{"id":"USN-2934-1","summary":"thunderbird vulnerabilities","details":"Bob Clary, Christoph Diehl, Christian Holler, Andrew McCreight, Daniel\nHolbert, Jesse Ruderman, and Randell Jesup discovered multiple memory\nsafety issues in Thunderbird. If a user were tricked in to opening a\nspecially crafted message, an attacker could potentially exploit these to\ncause a denial of service via application crash, or execute arbitrary code\nwith the privileges of the user invoking Thunderbird. (CVE-2016-1952)\n\nNicolas Golubovic discovered that CSP violation reports can be used to\noverwrite local files. If a user were tricked in to opening a specially\ncrafted website in a browsing context with addon signing disabled and\nunpacked addons installed, an attacker could potentially exploit this to\ngain additional privileges. (CVE-2016-1954)\n\nJose Martinez and Romina Santillan discovered a memory leak in\nlibstagefright during MPEG4 video file processing in some circumstances.\nIf a user were tricked in to opening a specially crafted website in a\nbrowsing context, an attacker could potentially exploit this to cause a\ndenial of service via memory exhaustion. (CVE-2016-1957)\n\nA use-after-free was discovered in the HTML5 string parser. If a user were\ntricked in to opening a specially crafted website in a browsing context, an\nattacker could potentially exploit this to cause a denial of service via\napplication crash, or execute arbitrary code with the privileges of the user\ninvoking Thunderbird. (CVE-2016-1960)\n\nA use-after-free was discovered in the SetBody function of HTMLDocument.\nIf a user were tricked in to opening a specially crafted website in a\nbrowsing context, an attacker could potentially exploit this to cause a\ndenial of service via application crash, or execute arbitrary code with\nthe privileges of the user invoking Thunderbird. (CVE-2016-1961)\n\nNicolas Grégoire discovered a use-after-free during XML transformations.\nIf a user were tricked in to opening a specially crafted website in a\nbrowsing context, an attacker could potentially exploit this to cause a\ndenial of service via application crash, or execute arbitrary code with\nthe privileges of the user invoking Thunderbird. (CVE-2016-1964)\n\nA memory corruption issues was discovered in the NPAPI subsystem. If\na user were tricked in to opening a specially crafted website in a\nbrowsing context with a malicious plugin installed, an attacker could\npotentially exploit this to cause a denial of service via application\ncrash, or execute arbitrary code with the privileges of the user invoking\nThunderbird. (CVE-2016-1966)\n\nRonald Crane discovered an out-of-bounds read following a failed\nallocation in the HTML parser in some circumstances. If a user were\ntricked in to opening a specially crafted website in a browsing context,\nan attacker could potentially exploit this to cause a denial of service\nvia application crash, or execute arbitrary code with the privileges of\nthe user invoking Thunderbird. (CVE-2016-1974)\n\nFrancis Gabriel discovered a buffer overflow during ASN.1 decoding in NSS.\nA remote attacker could potentially exploit this to cause a denial of\nservice via application crash, or execute arbitrary code with the\nprivileges of the user invoking Thunderbird. (CVE-2016-1950)\n\nHolger Fuhrmannek, Tyson Smith and Holger Fuhrmannek reported multiple\nmemory safety issues in the Graphite 2 library. If a user were tricked in\nto opening a specially crafted message, an attacker could potentially\nexploit these to cause a denial of service via application crash, or\nexecute arbitrary code with the privileges of the user invoking\nThunderbird. (CVE-2016-1977, CVE-2016-2790, CVE-2016-2791, CVE-2016-2792,\nCVE-2016-2793, CVE-2016-2794, CVE-2016-2795, CVE-2016-2796, CVE-2016-2797,\nCVE-2016-2798, CVE-2016-2799, CVE-2016-2800, CVE-2016-2801, CVE-2016-2802)\n","modified":"2026-02-10T04:40:58Z","published":"2016-04-27T22:32:50Z","related":["UBUNTU-CVE-2016-1950","UBUNTU-CVE-2016-1952","UBUNTU-CVE-2016-1954","UBUNTU-CVE-2016-1957","UBUNTU-CVE-2016-1960","UBUNTU-CVE-2016-1961","UBUNTU-CVE-2016-1964","UBUNTU-CVE-2016-1966","UBUNTU-CVE-2016-1974","UBUNTU-CVE-2016-1977","UBUNTU-CVE-2016-2790","UBUNTU-CVE-2016-2791","UBUNTU-CVE-2016-2792","UBUNTU-CVE-2016-2793","UBUNTU-CVE-2016-2794","UBUNTU-CVE-2016-2795","UBUNTU-CVE-2016-2796","UBUNTU-CVE-2016-2797","UBUNTU-CVE-2016-2798","UBUNTU-CVE-2016-2799","UBUNTU-CVE-2016-2800","UBUNTU-CVE-2016-2801","UBUNTU-CVE-2016-2802"],"upstream":["CVE-2016-1950","CVE-2016-1952","CVE-2016-1954","CVE-2016-1957","CVE-2016-1960","CVE-2016-1961","CVE-2016-1964","CVE-2016-1966","CVE-2016-1974","CVE-2016-1977","CVE-2016-2790","CVE-2016-2791","CVE-2016-2792","CVE-2016-2793","CVE-2016-2794","CVE-2016-2795","CVE-2016-2796","CVE-2016-2797","CVE-2016-2798","CVE-2016-2799","CVE-2016-2800","CVE-2016-2801","CVE-2016-2802","UBUNTU-CVE-2016-1950","UBUNTU-CVE-2016-1952","UBUNTU-CVE-2016-1954","UBUNTU-CVE-2016-1957","UBUNTU-CVE-2016-1960","UBUNTU-CVE-2016-1961","UBUNTU-CVE-2016-1964","UBUNTU-CVE-2016-1966","UBUNTU-CVE-2016-1974","UBUNTU-CVE-2016-1977","UBUNTU-CVE-2016-2790","UBUNTU-CVE-2016-2791","UBUNTU-CVE-2016-2792","UBUNTU-CVE-2016-2793","UBUNTU-CVE-2016-2794","UBUNTU-CVE-2016-2795","UBUNTU-CVE-2016-2796","UBUNTU-CVE-2016-2797","UBUNTU-CVE-2016-2798","UBUNTU-CVE-2016-2799","UBUNTU-CVE-2016-2800","UBUNTU-CVE-2016-2801","UBUNTU-CVE-2016-2802"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2934-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1950"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1952"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1954"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1957"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1960"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1961"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1964"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1966"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1974"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1977"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2790"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2791"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2792"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2793"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2794"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2795"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2796"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2797"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2798"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2799"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2800"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2801"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2802"}],"affected":[{"package":{"name":"thunderbird","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/thunderbird@1:38.7.2+build1-0ubuntu0.14.04.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:38.7.2+build1-0ubuntu0.14.04.1"}]}],"versions":["1:24.0+build1-0ubuntu1","1:24.0+build1-0ubuntu2","1:24.1.1+build1-0ubuntu0.13.10.1","1:24.1.1+build1-0ubuntu1","1:24.2.0+build1-0ubuntu1","1:24.4.0+build1-0ubuntu1","1:24.5.0+build1-0ubuntu0.14.04.1","1:24.6.0+build1-0ubuntu0.14.04.1","1:31.0+build1-0ubuntu0.14.04.1","1:31.1.1+build1-0ubuntu0.14.04.1","1:31.1.2+build1-0ubuntu0.14.04.1","1:31.2.0+build2-0ubuntu0.14.04.1","1:31.3.0+build1-0ubuntu0.14.04.1","1:31.4.0+build1-0ubuntu0.14.04.1","1:31.5.0+build1-0ubuntu0.14.04.1","1:31.6.0+build1-0ubuntu0.14.04.1","1:31.7.0+build1-0ubuntu0.14.04.1","1:31.8.0+build1-0ubuntu0.14.04.1","1:38.2.0+build1-0ubuntu0.14.04.1","1:38.3.0+build1-0ubuntu0.14.04.1","1:38.4.0+build3-0ubuntu0.14.04.1","1:38.5.1+build2-0ubuntu0.14.04.1","1:38.6.0+build1-0ubuntu0.14.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"thunderbird","binary_version":"1:38.7.2+build1-0ubuntu0.14.04.1"},{"binary_name":"thunderbird-dev","binary_version":"1:38.7.2+build1-0ubuntu0.14.04.1"},{"binary_name":"thunderbird-globalmenu","binary_version":"1:38.7.2+build1-0ubuntu0.14.04.1"},{"binary_name":"thunderbird-gnome-support","binary_version":"1:38.7.2+build1-0ubuntu0.14.04.1"},{"binary_name":"thunderbird-mozsymbols","binary_version":"1:38.7.2+build1-0ubuntu0.14.04.1"},{"binary_name":"thunderbird-testsuite","binary_version":"1:38.7.2+build1-0ubuntu0.14.04.1"},{"binary_name":"xul-ext-calendar-timezones","binary_version":"1:38.7.2+build1-0ubuntu0.14.04.1"},{"binary_name":"xul-ext-gdata-provider","binary_version":"1:38.7.2+build1-0ubuntu0.14.04.1"},{"binary_name":"xul-ext-lightning","binary_version":"1:38.7.2+build1-0ubuntu0.14.04.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2934-1.json","cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"id":"CVE-2016-1950","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-1952","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-1954","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-1957","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2016-1960","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-1961","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-1964","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-1966","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-1974","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-1977","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-2790","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-2791","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-2792","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-2793","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-2794","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-2795","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-2796","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-2797","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-2798","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-2799","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-2800","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-2801","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-2802","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]}}},{"package":{"name":"thunderbird","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/thunderbird@1:38.7.2+build1-0ubuntu0.16.04.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:38.7.2+build1-0ubuntu0.16.04.1"}]}],"versions":["1:38.3.0+build1-0ubuntu2","1:38.5.1+build2-0ubuntu1","1:38.6.0+build1-0ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_name":"thunderbird","binary_version":"1:38.7.2+build1-0ubuntu0.16.04.1"},{"binary_name":"thunderbird-dev","binary_version":"1:38.7.2+build1-0ubuntu0.16.04.1"},{"binary_name":"thunderbird-globalmenu","binary_version":"1:38.7.2+build1-0ubuntu0.16.04.1"},{"binary_name":"thunderbird-gnome-support","binary_version":"1:38.7.2+build1-0ubuntu0.16.04.1"},{"binary_name":"thunderbird-mozsymbols","binary_version":"1:38.7.2+build1-0ubuntu0.16.04.1"},{"binary_name":"thunderbird-testsuite","binary_version":"1:38.7.2+build1-0ubuntu0.16.04.1"},{"binary_name":"xul-ext-calendar-timezones","binary_version":"1:38.7.2+build1-0ubuntu0.16.04.1"},{"binary_name":"xul-ext-gdata-provider","binary_version":"1:38.7.2+build1-0ubuntu0.16.04.1"},{"binary_name":"xul-ext-lightning","binary_version":"1:38.7.2+build1-0ubuntu0.16.04.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2934-1.json","cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[{"id":"CVE-2016-1950","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-1952","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-1954","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-1957","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2016-1960","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-1961","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-1964","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-1966","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-1974","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-1977","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-2790","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-2791","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-2792","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-2793","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-2794","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-2795","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-2796","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-2797","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-2798","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-2799","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-2800","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-2801","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-2802","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]}}}],"schema_version":"1.7.3"}