{"id":18279,"date":"2017-08-16T06:34:27","date_gmt":"2017-08-15T21:34:27","guid":{"rendered":"https:\/\/jirak.net\/wp\/rhsa-20172481-1-critical-java-1-7-1-ibm-security-update\/"},"modified":"2017-08-16T06:34:27","modified_gmt":"2017-08-15T21:34:27","slug":"rhsa-20172481-1-critical-java-1-7-1-ibm-security-update","status":"publish","type":"post","link":"https:\/\/jirak.net\/wp\/rhsa-20172481-1-critical-java-1-7-1-ibm-security-update\/","title":{"rendered":"RHSA-2017:2481-1: Critical: java-1.7.1-ibm security update"},"content":{"rendered":"<p>RHSA-2017:2481-1: Critical: java-1.7.1-ibm security update<\/p>\n<p>Red Hat Enterprise Linux:  An update for java-1.7.1-ibm is now available for Red Hat Enterprise Linux 6<br \/>\nSupplementary and Red Hat Enterprise Linux 7 Supplementary.<\/p>\n<p>Red Hat Product Security has rated this update as having a security impact of<br \/>\nCritical. A Common Vulnerability Scoring System (CVSS) base score, which gives a<br \/>\ndetailed severity rating, is available for each vulnerability from the CVE<br \/>\nlink(s) in the References section.<br \/>\n CVE-2017-10053, CVE-2017-10067, CVE-2017-10087, CVE-2017-10089, CVE-2017-10090, CVE-2017-10096, CVE-2017-10101, CVE-2017-10102, CVE-2017-10105, CVE-2017-10107, CVE-2017-10108, CVE-2017-10109, CVE-2017-10110, CVE-2017-10115, CVE-2017-10116, CVE-2017-10243<br \/>\nSource: <a href=\"http:\/\/rhn.redhat.com\/errata\/RHSA-2017-2481.html\" target=\"_blank\">RHSA-2017:2481-1: Critical: java-1.7.1-ibm security update<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>RHSA-2017:2481-1: Critical: java-1.7.1-ibm security update Red Hat Enterprise Linux: An update for java-1.7.1-ibm is now available for Red Hat Enterprise Linux 6 Supplementary and Red Hat Enterprise Linux 7 Supplementary. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. CVE-2017-10053, CVE-2017-10067, CVE-2017-10087, CVE-2017-10089, CVE-2017-10090, CVE-2017-10096, CVE-2017-10101, CVE-2017-10102, CVE-2017-10105, CVE-2017-10107, CVE-2017-10108, CVE-2017-10109, CVE-2017-10110, CVE-2017-10115, CVE-2017-10116, CVE-2017-10243 Source: RHSA-2017:2481-1: Critical: java-1.7.1-ibm security update<\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[578],"tags":[581],"class_list":["post-18279","post","type-post","status-publish","format-standard","hentry","category-rhn-errata","tag-errata"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/18279","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/comments?post=18279"}],"version-history":[{"count":1,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/18279\/revisions"}],"predecessor-version":[{"id":18280,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/18279\/revisions\/18280"}],"wp:attachment":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media?parent=18279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/categories?post=18279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/tags?post=18279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}