You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
PyPDF2 quadratic runtime with malformed PDF missing xref marker
Moderate severity
GitHub Reviewed
Published
Jun 30, 2023
in
py-pdf/pypdf
•
Updated Nov 6, 2023
An attacker who uses this vulnerability can craft a PDF which leads to unexpected long runtime.
This quadratic runtime blocks the current process and can utilize a single core of the CPU by 100%. It does not affect memory usage.
Impact
An attacker who uses this vulnerability can craft a PDF which leads to unexpected long runtime.
This quadratic runtime blocks the current process and can utilize a single core of the CPU by 100%. It does not affect memory usage.
Patches
py-pdf/pypdf#808
Workarounds
Is there a way for users to fix or remediate the vulnerability without upgrading?
References
References