GHSA-x284-j5p8-9c5p
ADVISORY - githubSummary
Impact
An attacker who uses this vulnerability can craft a PDF which leads to the RAM being exhausted. This requires accessing an image using /FlateDecode with large size values.
Patches
This has been fixed in pypdf==6.10.2.
Workarounds
If you cannot upgrade yet, consider applying the changes from PR #3734.
Common Weakness Enumeration (CWE)
ADVISORY - github
Memory Allocation with Excessive Size Value
Sign in to Docker Scout
See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.
Sign in