CVE-2022-38784

Poppler prior to and including 22.08.0 contains an integer overflow in the JBIG2 decoder (JBIG2Stream::readTextRegionSeg() in JBIGStream.cc). Processing a specially crafted PDF file or JBIG2 image could lead to a crash or the execution of arbitrary code. This is similar to the vulnerability described by CVE-2022-38171 in Xpdf.
References
Link Resource
http://www.openwall.com/lists/oss-security/2022/09/02/11 Mailing List Third Party Advisory
https://github.com/jeffssh/CVE-2021-30860 Third Party Advisory
https://github.com/zmanion/Vulnerabilities/blob/main/CVE-2022-38171.md Exploit Third Party Advisory
https://gitlab.freedesktop.org/poppler/poppler/-/merge_requests/1261/diffs?commit_id=27354e9d9696ee2bc063910a6c9a6b27c5184a52 Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2022/09/msg00030.html Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BGY72LBJMFAKQWC2XH4MRPIGPQLXTFL6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E5Z2677EQUWVHJLGSH5DQX53EK6MY2M2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J546EJUKUOPWA3JSLP7DYNBAU3YGNCCW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NLKN3HJKZSGEEKOF57DM7Q3IB74HP5VW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQAO6O2XHPQHNW2MWOCJJ4C3YWS2VV4K/
https://poppler.freedesktop.org/releases.html Release Notes Vendor Advisory
https://security.gentoo.org/glsa/202209-21 Third Party Advisory
https://www.cve.org/CVERecord?id=CVE-2022-38171 Third Party Advisory
https://www.debian.org/security/2022/dsa-5224 Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/09/02/11 Mailing List Third Party Advisory
https://github.com/jeffssh/CVE-2021-30860 Third Party Advisory
https://github.com/zmanion/Vulnerabilities/blob/main/CVE-2022-38171.md Exploit Third Party Advisory
https://gitlab.freedesktop.org/poppler/poppler/-/merge_requests/1261/diffs?commit_id=27354e9d9696ee2bc063910a6c9a6b27c5184a52 Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2022/09/msg00030.html Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BGY72LBJMFAKQWC2XH4MRPIGPQLXTFL6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E5Z2677EQUWVHJLGSH5DQX53EK6MY2M2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J546EJUKUOPWA3JSLP7DYNBAU3YGNCCW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NLKN3HJKZSGEEKOF57DM7Q3IB74HP5VW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQAO6O2XHPQHNW2MWOCJJ4C3YWS2VV4K/
https://poppler.freedesktop.org/releases.html Release Notes Vendor Advisory
https://security.gentoo.org/glsa/202209-21 Third Party Advisory
https://www.cve.org/CVERecord?id=CVE-2022-38171 Third Party Advisory
https://www.debian.org/security/2022/dsa-5224 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*

History

21 Nov 2024, 07:17

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2022/09/02/11 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2022/09/02/11 - Mailing List, Third Party Advisory
References () https://github.com/jeffssh/CVE-2021-30860 - Third Party Advisory () https://github.com/jeffssh/CVE-2021-30860 - Third Party Advisory
References () https://github.com/zmanion/Vulnerabilities/blob/main/CVE-2022-38171.md - Exploit, Third Party Advisory () https://github.com/zmanion/Vulnerabilities/blob/main/CVE-2022-38171.md - Exploit, Third Party Advisory
References () https://gitlab.freedesktop.org/poppler/poppler/-/merge_requests/1261/diffs?commit_id=27354e9d9696ee2bc063910a6c9a6b27c5184a52 - Patch, Vendor Advisory () https://gitlab.freedesktop.org/poppler/poppler/-/merge_requests/1261/diffs?commit_id=27354e9d9696ee2bc063910a6c9a6b27c5184a52 - Patch, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2022/09/msg00030.html - Third Party Advisory () https://lists.debian.org/debian-lts-announce/2022/09/msg00030.html - Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BGY72LBJMFAKQWC2XH4MRPIGPQLXTFL6/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BGY72LBJMFAKQWC2XH4MRPIGPQLXTFL6/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E5Z2677EQUWVHJLGSH5DQX53EK6MY2M2/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E5Z2677EQUWVHJLGSH5DQX53EK6MY2M2/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J546EJUKUOPWA3JSLP7DYNBAU3YGNCCW/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J546EJUKUOPWA3JSLP7DYNBAU3YGNCCW/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NLKN3HJKZSGEEKOF57DM7Q3IB74HP5VW/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NLKN3HJKZSGEEKOF57DM7Q3IB74HP5VW/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQAO6O2XHPQHNW2MWOCJJ4C3YWS2VV4K/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQAO6O2XHPQHNW2MWOCJJ4C3YWS2VV4K/ -
References () https://poppler.freedesktop.org/releases.html - Release Notes, Vendor Advisory () https://poppler.freedesktop.org/releases.html - Release Notes, Vendor Advisory
References () https://security.gentoo.org/glsa/202209-21 - Third Party Advisory () https://security.gentoo.org/glsa/202209-21 - Third Party Advisory
References () https://www.cve.org/CVERecord?id=CVE-2022-38171 - Third Party Advisory () https://www.cve.org/CVERecord?id=CVE-2022-38171 - Third Party Advisory
References () https://www.debian.org/security/2022/dsa-5224 - Third Party Advisory () https://www.debian.org/security/2022/dsa-5224 - Third Party Advisory

07 Nov 2023, 03:50

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J546EJUKUOPWA3JSLP7DYNBAU3YGNCCW/', 'name': 'FEDORA-2022-51b27699ce', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BGY72LBJMFAKQWC2XH4MRPIGPQLXTFL6/', 'name': 'FEDORA-2022-f79aa2bae9', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQAO6O2XHPQHNW2MWOCJJ4C3YWS2VV4K/', 'name': 'FEDORA-2022-f7b375eae8', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E5Z2677EQUWVHJLGSH5DQX53EK6MY2M2/', 'name': 'FEDORA-2022-f8ec1c06a3', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NLKN3HJKZSGEEKOF57DM7Q3IB74HP5VW/', 'name': 'FEDORA-2022-fcb3b063a6', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E5Z2677EQUWVHJLGSH5DQX53EK6MY2M2/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQAO6O2XHPQHNW2MWOCJJ4C3YWS2VV4K/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J546EJUKUOPWA3JSLP7DYNBAU3YGNCCW/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BGY72LBJMFAKQWC2XH4MRPIGPQLXTFL6/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NLKN3HJKZSGEEKOF57DM7Q3IB74HP5VW/ -

Information

Published : 2022-08-30 03:15

Updated : 2024-11-21 07:17


NVD link : CVE-2022-38784

Mitre link : CVE-2022-38784

CVE.ORG link : CVE-2022-38784


JSON object : View

Products Affected

fedoraproject

  • fedora

debian

  • debian_linux

freedesktop

  • poppler
CWE
CWE-190

Integer Overflow or Wraparound