{"id":20961,"date":"2017-12-06T23:34:10","date_gmt":"2017-12-06T14:34:10","guid":{"rendered":"https:\/\/jirak.net\/wp\/rhsa-20173392-1-important-java-1-7-0-openjdk-security-and-bug-fix-update\/"},"modified":"2017-12-06T23:34:10","modified_gmt":"2017-12-06T14:34:10","slug":"rhsa-20173392-1-important-java-1-7-0-openjdk-security-and-bug-fix-update","status":"publish","type":"post","link":"https:\/\/jirak.net\/wp\/rhsa-20173392-1-important-java-1-7-0-openjdk-security-and-bug-fix-update\/","title":{"rendered":"RHSA-2017:3392-1: Important: java-1.7.0-openjdk security and bug fix update"},"content":{"rendered":"<p>RHSA-2017:3392-1: Important: java-1.7.0-openjdk security and bug fix update<\/p>\n<p>Red Hat Enterprise Linux:  An update for java-1.7.0-openjdk is now available for Red Hat Enterprise Linux 6<br \/>\nand Red Hat Enterprise Linux 7.<\/p>\n<p>Red Hat Product Security has rated this update as having a security impact of<br \/>\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives<br \/>\na detailed severity rating, is available for each vulnerability from the CVE<br \/>\nlink(s) in the References section.<br \/>\n CVE-2017-10193, CVE-2017-10198, CVE-2017-10274, CVE-2017-10281, CVE-2017-10285, CVE-2017-10295, CVE-2017-10345, CVE-2017-10346, CVE-2017-10347, CVE-2017-10348, CVE-2017-10349, CVE-2017-10350, CVE-2017-10355, CVE-2017-10356, CVE-2017-10357, CVE-2017-10388<br \/>\nSource: <a href=\"http:\/\/rhn.redhat.com\/errata\/RHSA-2017-3392.html\" target=\"_blank\">RHSA-2017:3392-1: Important: java-1.7.0-openjdk security and bug fix update<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>RHSA-2017:3392-1: Important: java-1.7.0-openjdk security and bug fix update Red Hat Enterprise Linux: An update for java-1.7.0-openjdk is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. CVE-2017-10193, CVE-2017-10198, CVE-2017-10274, CVE-2017-10281, CVE-2017-10285, CVE-2017-10295, CVE-2017-10345, CVE-2017-10346, CVE-2017-10347, CVE-2017-10348, CVE-2017-10349, CVE-2017-10350, CVE-2017-10355, CVE-2017-10356, CVE-2017-10357, CVE-2017-10388 Source: RHSA-2017:3392-1: Important: java-1.7.0-openjdk security and bug fix update<\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[578],"tags":[581],"class_list":["post-20961","post","type-post","status-publish","format-standard","hentry","category-rhn-errata","tag-errata"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/20961","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/comments?post=20961"}],"version-history":[{"count":1,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/20961\/revisions"}],"predecessor-version":[{"id":20962,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/20961\/revisions\/20962"}],"wp:attachment":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media?parent=20961"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/categories?post=20961"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/tags?post=20961"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}