{"id":2435,"date":"2018-01-12T16:51:34","date_gmt":"2018-01-12T16:51:34","guid":{"rendered":"https:\/\/newsite.inuvika.com\/?p=2435"},"modified":"2025-06-30T12:15:40","modified_gmt":"2025-06-30T16:15:40","slug":"meltdown-und-spectre-exploit-beratung","status":"publish","type":"post","link":"https:\/\/www.inuvika.com\/de\/meltdown-and-spectre-exploit-advisory\/","title":{"rendered":"Hinweis auf Meltdown- und Spectre-Exploits"},"content":{"rendered":"<p>Inuvika-Update bez\u00fcglich CVE-2017-5754, CVE-2017-5715 und CVE-2017-5753 (Spectre- und Meltdown-Sicherheitsl\u00fccken)<\/p>\n<h2>\u00dcbersicht<\/h2>\n<p>K\u00fcrzlich wurden neue sicherheitsrelevante Probleme festgestellt, die sich auf Intel-, AMD- und ARM-basierte CPU-Architekturen auswirken.<\/p>\n<p>Obwohl diese Probleme hardwarebezogen sind, pr\u00fcft Inuvika weiterhin die m\u00f6glichen Auswirkungen auf OVD Enterprise. Dieses Update soll unsere Kunden und Partner \u00fcber die derzeit bekannten Ma\u00dfnahmen informieren, die ergriffen werden k\u00f6nnen, um m\u00f6gliche Risiken zu minimieren.  Inuvika wird weitere Updates bereitstellen, wenn direkte Auswirkungen auf OVD festgestellt werden.<\/p>\n<h3>Auswirkungen auf OVD Enterprise<\/h3>\n<p>Inuvika glaubt, dass <a href=\"\/de\/unterstutzung\/#download\">derzeit unterst\u00fctzte<\/a> Versionen von OVD Enterprise sind nicht <em>direkt<\/em> die von den bekannten Sicherheitsproblemen betroffen sind.<\/p>\n<p>Die Sicherheitsprobleme k\u00f6nnen jedoch sowohl lokal (d. h. innerhalb desselben Betriebssystems) als auch \u00fcber die Grenzen des Virtualisierungsgastes ausgenutzt werden.\u00a0 \u00a0<strong>Daher kann es sein, dass die zugrunde liegende CPU-Firmware, der Hypervisor, die Gastbetriebssysteme, die Cloud-Plattformen und andere Komponenten von Drittanbietern, die Teil einer OVD Enterprise-Umgebung sind, aktualisiert werden m\u00fcssen.\u00a0<\/strong><\/p>\n<h2>Bekannter Status der Komponenten von Drittanbietern<\/h2>\n<ul>\n<li>Microsoft hat Patches f\u00fcr die Versionen 2008 R2, 2012 R2 und 2016 des Windows Server-Betriebssystems ver\u00f6ffentlicht. (Ref: <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4072698\/windows-server-guidance-to-protect-against-the-speculative-execution\">https:\/\/support.microsoft.com\/en-us\/help\/4072698\/windows-server-guidance-to-protect-against-the-speculative-execution<\/a> )<\/li>\n<li>Kernel- und Prozessor-Microcode-Updates wurden sowohl f\u00fcr Ubuntu 16.04 LTS als auch f\u00fcr Ubuntu 14.04 LTS zur Verf\u00fcgung gestellt.  (Ref: <a href=\"https:\/\/wiki.ubuntu.com\/SecurityTeam\/KnowledgeBase\/SpectreAndMeltdown\">https:\/\/wiki.ubuntu.com\/SecurityTeam\/KnowledgeBase\/SpectreAndMeltdown<\/a> )<\/li>\n<li>Kernel- und Prozessor-Microcode-Updates wurden f\u00fcr die Betriebssysteme Red Hat Enterprise Linux 6 und 7 zur Verf\u00fcgung gestellt. (Ref: <a href=\"https:\/\/access.redhat.com\/security\/vulnerabilities\/speculativeexecution\">https:\/\/access.redhat.com\/security\/vulnerabilities\/speculativeexecution<\/a> )<\/li>\n<li>VMware hat Patches f\u00fcr vSphere ESXi ver\u00f6ffentlicht.<\/li>\n<li>Google, Microsoft und Amazon Clouds wurden angesprochen.  Weitere Informationen finden Sie auf den Websites der Anbieter.<\/li>\n<li>Mozilla Firefox-Browser. (Ref: <a href=\"https:\/\/blog.mozilla.org\/security\/2018\/01\/03\/mitigations-landing-new-class-timing-attack\/\">https:\/\/blog.mozilla.org\/security\/2018\/01\/03\/mitigations-landing-new-class-timing-attack\/<\/a> )<\/li>\n<li>Apple iOS, macOS und Safari. (Ref: <a href=\"https:\/\/support.apple.com\/en-us\/HT208394\">https:\/\/support.apple.com\/en-us\/HT208394<\/a> )<\/li>\n<li>Nutanix Hyper-Konvergenz-Infrastruktur. (Siehe Sicherheitshinweis #0007 im Support-Portal: <a href=\"https:\/\/portal.nutanix.com\/#\/page\/static\/securityAdvisories\">https:\/\/portal.nutanix.com\/#\/page\/static\/securityAdvisories<\/a> )<\/li>\n<li>Intel Sicherheitshinweis. (Ref: https:\/\/security-center.intel.com\/advisory.aspx?intelid=INTEL-SA-00088&amp;languageid=en-fr )<\/li>\n<\/ul>\n<h2>Aktuelle Empfehlungen f\u00fcr OVD Enterprise Kunden<\/h2>\n<ol>\n<li>Bevor Sie mit der Aktualisierung beginnen, sollten Sie innehalten und einen Gesamtplan erstellen.  Bewerten Sie jede einzelne Komponente Ihrer OVD-Umgebung und identifizieren Sie die notwendigen Schritte, die unternommen werden m\u00fcssen.  Inuvika empfiehlt, dass Sie folgende Priorit\u00e4ten setzen:\n<ol style=\"list-style-type: lower-alpha;\">\n<li>Hypervisor-Anwendungen und Server-Hardware, die OVD hosten<\/li>\n<li>Gastbetriebssysteme<\/li>\n<li>Backend-Systeme (Verzeichnis-, Speicher- und Anwendungsserver-Hardware sowie deren Betriebssysteme)<\/li>\n<li>Anwendungen, die sich auf Ihren Anwendungsservern befinden<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<ol>\n<li value=\"2\">Wenden Sie sich an Ihren Hardware- oder Software-OEM-Anbieter, um die neuesten Informationen und verf\u00fcgbaren Patches zu erhalten.<\/li>\n<\/ol>\n<ol>\n<li value=\"3\">Wenden Sie die empfohlenen Patches an. \u00dcberpr\u00fcfen Sie nach dem Einspielen eines Patches, ob die Komponente wie erwartet funktioniert.<\/li>\n<\/ol>\n<ol>\n<li value=\"4\">Dar\u00fcber hinaus ben\u00f6tigen Client-Ger\u00e4te, deren Betriebssysteme und Anwendungen, die auf Ihre OVD-Umgebung zugreifen, m\u00f6glicherweise Updates.  Wir empfehlen Ihnen, sich f\u00fcr weitere Informationen an die OEMs Ihrer Ger\u00e4te zu wenden.<\/li>\n<\/ol>","protected":false},"excerpt":{"rendered":"<p>Inuvika Update Regarding CVE-2017-5754, CVE-2017-5715 and CVE-2017-5753 (Spectre and Meltdown Security Flaws) Overview Recently, new security-related issues have been identified impacting Intel, AMD, and ARM-based CPU architectures. While the nature [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[68,67,66],"tags":[70,79],"class_list":["post-2435","post","type-post","status-publish","format-standard","hentry","category-news","category-ovd-enterprise","category-support","tag-announcements","tag-security"],"blocksy_meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Meltdown and Spectre Exploit Advisory - Inuvika<\/title>\n<meta name=\"description\" content=\"Inuvika believes that currently-supported versions of OVD Enterprise are not directly impacted by the known security issues.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inuvika.com\/de\/meltdown-und-spectre-exploit-beratung\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Meltdown and Spectre Exploit Advisory - Inuvika\" \/>\n<meta property=\"og:description\" content=\"Inuvika believes that currently-supported versions of OVD Enterprise are not directly impacted by the known security issues.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inuvika.com\/de\/meltdown-und-spectre-exploit-beratung\/\" \/>\n<meta property=\"og:site_name\" content=\"Inuvika\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/inuvika\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-12T16:51:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-30T16:15:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inuvika.com\/wp-content\/uploads\/2018\/10\/inuvika-logo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"718\" \/>\n\t<meta property=\"og:image:height\" content=\"169\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"inuvika\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@InuvikaInc\" \/>\n<meta name=\"twitter:site\" content=\"@InuvikaInc\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.inuvika.com\\\/meltdown-and-spectre-exploit-advisory\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inuvika.com\\\/meltdown-and-spectre-exploit-advisory\\\/\"},\"author\":{\"name\":\"inuvika\",\"@id\":\"https:\\\/\\\/www.inuvika.com\\\/#\\\/schema\\\/person\\\/3dce21cd04a407041a24be571b54137e\"},\"headline\":\"Meltdown and Spectre Exploit Advisory\",\"datePublished\":\"2018-01-12T16:51:34+00:00\",\"dateModified\":\"2025-06-30T16:15:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.inuvika.com\\\/meltdown-and-spectre-exploit-advisory\\\/\"},\"wordCount\":445,\"publisher\":{\"@id\":\"https:\\\/\\\/www.inuvika.com\\\/#organization\"},\"keywords\":[\"Announcements\",\"Security\"],\"articleSection\":[\"News\",\"OVD Enterprise\",\"Support\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inuvika.com\\\/meltdown-and-spectre-exploit-advisory\\\/\",\"url\":\"https:\\\/\\\/www.inuvika.com\\\/meltdown-and-spectre-exploit-advisory\\\/\",\"name\":\"Meltdown and Spectre Exploit Advisory - Inuvika\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inuvika.com\\\/#website\"},\"datePublished\":\"2018-01-12T16:51:34+00:00\",\"dateModified\":\"2025-06-30T16:15:40+00:00\",\"description\":\"Inuvika believes that currently-supported versions of OVD Enterprise are not directly impacted by the known security issues.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inuvika.com\\\/meltdown-and-spectre-exploit-advisory\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inuvika.com\\\/meltdown-and-spectre-exploit-advisory\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inuvika.com\\\/meltdown-and-spectre-exploit-advisory\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inuvika.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Meltdown and Spectre Exploit Advisory\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inuvika.com\\\/#website\",\"url\":\"https:\\\/\\\/www.inuvika.com\\\/\",\"name\":\"inuvika.com\",\"description\":\"Apps + Desktops to any device!\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.inuvika.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inuvika.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.inuvika.com\\\/#organization\",\"name\":\"Inuvika Inc\",\"url\":\"https:\\\/\\\/www.inuvika.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.inuvika.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.inuvika.com\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/inuvika-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.inuvika.com\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/inuvika-logo.png\",\"width\":718,\"height\":169,\"caption\":\"Inuvika Inc\"},\"image\":{\"@id\":\"https:\\\/\\\/www.inuvika.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/inuvika\\\/\",\"https:\\\/\\\/x.com\\\/InuvikaInc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/inuvika-inc-\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UC4nWPydrDItH1KMWqfQw8aA\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.inuvika.com\\\/#\\\/schema\\\/person\\\/3dce21cd04a407041a24be571b54137e\",\"name\":\"inuvika\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3fd02665c9f370276f5686b17375b209374886f7697d9e1bcd2e3da4d5d104a2?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3fd02665c9f370276f5686b17375b209374886f7697d9e1bcd2e3da4d5d104a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3fd02665c9f370276f5686b17375b209374886f7697d9e1bcd2e3da4d5d104a2?s=96&d=mm&r=g\",\"caption\":\"inuvika\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hinweis auf Meltdown- und Spectre-Exploits - Inuvika","description":"Inuvika geht davon aus, dass die derzeit unterst\u00fctzten Versionen von OVD Enterprise nicht direkt von den bekannten Sicherheitsproblemen betroffen sind.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inuvika.com\/de\/meltdown-und-spectre-exploit-beratung\/","og_locale":"de_DE","og_type":"article","og_title":"Meltdown and Spectre Exploit Advisory - Inuvika","og_description":"Inuvika believes that currently-supported versions of OVD Enterprise are not directly impacted by the known security issues.\u00a0","og_url":"https:\/\/www.inuvika.com\/de\/meltdown-und-spectre-exploit-beratung\/","og_site_name":"Inuvika","article_publisher":"https:\/\/www.facebook.com\/inuvika\/","article_published_time":"2018-01-12T16:51:34+00:00","article_modified_time":"2025-06-30T16:15:40+00:00","og_image":[{"width":718,"height":169,"url":"https:\/\/www.inuvika.com\/wp-content\/uploads\/2018\/10\/inuvika-logo.jpg","type":"image\/jpeg"}],"author":"inuvika","twitter_card":"summary_large_image","twitter_creator":"@InuvikaInc","twitter_site":"@InuvikaInc","twitter_misc":{"Verfasst von":false,"Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inuvika.com\/meltdown-and-spectre-exploit-advisory\/#article","isPartOf":{"@id":"https:\/\/www.inuvika.com\/meltdown-and-spectre-exploit-advisory\/"},"author":{"name":"inuvika","@id":"https:\/\/www.inuvika.com\/#\/schema\/person\/3dce21cd04a407041a24be571b54137e"},"headline":"Meltdown and Spectre Exploit Advisory","datePublished":"2018-01-12T16:51:34+00:00","dateModified":"2025-06-30T16:15:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inuvika.com\/meltdown-and-spectre-exploit-advisory\/"},"wordCount":445,"publisher":{"@id":"https:\/\/www.inuvika.com\/#organization"},"keywords":["Announcements","Security"],"articleSection":["News","OVD Enterprise","Support"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.inuvika.com\/meltdown-and-spectre-exploit-advisory\/","url":"https:\/\/www.inuvika.com\/meltdown-and-spectre-exploit-advisory\/","name":"Hinweis auf Meltdown- und Spectre-Exploits - Inuvika","isPartOf":{"@id":"https:\/\/www.inuvika.com\/#website"},"datePublished":"2018-01-12T16:51:34+00:00","dateModified":"2025-06-30T16:15:40+00:00","description":"Inuvika geht davon aus, dass die derzeit unterst\u00fctzten Versionen von OVD Enterprise nicht direkt von den bekannten Sicherheitsproblemen betroffen sind.\u00a0","breadcrumb":{"@id":"https:\/\/www.inuvika.com\/meltdown-and-spectre-exploit-advisory\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inuvika.com\/meltdown-and-spectre-exploit-advisory\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.inuvika.com\/meltdown-and-spectre-exploit-advisory\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inuvika.com\/"},{"@type":"ListItem","position":2,"name":"Meltdown and Spectre Exploit Advisory"}]},{"@type":"WebSite","@id":"https:\/\/www.inuvika.com\/#website","url":"https:\/\/www.inuvika.com\/","name":"inuvika.de","description":"Apps + Desktops auf jedem Ger\u00e4t!","publisher":{"@id":"https:\/\/www.inuvika.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inuvika.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.inuvika.com\/#organization","name":"Inuvika Inc","url":"https:\/\/www.inuvika.com\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.inuvika.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.inuvika.com\/wp-content\/uploads\/2018\/10\/inuvika-logo.png","contentUrl":"https:\/\/www.inuvika.com\/wp-content\/uploads\/2018\/10\/inuvika-logo.png","width":718,"height":169,"caption":"Inuvika Inc"},"image":{"@id":"https:\/\/www.inuvika.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/inuvika\/","https:\/\/x.com\/InuvikaInc","https:\/\/www.linkedin.com\/company\/inuvika-inc-\/","https:\/\/www.youtube.com\/channel\/UC4nWPydrDItH1KMWqfQw8aA"]},{"@type":"Person","@id":"https:\/\/www.inuvika.com\/#\/schema\/person\/3dce21cd04a407041a24be571b54137e","name":"inuvika","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/3fd02665c9f370276f5686b17375b209374886f7697d9e1bcd2e3da4d5d104a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3fd02665c9f370276f5686b17375b209374886f7697d9e1bcd2e3da4d5d104a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3fd02665c9f370276f5686b17375b209374886f7697d9e1bcd2e3da4d5d104a2?s=96&d=mm&r=g","caption":"inuvika"}}]}},"brizy_media":[],"_links":{"self":[{"href":"https:\/\/www.inuvika.com\/de\/wp-json\/wp\/v2\/posts\/2435","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inuvika.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inuvika.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inuvika.com\/de\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inuvika.com\/de\/wp-json\/wp\/v2\/comments?post=2435"}],"version-history":[{"count":0,"href":"https:\/\/www.inuvika.com\/de\/wp-json\/wp\/v2\/posts\/2435\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inuvika.com\/de\/wp-json\/wp\/v2\/media?parent=2435"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inuvika.com\/de\/wp-json\/wp\/v2\/categories?post=2435"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inuvika.com\/de\/wp-json\/wp\/v2\/tags?post=2435"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}