A flaw was found in QPDF before 7.0.0. There is a large heap-based out-of-bounds read in the Pl_Buffer::write function in Pl_Buffer.cc. It is caused by an integer overflow in the PNG filter. This allows an attacker to cause a denial of service via a crafted file. External References: https://github.com/qpdf/qpdf/issues/150 Upstream Patch(es): https://github.com/qpdf/qpdf/commit/ec7d74a386c0b2f38990079c3b0d2a2b30be0e71 https://github.com/qpdf/qpdf/commit/6d46346eb93d5032c08cf1e39023b5d57260a766 https://github.com/qpdf/qpdf/commit/1868a10f8b06631362618bfc85ca8646da4b4b71
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2017-18185