Bug 2124527 (CVE-2022-38784)

Summary: CVE-2022-38784 poppler: integer overflow in JBIG2 decoder using malformed files
Product: [Other] Security Response Reporter: TEJ RATHI <trathi>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: caillon+fedoraproject, feborges, gnome-sig, manisandro, mclasen, mkasik, rdieter, rhughes, rstrode, sandmann
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: poppler 22.09.0 Doc Type: If docs needed, set a value
Doc Text:
An integer overflow issue was discovered in Popplers' JBIG2 decoder in the JBIG2Stream::readTextRegionSeg() function in JBIGStream.cc file. This flaw allows an attacker to trick a user into opening a malformed PDF file or JBIG2 image in the application, triggering an integer overflow, which could result in a crash or may lead to the execution of arbitrary code on the target system.
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-05-16 15:14:39 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2124530, 2124531, 2124532, 2124533, 2126358, 2126359, 2126360, 2126361, 2126362, 2126363, 2126364    
Bug Blocks: 2123505    

Description TEJ RATHI 2022-09-06 12:23:40 UTC
Poppler prior to and including 22.08.0 contains an integer overflow in the JBIG2 decoder (JBIG2Stream::readTextRegionSeg() in JBIGStream.cc). Processing a specially crafted PDF file or JBIG2 image could lead to a crash or the execution of arbitrary code. This is similar to the vulnerability described by CVE-2022-38171 in Xpdf.

https://poppler.freedesktop.org/releases.html
https://github.com/jeffssh/CVE-2021-30860
https://gist.github.com/zmanion/b2ed0d1a0cec163ecd07d5e3d9740dc6
https://gitlab.freedesktop.org/poppler/poppler/-/merge_requests/1261/diffs?commit_id=27354e9d9696ee2bc063910a6c9a6b27c5184a52
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38171
http://www.openwall.com/lists/oss-security/2022/09/02/11

Comment 1 TEJ RATHI 2022-09-06 12:47:58 UTC
Created mingw-poppler tracking bugs for this issue:

Affects: fedora-all [bug 2124532]


Created poppler tracking bugs for this issue:

Affects: fedora-all [bug 2124530]

Comment 2 TEJ RATHI 2022-09-06 12:48:00 UTC
Created mingw-poppler tracking bugs for this issue:

Affects: fedora-all [bug 2124533]


Created poppler tracking bugs for this issue:

Affects: fedora-all [bug 2124531]

Comment 7 errata-xmlrpc 2023-05-09 07:23:23 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:2259 https://access.redhat.com/errata/RHSA-2023:2259

Comment 8 errata-xmlrpc 2023-05-16 08:15:25 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:2810 https://access.redhat.com/errata/RHSA-2023:2810

Comment 9 Product Security DevOps Team 2023-05-16 15:14:37 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-38784