{"id":"CVE-2017-9208","details":"libqpdf.a in QPDF 6.0.0 allows remote attackers to cause a denial of service (infinite recursion and stack consumption) via a crafted PDF document, related to releaseResolved functions, aka qpdf-infiniteloop1.","modified":"2026-03-12T22:42:30.322022Z","published":"2017-05-23T04:29:04.713Z","related":["MGASA-2017-0237","MGASA-2018-0145","SUSE-SU-2018:3066-1","SUSE-SU-2018:3066-2"],"references":[{"type":"ADVISORY","url":"https://usn.ubuntu.com/3638-1/"},{"type":"FIX","url":"https://blogs.gentoo.org/ago/2017/05/21/qpdf-three-infinite-loop-in-libqpdf/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/qpdf/qpdf","events":[{"introduced":"0"},{"last_affected":"b7302a9b727d28d59bff0f0f7d8d62ff6486aef6"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"6.0.0"}]}}],"versions":["release-qpdf-2.0","release-qpdf-2.0.1","release-qpdf-2.0.2","release-qpdf-2.0.3","release-qpdf-2.0.4","release-qpdf-2.0.5","release-qpdf-2.0.6","release-qpdf-2.1","release-qpdf-2.1.1","release-qpdf-2.1.2","release-qpdf-2.1.3","release-qpdf-2.1.4","release-qpdf-2.1.5","release-qpdf-2.1.rc1","release-qpdf-2.2.0","release-qpdf-2.2.1","release-qpdf-2.2.2","release-qpdf-2.2.3","release-qpdf-2.2.4","release-qpdf-2.2.rc1","release-qpdf-2.3.0","release-qpdf-2.3.1","release-qpdf-3.0.0","release-qpdf-3.0.1","release-qpdf-3.0.2","release-qpdf-3.0.rc1","release-qpdf-4.0.0","release-qpdf-4.0.1","release-qpdf-4.1.0","release-qpdf-4.2.0","release-qpdf-5.0.0","release-qpdf-5.0.1","release-qpdf-5.1.0","release-qpdf-5.1.1","release-qpdf-5.1.2","release-qpdf-5.1.3","release-qpdf-5.2.0","release-qpdf-6.0.0"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"17.10"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-9208.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}