chore(deps): update dependency pypdf to v6.9.1 [security]#58
Open
renovate[bot] wants to merge 1 commit intomasterfrom
Open
chore(deps): update dependency pypdf to v6.9.1 [security]#58renovate[bot] wants to merge 1 commit intomasterfrom
renovate[bot] wants to merge 1 commit intomasterfrom
Conversation
Dependency ReviewThe following issues were found:
License Issuespoetry.lock
OpenSSF Scorecard
Scanned Files
|
7f8a320 to
008e839
Compare
008e839 to
b18307d
Compare
b18307d to
b30c152
Compare
b30c152 to
6050056
Compare
6050056 to
a822a2c
Compare
a822a2c to
d5e24f9
Compare
d5e24f9 to
fcdd0b4
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
6.6.1→6.9.1GitHub Vulnerability Alerts
CVE-2026-24688
Impact
An attacker who uses this vulnerability can craft a PDF which leads to an infinite loop. This requires accessing the outlines/bookmarks.
Patches
This has been fixed in pypdf 6.6.2.
Workarounds
If projects cannot upgrade yet, consider applying the changes from PR #3610.
CVE-2026-27024
Impact
An attacker who uses this vulnerability can craft a PDF which leads to an infinite loop. This requires accessing the children of a
TreeObject, for example as part of outlines.Patches
This has been fixed in pypdf==6.7.1.
Workarounds
If you cannot upgrade yet, consider applying the changes from PR #3645.
CVE-2026-27025
Impact
An attacker who uses this vulnerability can craft a PDF which leads to long runtimes and large memory consumption. This requires parsing the
/ToUnicodeentry of a font with unusually large values, for example during text extraction.Patches
This has been fixed in pypdf==6.7.1.
Workarounds
If you cannot upgrade yet, consider applying the changes from PR #3646.
CVE-2026-27026
Impact
An attacker who uses this vulnerability can craft a PDF which leads to long runtimes. This requires a malformed
/FlateDecodestream, where the byte-by-byte decompression is used.Patches
This has been fixed in pypdf==6.7.1.
Workarounds
If you cannot upgrade yet, consider applying the changes from PR #3644.
CVE-2026-27628
Impact
An attacker who uses this vulnerability can craft a PDF which leads to an infinite loop. This requires reading the file.
Patches
This has been fixed in pypdf==6.7.2.
Workarounds
If users cannot upgrade yet, consider applying the changes from PR #3655.
CVE-2026-27888
Impact
An attacker who uses this vulnerability can craft a PDF which leads to the RAM being exhausted. This requires accessing the
xfaproperty of a reader or writer and the corresponding stream being compressed using/FlateDecode.Patches
This has been fixed in pypdf==6.7.3.
Workarounds
If projects cannot upgrade yet, consider applying the changes from PR #3658.
CVE-2026-28351
Impact
An attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing the content stream using the RunLengthDecode filter.
Patches
This has been fixed in pypdf==6.7.4.
Workarounds
If you cannot upgrade yet, consider applying the changes from PR #3664.
CVE-2026-28804
Impact
An attacker who uses this vulnerability can craft a PDF which leads to long runtimes. This requires accessing a stream which uses the
/ASCIIHexDecodefilter.Patches
This has been fixed in pypdf==6.7.5.
Workarounds
If you cannot upgrade yet, consider applying the changes from PR #3666.
CVE-2026-31826
Impact
An attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing a content stream with a rather large
/Lengthvalue, regardless of the actual data length inside the stream.Patches
This has been fixed in pypdf==6.8.0.
Workarounds
If you cannot upgrade yet, consider applying the changes from PR #3675.
As far as we are aware, this mostly affects reading from buffers of unknown size, as returned by
open("file.pdf", mode="rb")for example. Passing a file path or aBytesIObuffer to pypdf instead does not seem to trigger the vulnerability.CVE-2026-33123
Impact
An attacker who uses this vulnerability can craft a PDF which leads to long runtimes and/or large memory usage. This requires accessing an array-based stream with lots of entries.
Patches
This has been fixed in pypdf==6.9.1.
Workarounds
If you cannot upgrade yet, consider applying the changes from PR #3686.
Release Notes
py-pdf/pypdf (pypdf)
v6.9.1Compare Source
Security (SEC)
Full Changelog
v6.9.0Compare Source
Security (SEC)
Full Changelog
v6.8.0Compare Source
New Features (ENH)
Performance Improvements (PI)
Bug Fixes (BUG)
Full Changelog
v6.7.5Compare Source
Security (SEC)
Full Changelog
v6.7.4Compare Source
Security (SEC)
Full Changelog
v6.7.3Compare Source
Security (SEC)
Robustness (ROB)
Full Changelog
v6.7.2Compare Source
Security (SEC)
Full Changelog
v6.7.1Compare Source
Security (SEC)
Bug Fixes (BUG)
/Pages(#3650)Full Changelog
v6.7.0Compare Source
Deprecations (DEP)
New Features (ENH)
Bug Fixes (BUG)
Robustness (ROB)
self._infobeing None incompress_identical_objects(#3612)Full Changelog
v6.6.2Compare Source
Security (SEC)
Full Changelog
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.