Nixpkgs Security Tracker

Login with GitHub

Details of issue NIXPKGS-2026-0505

NIXPKGS-2026-0505
published on 3 Mar 2026
updated 4 days, 23 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @anthonyroussel removed
    4 packages
    • capypdf
    • python312Packages.pypdf3
    • python313Packages.pypdf3
    • python314Packages.pypdf3
  • @anthonyroussel added
    3 packages
    • python312Packages.pypdf3
    • python314Packages.pypdf3
    • python313Packages.pypdf3
  • @anthonyroussel removed
    3 packages
    • python314Packages.pypdfium2
    • python313Packages.pypdfium2
    • python312Packages.pypdfium2
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Manipulated RunLengthDecode streams can exhaust RAM

pypdf is a free and open-source pure-python PDF library. Prior to version 6.7.4, an attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing the content stream using the RunLengthDecode filter. This has been fixed in pypdf 6.7.4. As a workaround, consider applying the changes from PR #3664.

Affected products

pypdf
  • ==< 6.7.4

Matching in nixpkgs

Ignored packages (4)

Package maintainers

Upstream advisory: https://github.com/kovidgoyal/calibre/security/advisories/GHSA-vhxc-r7v8-2xrw
Upstream patch: https://github.com/py-pdf/pypdf/commit/f309c6003746414dc7b5048c19e6d879ff2dc858