PYSEC-2022-194

See a problem?
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/pypdf2/PYSEC-2022-194.yaml
JSON Data
https://api.test.osv.dev/v1/vulns/PYSEC-2022-194
Aliases
Published
2022-04-18T19:15:00Z
Modified
2023-11-01T05:28:12.617658Z
Summary
[none]
Details

PyPDF2 is an open source python PDF library capable of splitting, merging, cropping, and transforming the pages of PDF files. In versions prior to 1.27.5 an attacker who uses this vulnerability can craft a PDF which leads to an infinite loop if the PyPDF2 if the code attempts to get the content stream. The reason is that the last while-loop in ContentStream._readInlineImage only terminates when it finds the EI token, but never actually checks if the stream has already ended. This issue has been resolved in version 1.27.5. Users unable to upgrade should validate and PDFs prior to iterating over their content stream.

References

Affected packages

PyPI / pypdf2

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.27.5

Affected versions

1.*

1.15
1.16
1.17
1.18
1.19
1.20
1.21
1.22
1.23
1.24
1.25
1.25.1
1.26.0
1.27.0
1.27.1
1.27.2
1.27.3
1.27.4