More information about this security flaw is available in the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=2295648 Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.
We do not yet build with tesseract ocr devices, so this report is INVALID. Also not that "arbitrary" (if you do build with ocr) is quite an exaggeration: there is no priviledge escalation whatsover. All you can do is make ghostscript "copy" files that the user has access to. (It should not do that either, of course, as it can overwrite files, copy them to shared locations etc.)