Integer Overflow or Wraparound Affecting poppler-qt5 package, versions <0:20.11.0-6.el8
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL8-POPPLERQT5-5539831
- published 8 Sep 2022
- disclosed 30 Aug 2022
Introduced: 30 Aug 2022
CVE-2022-38784 Open this link in a new tabHow to fix?
Upgrade RHEL:8 poppler-qt5 to version 0:20.11.0-6.el8 or higher.
This issue was patched in RHSA-2023:2810.
NVD Description
Note: Versions mentioned in the description apply only to the upstream poppler-qt5 package and not the poppler-qt5 package as distributed by RHEL.
See How to fix? for RHEL:8 relevant fixed versions and status.
Poppler prior to and including 22.08.0 contains an integer overflow in the JBIG2 decoder (JBIG2Stream::readTextRegionSeg() in JBIGStream.cc). Processing a specially crafted PDF file or JBIG2 image could lead to a crash or the execution of arbitrary code. This is similar to the vulnerability described by CVE-2022-38171 in Xpdf.
References
- https://access.redhat.com/security/cve/CVE-2022-38784
- https://poppler.freedesktop.org/releases.html
- https://github.com/jeffssh/CVE-2021-30860
- https://gist.github.com/zmanion/b2ed0d1a0cec163ecd07d5e3d9740dc6
- https://gitlab.freedesktop.org/poppler/poppler/-/merge_requests/1261/diffs?commit_id=27354e9d9696ee2bc063910a6c9a6b27c5184a52
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38171
- http://www.openwall.com/lists/oss-security/2022/09/02/11
- https://www.debian.org/security/2022/dsa-5224
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQAO6O2XHPQHNW2MWOCJJ4C3YWS2VV4K/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J546EJUKUOPWA3JSLP7DYNBAU3YGNCCW/
- https://lists.debian.org/debian-lts-announce/2022/09/msg00030.html
- https://security.gentoo.org/glsa/202209-21
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BGY72LBJMFAKQWC2XH4MRPIGPQLXTFL6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NLKN3HJKZSGEEKOF57DM7Q3IB74HP5VW/
- https://github.com/zmanion/Vulnerabilities/blob/main/CVE-2022-38171.md
- https://www.cve.org/CVERecord?id=CVE-2022-38171
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E5Z2677EQUWVHJLGSH5DQX53EK6MY2M2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BGY72LBJMFAKQWC2XH4MRPIGPQLXTFL6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E5Z2677EQUWVHJLGSH5DQX53EK6MY2M2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J546EJUKUOPWA3JSLP7DYNBAU3YGNCCW/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NLKN3HJKZSGEEKOF57DM7Q3IB74HP5VW/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQAO6O2XHPQHNW2MWOCJJ4C3YWS2VV4K/