Bug 2124527 (CVE-2022-38784)
| Summary: | CVE-2022-38784 poppler: integer overflow in JBIG2 decoder using malformed files | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | TEJ RATHI <trathi> |
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
| Status: | CLOSED ERRATA | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | CC: | caillon+fedoraproject, feborges, gnome-sig, manisandro, mclasen, mkasik, rdieter, rhughes, rstrode, sandmann |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | poppler 22.09.0 | Doc Type: | If docs needed, set a value |
| Doc Text: |
An integer overflow issue was discovered in Popplers' JBIG2 decoder in the JBIG2Stream::readTextRegionSeg() function in JBIGStream.cc file. This flaw allows an attacker to trick a user into opening a malformed PDF file or JBIG2 image in the application, triggering an integer overflow, which could result in a crash or may lead to the execution of arbitrary code on the target system.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | 2023-05-16 15:14:39 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2124530, 2124531, 2124532, 2124533, 2126358, 2126359, 2126360, 2126361, 2126362, 2126363, 2126364 | ||
| Bug Blocks: | 2123505 | ||
|
Description
TEJ RATHI
2022-09-06 12:23:40 UTC
Created mingw-poppler tracking bugs for this issue: Affects: fedora-all [bug 2124532] Created poppler tracking bugs for this issue: Affects: fedora-all [bug 2124530] Created mingw-poppler tracking bugs for this issue: Affects: fedora-all [bug 2124533] Created poppler tracking bugs for this issue: Affects: fedora-all [bug 2124531] Commit: https://gitlab.freedesktop.org/poppler/poppler/-/commit/27354e9d9696ee2bc063910a6c9a6b27c5184a52 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:2259 https://access.redhat.com/errata/RHSA-2023:2259 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:2810 https://access.redhat.com/errata/RHSA-2023:2810 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-38784 |