Loop with Unreachable Exit Condition ('Infinite Loop') Affecting ippsample package, versions *


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
0.32% (55th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN14-IPPSAMPLE-14156330
  • published2 Dec 2025
  • disclosed6 Aug 2024

Introduced: 6 Aug 2024

CVE-2024-42358  (opens in a new tab)
CWE-835  (opens in a new tab)

How to fix?

There is no fixed version for Debian:14 ippsample.

NVD Description

Note: Versions mentioned in the description apply only to the upstream ippsample package and not the ippsample package as distributed by Debian. See How to fix? for Debian:14 relevant fixed versions and status.

PDFio is a simple C library for reading and writing PDF files. There is a denial of service (DOS) vulnerability in the TTF parser. Maliciously crafted TTF files can cause the program to utilize 100% of the Memory and enter an infinite loop. This can also lead to a heap-buffer-overflow vulnerability. An infinite loop occurs in the read_camp function by nGroups value. The ttf.h library is vulnerable. A value called nGroups is extracted from the file, and by changing that value, you can cause the program to utilize 100% of the Memory and enter an infinite loop. If the value of nGroups in the file is small, an infinite loop will not occur. This library, whether used as a standalone binary or as part of another application, is vulnerable to DOS attacks when parsing certain types of files. Automated systems, including web servers that use this code to convert PDF submissions into plaintext, can be DOSed if an attacker uploads a malicious TTF file. This issue has been addressed in release version 1.3.1. All users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS Base Scores

version 3.1