MGASA-2022-0386

Source
https://advisories.mageia.org/MGASA-2022-0386.html
Import Source
https://advisories.mageia.org/MGASA-2022-0386.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2022-0386
Related
Published
2022-10-23T22:48:35Z
Modified
2022-10-23T21:53:54Z
Summary
Updated poppler packages fix security vulnerability
Details

Poppler prior to and including 22.08.0 contains an integer overflow in the JBIG2 decoder (JBIG2Stream::readTextRegionSeg() in JBIGStream.cc). Processing a specially crafted PDF file or JBIG2 image could lead to a crash or the execution of arbitrary code. This is similar to the vulnerability described by CVE-2022-38171 in Xpdf. (CVE-2022-38784)

References
Credits

Affected packages

Mageia:8 / poppler

Package

Name
poppler
Purl
pkg:rpm/mageia/poppler?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
20.12.1-1.2.mga8

Ecosystem specific

{
    "section": "core"
}