A denial of service flaw was found in the way ImageMagick, an image display and manipulation tool for the X Window System, decoded certain JPEG images. A remote attacker could provide a JPEG image with specially-crafted values / sequences of RST0 up to RST7 restart markers (used to indicate the input stream to be corrupted), which once processed by some ImageMagick tool would lead that tool to consume excessive amount of CPU time (denial of service). Upstream patch: [1] http://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=20629
Acknowledgements: Red Hat would like to thank CERT-FI for reporting this issue. CERT-FI acknowledges Aleksis Kauppinen, Joonas Kuorilehto, Tuomas Parttimaa and Lasse Ylivainio of Codenomicon's CROSS project as the original reporters.
This issue affects the versions of the ImageMagick package, as shipped with Fedora release of 15 and 16.
Public now via: [2] http://www.cert.fi/en/reports/2012/vulnerability635606.html
Created ImageMagick tracking bugs for this issue Affects: fedora-all [bug 808159]
This issue affects the versions of the ImageMagick package, as shipped with Red Hat Enterprise Linux 5 and 6.
Rawhide build which should fix it http://koji.fedoraproject.org/koji/taskinfo?taskID=3977291.
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2012:0545 https://rhn.redhat.com/errata/RHSA-2012-0545.html
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2012:0544 https://rhn.redhat.com/errata/RHSA-2012-0544.html