{
  "threat_severity" : "Important",
  "public_date" : "2019-08-12T13:00:00Z",
  "bugzilla" : {
    "description" : "ghostscript: -dSAFER escape via .buildfont1 (701394)",
    "id" : "1737080",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1737080"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.3",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
    "status" : "verified"
  },
  "cwe" : "CWE-648",
  "details" : [ "In ghostscript before version 9.50, the .buildfont1 procedure did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. An attacker could abuse this flaw by creating a specially crafted PostScript file that could escalate privileges and access files outside of restricted areas.", "It was found that the .buildfont1 procedure did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. An attacker could abuse this flaw by creating a specially crafted PostScript file that could escalate privileges and access files outside of restricted areas." ],
  "acknowledgement" : "Red Hat would like to thank Artifex Software for reporting this issue. Upstream acknowledges Netanel (Cloudinary) as the original reporter.",
  "affected_release" : [ {
    "product_name" : "3scale API Management 2.6 on RHEL 7",
    "release_date" : "2019-08-21T00:00:00Z",
    "advisory" : "RHSA-2019:2534",
    "cpe" : "cpe:/a:redhat:3scale_amp:2",
    "package" : "3scale-amp26/3scale-operator:1.9-7"
  }, {
    "product_name" : "3scale API Management 2.6 on RHEL 7",
    "release_date" : "2019-08-21T00:00:00Z",
    "advisory" : "RHSA-2019:2534",
    "cpe" : "cpe:/a:redhat:3scale_amp:2",
    "package" : "3scale-amp26/apicast-gateway:1.15-9"
  }, {
    "product_name" : "3scale API Management 2.6 on RHEL 7",
    "release_date" : "2019-08-21T00:00:00Z",
    "advisory" : "RHSA-2019:2534",
    "cpe" : "cpe:/a:redhat:3scale_amp:2",
    "package" : "3scale-amp26/backend:1.9-24"
  }, {
    "product_name" : "3scale API Management 2.6 on RHEL 7",
    "release_date" : "2019-08-21T00:00:00Z",
    "advisory" : "RHSA-2019:2534",
    "cpe" : "cpe:/a:redhat:3scale_amp:2",
    "package" : "3scale-amp26/operator:1.9-7"
  }, {
    "product_name" : "3scale API Management 2.6 on RHEL 7",
    "release_date" : "2019-08-21T00:00:00Z",
    "advisory" : "RHSA-2019:2534",
    "cpe" : "cpe:/a:redhat:3scale_amp:2",
    "package" : "3scale-amp26/toolbox:1.2-5"
  }, {
    "product_name" : "3scale API Management 2.6 on RHEL 7",
    "release_date" : "2019-08-21T00:00:00Z",
    "advisory" : "RHSA-2019:2534",
    "cpe" : "cpe:/a:redhat:3scale_amp:2",
    "package" : "3scale-amp26/zync:1.9-28"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2019-08-12T00:00:00Z",
    "advisory" : "RHSA-2019:2462",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "ghostscript-0:9.25-2.el7_7.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2019-08-12T00:00:00Z",
    "advisory" : "RHSA-2019:2465",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "ghostscript-0:9.25-2.el8_0.2"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Out of support scope",
    "package_name" : "ghostscript",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "ghostscript",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2019-10216\nhttps://nvd.nist.gov/vuln/detail/CVE-2019-10216" ],
  "name" : "CVE-2019-10216",
  "mitigation" : {
    "value" : "Please refer to the \"Mitigation\" section of CVE-2018-16509 : https://access.redhat.com/security/cve/cve-2018-16509",
    "lang" : "en:us"
  },
  "csaw" : false
}