CVE-2022-38784

Poppler prior to and including 22.08.0 contains an integer overflow in the JBIG2 decoder (JBIG2Stream::readTextRegionSeg() in JBIGStream.cc). Processing a specially crafted PDF file or JBIG2 image could lead to a crash or the execution of arbitrary code. This is similar to the vulnerability described by CVE-2022-38171 in Xpdf.
Configurations

Configuration 1 (hide)

cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*

History

20 Oct 2022, 18:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E5Z2677EQUWVHJLGSH5DQX53EK6MY2M2/ -

18 Oct 2022, 19:15

Type Values Removed Values Added
References
  • {'url': 'https://gist.github.com/zmanion/b2ed0d1a0cec163ecd07d5e3d9740dc6', 'name': 'https://gist.github.com/zmanion/b2ed0d1a0cec163ecd07d5e3d9740dc6', 'tags': ['Patch', 'Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38171', 'name': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38171', 'tags': ['Third Party Advisory'], 'refsource': 'MISC'}
  • (MISC) https://github.com/zmanion/Vulnerabilities/blob/main/CVE-2022-38171.md -
  • (MISC) https://www.cve.org/CVERecord?id=CVE-2022-38171 -

10 Oct 2022, 02:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BGY72LBJMFAKQWC2XH4MRPIGPQLXTFL6/ -
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NLKN3HJKZSGEEKOF57DM7Q3IB74HP5VW/ -
  • (MLIST) https://lists.debian.org/debian-lts-announce/2022/09/msg00030.html - Third Party Advisory
  • (GENTOO) https://security.gentoo.org/glsa/202209-21 - Third Party Advisory
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQAO6O2XHPQHNW2MWOCJJ4C3YWS2VV4K/ - Mailing List, Third Party Advisory
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J546EJUKUOPWA3JSLP7DYNBAU3YGNCCW/ - Mailing List, Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2022/dsa-5224 - (DEBIAN) https://www.debian.org/security/2022/dsa-5224 - Third Party Advisory
CPE cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*

07 Sep 2022, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-08-30 03:15

Updated : 2024-02-04 22:51


NVD link : CVE-2022-38784

Mitre link : CVE-2022-38784

CVE.ORG link : CVE-2022-38784


JSON object : View

Products Affected

fedoraproject

  • fedora

freedesktop

  • poppler

debian

  • debian_linux
CWE
CWE-190

Integer Overflow or Wraparound