{"id":"USN-4034-1","summary":"imagemagick vulnerabilities","details":"It was discovered that ImageMagick incorrectly handled certain malformed\nimage files. If a user or automated system using ImageMagick were tricked\ninto opening a specially crafted image, an attacker could exploit this to\ncause a denial of service or possibly execute code with the privileges of\nthe user invoking the program.\n\nDue to a large number of issues discovered in GhostScript that prevent it\nfrom being used by ImageMagick safely, the update for Ubuntu 18.10 and\nUbuntu 19.04 includes a default policy change that disables support for the\nPostscript and PDF formats in ImageMagick. This policy can be overridden if\nnecessary by using an alternate ImageMagick policy configuration.\n","modified":"2026-04-24T09:17:35.806725704Z","published":"2019-06-25T11:26:41Z","related":["UBUNTU-CVE-2017-12805","UBUNTU-CVE-2017-12806","UBUNTU-CVE-2018-14434","UBUNTU-CVE-2018-15607","UBUNTU-CVE-2018-16323","UBUNTU-CVE-2018-16412","UBUNTU-CVE-2018-16413","UBUNTU-CVE-2018-16644","UBUNTU-CVE-2018-16645","UBUNTU-CVE-2018-17965","UBUNTU-CVE-2018-17966","UBUNTU-CVE-2018-18016","UBUNTU-CVE-2018-18024","UBUNTU-CVE-2018-18025","UBUNTU-CVE-2018-18544","UBUNTU-CVE-2018-20467","UBUNTU-CVE-2019-10131","UBUNTU-CVE-2019-10650","UBUNTU-CVE-2019-11470","UBUNTU-CVE-2019-11472","UBUNTU-CVE-2019-11597","UBUNTU-CVE-2019-11598","UBUNTU-CVE-2019-7175","UBUNTU-CVE-2019-7395","UBUNTU-CVE-2019-7396","UBUNTU-CVE-2019-7397","UBUNTU-CVE-2019-7398","UBUNTU-CVE-2019-9956"],"upstream":["CVE-2017-12806","CVE-2018-14434","CVE-2018-16323","CVE-2018-16412","CVE-2018-16413","CVE-2018-16644","CVE-2018-16645","CVE-2018-17965","CVE-2018-17966","CVE-2018-18016","CVE-2018-18024","CVE-2018-18025","CVE-2018-20467","CVE-2019-10131","CVE-2019-10650","CVE-2019-11470","CVE-2019-11472","CVE-2019-11597","CVE-2019-11598","CVE-2019-7175","CVE-2019-7395","CVE-2019-7396","CVE-2019-7397","CVE-2019-7398","CVE-2019-9956","UBUNTU-CVE-2017-12806","UBUNTU-CVE-2018-14434","UBUNTU-CVE-2018-16323","UBUNTU-CVE-2018-16412","UBUNTU-CVE-2018-16413","UBUNTU-CVE-2018-16644","UBUNTU-CVE-2018-16645","UBUNTU-CVE-2018-17965","UBUNTU-CVE-2018-17966","UBUNTU-CVE-2018-18016","UBUNTU-CVE-2018-18023","UBUNTU-CVE-2018-18024","UBUNTU-CVE-2018-18025","UBUNTU-CVE-2018-20467","UBUNTU-CVE-2019-10131","UBUNTU-CVE-2019-10649","UBUNTU-CVE-2019-10650","UBUNTU-CVE-2019-11470","UBUNTU-CVE-2019-11472","UBUNTU-CVE-2019-11597","UBUNTU-CVE-2019-11598","UBUNTU-CVE-2019-7175","UBUNTU-CVE-2019-7395","UBUNTU-CVE-2019-7396","UBUNTU-CVE-2019-7397","UBUNTU-CVE-2019-7398","UBUNTU-CVE-2019-9956"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4034-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-12806"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-14434"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-16323"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-16412"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-16413"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-16644"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-16645"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-17965"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-17966"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-18016"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-18023"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-18024"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-18025"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-20467"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-7175"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-7395"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-7396"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-7397"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-7398"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-9956"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-10131"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-10649"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-10650"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-11470"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-11472"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-11597"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-11598"}],"affected":[{"package":{"name":"imagemagick","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/imagemagick@8:6.8.9.9-7ubuntu5.14?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8:6.8.9.9-7ubuntu5.14"}]}],"versions":["8:6.8.9.9-5ubuntu2","8:6.8.9.9-6","8:6.8.9.9-6build1","8:6.8.9.9-7","8:6.8.9.9-7ubuntu1","8:6.8.9.9-7ubuntu2","8:6.8.9.9-7ubuntu3","8:6.8.9.9-7ubuntu4","8:6.8.9.9-7ubuntu5","8:6.8.9.9-7ubuntu5.1","8:6.8.9.9-7ubuntu5.2","8:6.8.9.9-7ubuntu5.3","8:6.8.9.9-7ubuntu5.4","8:6.8.9.9-7ubuntu5.5","8:6.8.9.9-7ubuntu5.6","8:6.8.9.9-7ubuntu5.7","8:6.8.9.9-7ubuntu5.8","8:6.8.9.9-7ubuntu5.9","8:6.8.9.9-7ubuntu5.11","8:6.8.9.9-7ubuntu5.12","8:6.8.9.9-7ubuntu5.13"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"imagemagick","binary_version":"8:6.8.9.9-7ubuntu5.14"},{"binary_name":"imagemagick-6.q16","binary_version":"8:6.8.9.9-7ubuntu5.14"},{"binary_name":"imagemagick-common","binary_version":"8:6.8.9.9-7ubuntu5.14"},{"binary_name":"libimage-magick-perl","binary_version":"8:6.8.9.9-7ubuntu5.14"},{"binary_name":"libimage-magick-q16-perl","binary_version":"8:6.8.9.9-7ubuntu5.14"},{"binary_name":"libmagick++-6-headers","binary_version":"8:6.8.9.9-7ubuntu5.14"},{"binary_name":"libmagick++-6.q16-5v5","binary_version":"8:6.8.9.9-7ubuntu5.14"},{"binary_name":"libmagickcore-6-arch-config","binary_version":"8:6.8.9.9-7ubuntu5.14"},{"binary_name":"libmagickcore-6-headers","binary_version":"8:6.8.9.9-7ubuntu5.14"},{"binary_name":"libmagickcore-6.q16-2","binary_version":"8:6.8.9.9-7ubuntu5.14"},{"binary_name":"libmagickcore-6.q16-2-extra","binary_version":"8:6.8.9.9-7ubuntu5.14"},{"binary_name":"libmagickwand-6-headers","binary_version":"8:6.8.9.9-7ubuntu5.14"},{"binary_name":"libmagickwand-6.q16-2","binary_version":"8:6.8.9.9-7ubuntu5.14"},{"binary_name":"perlmagick","binary_version":"8:6.8.9.9-7ubuntu5.14"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[{"id":"CVE-2017-12806","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2018-16412","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2018-16413","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2018-17965","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2018-17966","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2018-18016","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2018-18024","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2018-18025","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2018-20467","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2019-7175","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"negligible","type":"Ubuntu"}]},{"id":"CVE-2019-7396","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"negligible","type":"Ubuntu"}]},{"id":"CVE-2019-7397","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"negligible","type":"Ubuntu"}]},{"id":"CVE-2019-7398","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"negligible","type":"Ubuntu"}]},{"id":"CVE-2019-9956","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2019-10131","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2019-10650","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2019-11470","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2019-11472","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2019-11597","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2019-11598","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4034-1.json"}},{"package":{"name":"imagemagick","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/imagemagick@8:6.9.7.4+dfsg-16ubuntu6.7?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8:6.9.7.4+dfsg-16ubuntu6.7"}]}],"versions":["8:6.9.7.4+dfsg-16ubuntu2","8:6.9.7.4+dfsg-16ubuntu3","8:6.9.7.4+dfsg-16ubuntu4","8:6.9.7.4+dfsg-16ubuntu5","8:6.9.7.4+dfsg-16ubuntu6","8:6.9.7.4+dfsg-16ubuntu6.2","8:6.9.7.4+dfsg-16ubuntu6.3","8:6.9.7.4+dfsg-16ubuntu6.4"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"imagemagick","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.7"},{"binary_name":"imagemagick-6-common","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.7"},{"binary_name":"imagemagick-6.q16","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.7"},{"binary_name":"imagemagick-6.q16hdri","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.7"},{"binary_name":"imagemagick-common","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.7"},{"binary_name":"libimage-magick-perl","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.7"},{"binary_name":"libimage-magick-q16-perl","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.7"},{"binary_name":"libimage-magick-q16hdri-perl","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.7"},{"binary_name":"libmagick++-6-headers","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.7"},{"binary_name":"libmagick++-6.q16-7","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.7"},{"binary_name":"libmagick++-6.q16hdri-7","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.7"},{"binary_name":"libmagickcore-6-arch-config","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.7"},{"binary_name":"libmagickcore-6-headers","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.7"},{"binary_name":"libmagickcore-6.q16-3","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.7"},{"binary_name":"libmagickcore-6.q16-3-extra","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.7"},{"binary_name":"libmagickcore-6.q16hdri-3","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.7"},{"binary_name":"libmagickcore-6.q16hdri-3-extra","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.7"},{"binary_name":"libmagickwand-6-headers","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.7"},{"binary_name":"libmagickwand-6.q16-3","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.7"},{"binary_name":"libmagickwand-6.q16hdri-3","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.7"},{"binary_name":"perlmagick","binary_version":"8:6.9.7.4+dfsg-16ubuntu6.7"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[{"id":"CVE-2017-12806","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2018-16412","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2018-16413","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2018-17965","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2018-17966","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2018-18016","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2018-18024","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2018-18025","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2018-20467","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2019-7175","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"negligible","type":"Ubuntu"}]},{"id":"CVE-2019-7395","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"negligible","type":"Ubuntu"}]},{"id":"CVE-2019-7396","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"negligible","type":"Ubuntu"}]},{"id":"CVE-2019-7397","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"negligible","type":"Ubuntu"}]},{"id":"CVE-2019-7398","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"negligible","type":"Ubuntu"}]},{"id":"CVE-2019-9956","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2019-10131","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2019-10650","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2019-11470","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2019-11472","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2019-11597","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2019-11598","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4034-1.json"}}],"schema_version":"1.7.5"}