{"id":8947,"date":"2016-08-03T16:34:09","date_gmt":"2016-08-03T07:34:09","guid":{"rendered":"https:\/\/jirak.net\/wp\/rhsa-20161551-1-critical-firefox-security-update\/"},"modified":"2016-08-03T16:34:10","modified_gmt":"2016-08-03T07:34:10","slug":"rhsa-20161551-1-critical-firefox-security-update","status":"publish","type":"post","link":"https:\/\/jirak.net\/wp\/rhsa-20161551-1-critical-firefox-security-update\/","title":{"rendered":"RHSA-2016:1551-1: Critical: firefox security update"},"content":{"rendered":"<p>RHSA-2016:1551-1: Critical: firefox security update<\/p>\n<p>Red Hat Enterprise Linux:  An update for firefox is now available for Red Hat Enterprise Linux 5, Red Hat<br \/>\nEnterprise Linux 6, and Red Hat Enterprise Linux 7.<\/p>\n<p>Red Hat Product Security has rated this update as having a security impact of<br \/>\nCritical. A Common Vulnerability Scoring System (CVSS) base score, which gives a<br \/>\ndetailed severity rating, is available for each vulnerability from the CVE<br \/>\nlink(s) in the References section.<br \/>\n CVE-2016-2830, CVE-2016-2836, CVE-2016-2837, CVE-2016-2838, CVE-2016-5252, CVE-2016-5254, CVE-2016-5258, CVE-2016-5259, CVE-2016-5262, CVE-2016-5263, CVE-2016-5264, CVE-2016-5265<br \/>\nSource: <a href=\"http:\/\/rhn.redhat.com\/errata\/RHSA-2016-1551.html\" target=\"_blank\">RHSA-2016:1551-1: Critical: firefox security update<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>RHSA-2016:1551-1: Critical: firefox security update Red Hat Enterprise Linux: An update for firefox is now available for Red Hat Enterprise Linux 5, Red Hat Enterprise Linux 6, and Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. CVE-2016-2830, CVE-2016-2836, CVE-2016-2837, CVE-2016-2838, CVE-2016-5252, CVE-2016-5254, CVE-2016-5258, CVE-2016-5259, CVE-2016-5262, CVE-2016-5263, CVE-2016-5264, CVE-2016-5265 Source: RHSA-2016:1551-1: Critical: firefox security update<\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[578],"tags":[581],"class_list":["post-8947","post","type-post","status-publish","format-standard","hentry","category-rhn-errata","tag-errata"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/8947","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/comments?post=8947"}],"version-history":[{"count":1,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/8947\/revisions"}],"predecessor-version":[{"id":8948,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/8947\/revisions\/8948"}],"wp:attachment":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media?parent=8947"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/categories?post=8947"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/tags?post=8947"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}