Artifex Ghostscript 9.25 and earlier allows attackers to bypass a sandbox protection mechanism via vectors involving errorhandler setup. This issue exists because of an incomplete fix for CVE-2018-17183. References: https://bugs.chromium.org/p/project-zero/issues/detail?id=1682&desc=2 https://bugs.ghostscript.com/show_bug.cgi?id=699816 http://www.openwall.com/lists/oss-security/2018/10/09/4 Upstream Patch: http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=a54c9e61e7d0 http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=a5a9bf8c6a63 http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=a6807394bd94
Created ghostscript tracking bugs for this issue: Affects: fedora-all [bug 1642579]
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:3834 https://access.redhat.com/errata/RHSA-2018:3834
Statement: Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Important, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.
Mitigation: Please refer to the "Mitigation" section of CVE-2018-16509 : https://access.redhat.com/security/cve/cve-2018-16509