CVE-2022-24859

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-24859
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-24859.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-24859
Aliases
Related
Published
2022-04-18T19:15:09Z
Modified
2024-10-12T09:19:30.436750Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

PyPDF2 is an open source python PDF library capable of splitting, merging, cropping, and transforming the pages of PDF files. In versions prior to 1.27.5 an attacker who uses this vulnerability can craft a PDF which leads to an infinite loop if the PyPDF2 if the code attempts to get the content stream. The reason is that the last while-loop in ContentStream._readInlineImage only terminates when it finds the EI token, but never actually checks if the stream has already ended. This issue has been resolved in version 1.27.5. Users unable to upgrade should validate and PDFs prior to iterating over their content stream.

References

Affected packages

Debian:11 / pypdf2

Package

Name
pypdf2
Purl
pkg:deb/debian/pypdf2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.26.0-4+deb11u1

Affected versions

1.*

1.26.0-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / pypdf2

Package

Name
pypdf2
Purl
pkg:deb/debian/pypdf2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.27.9-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/py-pdf/pypdf2

Affected ranges

Type
GIT
Repo
https://github.com/py-pdf/pypdf2
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.26.0
1.27.0
1.27.1
1.27.2
1.27.3
1.27.4

v1.*

v1.17
v1.18
v1.19
v1.20
v1.21
v1.22
v1.23
v1.24
v1.25
v1.25.1