pypdf: Manipulated FlateDecode predictor parameters can exhaust RAM
Description
Published to the GitHub Advisory Database
Apr 16, 2026
Reviewed
Apr 16, 2026
Published by the National Vulnerability Database
Apr 22, 2026
Last updated
Apr 24, 2026
Impact
An attacker who uses this vulnerability can craft a PDF which leads to the RAM being exhausted. This requires accessing a stream compressed using
/FlateDecodewith a/Predictorunequal 1 and large predictor parameters.Patches
This has been fixed in pypdf==6.10.2.
Workarounds
If you cannot upgrade yet, consider applying the changes from PR #3734.
References