{"id":"USN-3095-1","summary":"php5, php7.0 vulnerabilities","details":"Taoguang Chen discovered that PHP incorrectly handled certain invalid\nobjects when unserializing data. A remote attacker could use this issue to\ncause PHP to crash, resulting in a denial of service, or possibly execute\narbitrary code. (CVE-2016-7124)\n\nTaoguang Chen discovered that PHP incorrectly handled invalid session\nnames. A remote attacker could use this issue to inject arbitrary session\ndata. (CVE-2016-7125)\n\nIt was discovered that PHP incorrectly handled certain gamma values in the\nimagegammacorrect function. A remote attacker could use this issue to cause\nPHP to crash, resulting in a denial of service, or possibly execute\narbitrary code. (CVE-2016-7127)\n\nIt was discovered that PHP incorrectly handled certain crafted TIFF image\nthumbnails. A remote attacker could use this issue to cause PHP to crash,\nresulting in a denial of service, or possibly expose sensitive information.\n(CVE-2016-7128)\n\nIt was discovered that PHP incorrectly handled unserializing certain\nwddxPacket XML documents. A remote attacker could use this issue to cause\nPHP to crash, resulting in a denial of service, or possibly execute\narbitrary code. (CVE-2016-7129, CVE-2016-7130, CVE-2016-7131,\nCVE-2016-7132, CVE-2016-7413)\n\nIt was discovered that PHP incorrectly handled certain memory operations. A\nremote attacker could use this issue to cause PHP to crash, resulting in a\ndenial of service, or possibly execute arbitrary code. This issue only\naffected Ubuntu 16.04 LTS. (CVE-2016-7133)\n\nIt was discovered that PHP incorrectly handled long strings in curl_escape\ncalls. A remote attacker could use this issue to cause PHP to crash,\nresulting in a denial of service, or possibly execute arbitrary code. This\nissue only affected Ubuntu 16.04 LTS. (CVE-2016-7134)\n\nTaoguang Chen discovered that PHP incorrectly handled certain failures when\nunserializing data. A remote attacker could use this issue to cause PHP to\ncrash, resulting in a denial of service, or possibly execute arbitrary\ncode. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS.\n(CVE-2016-7411)\n\nIt was discovered that PHP incorrectly handled certain flags in the MySQL\ndriver. Malicious remote MySQL servers could use this issue to cause PHP to\ncrash, resulting in a denial of service, or possibly execute arbitrary\ncode. (CVE-2016-7412)\n\nIt was discovered that PHP incorrectly handled ZIP file signature\nverification when processing a PHAR archive. A remote attacker could use\nthis issue to cause PHP to crash, resulting in a denial of service, or\npossibly execute arbitrary code. (CVE-2016-7414)\n\nIt was discovered that PHP incorrectly handled certain locale operations. A\nremote attacker could use this issue to cause PHP to crash, resulting in a\ndenial of service, or possibly execute arbitrary code. (CVE-2016-7416)\n\nIt was discovered that PHP incorrectly handled SplArray unserializing. A\nremote attacker could use this issue to cause PHP to crash, resulting in a\ndenial of service, or possibly execute arbitrary code. (CVE-2016-7417)\n\nKe Liu discovered that PHP incorrectly handled unserializing wddxPacket XML\ndocuments with incorrect boolean elements. A remote attacker could use this\nissue to cause PHP to crash, resulting in a denial of service, or possibly\nexecute arbitrary code. (CVE-2016-7418)\n","modified":"2026-02-10T04:41:02Z","published":"2016-10-04T17:18:27Z","related":["UBUNTU-CVE-2016-7124","UBUNTU-CVE-2016-7125","UBUNTU-CVE-2016-7127","UBUNTU-CVE-2016-7128","UBUNTU-CVE-2016-7129","UBUNTU-CVE-2016-7130","UBUNTU-CVE-2016-7131","UBUNTU-CVE-2016-7132","UBUNTU-CVE-2016-7133","UBUNTU-CVE-2016-7134","UBUNTU-CVE-2016-7411","UBUNTU-CVE-2016-7412","UBUNTU-CVE-2016-7413","UBUNTU-CVE-2016-7414","UBUNTU-CVE-2016-7416","UBUNTU-CVE-2016-7417","UBUNTU-CVE-2016-7418"],"upstream":["CVE-2016-7124","CVE-2016-7125","CVE-2016-7127","CVE-2016-7128","CVE-2016-7129","CVE-2016-7130","CVE-2016-7131","CVE-2016-7132","CVE-2016-7133","CVE-2016-7134","CVE-2016-7411","CVE-2016-7412","CVE-2016-7413","CVE-2016-7414","CVE-2016-7416","CVE-2016-7417","CVE-2016-7418","UBUNTU-CVE-2016-7124","UBUNTU-CVE-2016-7125","UBUNTU-CVE-2016-7127","UBUNTU-CVE-2016-7128","UBUNTU-CVE-2016-7129","UBUNTU-CVE-2016-7130","UBUNTU-CVE-2016-7131","UBUNTU-CVE-2016-7132","UBUNTU-CVE-2016-7133","UBUNTU-CVE-2016-7134","UBUNTU-CVE-2016-7411","UBUNTU-CVE-2016-7412","UBUNTU-CVE-2016-7413","UBUNTU-CVE-2016-7414","UBUNTU-CVE-2016-7416","UBUNTU-CVE-2016-7417","UBUNTU-CVE-2016-7418"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3095-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7124"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7125"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7127"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7128"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7129"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7130"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7131"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7132"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7133"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7134"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7411"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7412"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7413"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7414"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7416"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7417"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7418"}],"affected":[{"package":{"name":"php5","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/php5@5.5.9+dfsg-1ubuntu4.20?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.5.9+dfsg-1ubuntu4.20"}]}],"versions":["5.5.3+dfsg-1ubuntu2","5.5.3+dfsg-1ubuntu3","5.5.6+dfsg-1ubuntu1","5.5.6+dfsg-1ubuntu2","5.5.8+dfsg-2ubuntu1","5.5.9+dfsg-1ubuntu1","5.5.9+dfsg-1ubuntu2","5.5.9+dfsg-1ubuntu3","5.5.9+dfsg-1ubuntu4","5.5.9+dfsg-1ubuntu4.1","5.5.9+dfsg-1ubuntu4.2","5.5.9+dfsg-1ubuntu4.3","5.5.9+dfsg-1ubuntu4.4","5.5.9+dfsg-1ubuntu4.5","5.5.9+dfsg-1ubuntu4.6","5.5.9+dfsg-1ubuntu4.7","5.5.9+dfsg-1ubuntu4.9","5.5.9+dfsg-1ubuntu4.11","5.5.9+dfsg-1ubuntu4.12","5.5.9+dfsg-1ubuntu4.13","5.5.9+dfsg-1ubuntu4.14","5.5.9+dfsg-1ubuntu4.16","5.5.9+dfsg-1ubuntu4.17","5.5.9+dfsg-1ubuntu4.19"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"libapache2-mod-php5","binary_version":"5.5.9+dfsg-1ubuntu4.20"},{"binary_name":"libapache2-mod-php5filter","binary_version":"5.5.9+dfsg-1ubuntu4.20"},{"binary_name":"libphp5-embed","binary_version":"5.5.9+dfsg-1ubuntu4.20"},{"binary_name":"php-pear","binary_version":"5.5.9+dfsg-1ubuntu4.20"},{"binary_name":"php5","binary_version":"5.5.9+dfsg-1ubuntu4.20"},{"binary_name":"php5-cgi","binary_version":"5.5.9+dfsg-1ubuntu4.20"},{"binary_name":"php5-cli","binary_version":"5.5.9+dfsg-1ubuntu4.20"},{"binary_name":"php5-common","binary_version":"5.5.9+dfsg-1ubuntu4.20"},{"binary_name":"php5-curl","binary_version":"5.5.9+dfsg-1ubuntu4.20"},{"binary_name":"php5-dev","binary_version":"5.5.9+dfsg-1ubuntu4.20"},{"binary_name":"php5-enchant","binary_version":"5.5.9+dfsg-1ubuntu4.20"},{"binary_name":"php5-fpm","binary_version":"5.5.9+dfsg-1ubuntu4.20"},{"binary_name":"php5-gd","binary_version":"5.5.9+dfsg-1ubuntu4.20"},{"binary_name":"php5-gmp","binary_version":"5.5.9+dfsg-1ubuntu4.20"},{"binary_name":"php5-intl","binary_version":"5.5.9+dfsg-1ubuntu4.20"},{"binary_name":"php5-ldap","binary_version":"5.5.9+dfsg-1ubuntu4.20"},{"binary_name":"php5-mysql","binary_version":"5.5.9+dfsg-1ubuntu4.20"},{"binary_name":"php5-mysqlnd","binary_version":"5.5.9+dfsg-1ubuntu4.20"},{"binary_name":"php5-odbc","binary_version":"5.5.9+dfsg-1ubuntu4.20"},{"binary_name":"php5-pgsql","binary_version":"5.5.9+dfsg-1ubuntu4.20"},{"binary_name":"php5-pspell","binary_version":"5.5.9+dfsg-1ubuntu4.20"},{"binary_name":"php5-readline","binary_version":"5.5.9+dfsg-1ubuntu4.20"},{"binary_name":"php5-recode","binary_version":"5.5.9+dfsg-1ubuntu4.20"},{"binary_name":"php5-snmp","binary_version":"5.5.9+dfsg-1ubuntu4.20"},{"binary_name":"php5-sqlite","binary_version":"5.5.9+dfsg-1ubuntu4.20"},{"binary_name":"php5-sybase","binary_version":"5.5.9+dfsg-1ubuntu4.20"},{"binary_name":"php5-tidy","binary_version":"5.5.9+dfsg-1ubuntu4.20"},{"binary_name":"php5-xmlrpc","binary_version":"5.5.9+dfsg-1ubuntu4.20"},{"binary_name":"php5-xsl","binary_version":"5.5.9+dfsg-1ubuntu4.20"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"id":"CVE-2016-7124","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-7125","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-7127","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-7128","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-7129","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-7130","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-7131","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-7132","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-7411","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-7412","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-7413","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-7414","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-7416","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-7417","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-7418","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3095-1.json"}},{"package":{"name":"php7.0","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/php7.0@7.0.8-0ubuntu0.16.04.3?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7.0.8-0ubuntu0.16.04.3"}]}],"versions":["7.0.1-5","7.0.1-6","7.0.2-1","7.0.2-3","7.0.2-4","7.0.2-5","7.0.3-2","7.0.3-3","7.0.3-9ubuntu1","7.0.4-5ubuntu1","7.0.4-5ubuntu2","7.0.4-7ubuntu1","7.0.4-7ubuntu2","7.0.4-7ubuntu2.1","7.0.8-0ubuntu0.16.04.1","7.0.8-0ubuntu0.16.04.2"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"libapache2-mod-php7.0","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"libphp7.0-embed","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-bcmath","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-bz2","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-cgi","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-cli","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-common","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-curl","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-dba","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-dev","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-enchant","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-fpm","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-gd","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-gmp","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-imap","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-interbase","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-intl","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-json","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-ldap","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-mbstring","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-mcrypt","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-mysql","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-odbc","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-opcache","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-pgsql","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-phpdbg","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-pspell","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-readline","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-recode","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-snmp","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-soap","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-sqlite3","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-sybase","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-tidy","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-xml","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-xmlrpc","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-xsl","binary_version":"7.0.8-0ubuntu0.16.04.3"},{"binary_name":"php7.0-zip","binary_version":"7.0.8-0ubuntu0.16.04.3"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[{"id":"CVE-2016-7124","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-7125","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-7127","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-7128","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-7129","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-7130","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-7131","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-7132","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-7133","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-7134","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-7412","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-7413","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-7414","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-7416","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-7417","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-7418","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3095-1.json"}}],"schema_version":"1.7.3"}