Artifex Ghostscript before 9.25 allowed a user-writable error exception table, which could be used by remote attackers able to supply crafted PostScript to potentially overwrite or replace error handlers to inject code. Upstream patch: http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=fb713b3818b52d8a6cf62c951eba2e1795ff9624 Upstream bug: https://bugs.ghostscript.com/show_bug.cgi?id=699708
Created ghostscript tracking bugs for this issue: Affects: fedora-all [bug 1632472]
Note: The fix creates some regression : https://bugs.ghostscript.com/show_bug.cgi?id=699832 (fix commit : http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=1778db6bc10)
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:3834 https://access.redhat.com/errata/RHSA-2018:3834
Statement: Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Important, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.
Mitigation: Please refer to the "Mitigation" section of CVE-2018-16509 : https://access.redhat.com/security/cve/cve-2018-16509