First published: Fri Jun 30 2023(Updated: )
### Impact An attacker who uses this vulnerability can craft a PDF which leads to unexpected long runtime. This quadratic runtime blocks the current process and can utilize a single core of the CPU by 100%. It does not affect memory usage. ### Patches https://github.com/py-pdf/pypdf/pull/808 ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ ### References * [PyPDF2 PR #808](https://github.com/py-pdf/pypdf/pull/808) * [PyPDF2 Issue #582](https://github.com/py-pdf/pypdf/issues/582)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/pypdf2 | <1.26.0-2ubuntu0.1~ | 1.26.0-2ubuntu0.1~ |
ubuntu/pypdf2 | <1.26.0-3ubuntu1.20.04.2 | 1.26.0-3ubuntu1.20.04.2 |
ubuntu/pypdf2 | <1.26.0-4ubuntu0.22.04.2 | 1.26.0-4ubuntu0.22.04.2 |
ubuntu/pypdf2 | <1.25.1-1ubuntu0.1~ | 1.25.1-1ubuntu0.1~ |
debian/pypdf2 | <=1.26.0-2<=1.26.0-4 | 1.26.0-2+deb10u2 2.12.1-3 |
Pypdf Project Pypdf | <=1.27.8 | |
pip/PyPDF2 | <=1.27.8 | 1.27.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
An attacker can craft a PDF that leads to unexpected long runtime and utilizes 100% of a single CPU core.
It blocks the current process and can cause high CPU usage.
PyPDF2 versions up to and including 1.27.8, pypdf2 versions up to and including 1.26.0-2ubuntu0.1~, 1.26.0-3ubuntu1.20.04.2, 1.26.0-4ubuntu0.22.04.2, 1.25.1-1ubuntu0.1~, and pypdf versions up to and including 1.27.8.
Apply the corresponding patches or updates for the affected software versions, which can be found in the provided references.
The CWE ID for CVE-2023-36810 is CWE-407 (Uncontrolled Resource Consumption).