First published: Thu Feb 29 2024(Updated: )
Heap Buffer Overflow vulnerability in qpdf 11.9.0 allows attackers to crash the application via the std::__shared_count() function at /bits/shared_ptr_base.h.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/qpdf | <11.5.0-1ubuntu1.1 | 11.5.0-1ubuntu1.1 |
ubuntu/qpdf | <11.9.0-1 | 11.9.0-1 |
debian/qpdf | <=11.3.0-1+deb12u1 | 8.4.0-2 8.4.0-2+deb10u1 10.1.0-1 11.9.0-2 |
qpdf | =11.9.0 | |
Fedora | =38 | |
Fedora | =39 | |
Fedora | =40 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-24246 is classified as a high severity vulnerability due to its potential to cause application crashes.
To fix CVE-2024-24246, update qpdf to version 11.9.0-2 or later from the repository of your Linux distribution.
CVE-2024-24246 affects qpdf versions 11.9.0 and potentially earlier versions depending on the specific package source.
Yes, CVE-2024-24246 can be exploited by attackers remotely to crash the application, causing denial of service.
CVE-2024-24246 affects systems running qpdf version 11.9.0 on Ubuntu, Debian, and Fedora distributions.