Artifex Ghostscript 9.25 and earlier allows attackers to bypass a sandbox protection mechanism via vectors involving the 1Policy operator. References: https://www.openwall.com/lists/oss-security/2018/10/16/2 https://bugs.chromium.org/p/project-zero/issues/detail?id=1696 git.ghostscript.com/?p=ghostpdl.git;h=8d19fdf63f91f50466b08f23e2d93d37a4c5ea0b
Created ghostscript tracking bugs for this issue: Affects: fedora-all [bug 1642943]
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:3834 https://access.redhat.com/errata/RHSA-2018:3834
Statement: Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Important, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.
Mitigation: Please refer to the "Mitigation" section of CVE-2018-16509 : https://access.redhat.com/security/cve/cve-2018-16509