ghostscript is vulnerable to arbitrary command execution. An incomplete fix for CVE-2018-16509 allows an attacker to exploit another variant of the vulnerability and bypass the -dSAFER
protection to execute arbitrary command via malicious PostScript documents.
git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=520bb0ea7519
git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=5516c614dc33
git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=78911a01b67d
git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=79cccf641486
git.ghostscript.com/?p=ghostpdl.git;a=commit;h=520bb0ea7519
git.ghostscript.com/?p=ghostpdl.git;a=commit;h=5516c614dc33
git.ghostscript.com/?p=ghostpdl.git;a=commit;h=78911a01b67d
git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
access.redhat.com/errata/RHSA-2018:3761
access.redhat.com/security/cve/CVE-2018-16863
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=1652893
bugzilla.redhat.com/show_bug.cgi?id=1654290
bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16863