Описание
Heap Buffer Overflow vulnerability in qpdf 11.9.0 allows attackers to crash the application via the std::__shared_count() function at /bits/shared_ptr_base.h.
A flaw was found in qpdf. Processing a specially crafted JSON file using the --json-input command line option may lead to a heap-based buffer over-read, resulting in an application crash.
Отчет
The qpdf packages as shipped in Red Hat Enterprise Linux 8 and 9 are not affected by this vulnerability because the support of generating PDFs based on JSON was introduced in a newer version of qpdf.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 7 | qpdf | Out of support scope | ||
| Red Hat Enterprise Linux 8 | qpdf | Not affected | ||
| Red Hat Enterprise Linux 9 | qpdf | Not affected |
Показывать по
Дополнительная информация
Статус:
EPSS
7.5 High
CVSS3
Связанные уязвимости
Heap Buffer Overflow vulnerability in qpdf 11.9.0 allows attackers to crash the application via the std::__shared_count() function at /bits/shared_ptr_base.h.
Heap Buffer Overflow vulnerability in qpdf 11.9.0 allows attackers to crash the application via the std::__shared_count() function at /bits/shared_ptr_base.h.
Heap Buffer Overflow vulnerability in qpdf 11.9.0 allows attackers to ...
Heap Buffer Overflow vulnerability in qpdf 11.9.0 allows attackers to crash the application via the std::__shared_count() function at /bits/shared_ptr_base.h.
EPSS
7.5 High
CVSS3