{"id":25542,"date":"2020-06-17T06:01:38","date_gmt":"2020-06-17T06:01:38","guid":{"rendered":"https:\/\/udsenterprise.com\/lockdown-security-module-bypass-linux\/"},"modified":"2023-09-21T12:21:43","modified_gmt":"2023-09-21T12:21:43","slug":"lockdown-security-module-bypass-linux","status":"publish","type":"post","link":"https:\/\/udsenterprise.com\/en\/lockdown-security-module-bypass-linux\/","title":{"rendered":"Lockdown security module bypass on Linux"},"content":{"rendered":"<p>As the Ubuntu kernel is quite modified, it was initially thought that it would be a specific vulnerability of this operating system. But Jason Donenfeld, the WireGuard developer who discovered the vulnerability, found <strong>another very similar security flaw in the main branch of the Linux kernel<\/strong>. He has managed to exploit it by also injecting ACPI tables and handling to disable Lockdown completely.<\/p>\n<p>This security hole is more delicate than the one found in Ubuntu, since it is not necessary to restart the system to exploit it. <strong>The root of the problem is in the ACPI ConfigFS module<\/strong>, which lets you add arbitrary tables at runtime.<\/p>\n<p>Donenfeld has verified that even <strong>can break the security of the system with Secure Boot enabled<\/strong>. He has successfully loaded arbitrary unsigned kernel modules onto the system.<\/p>\n<p>Fortunately, the developer himself <strong>has created and released the <\/strong><a href=\"https:\/\/lore.kernel.org\/lkml\/20200615104332.901519-1-Jason@zx2c4.com\/\" target=\"_blank\" rel=\"nofollow noopener\">patch that fixes this vulnerability<\/a>**. They are just five lines of code whose job is to check the Lockdown status before giving the green light to writing ACPI tables.<\/p>\n<p>More information: <strong><a href=\"https:\/\/www.muylinux.com\/2020\/06\/15\/romper-seguridad-lockdown-ubuntu-linux\/\" target=\"_blank\" rel=\"nofollow noopener\">MuyLinux<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The <strong>Lockdown security module<\/strong> introduced in Linux 5.4 to lock certain parts of the kernel seems not to be as effective as expected. A developer has managed to <strong>skip this protection on Ubuntu 18.04 and break Secure Boot<\/strong>. To do this, he has used <strong>ACPI tables<\/strong>, the standard that controls the operation of the BIOS and provides advanced functionalities to manage and save energy.<\/p>\n","protected":false},"author":2,"featured_media":10861,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[985,1023,931,926],"tags":[986,1024,934,928],"class_list":["post-25542","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hot-news","category-linux-en","category-open-source","category-security","tag-hot-news","tag-linux-en","tag-open-source","tag-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Lockdown security module bypass on Linux<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/udsenterprise.com\/en\/lockdown-security-module-bypass-linux\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Lockdown security module bypass on Linux\" \/>\n<meta property=\"og:description\" content=\"The Lockdown security module introduced in Linux 5.4 to lock certain parts of the kernel seems not to be as effective as expected. A developer has managed to skip this protection on Ubuntu 18.04 and break Secure Boot. To do this, he has used ACPI tables, the standard that controls the operation of the BIOS and provides advanced functionalities to manage and save energy.\" \/>\n<meta property=\"og:site_name\" content=\"UDS Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-17T06:01:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-21T12:21:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"67\" \/>\n\t<meta property=\"og:image:height\" content=\"4\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"author\" content=\"UDS Enterprise Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif\" \/>\n<meta name=\"twitter:creator\" content=\"@VirtualCable_\" \/>\n<meta name=\"twitter:site\" content=\"@VirtualCable_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"UDS Enterprise Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/lockdown-security-module-bypass-linux\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/lockdown-security-module-bypass-linux\\\/\"},\"author\":{\"name\":\"UDS Enterprise Team\",\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#\\\/schema\\\/person\\\/83f63ed09241332cf10f8f6e7bbdd920\"},\"headline\":\"Lockdown security module bypass on Linux\",\"datePublished\":\"2020-06-17T06:01:38+00:00\",\"dateModified\":\"2023-09-21T12:21:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/lockdown-security-module-bypass-linux\\\/\"},\"wordCount\":180,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/lockdown-security-module-bypass-linux\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/udsenterprise.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/lockdown-ubuntu-linux.jpg\",\"keywords\":[\"Hot news\",\"Linux-en\",\"Open source\",\"Security\"],\"articleSection\":[\"Hot news\",\"Linux-en\",\"Open source\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/udsenterprise.com\\\/en\\\/lockdown-security-module-bypass-linux\\\/#respond\"]}]},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/lockdown-security-module-bypass-linux\\\/\",\"url\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/lockdown-security-module-bypass-linux\\\/\",\"name\":\"Lockdown security module bypass on Linux\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/lockdown-security-module-bypass-linux\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/lockdown-security-module-bypass-linux\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/udsenterprise.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/lockdown-ubuntu-linux.jpg\",\"datePublished\":\"2020-06-17T06:01:38+00:00\",\"dateModified\":\"2023-09-21T12:21:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/lockdown-security-module-bypass-linux\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/udsenterprise.com\\\/en\\\/lockdown-security-module-bypass-linux\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/lockdown-security-module-bypass-linux\\\/#primaryimage\",\"url\":\"https:\\\/\\\/udsenterprise.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/lockdown-ubuntu-linux.jpg\",\"contentUrl\":\"https:\\\/\\\/udsenterprise.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/lockdown-ubuntu-linux.jpg\",\"width\":800,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/lockdown-security-module-bypass-linux\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hot news\",\"item\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/category\\\/hot-news\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Lockdown security module bypass on Linux\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/\",\"name\":\"UDS Enterprise\",\"description\":\"UDS Enterprise es una soluci\u00f3n segura y flexible para virtualizaci\u00f3n de escritorios y acceso remoto, compatible con Windows, Linux y macOS.\",\"publisher\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#organization\"},\"alternateName\":\"UDS Enterprise\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#organization\",\"name\":\"UDS Enterprise\",\"alternateName\":\"UDS Enterprise\",\"url\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/udsenterprise.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/img-logotipo-top-00-udsenterprise.jpg\",\"contentUrl\":\"https:\\\/\\\/udsenterprise.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/img-logotipo-top-00-udsenterprise.jpg\",\"width\":300,\"height\":202,\"caption\":\"UDS Enterprise\"},\"image\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/VirtualCable_\",\"https:\\\/\\\/es.linkedin.com\\\/company\\\/virtualcable\",\"https:\\\/\\\/www.youtube.com\\\/@UDSEnterprise\"],\"description\":\"Virtual Cable es una empresa espa\u00f1ola especializada en soluciones de virtualizaci\u00f3n del puesto de trabajo. Su producto estrella, UDS Enterprise, es un broker de conexiones multiplataforma que permite la administraci\u00f3n y despliegue de escritorios virtuales Windows y Linux, la virtualizaci\u00f3n de aplicaciones y el acceso remoto a equipos f\u00edsicos con sistemas operativos Windows, Linux y macOS\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#\\\/schema\\\/person\\\/83f63ed09241332cf10f8f6e7bbdd920\",\"name\":\"UDS Enterprise Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g\",\"caption\":\"UDS Enterprise Team\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Lockdown security module bypass on Linux","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/udsenterprise.com\/en\/lockdown-security-module-bypass-linux\/","og_locale":"en_US","og_type":"article","og_title":"Lockdown security module bypass on Linux","og_description":"The Lockdown security module introduced in Linux 5.4 to lock certain parts of the kernel seems not to be as effective as expected. A developer has managed to skip this protection on Ubuntu 18.04 and break Secure Boot. To do this, he has used ACPI tables, the standard that controls the operation of the BIOS and provides advanced functionalities to manage and save energy.","og_site_name":"UDS Enterprise","article_published_time":"2020-06-17T06:01:38+00:00","article_modified_time":"2023-09-21T12:21:43+00:00","og_image":[{"width":67,"height":4,"url":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif","type":"image\/gif"}],"author":"UDS Enterprise Team","twitter_card":"summary_large_image","twitter_image":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif","twitter_creator":"@VirtualCable_","twitter_site":"@VirtualCable_","twitter_misc":{"Written by":"UDS Enterprise Team","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/udsenterprise.com\/en\/lockdown-security-module-bypass-linux\/#article","isPartOf":{"@id":"https:\/\/udsenterprise.com\/en\/lockdown-security-module-bypass-linux\/"},"author":{"name":"UDS Enterprise Team","@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/person\/83f63ed09241332cf10f8f6e7bbdd920"},"headline":"Lockdown security module bypass on Linux","datePublished":"2020-06-17T06:01:38+00:00","dateModified":"2023-09-21T12:21:43+00:00","mainEntityOfPage":{"@id":"https:\/\/udsenterprise.com\/en\/lockdown-security-module-bypass-linux\/"},"wordCount":180,"commentCount":0,"publisher":{"@id":"https:\/\/udsenterprise.com\/en\/#organization"},"image":{"@id":"https:\/\/udsenterprise.com\/en\/lockdown-security-module-bypass-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/lockdown-ubuntu-linux.jpg","keywords":["Hot news","Linux-en","Open source","Security"],"articleSection":["Hot news","Linux-en","Open source","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/udsenterprise.com\/en\/lockdown-security-module-bypass-linux\/#respond"]}]},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/udsenterprise.com\/en\/lockdown-security-module-bypass-linux\/","url":"https:\/\/udsenterprise.com\/en\/lockdown-security-module-bypass-linux\/","name":"Lockdown security module bypass on Linux","isPartOf":{"@id":"https:\/\/udsenterprise.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/udsenterprise.com\/en\/lockdown-security-module-bypass-linux\/#primaryimage"},"image":{"@id":"https:\/\/udsenterprise.com\/en\/lockdown-security-module-bypass-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/lockdown-ubuntu-linux.jpg","datePublished":"2020-06-17T06:01:38+00:00","dateModified":"2023-09-21T12:21:43+00:00","breadcrumb":{"@id":"https:\/\/udsenterprise.com\/en\/lockdown-security-module-bypass-linux\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/udsenterprise.com\/en\/lockdown-security-module-bypass-linux\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/udsenterprise.com\/en\/lockdown-security-module-bypass-linux\/#primaryimage","url":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/lockdown-ubuntu-linux.jpg","contentUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/lockdown-ubuntu-linux.jpg","width":800,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/udsenterprise.com\/en\/lockdown-security-module-bypass-linux\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/udsenterprise.com\/en\/"},{"@type":"ListItem","position":2,"name":"Hot news","item":"https:\/\/udsenterprise.com\/en\/category\/hot-news\/"},{"@type":"ListItem","position":3,"name":"Lockdown security module bypass on Linux"}]},{"@type":"WebSite","@id":"https:\/\/udsenterprise.com\/en\/#website","url":"https:\/\/udsenterprise.com\/en\/","name":"UDS Enterprise","description":"UDS Enterprise es una soluci\u00f3n segura y flexible para virtualizaci\u00f3n de escritorios y acceso remoto, compatible con Windows, Linux y macOS.","publisher":{"@id":"https:\/\/udsenterprise.com\/en\/#organization"},"alternateName":"UDS Enterprise","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/udsenterprise.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/udsenterprise.com\/en\/#organization","name":"UDS Enterprise","alternateName":"UDS Enterprise","url":"https:\/\/udsenterprise.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/05\/img-logotipo-top-00-udsenterprise.jpg","contentUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/05\/img-logotipo-top-00-udsenterprise.jpg","width":300,"height":202,"caption":"UDS Enterprise"},"image":{"@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/VirtualCable_","https:\/\/es.linkedin.com\/company\/virtualcable","https:\/\/www.youtube.com\/@UDSEnterprise"],"description":"Virtual Cable es una empresa espa\u00f1ola especializada en soluciones de virtualizaci\u00f3n del puesto de trabajo. Su producto estrella, UDS Enterprise, es un broker de conexiones multiplataforma que permite la administraci\u00f3n y despliegue de escritorios virtuales Windows y Linux, la virtualizaci\u00f3n de aplicaciones y el acceso remoto a equipos f\u00edsicos con sistemas operativos Windows, Linux y macOS"},{"@type":"Person","@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/person\/83f63ed09241332cf10f8f6e7bbdd920","name":"UDS Enterprise Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g","caption":"UDS Enterprise Team"}}]}},"_links":{"self":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts\/25542","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/comments?post=25542"}],"version-history":[{"count":1,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts\/25542\/revisions"}],"predecessor-version":[{"id":27800,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts\/25542\/revisions\/27800"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/media\/10861"}],"wp:attachment":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/media?parent=25542"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/categories?post=25542"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/tags?post=25542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}