Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-62708

Опубликовано: 22 окт. 2025
Источник: debian
EPSS Низкий

Описание

pypdf is a free and open-source pure-python PDF library. Prior to version 6.1.3, an attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing the content stream of a page using the LZWDecode filter. This has been fixed in pypdf version 6.1.3.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pypdfunfixedpackage
pypdfno-dsatrixiepackage
pypdfnot-affectedbookwormpackage

Примечания

  • https://github.com/py-pdf/pypdf/security/advisories/GHSA-jfx9-29x2-rv3j

  • https://github.com/py-pdf/pypdf/pull/3502

  • Introduced with: https://github.com/py-pdf/pypdf/commit/e825ac07ea89c78962646245e348b934d48f9629 (5.1.0)

  • Fixed by: https://github.com/py-pdf/pypdf/commit/e51d07807ffcdaf18077b9486dadb3dc05b368da (6.1.3)

  • When fixing this issue make sure to adjust the limits according to the followup

  • GHSA-m449-cwjh-6pw7 / CVE-2025-66019 to not open up CVE-2025-66019

EPSS

Процентиль: 23%
0.00076
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
4 месяца назад

pypdf is a free and open-source pure-python PDF library. Prior to version 6.1.3, an attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing the content stream of a page using the LZWDecode filter. This has been fixed in pypdf version 6.1.3.

CVSS3: 7.5
nvd
4 месяца назад

pypdf is a free and open-source pure-python PDF library. Prior to version 6.1.3, an attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing the content stream of a page using the LZWDecode filter. This has been fixed in pypdf version 6.1.3.

github
4 месяца назад

pypdf can exhaust RAM via manipulated LZWDecode streams

EPSS

Процентиль: 23%
0.00076
Низкий