Skip to content

fix(deps): Update security vulnerability in pypdf to v6.9.1 [SECURITY]#4248

Merged
lawrence-u10d merged 1 commit intomainfrom
renovate/security-updates
Mar 20, 2026
Merged

fix(deps): Update security vulnerability in pypdf to v6.9.1 [SECURITY]#4248
lawrence-u10d merged 1 commit intomainfrom
renovate/security-updates

Conversation

@utic-renovate
Copy link
Copy Markdown
Contributor

@utic-renovate utic-renovate bot commented Feb 19, 2026

This PR contains the following updates:

Package Change Age Confidence
pypdf (changelog) 6.7.36.9.1 age confidence

GitHub Vulnerability Alerts

CVE-2026-28351

Impact

An attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing the content stream using the RunLengthDecode filter.

Patches

This has been fixed in pypdf==6.7.4.

Workarounds

If you cannot upgrade yet, consider applying the changes from PR #​3664.

CVE-2026-28804

Impact

An attacker who uses this vulnerability can craft a PDF which leads to long runtimes. This requires accessing a stream which uses the /ASCIIHexDecode filter.

Patches

This has been fixed in pypdf==6.7.5.

Workarounds

If you cannot upgrade yet, consider applying the changes from PR #​3666.

CVE-2026-31826

Impact

An attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing a content stream with a rather large /Length value, regardless of the actual data length inside the stream.

Patches

This has been fixed in pypdf==6.8.0.

Workarounds

If you cannot upgrade yet, consider applying the changes from PR #​3675.

As far as we are aware, this mostly affects reading from buffers of unknown size, as returned by open("file.pdf", mode="rb") for example. Passing a file path or a BytesIO buffer to pypdf instead does not seem to trigger the vulnerability.

CVE-2026-33123

Impact

An attacker who uses this vulnerability can craft a PDF which leads to long runtimes and/or large memory usage. This requires accessing an array-based stream with lots of entries.

Patches

This has been fixed in pypdf==6.9.1.

Workarounds

If you cannot upgrade yet, consider applying the changes from PR #​3686.


Release Notes

py-pdf/pypdf (pypdf)

v6.9.1

Compare Source

Security (SEC)
  • Improve performance and limit length of array-based content streams (#​3686)

Full Changelog

v6.9.0

Compare Source

Security (SEC)
  • Improve performance and limit length of array-based content streams (#​3686)

Full Changelog

v6.8.0

Compare Source

New Features (ENH)
  • Expose /Perms verification result on Encryption object (#​3672)
Performance Improvements (PI)
  • Fix O(n²) performance in NameObject read/write (#​3679)
  • Batch-parse all objects in ObjStm on first access (#​3677)
Bug Fixes (BUG)
  • Avoid sharing array-based content streams between pages (#​3681)
  • Avoid accessing invalid page when inserting blank page under some conditions (#​3529)

Full Changelog

v6.7.5

Compare Source

Security (SEC)
  • Limit allowed /Length value of stream (#​3675)
New Features (ENH)
  • Add /IRT (in-reply-to) support for markup annotations (#​3631)
Documentation (DOC)
  • Avoid using PageObject.replace_contents on PdfReader (#​3669)
  • Document how to disable jbig2dec calls

Full Changelog

v6.7.4

Compare Source

Security (SEC)
  • Improve the performance of the ASCIIHexDecode filter (#​3666)

Full Changelog


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

@utic-renovate utic-renovate bot changed the title fix(deps): Update security vulnerability in pypdf to v6.7.1 [SECURITY] fix(deps): Update security vulnerability in pypdf to v6.7.1 [SECURITY] - autoclosed Feb 20, 2026
@utic-renovate utic-renovate bot closed this Feb 20, 2026
@utic-renovate utic-renovate bot deleted the renovate/security-updates branch February 20, 2026 00:41
@utic-renovate utic-renovate bot changed the title fix(deps): Update security vulnerability in pypdf to v6.7.1 [SECURITY] - autoclosed fix(deps): Update security vulnerability in pypdf to v6.7.2 [SECURITY] Feb 25, 2026
@utic-renovate utic-renovate bot reopened this Feb 25, 2026
@utic-renovate utic-renovate bot force-pushed the renovate/security-updates branch 2 times, most recently from cfa90a8 to 8cb13f7 Compare February 25, 2026 18:30
@utic-renovate utic-renovate bot changed the title fix(deps): Update security vulnerability in pypdf to v6.7.2 [SECURITY] fix(deps): Update security vulnerability in pypdf to v6.7.2 [SECURITY] - autoclosed Feb 25, 2026
@utic-renovate utic-renovate bot closed this Feb 25, 2026
@utic-renovate utic-renovate bot changed the title fix(deps): Update security vulnerability in pypdf to v6.7.2 [SECURITY] - autoclosed fix(deps): Update security vulnerability in pypdf to v6.7.4 [SECURITY] Mar 2, 2026
@utic-renovate utic-renovate bot reopened this Mar 2, 2026
@utic-renovate utic-renovate bot force-pushed the renovate/security-updates branch 2 times, most recently from 41dd139 to c736c86 Compare March 2, 2026 09:24
@utic-renovate utic-renovate bot changed the title fix(deps): Update security vulnerability in pypdf to v6.7.4 [SECURITY] fix(deps): Update security vulnerability in pypdf to v6.7.5 [SECURITY] Mar 3, 2026
@utic-renovate utic-renovate bot force-pushed the renovate/security-updates branch from c736c86 to 97fa6e4 Compare March 20, 2026 20:55
@utic-renovate utic-renovate bot changed the title fix(deps): Update security vulnerability in pypdf to v6.7.5 [SECURITY] fix(deps): Update security vulnerability in pypdf to v6.9.1 [SECURITY] Mar 20, 2026
@lawrence-u10d lawrence-u10d enabled auto-merge March 20, 2026 20:57
@lawrence-u10d lawrence-u10d added this pull request to the merge queue Mar 20, 2026
Merged via the queue into main with commit cc89c8c Mar 20, 2026
53 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant