{"id":"CVE-2024-24246","details":"Heap Buffer Overflow vulnerability in qpdf 11.9.0 allows attackers to crash the application via the std::__shared_count() function at /bits/shared_ptr_base.h.","modified":"2026-04-16T04:34:46.491710542Z","published":"2024-02-29T20:15:41.407Z","related":["USN-6713-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4WLK6ICPJUMOJNHZQWXAA5MPXG5JHZZL/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX3D3YCNS6CQL3774OFUROLP3EM25ILC/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3N6TULMEYVCLXO47Y5W4VWCJMSB72CB/"},{"type":"ARTICLE","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4WLK6ICPJUMOJNHZQWXAA5MPXG5JHZZL/"},{"type":"ARTICLE","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FX3D3YCNS6CQL3774OFUROLP3EM25ILC/"},{"type":"ARTICLE","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3N6TULMEYVCLXO47Y5W4VWCJMSB72CB/"},{"type":"EVIDENCE","url":"https://github.com/qpdf/qpdf/issues/1123"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/qpdf/qpdf","events":[{"introduced":"0"},{"last_affected":"3b97c9bd266b7c32ea36d3536e22dab77412886d"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"11.9.0"}]}}],"versions":["release-qpdf-10.0.0","release-qpdf-10.0.1","release-qpdf-10.0.2","release-qpdf-10.0.3","release-qpdf-10.0.4","release-qpdf-10.1.0","release-qpdf-10.2.0","release-qpdf-10.3.0","release-qpdf-10.3.1","release-qpdf-10.3.2","release-qpdf-10.4.0","release-qpdf-10.5.0","release-qpdf-10.6.0","release-qpdf-10.6.1","release-qpdf-10.6.2","release-qpdf-10.6.3","release-qpdf-10.6.3.0cmake1","release-qpdf-2.0","release-qpdf-2.0.1","release-qpdf-2.0.2","release-qpdf-2.0.3","release-qpdf-2.0.4","release-qpdf-2.0.5","release-qpdf-2.0.6","release-qpdf-2.1","release-qpdf-2.1.1","release-qpdf-2.1.2","release-qpdf-2.1.3","release-qpdf-2.1.4","release-qpdf-2.1.5","release-qpdf-2.1.rc1","release-qpdf-2.2.0","release-qpdf-2.2.1","release-qpdf-2.2.2","release-qpdf-2.2.3","release-qpdf-2.2.4","release-qpdf-2.2.rc1","release-qpdf-2.3.0","release-qpdf-2.3.1","release-qpdf-3.0.0","release-qpdf-3.0.1","release-qpdf-3.0.2","release-qpdf-3.0.rc1","release-qpdf-4.0.0","release-qpdf-4.0.1","release-qpdf-4.1.0","release-qpdf-4.2.0","release-qpdf-5.0.0","release-qpdf-5.0.1","release-qpdf-5.1.0","release-qpdf-5.1.1","release-qpdf-5.1.2","release-qpdf-5.1.3","release-qpdf-5.2.0","release-qpdf-6.0.0","release-qpdf-7.0.0","release-qpdf-7.0.b1","release-qpdf-7.1.0","release-qpdf-7.1.1","release-qpdf-8.0.0","release-qpdf-8.0.1","release-qpdf-8.0.2","release-qpdf-8.0.a1","release-qpdf-8.0.rc1","release-qpdf-8.0.rc2","release-qpdf-8.0.rc3","release-qpdf-8.1.0","release-qpdf-8.2.0","release-qpdf-8.2.1","release-qpdf-8.3.0","release-qpdf-8.4.0","release-qpdf-8.4.1","release-qpdf-8.4.2","release-qpdf-9.0.0","release-qpdf-9.0.1","release-qpdf-9.0.2","release-qpdf-9.1.0","release-qpdf-9.1.1","release-qpdf-9.1.rc1","v11.0.0","v11.1.0","v11.1.1","v11.2.0","v11.3.0","v11.4.0","v11.5.0","v11.6.0","v11.6.1","v11.6.2","v11.6.3","v11.6.4","v11.7.0","v11.8.0","v11.9.0"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"38"}]},{"events":[{"introduced":"0"},{"last_affected":"39"}]},{"events":[{"introduced":"0"},{"last_affected":"40"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-24246.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}