exploit the possibilities

Red Hat Security Advisory 2019-2534-01

Red Hat Security Advisory 2019-2534-01
Posted Aug 21, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-2534-01 - Red Hat 3scale API Management delivers centralized API management features through a distributed, cloud-hosted layer. It includes built-in features to help in building a more successful API program, including access control, rate limits, payment gateway integration, and developer experience tools. This release of Red Hat 3scale API Management 2.6.0 replaces Red Hat 3scale API Management 2.5.1.

tags | advisory
systems | linux, redhat
advisories | CVE-2019-10216
MD5 | 9c5e706bb8911d6bc88a8c019dbd73c4

Red Hat Security Advisory 2019-2534-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Important: Red Hat 3scale API Management 2.6.0 release and security update
Advisory ID: RHSA-2019:2534-01
Product: 3scale API Management
Advisory URL: https://access.redhat.com/errata/RHSA-2019:2534
Issue date: 2019-08-21
CVE Names: CVE-2019-10216
====================================================================
1. Summary:

A security update for Red Hat 3scale API Management Platform is now
available from the Red Hat Container Catalog.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

Red Hat 3scale API Management delivers centralized API management features
through a distributed, cloud-hosted layer. It includes built-in features to
help in building a more successful API program, including access control,
rate limits, payment gateway integration, and developer experience tools.

This release of Red Hat 3scale API Management 2.6.0 replaces Red Hat 3scale
API Management 2.5.1.

Security Fix(es):

* ghostscript: -dSAFER escape via .buildfont1 (CVE-2019-10216)

3. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/documentation/en-us/red_hat_3scale_api_management
/2.6/html-single/installing_3scale/#onpremises-installation

4. Bugs fixed (https://bugzilla.redhat.com/):

1737080 - CVE-2019-10216 ghostscript: -dSAFER escape via .buildfont1 (701394)

5. JIRA issues fixed (https://issues.jboss.org/):

THREESCALE-2852 - Release 3scale AMP 2.6 - Container Images

6. References:

https://access.redhat.com/security/cve/CVE-2019-10216
https://access.redhat.com/security/updates/classification/#important

7. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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9v+4
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

September 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    1 Files
  • 2
    Sep 2nd
    38 Files
  • 3
    Sep 3rd
    30 Files
  • 4
    Sep 4th
    15 Files
  • 5
    Sep 5th
    12 Files
  • 6
    Sep 6th
    17 Files
  • 7
    Sep 7th
    3 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    24 Files
  • 10
    Sep 10th
    22 Files
  • 11
    Sep 11th
    22 Files
  • 12
    Sep 12th
    15 Files
  • 13
    Sep 13th
    5 Files
  • 14
    Sep 14th
    2 Files
  • 15
    Sep 15th
    1 Files
  • 16
    Sep 16th
    11 Files
  • 17
    Sep 17th
    16 Files
  • 18
    Sep 18th
    8 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close