{"id":15628,"date":"2017-04-20T17:38:35","date_gmt":"2017-04-20T08:38:35","guid":{"rendered":"https:\/\/jirak.net\/wp\/rhsa-20171104-1-critical-firefox-security-update\/"},"modified":"2017-04-20T17:38:35","modified_gmt":"2017-04-20T08:38:35","slug":"rhsa-20171104-1-critical-firefox-security-update","status":"publish","type":"post","link":"https:\/\/jirak.net\/wp\/rhsa-20171104-1-critical-firefox-security-update\/","title":{"rendered":"RHSA-2017:1104-1: Critical: firefox security update"},"content":{"rendered":"<p>RHSA-2017:1104-1: Critical: firefox security update<\/p>\n<p>Red Hat Enterprise Linux:  An update for firefox is now available for Red Hat Enterprise Linux 6.<\/p>\n<p>Red Hat Product Security has rated this update as having a security impact of<br \/>\nCritical. A Common Vulnerability Scoring System (CVSS) base score, which gives a<br \/>\ndetailed severity rating, is available for each vulnerability from the CVE<br \/>\nlink(s) in the References section.<br \/>\n CVE-2017-5429, CVE-2017-5432, CVE-2017-5433, CVE-2017-5434, CVE-2017-5435, CVE-2017-5436, CVE-2017-5437, CVE-2017-5438, CVE-2017-5439, CVE-2017-5440, CVE-2017-5441, CVE-2017-5442, CVE-2017-5443, CVE-2017-5444, CVE-2017-5445, CVE-2017-5446, CVE-2017-5447, CVE-2017-5448, CVE-2017-5449, CVE-2017-5459, CVE-2017-5460, CVE-2017-5464, CVE-2017-5465, CVE-2017-5469<br \/>\nSource: <a href=\"http:\/\/rhn.redhat.com\/errata\/RHSA-2017-1104.html\" target=\"_blank\">RHSA-2017:1104-1: Critical: firefox security update<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>RHSA-2017:1104-1: Critical: firefox security update Red Hat Enterprise Linux: An update for firefox is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. CVE-2017-5429, CVE-2017-5432, CVE-2017-5433, CVE-2017-5434, CVE-2017-5435, CVE-2017-5436, CVE-2017-5437, CVE-2017-5438, CVE-2017-5439, CVE-2017-5440, CVE-2017-5441, CVE-2017-5442, CVE-2017-5443, CVE-2017-5444, CVE-2017-5445, CVE-2017-5446, CVE-2017-5447, CVE-2017-5448, CVE-2017-5449, CVE-2017-5459, CVE-2017-5460, CVE-2017-5464, CVE-2017-5465, CVE-2017-5469 Source: RHSA-2017:1104-1: Critical: firefox security update<\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[578],"tags":[581],"class_list":["post-15628","post","type-post","status-publish","format-standard","hentry","category-rhn-errata","tag-errata"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/15628","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/comments?post=15628"}],"version-history":[{"count":1,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/15628\/revisions"}],"predecessor-version":[{"id":15629,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/15628\/revisions\/15629"}],"wp:attachment":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media?parent=15628"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/categories?post=15628"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/tags?post=15628"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}