Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1823 | pypdf is a pure-python PDF library capable of splitting, merging, cropping, and transforming the pages of PDF files. In version 2.10.5 an attacker who uses this vulnerability can craft a PDF which leads to an infinite loop. This infinite loop blocks the current process and can utilize a single core of the CPU by 100%. It does not affect memory usage. That is, for example, the case if the user extracted metadata from such a malformed PDF. Versions prior to 2.10.5 throw an error, but do not hang forever. This issue was fixed with https://github.com/py-pdf/pypdf/pull/1331 which has been included in release 2.10.6. Users are advised to upgrade. Users unable to upgrade should modify `PyPDF2/generic/_data_structures.py::read_object` to an an error throwing case. See GHSA-hm9v-vj3r-r55m for details. |
Github GHSA |
GHSA-hm9v-vj3r-r55m | PyPDF2 vulnerable to possible Infinite Loop when reading malformed objects |
Wed, 06 Nov 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-11-06T19:51:43.120Z
Reserved: 2023-06-27T15:43:18.383Z
Link: CVE-2023-36807
Updated: 2024-08-02T17:01:09.484Z
Status : Modified
Published: 2023-06-30T19:15:09.283
Modified: 2024-11-21T08:10:38.247
Link: CVE-2023-36807
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA