{"id":188,"date":"2018-10-17T05:29:11","date_gmt":"2018-10-17T05:29:11","guid":{"rendered":"https:\/\/www.appservgrid.com\/paw92\/index.php\/2018\/10\/17\/redhat-rhsa-2018-292501-important-kernel-security-and-bug-fix-update\/"},"modified":"2018-10-17T05:31:13","modified_gmt":"2018-10-17T05:31:13","slug":"redhat-rhsa-2018-292501-important-kernel-security-and-bug-fix-update","status":"publish","type":"post","link":"https:\/\/www.appservgrid.com\/paw92\/index.php\/2018\/10\/17\/redhat-rhsa-2018-292501-important-kernel-security-and-bug-fix-update\/","title":{"rendered":"RedHat: RHSA-2018-2925:01 Important: kernel security and bug fix update"},"content":{"rendered":"<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td>\n<table>\n<tbody>\n<tr>\n<td><b> Posted by<\/b> Anthony Pell<\/td>\n<\/tr>\n<tr>\n<td><a href=\"\/content\/blogcategory\/98\/110\/\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"http:\/\/www.linuxsecurity.com\/images\/stories\/icons\/redhat-icon.gif\" alt=\"RedHat Linux\" width=\"195\" height=\"195\" \/><\/a><br \/>\nAn update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, &#8212;&#8211;BEGIN PGP SIGNED MESSAGE&#8212;&#8211;<br \/>\nHash: SHA256=====================================================================<br \/>\nRed Hat Security Advisory<\/p>\n<p>Synopsis: Important: kernel security and bug fix update<br \/>\nAdvisory ID: RHSA-2018:2925-01<br \/>\nProduct: Red Hat Enterprise Linux<br \/>\nAdvisory URL: https:\/\/access.redhat.com\/errata\/RHSA-2018:2925<br \/>\nIssue date: 2018-10-16<br \/>\nCVE Names: CVE-2018-5391 CVE-2018-10675 CVE-2018-14634<br \/>\n=====================================================================<\/p>\n<p>1. Summary:<\/p>\n<p>An update for kernel is now available for Red Hat Enterprise Linux 6.7<br \/>\nExtended Update Support.<\/p>\n<p>Red Hat Product Security has rated this update as having a security impact<br \/>\nof Important. A Common Vulnerability Scoring System (CVSS) base score,<br \/>\nwhich gives a detailed severity rating, is available for each vulnerability<br \/>\nfrom the CVE link(s) in the References section.<\/p>\n<p>2. Relevant releases\/architectures:<\/p>\n<p>Red Hat Enterprise Linux HPC Node EUS (v. 6.7) &#8211; noarch, x86_64<br \/>\nRed Hat Enterprise Linux HPC Node Optional EUS (v. 6.7) &#8211; x86_64<br \/>\nRed Hat Enterprise Linux Server EUS (v. 6.7) &#8211; i386, noarch, ppc64, s390x, x86_64<br \/>\nRed Hat Enterprise Linux Server Optional EUS (v. 6.7) &#8211; i386, ppc64, s390x, x86_64<\/p>\n<p>3. Description:<\/p>\n<p>The kernel packages contain the Linux kernel, the core of any Linux<br \/>\noperating system.<\/p>\n<p>Security Fix(es):<\/p>\n<p>* A flaw named FragmentSmack was found in the way the Linux kernel handled<br \/>\nreassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use<br \/>\nthis flaw to trigger time and calculation expensive fragment reassembly<br \/>\nalgorithm by sending specially crafted packets which could lead to a CPU<br \/>\nsaturation and hence a denial of service on the system. (CVE-2018-5391)<\/p>\n<p>* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS<br \/>\nor other unspecified impact (CVE-2018-10675)<\/p>\n<p>* kernel: Integer overflow in Linux&#8217;s create_elf_tables function<br \/>\n(CVE-2018-14634)<\/p>\n<p>For more details about the security issue(s), including the impact, a CVSS<br \/>\nscore, and other related information, refer to the CVE page(s) listed in<br \/>\nthe References section.<\/p>\n<p>Red Hat would like to thank Juha-Matti Tilli (Aalto University &#8211; Department<br \/>\nof Communications and Networking and Nokia Bell Labs) for reporting<br \/>\nCVE-2018-5391 and Qualys Research Labs for reporting CVE-2018-14634.<\/p>\n<p>Bug Fix(es):<\/p>\n<p>* Previously, the kernel source code lacked support to report the<br \/>\nSpeculative Store Bypass Disable (SSBD) vulnerability status on IBM Power<br \/>\nSystems. As a consequence, the<br \/>\n\/sys\/devices\/system\/cpu\/vulnerabilities\/spec_store_bypass file incorrectly<br \/>\nreported &#8220;Not affected&#8221;. This fix updates the kernel source code to<br \/>\nproperly report the SSBD status either as &#8220;Vulnerable&#8221; or &#8220;Mitigation:<br \/>\nKernel entry\/exit barrier (TYPE)&#8221;, where TYPE is one of &#8220;eieio&#8221;, &#8220;hwsync&#8221;,<br \/>\n&#8220;fallback&#8221;, or &#8220;unknown&#8221;. (BZ#1615873)<\/p>\n<p>* After updating the system to prevent the L1 Terminal Fault (L1TF)<br \/>\nvulnerability, only one thread was detected on systems that offer<br \/>\nprocessing of two threads on a single processor core. With this update, the<br \/>\n&#8220;__max_smt_threads()&#8221; function has been fixed. As a result, both threads<br \/>\nare now detected correctly in the described situation. (BZ#1625335)<\/p>\n<p>* Previously, a kernel panic occurred when the kernel tried to make an out<br \/>\nof bound access to the array that describes the L1 Terminal Fault (L1TF)<br \/>\nmitigation state on systems without Extended Page Tables (EPT) support.<br \/>\nThis update extends the array of mitigation states to cover all the states,<br \/>\nwhich effectively prevents out of bound array access. Also, this update<br \/>\nenables rejecting invalid, irrelevant values, that might be erroneously<br \/>\nprovided by the userspace. As a result, the kernel no longer panics in the<br \/>\ndescribed scenario. (BZ#1629634)<\/p>\n<p>4. Solution:<\/p>\n<p>For details on how to apply this update, which includes the changes<br \/>\ndescribed in this advisory, refer to:<\/p>\n<p>https:\/\/access.redhat.com\/articles\/11258<\/p>\n<p>The system must be rebooted for this update to take effect.<\/p>\n<p>5. Bugs fixed (https:\/\/bugzilla.redhat.com\/):<\/p>\n<p>1575065 &#8211; CVE-2018-10675 kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact<br \/>\n1609664 &#8211; CVE-2018-5391 kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack)<br \/>\n1624498 &#8211; CVE-2018-14634 kernel: Integer overflow in Linux&#8217;s create_elf_tables function<\/p>\n<p>6. Package List:<\/p>\n<p>Red Hat Enterprise Linux HPC Node EUS (v. 6.7):<\/p>\n<p>Source:<br \/>\nkernel-2.6.32-573.65.2.el6.src.rpm<\/p>\n<p>noarch:<br \/>\nkernel-abi-whitelists-2.6.32-573.65.2.el6.noarch.rpm<br \/>\nkernel-doc-2.6.32-573.65.2.el6.noarch.rpm<br \/>\nkernel-firmware-2.6.32-573.65.2.el6.noarch.rpm<\/p>\n<p>x86_64:<br \/>\nkernel-2.6.32-573.65.2.el6.x86_64.rpm<br \/>\nkernel-debug-2.6.32-573.65.2.el6.x86_64.rpm<br \/>\nkernel-debug-debuginfo-2.6.32-573.65.2.el6.i686.rpm<br \/>\nkernel-debug-debuginfo-2.6.32-573.65.2.el6.x86_64.rpm<br \/>\nkernel-debug-devel-2.6.32-573.65.2.el6.i686.rpm<br \/>\nkernel-debug-devel-2.6.32-573.65.2.el6.x86_64.rpm<br \/>\nkernel-debuginfo-2.6.32-573.65.2.el6.i686.rpm<br \/>\nkernel-debuginfo-2.6.32-573.65.2.el6.x86_64.rpm<br \/>\nkernel-debuginfo-common-i686-2.6.32-573.65.2.el6.i686.rpm<br \/>\nkernel-debuginfo-common-x86_64-2.6.32-573.65.2.el6.x86_64.rpm<br \/>\nkernel-devel-2.6.32-573.65.2.el6.x86_64.rpm<br \/>\nkernel-headers-2.6.32-573.65.2.el6.x86_64.rpm<br \/>\nperf-2.6.32-573.65.2.el6.x86_64.rpm<br \/>\nperf-debuginfo-2.6.32-573.65.2.el6.i686.rpm<br \/>\nperf-debuginfo-2.6.32-573.65.2.el6.x86_64.rpm<br \/>\npython-perf-debuginfo-2.6.32-573.65.2.el6.i686.rpm<br \/>\npython-perf-debuginfo-2.6.32-573.65.2.el6.x86_64.rpm<\/p>\n<p>Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7):<\/p>\n<p>x86_64:<br \/>\nkernel-debug-debuginfo-2.6.32-573.65.2.el6.x86_64.rpm<br \/>\nkernel-debuginfo-2.6.32-573.65.2.el6.x86_64.rpm<br \/>\nkernel-debuginfo-common-x86_64-2.6.32-573.65.2.el6.x86_64.rpm<br \/>\nperf-debuginfo-2.6.32-573.65.2.el6.x86_64.rpm<br \/>\npython-perf-2.6.32-573.65.2.el6.x86_64.rpm<br \/>\npython-perf-debuginfo-2.6.32-573.65.2.el6.x86_64.rpm<\/p>\n<p>Red Hat Enterprise Linux Server EUS (v. 6.7):<\/p>\n<p>Source:<br \/>\nkernel-2.6.32-573.65.2.el6.src.rpm<\/p>\n<p>i386:<br \/>\nkernel-2.6.32-573.65.2.el6.i686.rpm<br \/>\nkernel-debug-2.6.32-573.65.2.el6.i686.rpm<br \/>\nkernel-debug-debuginfo-2.6.32-573.65.2.el6.i686.rpm<br \/>\nkernel-debug-devel-2.6.32-573.65.2.el6.i686.rpm<br \/>\nkernel-debuginfo-2.6.32-573.65.2.el6.i686.rpm<br \/>\nkernel-debuginfo-common-i686-2.6.32-573.65.2.el6.i686.rpm<br \/>\nkernel-devel-2.6.32-573.65.2.el6.i686.rpm<br \/>\nkernel-headers-2.6.32-573.65.2.el6.i686.rpm<br \/>\nperf-2.6.32-573.65.2.el6.i686.rpm<br \/>\nperf-debuginfo-2.6.32-573.65.2.el6.i686.rpm<br \/>\npython-perf-debuginfo-2.6.32-573.65.2.el6.i686.rpm<\/p>\n<p>noarch:<br \/>\nkernel-abi-whitelists-2.6.32-573.65.2.el6.noarch.rpm<br \/>\nkernel-doc-2.6.32-573.65.2.el6.noarch.rpm<br \/>\nkernel-firmware-2.6.32-573.65.2.el6.noarch.rpm<\/p>\n<p>ppc64:<br \/>\nkernel-2.6.32-573.65.2.el6.ppc64.rpm<br \/>\nkernel-bootwrapper-2.6.32-573.65.2.el6.ppc64.rpm<br \/>\nkernel-debug-2.6.32-573.65.2.el6.ppc64.rpm<br \/>\nkernel-debug-debuginfo-2.6.32-573.65.2.el6.ppc64.rpm<br \/>\nkernel-debug-devel-2.6.32-573.65.2.el6.ppc64.rpm<br \/>\nkernel-debuginfo-2.6.32-573.65.2.el6.ppc64.rpm<br \/>\nkernel-debuginfo-common-ppc64-2.6.32-573.65.2.el6.ppc64.rpm<br \/>\nkernel-devel-2.6.32-573.65.2.el6.ppc64.rpm<br \/>\nkernel-headers-2.6.32-573.65.2.el6.ppc64.rpm<br \/>\nperf-2.6.32-573.65.2.el6.ppc64.rpm<br \/>\nperf-debuginfo-2.6.32-573.65.2.el6.ppc64.rpm<br \/>\npython-perf-debuginfo-2.6.32-573.65.2.el6.ppc64.rpm<\/p>\n<p>s390x:<br \/>\nkernel-2.6.32-573.65.2.el6.s390x.rpm<br \/>\nkernel-debug-2.6.32-573.65.2.el6.s390x.rpm<br \/>\nkernel-debug-debuginfo-2.6.32-573.65.2.el6.s390x.rpm<br \/>\nkernel-debug-devel-2.6.32-573.65.2.el6.s390x.rpm<br \/>\nkernel-debuginfo-2.6.32-573.65.2.el6.s390x.rpm<br \/>\nkernel-debuginfo-common-s390x-2.6.32-573.65.2.el6.s390x.rpm<br \/>\nkernel-devel-2.6.32-573.65.2.el6.s390x.rpm<br \/>\nkernel-headers-2.6.32-573.65.2.el6.s390x.rpm<br \/>\nkernel-kdump-2.6.32-573.65.2.el6.s390x.rpm<br \/>\nkernel-kdump-debuginfo-2.6.32-573.65.2.el6.s390x.rpm<br \/>\nkernel-kdump-devel-2.6.32-573.65.2.el6.s390x.rpm<br \/>\nperf-2.6.32-573.65.2.el6.s390x.rpm<br \/>\nperf-debuginfo-2.6.32-573.65.2.el6.s390x.rpm<br \/>\npython-perf-debuginfo-2.6.32-573.65.2.el6.s390x.rpm<\/p>\n<p>x86_64:<br \/>\nkernel-2.6.32-573.65.2.el6.x86_64.rpm<br \/>\nkernel-debug-2.6.32-573.65.2.el6.x86_64.rpm<br \/>\nkernel-debug-debuginfo-2.6.32-573.65.2.el6.i686.rpm<br \/>\nkernel-debug-debuginfo-2.6.32-573.65.2.el6.x86_64.rpm<br \/>\nkernel-debug-devel-2.6.32-573.65.2.el6.i686.rpm<br \/>\nkernel-debug-devel-2.6.32-573.65.2.el6.x86_64.rpm<br \/>\nkernel-debuginfo-2.6.32-573.65.2.el6.i686.rpm<br \/>\nkernel-debuginfo-2.6.32-573.65.2.el6.x86_64.rpm<br \/>\nkernel-debuginfo-common-i686-2.6.32-573.65.2.el6.i686.rpm<br \/>\nkernel-debuginfo-common-x86_64-2.6.32-573.65.2.el6.x86_64.rpm<br \/>\nkernel-devel-2.6.32-573.65.2.el6.x86_64.rpm<br \/>\nkernel-headers-2.6.32-573.65.2.el6.x86_64.rpm<br \/>\nperf-2.6.32-573.65.2.el6.x86_64.rpm<br \/>\nperf-debuginfo-2.6.32-573.65.2.el6.i686.rpm<br \/>\nperf-debuginfo-2.6.32-573.65.2.el6.x86_64.rpm<br \/>\npython-perf-debuginfo-2.6.32-573.65.2.el6.i686.rpm<br \/>\npython-perf-debuginfo-2.6.32-573.65.2.el6.x86_64.rpm<\/p>\n<p>Red Hat Enterprise Linux Server Optional EUS (v. 6.7):<\/p>\n<p>i386:<br \/>\nkernel-debug-debuginfo-2.6.32-573.65.2.el6.i686.rpm<br \/>\nkernel-debuginfo-2.6.32-573.65.2.el6.i686.rpm<br \/>\nkernel-debuginfo-common-i686-2.6.32-573.65.2.el6.i686.rpm<br \/>\nperf-debuginfo-2.6.32-573.65.2.el6.i686.rpm<br \/>\npython-perf-2.6.32-573.65.2.el6.i686.rpm<br \/>\npython-perf-debuginfo-2.6.32-573.65.2.el6.i686.rpm<\/p>\n<p>ppc64:<br \/>\nkernel-debug-debuginfo-2.6.32-573.65.2.el6.ppc64.rpm<br \/>\nkernel-debuginfo-2.6.32-573.65.2.el6.ppc64.rpm<br \/>\nkernel-debuginfo-common-ppc64-2.6.32-573.65.2.el6.ppc64.rpm<br \/>\nperf-debuginfo-2.6.32-573.65.2.el6.ppc64.rpm<br \/>\npython-perf-2.6.32-573.65.2.el6.ppc64.rpm<br \/>\npython-perf-debuginfo-2.6.32-573.65.2.el6.ppc64.rpm<\/p>\n<p>s390x:<br \/>\nkernel-debug-debuginfo-2.6.32-573.65.2.el6.s390x.rpm<br \/>\nkernel-debuginfo-2.6.32-573.65.2.el6.s390x.rpm<br \/>\nkernel-debuginfo-common-s390x-2.6.32-573.65.2.el6.s390x.rpm<br \/>\nkernel-kdump-debuginfo-2.6.32-573.65.2.el6.s390x.rpm<br \/>\nperf-debuginfo-2.6.32-573.65.2.el6.s390x.rpm<br \/>\npython-perf-2.6.32-573.65.2.el6.s390x.rpm<br \/>\npython-perf-debuginfo-2.6.32-573.65.2.el6.s390x.rpm<\/p>\n<p>x86_64:<br \/>\nkernel-debug-debuginfo-2.6.32-573.65.2.el6.x86_64.rpm<br \/>\nkernel-debuginfo-2.6.32-573.65.2.el6.x86_64.rpm<br \/>\nkernel-debuginfo-common-x86_64-2.6.32-573.65.2.el6.x86_64.rpm<br \/>\nperf-debuginfo-2.6.32-573.65.2.el6.x86_64.rpm<br \/>\npython-perf-2.6.32-573.65.2.el6.x86_64.rpm<br \/>\npython-perf-debuginfo-2.6.32-573.65.2.el6.x86_64.rpm<\/p>\n<p>These packages are GPG signed by Red Hat for security. Our key and<br \/>\ndetails on how to verify the signature are available from<br \/>\nhttps:\/\/access.redhat.com\/security\/team\/key\/<\/p>\n<p>7. References:<\/p>\n<p>https:\/\/access.redhat.com\/security\/cve\/CVE-2018-5391<br \/>\nhttps:\/\/access.redhat.com\/security\/cve\/CVE-2018-10675<br \/>\nhttps:\/\/access.redhat.com\/security\/cve\/CVE-2018-14634<br \/>\nhttps:\/\/access.redhat.com\/security\/updates\/classification\/#important<br \/>\nhttps:\/\/access.redhat.com\/articles\/3553061<br \/>\nhttps:\/\/access.redhat.com\/security\/vulnerabilities\/mutagen-astronomy<\/p>\n<p>8. Contact:<\/p>\n<p>The Red Hat security contact is . More contact<br \/>\ndetails at https:\/\/access.redhat.com\/security\/team\/contact\/<\/p>\n<p>Copyright 2018 Red Hat, Inc.<br \/>\n&#8212;&#8211;BEGIN PGP SIGNATURE&#8212;&#8211;<br \/>\nVersion: GnuPG v1<\/p>\n<p>iQIVAwUBW8Z6itzjgjWX9erEAQihmg\/+ONhYRMfXI8p2Ej4My0OG2tlpgkFtWNaV<br \/>\n6mO9pCv\/pNf93U7\/F1Dp2SHMdTfTk4lvhI86dYGohvRTD0jqeLfi6zxBtPcD61wO<br \/>\ngn1jLlTdN8a7\/zbT3QxD6fnqBqsu7uftoV48PRwvf18NoiSBHkmTCAFqNO\/J\/etW<br \/>\nTsm8Wii+vdg727QDrWvfmYL4iIPIynrEvfTpFzksxyK\/wqCaBduxp6LgLVGEQPkH<br \/>\n68zy7uXbzyNFvlOjmAdql\/T5jWrJ9l4sfCkioPGYV0\/2+6v+RT82plYJYAYNQc+f<br \/>\nZf7nlLaGI2Gxh207R0JpTdyLR7IM5mThLXm2Xjf0rm3XkYQN6\/vEyG44RJWb1eEY<br \/>\nyBRvY7Cm2G3+F2+pV5POLTjpzUr3kGjD5YkTTiYjby0i38\/o8UWSwH+QJGkMv+wL<br \/>\ntMOMH9AsQkE3srG0TQEVoyBYOcnYb5YFv\/oy\/\/uOHqX2E1DksVgV9CskQgOhyHuE<br \/>\nX3pEdCAv6ai\/r3nJxhoQuIj1kgUrBYa5zXkC\/MDCUz4lhSOWNcjQXksRL3T4JQz\/<br \/>\nrA44XSBvX5EB5YVtcLhYmMYBc+LBcTcJgR3iQtXgkiAnfEWAu6GznXQGjZANmrE+<br \/>\noxbaxYtidRGbkhVayFUju44heYE3+Hh0hw3BoXICXkihE1BNI0WiBcBmzmsSNuUR<br \/>\ned0pFxszsPc=<br \/>\n=dvOf<br \/>\n&#8212;&#8211;END PGP SIGNATURE&#8212;&#8211;<\/p>\n<p>&#8212;<br \/>\nRHSA-announce mailing list<br \/>\nRHSA-announce@redhat.com<br \/>\nhttps:\/\/www.redhat.com\/mailman\/listinfo\/rhsa-announce<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><a href=\"http:\/\/www.linuxsecurity.com\/content\/view\/214424?rdf\" target=\"_blank\" rel=\"noopener\">Source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Posted by Anthony Pell An update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, &#8212;&#8211;BEGIN PGP SIGNED MESSAGE&#8212;&#8211; Hash: SHA256===================================================================== Red Hat Security Advisory Synopsis: &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.appservgrid.com\/paw92\/index.php\/2018\/10\/17\/redhat-rhsa-2018-292501-important-kernel-security-and-bug-fix-update\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;RedHat: RHSA-2018-2925:01 Important: kernel security and bug fix update&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-188","post","type-post","status-publish","format-standard","hentry","category-linux"],"_links":{"self":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts\/188","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/comments?post=188"}],"version-history":[{"count":1,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts\/188\/revisions"}],"predecessor-version":[{"id":190,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts\/188\/revisions\/190"}],"wp:attachment":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/media?parent=188"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/categories?post=188"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/tags?post=188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}