vulnerability
Amazon Linux 2023: CVE-2022-38784: Medium priority package update for poppler
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:M/Au:N/C:C/I:C/A:C) | Aug 30, 2022 | Feb 17, 2025 | Jul 7, 2025 |
Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
Aug 30, 2022
Added
Feb 17, 2025
Modified
Jul 7, 2025
Description
Poppler prior to and including 22.08.0 contains an integer overflow in the JBIG2 decoder (JBIG2Stream::readTextRegionSeg() in JBIGStream.cc). Processing a specially crafted PDF file or JBIG2 image could lead to a crash or the execution of arbitrary code. This is similar to the vulnerability described by CVE-2022-38171 in Xpdf.
An integer overflow issue was discovered in Popplers' JBIG2 decoder in the JBIG2Stream::readTextRegionSeg() function in JBIGStream.cc file. This flaw allows an attacker to trick a user into opening a malformed PDF file or JBIG2 image in the application, triggering an integer overflow, which could result in a crash or may lead to the execution of arbitrary code on the target system.
An integer overflow issue was discovered in Popplers' JBIG2 decoder in the JBIG2Stream::readTextRegionSeg() function in JBIGStream.cc file. This flaw allows an attacker to trick a user into opening a malformed PDF file or JBIG2 image in the application, triggering an integer overflow, which could result in a crash or may lead to the execution of arbitrary code on the target system.
Solutions
amazon-linux-2023-upgrade-poppleramazon-linux-2023-upgrade-poppler-cppamazon-linux-2023-upgrade-poppler-cpp-debuginfoamazon-linux-2023-upgrade-poppler-cpp-develamazon-linux-2023-upgrade-poppler-debuginfoamazon-linux-2023-upgrade-poppler-debugsourceamazon-linux-2023-upgrade-poppler-develamazon-linux-2023-upgrade-poppler-glibamazon-linux-2023-upgrade-poppler-glib-debuginfoamazon-linux-2023-upgrade-poppler-glib-develamazon-linux-2023-upgrade-poppler-glib-docamazon-linux-2023-upgrade-poppler-utilsamazon-linux-2023-upgrade-poppler-utils-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.