{"id":"USN-3785-1","summary":"imagemagick vulnerabilities","details":"Due to a large number of issues discovered in GhostScript that prevent\nit from being used by ImageMagick safely, this update includes a\ndefault policy change that disables support for the Postscript and\nPDF formats in ImageMagick. This policy can be overridden if necessary\nby using an alternate ImageMagick policy configuration.\n\nIt was discovered that several memory leaks existed when handling\ncertain images in ImageMagick. An attacker could use this to cause a\ndenial of service. (CVE-2018-14434, CVE-2018-14435, CVE-2018-14436,\nCVE-2018-14437, CVE-2018-16640, CVE-2018-16750)\n\nIt was discovered that ImageMagick did not properly initialize a\nvariable before using it when processing MAT images. An attacker could\nuse this to cause a denial of service or possibly execute arbitrary\ncode. This issue only affected Ubuntu 18.04 LTS. (CVE-2018-14551)\n\nIt was discovered that an information disclosure vulnerability existed\nin ImageMagick when processing XBM images. An attacker could use this\nto expose sensitive information. (CVE-2018-16323)\n\nIt was discovered that an out-of-bounds write vulnerability existed\nin ImageMagick when handling certain images. An attacker could use\nthis to cause a denial of service or possibly execute arbitrary code.\n(CVE-2018-16642)\n\nIt was discovered that ImageMagick did not properly check for errors\nin some situations. An attacker could use this to cause a denial of\nservice. (CVE-2018-16643)\n\nIt was discovered that ImageMagick did not properly validate image\nmeta data in some situations. An attacker could use this to cause a\ndenial of service. (CVE-2018-16644)\n\nIt was discovered that ImageMagick did not prevent excessive memory\nallocation when handling certain image types. An attacker could use\nthis to cause a denial of service. (CVE-2018-16645)\n\nSergej Schumilo and Cornelius Aschermann discovered that ImageMagick\ndid not properly check for NULL in some situations when processing\nPNG images. An attacker could use this to cause a denial of service.\n(CVE-2018-16749)\n\nUSN-3681-1 fixed vulnerabilities in Imagemagick. Unfortunately,\nthe fix for CVE-2017-13144 introduced a regression in ImageMagick in\nUbuntu 14.04 LTS and Ubuntu 16.04 LTS. This update reverts the fix\nfor CVE-2017-13144 for those releases.\n\nWe apologize for the inconvenience.\n","modified":"2026-02-10T04:41:26Z","published":"2018-10-04T23:13:25Z","related":["UBUNTU-CVE-2017-13144","UBUNTU-CVE-2018-14434","UBUNTU-CVE-2018-14435","UBUNTU-CVE-2018-14436","UBUNTU-CVE-2018-14437","UBUNTU-CVE-2018-14551","UBUNTU-CVE-2018-16323","UBUNTU-CVE-2018-16640","UBUNTU-CVE-2018-16642","UBUNTU-CVE-2018-16643","UBUNTU-CVE-2018-16644","UBUNTU-CVE-2018-16645","UBUNTU-CVE-2018-16749","UBUNTU-CVE-2018-16750"],"upstream":["CVE-2018-14434","CVE-2018-14435","CVE-2018-14436","CVE-2018-14437","CVE-2018-14551","CVE-2018-16323","CVE-2018-16640","CVE-2018-16642","CVE-2018-16643","CVE-2018-16644","CVE-2018-16645","CVE-2018-16749","CVE-2018-16750","UBUNTU-CVE-2018-14434","UBUNTU-CVE-2018-14435","UBUNTU-CVE-2018-14436","UBUNTU-CVE-2018-14437","UBUNTU-CVE-2018-14551","UBUNTU-CVE-2018-16323","UBUNTU-CVE-2018-16640","UBUNTU-CVE-2018-16642","UBUNTU-CVE-2018-16643","UBUNTU-CVE-2018-16644","UBUNTU-CVE-2018-16645","UBUNTU-CVE-2018-16749","UBUNTU-CVE-2018-16750"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3785-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-14434"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-14435"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-14436"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-14437"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-14551"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-16323"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-16640"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-16642"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-16643"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-16644"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-16645"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-16749"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-16750"},{"type":"REPORT","url":"https://launchpad.net/bugs/1793485"}],"affected":[{"package":{"name":"imagemagick","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/imagemagick@8:6.7.7.10-6ubuntu3.13?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8:6.7.7.10-6ubuntu3.13"}]}],"versions":["8:6.7.7.10-5ubuntu3","8:6.7.7.10-5ubuntu4","8:6.7.7.10-6ubuntu1","8:6.7.7.10-6ubuntu2","8:6.7.7.10-6ubuntu3","8:6.7.7.10-6ubuntu3.1","8:6.7.7.10-6ubuntu3.2","8:6.7.7.10-6ubuntu3.3","8:6.7.7.10-6ubuntu3.4","8:6.7.7.10-6ubuntu3.5","8:6.7.7.10-6ubuntu3.6","8:6.7.7.10-6ubuntu3.7","8:6.7.7.10-6ubuntu3.8","8:6.7.7.10-6ubuntu3.9","8:6.7.7.10-6ubuntu3.11","8:6.7.7.10-6ubuntu3.12"],"ecosystem_specific":{"binaries":[{"binary_name":"imagemagick","binary_version":"8:6.7.7.10-6ubuntu3.13"},{"binary_name":"imagemagick-common","binary_version":"8:6.7.7.10-6ubuntu3.13"},{"binary_name":"libmagick++-dev","binary_version":"8:6.7.7.10-6ubuntu3.13"},{"binary_name":"libmagick++5","binary_version":"8:6.7.7.10-6ubuntu3.13"},{"binary_name":"libmagickcore-dev","binary_version":"8:6.7.7.10-6ubuntu3.13"},{"binary_name":"libmagickcore5","binary_version":"8:6.7.7.10-6ubuntu3.13"},{"binary_name":"libmagickcore5-extra","binary_version":"8:6.7.7.10-6ubuntu3.13"},{"binary_name":"libmagickwand-dev","binary_version":"8:6.7.7.10-6ubuntu3.13"},{"binary_name":"libmagickwand5","binary_version":"8:6.7.7.10-6ubuntu3.13"},{"binary_name":"perlmagick","binary_version":"8:6.7.7.10-6ubuntu3.13"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-14434"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-14435"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-14436"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-14437"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-16323"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"negligible"}],"id":"CVE-2018-16640"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-16642"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-16643"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-16644"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-16645"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-16749"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"negligible"}],"id":"CVE-2018-16750"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3785-1.json"}},{"package":{"name":"imagemagick","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/imagemagick@8:6.8.9.9-7ubuntu5.13?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8:6.8.9.9-7ubuntu5.13"}]}],"versions":["8:6.8.9.9-5ubuntu2","8:6.8.9.9-6","8:6.8.9.9-6build1","8:6.8.9.9-7","8:6.8.9.9-7ubuntu1","8:6.8.9.9-7ubuntu2","8:6.8.9.9-7ubuntu3","8:6.8.9.9-7ubuntu4","8:6.8.9.9-7ubuntu5","8:6.8.9.9-7ubuntu5.1","8:6.8.9.9-7ubuntu5.2","8:6.8.9.9-7ubuntu5.3","8:6.8.9.9-7ubuntu5.4","8:6.8.9.9-7ubuntu5.5","8:6.8.9.9-7ubuntu5.6","8:6.8.9.9-7ubuntu5.7","8:6.8.9.9-7ubuntu5.8","8:6.8.9.9-7ubuntu5.9","8:6.8.9.9-7ubuntu5.11","8:6.8.9.9-7ubuntu5.12"],"ecosystem_specific":{"binaries":[{"binary_name":"imagemagick","binary_version":"8:6.8.9.9-7ubuntu5.13"},{"binary_name":"imagemagick-6.q16","binary_version":"8:6.8.9.9-7ubuntu5.13"},{"binary_name":"imagemagick-common","binary_version":"8:6.8.9.9-7ubuntu5.13"},{"binary_name":"libimage-magick-perl","binary_version":"8:6.8.9.9-7ubuntu5.13"},{"binary_name":"libimage-magick-q16-perl","binary_version":"8:6.8.9.9-7ubuntu5.13"},{"binary_name":"libmagick++-6-headers","binary_version":"8:6.8.9.9-7ubuntu5.13"},{"binary_name":"libmagick++-6.q16-5v5","binary_version":"8:6.8.9.9-7ubuntu5.13"},{"binary_name":"libmagick++-6.q16-dev","binary_version":"8:6.8.9.9-7ubuntu5.13"},{"binary_name":"libmagick++-dev","binary_version":"8:6.8.9.9-7ubuntu5.13"},{"binary_name":"libmagickcore-6-arch-config","binary_version":"8:6.8.9.9-7ubuntu5.13"},{"binary_name":"libmagickcore-6-headers","binary_version":"8:6.8.9.9-7ubuntu5.13"},{"binary_name":"libmagickcore-6.q16-2","binary_version":"8:6.8.9.9-7ubuntu5.13"},{"binary_name":"libmagickcore-6.q16-2-extra","binary_version":"8:6.8.9.9-7ubuntu5.13"},{"binary_name":"libmagickcore-6.q16-dev","binary_version":"8:6.8.9.9-7ubuntu5.13"},{"binary_name":"libmagickcore-dev","binary_version":"8:6.8.9.9-7ubuntu5.13"},{"binary_name":"libmagickwand-6-headers","binary_version":"8:6.8.9.9-7ubuntu5.13"},{"binary_name":"libmagickwand-6.q16-2","binary_version":"8:6.8.9.9-7ubuntu5.13"},{"binary_name":"libmagickwand-6.q16-dev","binary_version":"8:6.8.9.9-7ubuntu5.13"},{"binary_name":"libmagickwand-dev","binary_version":"8:6.8.9.9-7ubuntu5.13"},{"binary_name":"perlmagick","binary_version":"8:6.8.9.9-7ubuntu5.13"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-14434"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-14435"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-14436"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-14437"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-16323"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"negligible"}],"id":"CVE-2018-16640"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-16642"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-16643"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-16644"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-16645"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-16749"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"negligible"}],"id":"CVE-2018-16750"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3785-1.json"}},{"package":{"name":"imagemagick","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/imagemagick@8:6.9.7.4+dfsg-16ubuntu6.4?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8:6.9.7.4+dfsg-16ubuntu6.4"}]}],"versions":["8:6.9.7.4+dfsg-16ubuntu2","8:6.9.7.4+dfsg-16ubuntu3","8:6.9.7.4+dfsg-16ubuntu4","8:6.9.7.4+dfsg-16ubuntu5","8:6.9.7.4+dfsg-16ubuntu6","8:6.9.7.4+dfsg-16ubuntu6.2","8:6.9.7.4+dfsg-16ubuntu6.3"],"ecosystem_specific":{"binaries":[{"binary_name":"imagemagick","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.4"},{"binary_name":"imagemagick-6-common","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.4"},{"binary_name":"imagemagick-6.q16","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.4"},{"binary_name":"imagemagick-6.q16hdri","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.4"},{"binary_name":"imagemagick-common","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.4"},{"binary_name":"libimage-magick-perl","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.4"},{"binary_name":"libimage-magick-q16-perl","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.4"},{"binary_name":"libimage-magick-q16hdri-perl","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.4"},{"binary_name":"libmagick++-6-headers","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.4"},{"binary_name":"libmagick++-6.q16-7","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.4"},{"binary_name":"libmagick++-6.q16-dev","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.4"},{"binary_name":"libmagick++-6.q16hdri-7","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.4"},{"binary_name":"libmagick++-6.q16hdri-dev","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.4"},{"binary_name":"libmagick++-dev","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.4"},{"binary_name":"libmagickcore-6-arch-config","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.4"},{"binary_name":"libmagickcore-6-headers","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.4"},{"binary_name":"libmagickcore-6.q16-3","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.4"},{"binary_name":"libmagickcore-6.q16-3-extra","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.4"},{"binary_name":"libmagickcore-6.q16-dev","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.4"},{"binary_name":"libmagickcore-6.q16hdri-3","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.4"},{"binary_name":"libmagickcore-6.q16hdri-3-extra","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.4"},{"binary_name":"libmagickcore-6.q16hdri-dev","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.4"},{"binary_name":"libmagickcore-dev","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.4"},{"binary_name":"libmagickwand-6-headers","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.4"},{"binary_name":"libmagickwand-6.q16-3","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.4"},{"binary_name":"libmagickwand-6.q16-dev","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.4"},{"binary_name":"libmagickwand-6.q16hdri-3","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.4"},{"binary_name":"libmagickwand-6.q16hdri-dev","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.4"},{"binary_name":"libmagickwand-dev","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.4"},{"binary_name":"perlmagick","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.4"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-14434"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-14435"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-14436"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-14437"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-14551"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-16323"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"negligible"}],"id":"CVE-2018-16640"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-16642"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-16643"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-16644"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-16645"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-16749"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"negligible"}],"id":"CVE-2018-16750"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3785-1.json"}}],"schema_version":"1.7.3"}