Bug 1343510 (CVE-2014-9850)

Summary: CVE-2014-9850 ImageMagick: incorrect thread limit logic
Product: [Other] Security Response Reporter: Martin Prpič <mprpic>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: abhgupta, dmcphers, ethan, jhorak, jialiu, jokerman, lmeyer, mmccomas, nmurray, pahan, tiwillia
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: impact=moderate,public=20141224,reported=20141224,source=oss-security,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,rhel-5/ImageMagick=wontfix,rhel-6/ImageMagick=wontfix,rhel-7/ImageMagick=wontfix,openshift-enterprise-2/ImageMagick=wontfix,fedora-all/ImageMagick=notaffected
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-08 02:54:34 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Description Martin Prpič 2016-06-07 12:01:25 UTC
Limit thread when thread limit is 0. It is a logic error that could lead to resource exhaustion.

CVE assignment:

http://seclists.org/oss-sec/2016/q2/459

Upstream patch:

https://anonscm.debian.org/cgit/collab-maint/imagemagick.git/commit/?h=debian-patches/6.8.9.9-4-for-upstream&id=2257d1eadd02d89d225fce21013a1219d221dc7d