CVE-2023-36810

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-36810
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-36810.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-36810
Aliases
Downstream
Related
Published
2023-06-30T18:43:12Z
Modified
2025-10-15T02:25:50.211793Z
Severity
  • 6.2 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Quadratic runtime with malformed PDF missing xref marker in pypdf
Details

pypdf is a pure-python PDF library capable of splitting, merging, cropping, and transforming the pages of PDF files. An attacker who uses this vulnerability can craft a PDF which leads to unexpected long runtime. This quadratic runtime blocks the current process and can utilize a single core of the CPU by 100%. It does not affect memory usage. This issue has been addressed in PR 808 and versions from 1.27.9 include this fix. Users are advised to upgrade. There are no known workarounds for this vulnerability.

References

Affected packages

Git / github.com/py-pdf/pypdf

Affected ranges

Type
GIT
Repo
https://github.com/py-pdf/pypdf
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.26.0
1.27.0
1.27.1
1.27.2
1.27.3
1.27.4
1.27.5
1.27.6
1.27.7
1.27.8

v1.*

v1.17
v1.18
v1.19
v1.20
v1.21
v1.22
v1.23
v1.24
v1.25
v1.25.1