Resource Exhaustion Affecting qpdf-doc package, versions *
Threat Intelligence
EPSS
0.13% (49th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL7-QPDFDOC-1360853
- published 26 Jul 2021
- disclosed 25 Jul 2017
Introduced: 25 Jul 2017
CVE-2017-11624 Open this link in a new tabHow to fix?
There is no fixed version for RHEL:7 qpdf-doc.
NVD Description
Note: Versions mentioned in the description apply only to the upstream qpdf-doc package and not the qpdf-doc package as distributed by RHEL.
See How to fix? for RHEL:7 relevant fixed versions and status.
A stack-consumption vulnerability was found in libqpdf in QPDF 6.0.0, which allows attackers to cause a denial of service via a crafted file, related to the QPDFTokenizer::resolveLiteral function in QPDFTokenizer.cc after two consecutive calls to QPDFObjectHandle::parseInternal, aka an "infinite loop."