CVE-2022-38784

NameCVE-2022-38784
DescriptionPoppler prior to and including 22.08.0 contains an integer overflow in the JBIG2 decoder (JBIG2Stream::readTextRegionSeg() in JBIGStream.cc). Processing a specially crafted PDF file or JBIG2 image could lead to a crash or the execution of arbitrary code. This is similar to the vulnerability described by CVE-2022-38171 in Xpdf.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3120-1, DSA-5224-1
Debian Bugs1018971

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
poppler (PTS)buster0.71.0-5vulnerable
buster (security)0.71.0-5+deb10u3fixed
bullseye (security), bullseye20.09.0-3.1+deb11u1fixed
trixie, bookworm22.12.0-2fixed
sid22.12.0-2.2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
popplersourcebuster0.71.0-5+deb10u1DLA-3120-1
popplersourcebullseye20.09.0-3.1+deb11u1DSA-5224-1
popplersource(unstable)22.08.0-2.11018971

Notes

Fixed by: https://gitlab.freedesktop.org/poppler/poppler/-/commit/27354e9d9696ee2bc063910a6c9a6b27c5184a52 (poppler-22.09.0)
This is CVE-2021-30860 in Apple CoreGraphics and CVE-2022-38171 in xpdf
https://gist.github.com/zmanion/b2ed0d1a0cec163ecd07d5e3d9740dc6
https://www.openwall.com/lists/oss-security/2022/09/02/11
https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html

Search for package or bug name: Reporting problems