1962","CVE-2016-1963","CVE-2016-1964","CVE-2016-1965","CVE-2016-1966","CVE-2016-1967","CVE-2016-1968","CVE-2016-1973","CVE-2016-1974","CVE-2016-1977","CVE-2016-2790","CVE-2016-2791","CVE-2016-2792","CVE-2016-2793","CVE-2016-2794","CVE-2016-2795","CVE-2016-2796","CVE-2016-2797","CVE-2016-2798","CVE-2016-2799","CVE-2016-2800","CVE-2016-2801","CVE-2016-2802","UBUNTU-CVE-2016-1950","UBUNTU-CVE-2016-1952","UBUNTU-CVE-2016-1953","UBUNTU-CVE-2016-1954","UBUNTU-CVE-2016-1955","UBUNTU-CVE-2016-1956","UBUNTU-CVE-2016-1957","UBUNTU-CVE-2016-1958","UBUNTU-CVE-2016-1959","UBUNTU-CVE-2016-1960","UBUNTU-CVE-2016-1961","UBUNTU-CVE-2016-1962","UBUNTU-CVE-2016-1963","UBUNTU-CVE-2016-1964","UBUNTU-CVE-2016-1965","UBUNTU-CVE-2016-1966","UBUNTU-CVE-2016-1967","UBUNTU-CVE-2016-1968","UBUNTU-CVE-2016-1973","UBUNTU-CVE-2016-1974","UBUNTU-CVE-2016-1977","UBUNTU-CVE-2016-2790","UBUNTU-CVE-2016-2791","UBUNTU-CVE-2016-2792","UBUNTU-CVE-2016-2793","UBUNTU-CVE-2016-2794","UBUNTU-CVE-2016-2795","UBUNTU-CVE-2016-2796","UBUNTU-CVE-2016-2797","UBUNTU-CVE-2016-2798","UBUNTU-CVE-2016-2799","UBUNTU-CVE-2016-2800","UBUNTU-CVE-2016-2801","UBUNTU-CVE-2016-2802"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2917-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1950"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1952"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1953"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1954"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1955"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1956"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1957"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1958"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1959"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1960"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1961"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1962"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1963"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1964"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1965"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1966"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1967"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1968"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1973"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1974"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1977"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2790"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2791"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2792"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2793"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2794"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2795"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2796"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2797"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2798"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2799"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2800"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2801"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2802"}],"affected":[{"package":{"name":"firefox","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/firefox@45.0+build2-0ubuntu0.14.04.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"45.0+build2-0ubuntu0.14.04.1"}]}],"versions":["24.0+build1-0ubuntu1","25.0+build3-0ubuntu0.13.10.1","28.0~b2+build1-0ubuntu2","28.0+build1-0ubuntu1","28.0+build2-0ubuntu1","28.0+build2-0ubuntu2","29.0+build1-0ubuntu0.14.04.2","30.0+build1-0ubuntu0.14.04.3","31.0+build1-0ubuntu0.14.04.1","32.0+build1-0ubuntu0.14.04.1","32.0.3+build1-0ubuntu0.14.04.1","33.0+build2-0ubuntu0.14.04.1","34.0+build2-0ubuntu0.14.04.1","35.0+build3-0ubuntu0.14.04.2","35.0.1+build1-0ubuntu0.14.04.1","36.0+build2-0ubuntu0.14.04.4","36.0.1+build2-0ubuntu0.14.04.1","36.0.4+build1-0ubuntu0.14.04.1","37.0+build2-0ubuntu0.14.04.1","37.0.1+build1-0ubuntu0.14.04.1","37.0.2+build1-0ubuntu0.14.04.1","38.0+build3-0ubuntu0.14.04.1","39.0+build5-0ubuntu0.14.04.1","39.0.3+build2-0ubuntu0.14.04.1","40.0+build4-0ubuntu0.14.04.1","40.0+build4-0ubuntu0.14.04.4","40.0.3+build1-0ubuntu0.14.04.1","41.0+build3-0ubuntu0.14.04.1","41.0.1+build2-0ubuntu0.14.04.1","41.0.2+build2-0ubuntu0.14.04.1","42.0+build2-0ubuntu0.14.04.1","43.0+build1-0ubuntu0.14.04.1","43.0.4+build3-0ubuntu0.14.04.1","44.0+build3-0ubuntu0.14.04.1","44.0.1+build2-0ubuntu0.14.04.1","44.0.2+build1-0ubuntu0.14.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"45.0+build2-0ubuntu0.14.04.1","binary_name":"firefox"},{"binary_version":"45.0+build2-0ubuntu0.14.04.1","binary_name":"firefox-dev"},{"binary_version":"45.0+build2-0ubuntu0.14.04.1","binary_name":"firefox-globalmenu"},{"binary_version":"45.0+build2-0ubuntu0.14.04.1","binary_name":"firefox-mozsymbols"},{"binary_version":"45.0+build2-0ubuntu0.14.04.1","binary_name":"firefox-testsuite"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-1950"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-1952"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-1953"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-1954"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-1955"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-1956"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2016-1957"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-1958"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-1959"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-1960"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-1961"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-1962"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2016-1963"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-1964"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-1965"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-1966"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-1967"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-1968"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2016-1973"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-1974"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-1977"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2790"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2791"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2792"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2793"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2794"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2795"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2796"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2797"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2798"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2799"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2800"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2801"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2016-2802"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2917-1.json"}}],"schema_version":"1.7.3"}