Artifex Ghostscript allows attackers to bypass a sandbox protection mechanism by leveraging exposure of system operators in the saved execution stack in an error object.
Created ghostscript tracking bugs for this issue:
Affects: fedora-all [bug 1642585]
This issue has been addressed in the following products:
Red Hat Enterprise Linux 7
Via RHSA-2018:3834 https://access.redhat.com/errata/RHSA-2018:3834
Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Important, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.
Please refer to the "Mitigation" section of CVE-2018-16509 : https://access.redhat.com/security/cve/cve-2018-16509