Name | CVE-2022-38784 |
Description | Poppler prior to and including 22.08.0 contains an integer overflow in the JBIG2 decoder (JBIG2Stream::readTextRegionSeg() in JBIGStream.cc). Processing a specially crafted PDF file or JBIG2 image could lead to a crash or the execution of arbitrary code. This is similar to the vulnerability described by CVE-2022-38171 in Xpdf. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3120-1, DSA-5224-1 |
Debian Bugs | 1018971 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
poppler (PTS) | bullseye (security), bullseye | 20.09.0-3.1+deb11u1 | fixed |
| bookworm | 22.12.0-2 | fixed |
| sid, trixie | 24.08.0-2 | fixed |
The information below is based on the following data on fixed versions.
Notes
Fixed by: https://gitlab.freedesktop.org/poppler/poppler/-/commit/27354e9d9696ee2bc063910a6c9a6b27c5184a52 (poppler-22.09.0)
This is CVE-2021-30860 in Apple CoreGraphics and CVE-2022-38171 in xpdf
https://gist.github.com/zmanion/b2ed0d1a0cec163ecd07d5e3d9740dc6
https://www.openwall.com/lists/oss-security/2022/09/02/11
https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html