{"id":7250,"date":"2016-04-25T21:33:57","date_gmt":"2016-04-25T12:33:57","guid":{"rendered":"https:\/\/jirak.net\/wp\/rhsa-20160685-1-moderate-nss-nspr-nss-softokn-and-nss-util-security-bug-fix-and-enhancement-update\/"},"modified":"2016-04-25T21:33:57","modified_gmt":"2016-04-25T12:33:57","slug":"rhsa-20160685-1-moderate-nss-nspr-nss-softokn-and-nss-util-security-bug-fix-and-enhancement-update","status":"publish","type":"post","link":"https:\/\/jirak.net\/wp\/rhsa-20160685-1-moderate-nss-nspr-nss-softokn-and-nss-util-security-bug-fix-and-enhancement-update\/","title":{"rendered":"RHSA-2016:0685-1: Moderate: nss, nspr, nss-softokn, and nss-util security, bug fix, and enhancement update"},"content":{"rendered":"<p>RHSA-2016:0685-1: Moderate: nss, nspr, nss-softokn, and nss-util security, bug fix, and enhancement update<\/p>\n<p>Red Hat Enterprise Linux:  An update for nss, nspr, nss-softokn, and nss-util is now available for Red Hat<br \/>\nEnterprise Linux 7.<\/p>\n<p>Red Hat Product Security has rated this update as having a security impact of<br \/>\nModerate. A Common Vulnerability Scoring System (CVSS) base score, which gives a<br \/>\ndetailed severity rating, is available for each vulnerability from the CVE<br \/>\nlink(s) in the References section.<br \/>\n CVE-2016-1978, CVE-2016-1979<br \/>\nSource: <a href=\"http:\/\/rhn.redhat.com\/errata\/RHSA-2016-0685.html\" target=\"_blank\">RHSA-2016:0685-1: Moderate: nss, nspr, nss-softokn, and nss-util security, bug fix, and enhancement update<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>RHSA-2016:0685-1: Moderate: nss, nspr, nss-softokn, and nss-util security, bug fix, and enhancement update Red Hat Enterprise Linux: An update for nss, nspr, nss-softokn, and nss-util is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. CVE-2016-1978, CVE-2016-1979 Source: RHSA-2016:0685-1: Moderate: nss, nspr, nss-softokn, and nss-util security, bug fix, and enhancement update<\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[578],"tags":[581],"class_list":["post-7250","post","type-post","status-publish","format-standard","hentry","category-rhn-errata","tag-errata"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/7250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/comments?post=7250"}],"version-history":[{"count":1,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/7250\/revisions"}],"predecessor-version":[{"id":7251,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/7250\/revisions\/7251"}],"wp:attachment":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media?parent=7250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/categories?post=7250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/tags?post=7250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}