Integer Overflow or Wraparound Affecting poppler-utils package, versions <0:21.01.0-14.el9
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ALMALINUX9-POPPLERUTILS-5615091
- published 28 May 2023
- disclosed 9 May 2023
Introduced: 9 May 2023
CVE-2022-38784 Open this link in a new tabHow to fix?
Upgrade AlmaLinux:9
poppler-utils
to version 0:21.01.0-14.el9 or higher.
This issue was patched in ALSA-2023:2259
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream poppler-utils
package and not the poppler-utils
package as distributed by AlmaLinux
.
See How to fix?
for AlmaLinux:9
relevant fixed versions and status.
Poppler prior to and including 22.08.0 contains an integer overflow in the JBIG2 decoder (JBIG2Stream::readTextRegionSeg() in JBIGStream.cc). Processing a specially crafted PDF file or JBIG2 image could lead to a crash or the execution of arbitrary code. This is similar to the vulnerability described by CVE-2022-38171 in Xpdf.
References
- https://errata.almalinux.org/9/ALSA-2023-2259.html
- https://errata.almalinux.org/8/ALSA-2023-2810.html
- https://access.redhat.com/security/cve/CVE-2022-38784
- https://access.redhat.com/errata/RHSA-2023:2259
- https://access.redhat.com/errata/RHSA-2023:2810
- https://gist.github.com/zmanion/b2ed0d1a0cec163ecd07d5e3d9740dc6
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38171
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BGY72LBJMFAKQWC2XH4MRPIGPQLXTFL6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E5Z2677EQUWVHJLGSH5DQX53EK6MY2M2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J546EJUKUOPWA3JSLP7DYNBAU3YGNCCW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NLKN3HJKZSGEEKOF57DM7Q3IB74HP5VW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQAO6O2XHPQHNW2MWOCJJ4C3YWS2VV4K/
- http://www.openwall.com/lists/oss-security/2022/09/02/11
- https://github.com/jeffssh/CVE-2021-30860
- https://github.com/zmanion/Vulnerabilities/blob/main/CVE-2022-38171.md
- https://gitlab.freedesktop.org/poppler/poppler/-/merge_requests/1261/diffs?commit_id=27354e9d9696ee2bc063910a6c9a6b27c5184a52
- https://lists.debian.org/debian-lts-announce/2022/09/msg00030.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BGY72LBJMFAKQWC2XH4MRPIGPQLXTFL6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E5Z2677EQUWVHJLGSH5DQX53EK6MY2M2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J546EJUKUOPWA3JSLP7DYNBAU3YGNCCW/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NLKN3HJKZSGEEKOF57DM7Q3IB74HP5VW/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQAO6O2XHPQHNW2MWOCJJ4C3YWS2VV4K/
- https://poppler.freedesktop.org/releases.html
- https://security.gentoo.org/glsa/202209-21
- https://www.cve.org/CVERecord?id=CVE-2022-38171
- https://www.debian.org/security/2022/dsa-5224