{"id":"USN-6713-1","summary":"qpdf vulnerability","details":"It was discovered that QPDF incorrectly handled certain memory operations\nwhen decoding JSON files. If a user or automated system were tricked into\nprocessing a specially crafted JSON file, QPDF could be made to crash,\nresulting in a denial of service, or possibly execute arbitrary code.\n","modified":"2026-02-04T04:34:22.665645Z","published":"2024-03-25T12:01:37.414662Z","related":["CVE-2024-24246","UBUNTU-CVE-2024-24246"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6713-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-24246"}],"affected":[{"package":{"name":"qpdf","ecosystem":"Ubuntu:23.10","purl":"pkg:deb/ubuntu/qpdf@11.5.0-1ubuntu1.1?arch=source&distro=mantic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"11.5.0-1ubuntu1.1"}]}],"versions":["11.3.0-1","11.4.0-1","11.5.0-1","11.5.0-1ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_version":"11.5.0-1ubuntu1.1","binary_name":"libqpdf-dev"},{"binary_version":"11.5.0-1ubuntu1.1","binary_name":"libqpdf29"},{"binary_version":"11.5.0-1ubuntu1.1","binary_name":"libqpdf29-dbgsym"},{"binary_version":"11.5.0-1ubuntu1.1","binary_name":"qpdf"},{"binary_version":"11.5.0-1ubuntu1.1","binary_name":"qpdf-dbgsym"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6713-1.json"}}],"schema_version":"1.7.3"}