{"id":"USN-7496-4","summary":"linux-azure vulnerabilities","details":"Several security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - Block layer subsystem;\n  - Character device driver;\n  - Hardware crypto device drivers;\n  - GPU drivers;\n  - Media drivers;\n  - Network drivers;\n  - SCSI subsystem;\n  - USB Gadget drivers;\n  - Framebuffer layer;\n  - Ceph distributed file system;\n  - File systems infrastructure;\n  - JFS file system;\n  - Network file system (NFS) client;\n  - NILFS2 file system;\n  - SMB network file system;\n  - Netfilter;\n  - CAN network layer;\n  - IPv6 networking;\n  - MAC80211 subsystem;\n  - Netlink;\n  - Network traffic control;\n  - SCTP protocol;\n  - TIPC protocol;\n(CVE-2025-21971, CVE-2024-50237, CVE-2023-52927, CVE-2023-52458,\nCVE-2021-47163, CVE-2024-26689, CVE-2024-53066, CVE-2021-47191,\nCVE-2021-47219, CVE-2024-56770, CVE-2024-46780, CVE-2024-56598,\nCVE-2023-52741, CVE-2024-53173, CVE-2021-47150, CVE-2024-50296,\nCVE-2024-56631, CVE-2024-53063, CVE-2024-56642, CVE-2024-50256,\nCVE-2024-26974, CVE-2024-56651, CVE-2024-36934, CVE-2023-52664,\nCVE-2024-26996, CVE-2024-26915, CVE-2024-46771, CVE-2024-56650,\nCVE-2024-53140, CVE-2024-49925, CVE-2024-36015, CVE-2024-49944,\nCVE-2024-35864)\n","modified":"2026-04-27T17:28:26.042416Z","published":"2025-05-07T10:22:08Z","related":["UBUNTU-CVE-2021-47150","UBUNTU-CVE-2021-47163","UBUNTU-CVE-2021-47191","UBUNTU-CVE-2021-47219","UBUNTU-CVE-2023-52458","UBUNTU-CVE-2023-52664","UBUNTU-CVE-2023-52741","UBUNTU-CVE-2023-52927","UBUNTU-CVE-2024-26689","UBUNTU-CVE-2024-26915","UBUNTU-CVE-2024-26974","UBUNTU-CVE-2024-26996","UBUNTU-CVE-2024-35864","UBUNTU-CVE-2024-36015","UBUNTU-CVE-2024-36934","UBUNTU-CVE-2024-46771","UBUNTU-CVE-2024-46780","UBUNTU-CVE-2024-49925","UBUNTU-CVE-2024-49944","UBUNTU-CVE-2024-50237","UBUNTU-CVE-2024-50256","UBUNTU-CVE-2024-50296","UBUNTU-CVE-2024-53063","UBUNTU-CVE-2024-53066","UBUNTU-CVE-2024-53140","UBUNTU-CVE-2024-53173","UBUNTU-CVE-2024-56598","UBUNTU-CVE-2024-56631","UBUNTU-CVE-2024-56642","UBUNTU-CVE-2024-56650","UBUNTU-CVE-2024-56651","UBUNTU-CVE-2024-56770","UBUNTU-CVE-2025-21971"],"upstream":["CVE-2021-47150","CVE-2021-47163","CVE-2021-47191","CVE-2021-47219","CVE-2023-52458","CVE-2023-52664","CVE-2023-52741","CVE-2023-52927","CVE-2024-26689","CVE-2024-26915","CVE-2024-26974","CVE-2024-26996","CVE-2024-35864","CVE-2024-36015","CVE-2024-36934","CVE-2024-46771","CVE-2024-46780","CVE-2024-49925","CVE-2024-49944","CVE-2024-50237","CVE-2024-50256","CVE-2024-50296","CVE-2024-53063","CVE-2024-53066","CVE-2024-53140","CVE-2024-53173","CVE-2024-56598","CVE-2024-56631","CVE-2024-56642","CVE-2024-56650","CVE-2024-56651","CVE-2024-56770","CVE-2025-21971","UBUNTU-CVE-2021-47150","UBUNTU-CVE-2021-47163","UBUNTU-CVE-2021-47191","UBUNTU-CVE-2021-47219","UBUNTU-CVE-2023-52458","UBUNTU-CVE-2023-52664","UBUNTU-CVE-2023-52741","UBUNTU-CVE-2023-52927","UBUNTU-CVE-2024-26689","UBUNTU-CVE-2024-26915","UBUNTU-CVE-2024-26974","UBUNTU-CVE-2024-26996","UBUNTU-CVE-2024-35864","UBUNTU-CVE-2024-36015","UBUNTU-CVE-2024-36934","UBUNTU-CVE-2024-46771","UBUNTU-CVE-2024-46780","UBUNTU-CVE-2024-49925","UBUNTU-CVE-2024-49944","UBUNTU-CVE-2024-50237","UBUNTU-CVE-2024-50256","UBUNTU-CVE-2024-50296","UBUNTU-CVE-2024-53063","UBUNTU-CVE-2024-53066","UBUNTU-CVE-2024-53140","UBUNTU-CVE-2024-53173","UBUNTU-CVE-2024-56598","UBUNTU-CVE-2024-56631","UBUNTU-CVE-2024-56642","UBUNTU-CVE-2024-56650","UBUNTU-CVE-2024-56651","UBUNTU-CVE-2024-56770","UBUNTU-CVE-2025-21971"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7496-4"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-47150"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-47163"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-47191"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-47219"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52458"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52664"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52741"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52927"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26689"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26915"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26974"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26996"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-35864"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-36015"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-36934"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-46771"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-46780"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-49925"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-49944"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-50237"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-50256"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-50296"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-53063"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-53066"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-53140"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-53173"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-56598"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-56631"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-56642"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-56650"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-56651"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-56770"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-21971"}],"affected":[{"package":{"name":"linux-azure","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/linux-azure@4.15.0-1188.203~14.04.1?arch=source&distro=esm-infra-legacy/trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1188.203~14.04.1"}]}],"versions":["4.15.0-1023.24~14.04.1","4.15.0-1030.31~14.04.1","4.15.0-1031.32~14.04.1","4.15.0-1032.33~14.04.2","4.15.0-1035.36~14.04.2","4.15.0-1036.38~14.04.2","4.15.0-1037.39~14.04.2","4.15.0-1039.41~14.04.2","4.15.0-1040.44~14.04.1","4.15.0-1041.45~14.04.1","4.15.0-1042.46~14.04.1","4.15.0-1045.49~14.04.1","4.15.0-1046.50~14.04.1","4.15.0-1047.51~14.04.1","4.15.0-1049.54~14.04.1","4.15.0-1050.55~14.04.1","4.15.0-1051.56~14.04.1","4.15.0-1052.57~14.04.1","4.15.0-1055.60~14.04.1","4.15.0-1056.61~14.04.1","4.15.0-1057.62~14.04.1","4.15.0-1059.64~14.04.1","4.15.0-1060.65~14.04.1","4.15.0-1061.66~14.04.1","4.15.0-1063.68~14.04.1","4.15.0-1064.69~14.04.1","4.15.0-1066.71~14.04.1","4.15.0-1067.72~14.04.1","4.15.0-1069.74~14.04.1","4.15.0-1071.76~14.04.1","4.15.0-1074.79~14.04.1","4.15.0-1077.82~14.04.1","4.15.0-1082.92~14.04.1","4.15.0-1083.93~14.04.1","4.15.0-1089.99~14.04.1","4.15.0-1091.101~14.04.1","4.15.0-1092.102~14.04.1","4.15.0-1093.103~14.04.1","4.15.0-1095.105~14.04.1","4.15.0-1096.106~14.04.1","4.15.0-1098.109~14.04.1","4.15.0-1100.111~14.04.1","4.15.0-1102.113~14.04.1","4.15.0-1103.114~14.04.1","4.15.0-1106.118~14.04.1","4.15.0-1108.120~14.04.1","4.15.0-1109.121~14.04.1","4.15.0-1110.122~14.04.1","4.15.0-1111.123~14.04.1","4.15.0-1112.124~14.04.1","4.15.0-1113.126~14.04.1","4.15.0-1114.127~14.04.1","4.15.0-1115.128~14.04.1","4.15.0-1118.131~14.04.1","4.15.0-1121.134~14.04.1","4.15.0-1122.135~14.04.1","4.15.0-1123.136~14.04.1","4.15.0-1124.137~14.04.1","4.15.0-1125.138~14.04.1","4.15.0-1126.139~14.04.1","4.15.0-1127.140~14.04.1","4.15.0-1129.142~14.04.1","4.15.0-1130.143~14.04.1","4.15.0-1131.144~14.04.1","4.15.0-1133.146~14.04.1","4.15.0-1134.147~14.04.1","4.15.0-1136.149~14.04.1","4.15.0-1137.150~14.04.1","4.15.0-1138.151~14.04.1","4.15.0-1139.152~14.04.1","4.15.0-1142.156~14.04.1","4.15.0-1145.160~14.04.1","4.15.0-1146.161~14.04.1","4.15.0-1149.164~14.04.1","4.15.0-1150.165~14.04.1","4.15.0-1151.166~14.04.1","4.15.0-1153.168~14.04.1","4.15.0-1157.172~14.04.2","4.15.0-1158.173~14.04.1","4.15.0-1159.174~14.04.1","4.15.0-1162.177~14.04.1","4.15.0-1163.178~14.04.1","4.15.0-1164.179~14.04.1","4.15.0-1165.180~14.04.1","4.15.0-1166.181~14.04.1","4.15.0-1167.182~14.04.1","4.15.0-1168.183~14.04.1","4.15.0-1169.184~14.04.1","4.15.0-1170.185~14.04.1","4.15.0-1171.186~14.04.1","4.15.0-1172.187~14.04.1","4.15.0-1173.188~14.04.1","4.15.0-1174.189~14.04.1","4.15.0-1175.190~14.04.1","4.15.0-1176.191~14.04.1","4.15.0-1177.192~14.04.1","4.15.0-1178.193~14.04.1","4.15.0-1179.194~14.04.1","4.15.0-1180.195~14.04.1","4.15.0-1181.196~14.04.1","4.15.0-1182.197~14.04.1","4.15.0-1183.198~14.04.1","4.15.0-1184.199~14.04.1","4.15.0-1185.200~14.04.1","4.15.0-1186.201~14.04.1","4.15.0-1187.202~14.04.1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro","binaries":[{"binary_version":"4.15.0-1188.203~14.04.1","binary_name":"linux-azure-cloud-tools-4.15.0-1188"},{"binary_version":"4.15.0-1188.203~14.04.1","binary_name":"linux-azure-headers-4.15.0-1188"},{"binary_version":"4.15.0-1188.203~14.04.1","binary_name":"linux-azure-tools-4.15.0-1188"},{"binary_version":"4.15.0-1188.203~14.04.1","binary_name":"linux-buildinfo-4.15.0-1188-azure"},{"binary_version":"4.15.0-1188.203~14.04.1","binary_name":"linux-cloud-tools-4.15.0-1188-azure"},{"binary_version":"4.15.0-1188.203~14.04.1","binary_name":"linux-headers-4.15.0-1188-azure"},{"binary_version":"4.15.0-1188.203~14.04.1","binary_name":"linux-image-unsigned-4.15.0-1188-azure"},{"binary_version":"4.15.0-1188.203~14.04.1","binary_name":"linux-modules-4.15.0-1188-azure"},{"binary_version":"4.15.0-1188.203~14.04.1","binary_name":"linux-modules-extra-4.15.0-1188-azure"},{"binary_version":"4.15.0-1188.203~14.04.1","binary_name":"linux-tools-4.15.0-1188-azure"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7496-4.json","cves_map":{"ecosystem":"Ubuntu:Pro:14.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-47150"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-47163"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-47191"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-47219"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52458"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2023-52664"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52741"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2023-52927"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2024-26689"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-26915"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-26974"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-26996"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2024-35864"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-36015"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-36934"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-46771"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-46780"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-49925"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-49944"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-50237"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-50256"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-50296"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2024-53063"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-53066"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2024-53140"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-53173"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2024-56598"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-56631"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-56642"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-56650"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-56651"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-56770"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2025-21971"}]}}}],"schema_version":"1.7.5"}