fix(deps): Update security vulnerability in pypdf to v6.9.1 [SECURITY]#4248
Merged
lawrence-u10d merged 1 commit intomainfrom Mar 20, 2026
Merged
fix(deps): Update security vulnerability in pypdf to v6.9.1 [SECURITY]#4248lawrence-u10d merged 1 commit intomainfrom
lawrence-u10d merged 1 commit intomainfrom
Conversation
cfa90a8 to
8cb13f7
Compare
41dd139 to
c736c86
Compare
c736c86 to
97fa6e4
Compare
lawrence-u10d
approved these changes
Mar 20, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
6.7.3→6.9.1GitHub Vulnerability Alerts
CVE-2026-28351
Impact
An attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing the content stream using the RunLengthDecode filter.
Patches
This has been fixed in pypdf==6.7.4.
Workarounds
If you cannot upgrade yet, consider applying the changes from PR #3664.
CVE-2026-28804
Impact
An attacker who uses this vulnerability can craft a PDF which leads to long runtimes. This requires accessing a stream which uses the
/ASCIIHexDecodefilter.Patches
This has been fixed in pypdf==6.7.5.
Workarounds
If you cannot upgrade yet, consider applying the changes from PR #3666.
CVE-2026-31826
Impact
An attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing a content stream with a rather large
/Lengthvalue, regardless of the actual data length inside the stream.Patches
This has been fixed in pypdf==6.8.0.
Workarounds
If you cannot upgrade yet, consider applying the changes from PR #3675.
As far as we are aware, this mostly affects reading from buffers of unknown size, as returned by
open("file.pdf", mode="rb")for example. Passing a file path or aBytesIObuffer to pypdf instead does not seem to trigger the vulnerability.CVE-2026-33123
Impact
An attacker who uses this vulnerability can craft a PDF which leads to long runtimes and/or large memory usage. This requires accessing an array-based stream with lots of entries.
Patches
This has been fixed in pypdf==6.9.1.
Workarounds
If you cannot upgrade yet, consider applying the changes from PR #3686.
Release Notes
py-pdf/pypdf (pypdf)
v6.9.1Compare Source
Security (SEC)
Full Changelog
v6.9.0Compare Source
Security (SEC)
Full Changelog
v6.8.0Compare Source
New Features (ENH)
Performance Improvements (PI)
Bug Fixes (BUG)
Full Changelog
v6.7.5Compare Source
Security (SEC)
/Lengthvalue of stream (#3675)New Features (ENH)
Documentation (DOC)
PageObject.replace_contentson PdfReader (#3669)Full Changelog
v6.7.4Compare Source
Security (SEC)
Full Changelog
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Renovate Bot.