As per the upstream advisory:
Condor installations that support Standard Universe jobs and run the daemons on the submit machine as root are vulnerable to local privilege escalation. If a user submits a job into the standard universe, the user job may then execute code on the submit machine as the root user. If your Condor installation does not contain the condor_shadow.std executable, then you are not affected by this vulnerability
The problem exists in the 7.8.X series only. The 7.6.X series is not affected. Also, Condor must be started as root otherwise it is not affected.
Current Fedora versions have the fixed version so are not affected. Red Hat Enterprise MRG provides 7.6.x and is not affected.
Not vulnerable. This issue did not affect the versions of condor as shipped with Red Hat Enterprise MRG 1 or 2 as they do not provide a vulnerable version of condor.