First published: Tue Aug 30 2022(Updated: )
Poppler prior to and including 22.08.0 contains an integer overflow in the JBIG2 decoder (JBIG2Stream::readTextRegionSeg() in JBIGStream.cc). Processing a specially crafted PDF file or JBIG2 image could lead to a crash or the execution of arbitrary code. This is similar to the vulnerability described by CVE-2022-38171 in Xpdf.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/poppler | <=22.08.0-2<=20.09.0-3.1 | 22.08.0-2.1 20.09.0-3.1+deb11u1 |
debian/poppler | <=0.71.0-5 | 0.71.0-5+deb10u3 20.09.0-3.1+deb11u1 22.12.0-2 |
freedesktop poppler | <=22.08.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-38784 is a vulnerability in Poppler prior to and including version 22.08.0 that contains an integer overflow in the JBIG2 decoder, which could lead to a crash or the execution of arbitrary code when processing a specially crafted PDF file or JBIG2 image.
CVE-2022-38784 affects Poppler versions prior to and including 22.08.0.
The severity of CVE-2022-38784 is high, with a CVSS score of 7.8.
CVE-2022-38784 can be exploited by processing a specially crafted PDF file or JBIG2 image.
The remedy for CVE-2022-38784 is to update Poppler to version 22.08.0-2.1 or 20.09.0-3.1+deb11u1.