{"id":6989,"date":"2016-04-13T07:36:43","date_gmt":"2016-04-12T22:36:43","guid":{"rendered":"https:\/\/jirak.net\/wp\/rhsa-20160620-1-critical-samba4-security-bug-fix-and-enhancement-update\/"},"modified":"2016-04-13T07:36:43","modified_gmt":"2016-04-12T22:36:43","slug":"rhsa-20160620-1-critical-samba4-security-bug-fix-and-enhancement-update","status":"publish","type":"post","link":"https:\/\/jirak.net\/wp\/rhsa-20160620-1-critical-samba4-security-bug-fix-and-enhancement-update\/","title":{"rendered":"RHSA-2016:0620-1: Critical: samba4 security, bug fix, and enhancement update"},"content":{"rendered":"<p>RHSA-2016:0620-1: Critical: samba4 security, bug fix, and enhancement update<\/p>\n<p>Red Hat Enterprise Linux:  An update for samba4 is now available for Red Hat Enterprise Linux 6.2 Advanced<br \/>\nUpdate Support, Red Hat Enterprise Linux 6.4 Advanced Update Support, Red Hat<br \/>\nEnterprise Linux 6.5 Advanced Update Support, and Red Hat Enterprise Linux 6.6<br \/>\nExtended Update Support.<\/p>\n<p>Red Hat Product Security has rated this update as having a security impact of<br \/>\nCritical. A Common Vulnerability Scoring System (CVSS) base score, which gives a<br \/>\ndetailed severity rating, is available for each vulnerability from the CVE<br \/>\nlink(s) in the References section.<br \/>\n CVE-2015-5370, CVE-2016-2110, CVE-2016-2111, CVE-2016-2112, CVE-2016-2113, CVE-2016-2114, CVE-2016-2115, CVE-2016-2118<br \/>\nSource: <a href=\"http:\/\/rhn.redhat.com\/errata\/RHSA-2016-0620.html\" target=\"_blank\">RHSA-2016:0620-1: Critical: samba4 security, bug fix, and enhancement update<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>RHSA-2016:0620-1: Critical: samba4 security, bug fix, and enhancement update Red Hat Enterprise Linux: An update for samba4 is now available for Red Hat Enterprise Linux 6.2 Advanced Update Support, Red Hat Enterprise Linux 6.4 Advanced Update Support, Red Hat Enterprise Linux 6.5 Advanced Update Support, and Red Hat Enterprise Linux 6.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. CVE-2015-5370, CVE-2016-2110, CVE-2016-2111, CVE-2016-2112, CVE-2016-2113, CVE-2016-2114, CVE-2016-2115, CVE-2016-2118 Source: RHSA-2016:0620-1: Critical: samba4 security, bug fix, and enhancement update<\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[578],"tags":[581],"class_list":["post-6989","post","type-post","status-publish","format-standard","hentry","category-rhn-errata","tag-errata"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/6989","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/comments?post=6989"}],"version-history":[{"count":1,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/6989\/revisions"}],"predecessor-version":[{"id":6990,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/6989\/revisions\/6990"}],"wp:attachment":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media?parent=6989"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/categories?post=6989"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/tags?post=6989"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}