[Bug 1216772] New: VUL-0: CVE-2023-36807: pypdf: In version 2.10.5 an attacker who uses this vulnerability can craft a PDF which leads to an infinite loop.
https://bugzilla.suse.com/show_bug.cgi?id=1216772 Bug ID: 1216772 Summary: VUL-0: CVE-2023-36807: pypdf: In version 2.10.5 an attacker who uses this vulnerability can craft a PDF which leads to an infinite loop. Classification: openSUSE Product: openSUSE Distribution Version: Leap 15.6 Hardware: Other URL: https://smash.suse.de/issue/371003/ OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Python Assignee: simonf.lees@suse.com Reporter: smash_bz@suse.de QA Contact: security-team@suse.de CC: stoyan.manolov@suse.com Target Milestone: --- Found By: Security Response Team Blocker: --- pypdf is a pure-python PDF library capable of splitting, merging, cropping, and transforming the pages of PDF files. In version 2.10.5 an attacker who uses this vulnerability can craft a PDF which leads to an infinite loop. This infinite loop blocks the current process and can utilize a single core of the CPU by 100%. It does not affect memory usage. That is, for example, the case if the user extracted metadata from such a malformed PDF. Versions prior to 2.10.5 throw an error, but do not hang forever. This issue was fixed with https://github.com/py-pdf/pypdf/pull/1331 which has been included in release 2.10.6. Users are advised to upgrade. Users unable to upgrade should modify `PyPDF2/generic/_data_structures.py::read_object` to an an error throwing case. See GHSA-hm9v-vj3r-r55m for details. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36807 -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1216772 Maintenance Automation <maint-coord+maintenance-robot@suse.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Priority|P5 - None |P3 - Medium -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@suse.com