Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1690 | pypdf is an open source, pure-python PDF library. In affected versions an attacker may craft a PDF which leads to an infinite loop if `__parse_content_stream` is executed. That is, for example, the case if the user extracted text from such a PDF. This issue was introduced in pull request #969 and resolved in pull request #1828. Users are advised to upgrade. Users unable to upgrade may modify the line `while peek not in (b"\r", b"\n")` in `pypdf/generic/_data_structures.py` to `while peek not in (b"\r", b"\n", b"")`. |
Github GHSA |
GHSA-4vvm-4w3v-6mr8 | pypdf and PyPDF2 possible Infinite Loop when a comment isn't followed by a character |
Tue, 03 Dec 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-12-03T16:56:06.186Z
Reserved: 2023-06-21T18:50:41.700Z
Link: CVE-2023-36464
Updated: 2024-08-02T16:45:57.117Z
Status : Modified
Published: 2023-06-27T22:15:11.790
Modified: 2024-11-21T08:09:45.950
Link: CVE-2023-36464
OpenCVE Enrichment
No data.
EUVD
Github GHSA