Skip to content

Commit 27a53ed

Browse files
Advisory Database Sync
1 parent d0efe19 commit 27a53ed

File tree

45 files changed

+766
-68
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

45 files changed

+766
-68
lines changed
Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,63 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-4pxv-j86v-mhcw",
4+
"modified": "2026-04-16T21:30:12Z",
5+
"published": "2026-04-16T21:30:12Z",
6+
"aliases": [],
7+
"summary": "pypdf: Possible long runtimes for wrong size values in incremental mode",
8+
"details": "### Impact\nAn attacker who uses this vulnerability can craft a PDF which leads to long runtimes. This requires loading a PDF with a large trailer `/Size` value in incremental mode.\n\n### Patches\nThis has been fixed in [pypdf==6.10.2](https://github.com/py-pdf/pypdf/releases/tag/6.10.2).\n\n### Workarounds\nIf you cannot upgrade yet, consider applying the changes from PR [#3735](https://github.com/py-pdf/pypdf/pull/3735).",
9+
"severity": [
10+
{
11+
"type": "CVSS_V4",
12+
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
13+
}
14+
],
15+
"affected": [
16+
{
17+
"package": {
18+
"ecosystem": "PyPI",
19+
"name": "pypdf"
20+
},
21+
"ranges": [
22+
{
23+
"type": "ECOSYSTEM",
24+
"events": [
25+
{
26+
"introduced": "0"
27+
},
28+
{
29+
"fixed": "6.10.2"
30+
}
31+
]
32+
}
33+
]
34+
}
35+
],
36+
"references": [
37+
{
38+
"type": "WEB",
39+
"url": "https://github.com/py-pdf/pypdf/security/advisories/GHSA-4pxv-j86v-mhcw"
40+
},
41+
{
42+
"type": "WEB",
43+
"url": "https://github.com/py-pdf/pypdf/pull/3735"
44+
},
45+
{
46+
"type": "PACKAGE",
47+
"url": "https://github.com/py-pdf/pypdf"
48+
},
49+
{
50+
"type": "WEB",
51+
"url": "https://github.com/py-pdf/pypdf/releases/tag/6.10.2"
52+
}
53+
],
54+
"database_specific": {
55+
"cwe_ids": [
56+
"CWE-834"
57+
],
58+
"severity": "MODERATE",
59+
"github_reviewed": true,
60+
"github_reviewed_at": "2026-04-16T21:30:12Z",
61+
"nvd_published_at": null
62+
}
63+
}
Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,63 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-7gw9-cf7v-778f",
4+
"modified": "2026-04-16T21:30:00Z",
5+
"published": "2026-04-16T21:30:00Z",
6+
"aliases": [],
7+
"summary": "pypdf: Manipulated FlateDecode predictor parameters can exhaust RAM",
8+
"details": "### Impact\nAn attacker who uses this vulnerability can craft a PDF which leads to the RAM being exhausted. This requires accessing a stream compressed using `/FlateDecode` with a `/Predictor` unequal 1 and large predictor parameters.\n\n### Patches\nThis has been fixed in [pypdf==6.10.2](https://github.com/py-pdf/pypdf/releases/tag/6.10.2).\n\n### Workarounds\nIf you cannot upgrade yet, consider applying the changes from PR [#3734](https://github.com/py-pdf/pypdf/pull/3734).",
9+
"severity": [
10+
{
11+
"type": "CVSS_V4",
12+
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
13+
}
14+
],
15+
"affected": [
16+
{
17+
"package": {
18+
"ecosystem": "PyPI",
19+
"name": "pypdf"
20+
},
21+
"ranges": [
22+
{
23+
"type": "ECOSYSTEM",
24+
"events": [
25+
{
26+
"introduced": "0"
27+
},
28+
{
29+
"fixed": "6.10.2"
30+
}
31+
]
32+
}
33+
]
34+
}
35+
],
36+
"references": [
37+
{
38+
"type": "WEB",
39+
"url": "https://github.com/py-pdf/pypdf/security/advisories/GHSA-7gw9-cf7v-778f"
40+
},
41+
{
42+
"type": "WEB",
43+
"url": "https://github.com/py-pdf/pypdf/pull/3734"
44+
},
45+
{
46+
"type": "PACKAGE",
47+
"url": "https://github.com/py-pdf/pypdf"
48+
},
49+
{
50+
"type": "WEB",
51+
"url": "https://github.com/py-pdf/pypdf/releases/tag/6.10.2"
52+
}
53+
],
54+
"database_specific": {
55+
"cwe_ids": [
56+
"CWE-789"
57+
],
58+
"severity": "MODERATE",
59+
"github_reviewed": true,
60+
"github_reviewed_at": "2026-04-16T21:30:00Z",
61+
"nvd_published_at": null
62+
}
63+
}
Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,61 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-9jj7-4m8r-rfcm",
4+
"modified": "2026-04-16T21:31:34Z",
5+
"published": "2026-04-07T18:31:36Z",
6+
"aliases": [
7+
"CVE-2026-33816"
8+
],
9+
"summary": "Memory-safety vulnerability in github.com/jackc/pgx/v5.",
10+
"details": "Memory-safety vulnerability in github.com/jackc/pgx/v5.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Go",
21+
"name": "github.com/jackc/pgx/v5"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "5.9.0"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "ADVISORY",
41+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33816"
42+
},
43+
{
44+
"type": "PACKAGE",
45+
"url": "https://github.com/jackc/pgx"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://pkg.go.dev/vuln/GO-2026-4772"
50+
}
51+
],
52+
"database_specific": {
53+
"cwe_ids": [
54+
"CWE-20"
55+
],
56+
"severity": "CRITICAL",
57+
"github_reviewed": true,
58+
"github_reviewed_at": "2026-04-16T21:31:34Z",
59+
"nvd_published_at": "2026-04-07T16:16:24Z"
60+
}
61+
}
Lines changed: 134 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,134 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-vp6r-9m58-5xv8",
4+
"modified": "2026-04-16T21:31:14Z",
5+
"published": "2026-04-16T21:31:14Z",
6+
"aliases": [],
7+
"summary": "OmniFaces: EL injection via crafted resource name in wildcard CDN mapping",
8+
"details": "### Impact\n\nServer-side EL injection leading to Remote Code Execution (RCE). Affects applications that use `CDNResourceHandler` with a wildcard CDN mapping (e.g. `libraryName:*=https://cdn.example.com/*`). An attacker can craft a resource request\nURL containing an EL expression in the resource name, which is evaluated server-side.\n\nThe severity depends on the EL implementation and the objects available in the EL context. In the worst case this leads to Remote Code Execution (RCE). At minimum it allows information disclosure and denial of service.\n\nApplications using `CDNResourceHandler` without wildcard mappings (i.e. only explicit resource-to-URL mappings) are **not** affected.\n\n### Patches\n\nFixed in versions 5.2.3, 4.7.5, 3.14.16, 2.7.32, and 1.14.2. Users should upgrade to the appropriate version for their branch.\n\n### Workarounds\n\nReplace wildcard CDN mappings with explicit resource-to-URL mappings. For example, replace:\n```\nlibraryName:*=https://cdn.example.com/*\n```\nwith individual entries:\n```\nlibraryName:resource1.js=https://cdn.example.com/resource1.js,\nlibraryName:resource2.js=https://cdn.example.com/resource2.js\n```",
9+
"severity": [
10+
{
11+
"type": "CVSS_V3",
12+
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
13+
}
14+
],
15+
"affected": [
16+
{
17+
"package": {
18+
"ecosystem": "Maven",
19+
"name": "org.omnifaces:omnifaces"
20+
},
21+
"ranges": [
22+
{
23+
"type": "ECOSYSTEM",
24+
"events": [
25+
{
26+
"introduced": "0"
27+
},
28+
{
29+
"fixed": "1.14.2"
30+
}
31+
]
32+
}
33+
]
34+
},
35+
{
36+
"package": {
37+
"ecosystem": "Maven",
38+
"name": "org.omnifaces:omnifaces"
39+
},
40+
"ranges": [
41+
{
42+
"type": "ECOSYSTEM",
43+
"events": [
44+
{
45+
"introduced": "2.0-RC1"
46+
},
47+
{
48+
"fixed": "2.7.32"
49+
}
50+
]
51+
}
52+
]
53+
},
54+
{
55+
"package": {
56+
"ecosystem": "Maven",
57+
"name": "org.omnifaces:omnifaces"
58+
},
59+
"ranges": [
60+
{
61+
"type": "ECOSYSTEM",
62+
"events": [
63+
{
64+
"introduced": "3.0-RC1"
65+
},
66+
{
67+
"fixed": "3.14.16"
68+
}
69+
]
70+
}
71+
]
72+
},
73+
{
74+
"package": {
75+
"ecosystem": "Maven",
76+
"name": "org.omnifaces:omnifaces"
77+
},
78+
"ranges": [
79+
{
80+
"type": "ECOSYSTEM",
81+
"events": [
82+
{
83+
"introduced": "4.0-M1"
84+
},
85+
{
86+
"fixed": "4.7.5"
87+
}
88+
]
89+
}
90+
]
91+
},
92+
{
93+
"package": {
94+
"ecosystem": "Maven",
95+
"name": "org.omnifaces:omnifaces"
96+
},
97+
"ranges": [
98+
{
99+
"type": "ECOSYSTEM",
100+
"events": [
101+
{
102+
"introduced": "5.0-M1"
103+
},
104+
{
105+
"fixed": "5.2.3"
106+
}
107+
]
108+
}
109+
],
110+
"database_specific": {
111+
"last_known_affected_version_range": "< 5.2.2"
112+
}
113+
}
114+
],
115+
"references": [
116+
{
117+
"type": "WEB",
118+
"url": "https://github.com/omnifaces/omnifaces/security/advisories/GHSA-vp6r-9m58-5xv8"
119+
},
120+
{
121+
"type": "PACKAGE",
122+
"url": "https://github.com/omnifaces/omnifaces"
123+
}
124+
],
125+
"database_specific": {
126+
"cwe_ids": [
127+
"CWE-917"
128+
],
129+
"severity": "HIGH",
130+
"github_reviewed": true,
131+
"github_reviewed_at": "2026-04-16T21:31:14Z",
132+
"nvd_published_at": null
133+
}
134+
}
Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,63 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-x284-j5p8-9c5p",
4+
"modified": "2026-04-16T21:30:25Z",
5+
"published": "2026-04-16T21:30:25Z",
6+
"aliases": [],
7+
"summary": "pypdf: Manipulated FlateDecode image dimensions can exhaust RAM",
8+
"details": "### Impact\nAn attacker who uses this vulnerability can craft a PDF which leads to the RAM being exhausted. This requires accessing an image using `/FlateDecode` with large size values.\n\n### Patches\nThis has been fixed in [pypdf==6.10.2](https://github.com/py-pdf/pypdf/releases/tag/6.10.2).\n\n### Workarounds\nIf you cannot upgrade yet, consider applying the changes from PR [#3734](https://github.com/py-pdf/pypdf/pull/3734).",
9+
"severity": [
10+
{
11+
"type": "CVSS_V4",
12+
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
13+
}
14+
],
15+
"affected": [
16+
{
17+
"package": {
18+
"ecosystem": "PyPI",
19+
"name": "pypdf"
20+
},
21+
"ranges": [
22+
{
23+
"type": "ECOSYSTEM",
24+
"events": [
25+
{
26+
"introduced": "0"
27+
},
28+
{
29+
"fixed": "6.10.2"
30+
}
31+
]
32+
}
33+
]
34+
}
35+
],
36+
"references": [
37+
{
38+
"type": "WEB",
39+
"url": "https://github.com/py-pdf/pypdf/security/advisories/GHSA-x284-j5p8-9c5p"
40+
},
41+
{
42+
"type": "WEB",
43+
"url": "https://github.com/py-pdf/pypdf/pull/3734"
44+
},
45+
{
46+
"type": "PACKAGE",
47+
"url": "https://github.com/py-pdf/pypdf"
48+
},
49+
{
50+
"type": "WEB",
51+
"url": "https://github.com/py-pdf/pypdf/releases/tag/6.10.2"
52+
}
53+
],
54+
"database_specific": {
55+
"cwe_ids": [
56+
"CWE-789"
57+
],
58+
"severity": "MODERATE",
59+
"github_reviewed": true,
60+
"github_reviewed_at": "2026-04-16T21:30:25Z",
61+
"nvd_published_at": null
62+
}
63+
}

0 commit comments

Comments
 (0)