中危 freedesktop poppler 整数溢出或超界折返

CVE编号

CVE-2022-38784

利用情况

暂无

补丁情况

官方补丁

披露时间

2022-08-30
漏洞描述
Poppler prior to and including 22.08.0 contains an integer overflow in the JBIG2 decoder (JBIG2Stream::readTextRegionSeg() in JBIGStream.cc). Processing a specially crafted PDF file or JBIG2 image could lead to a crash or the execution of arbitrary code. This is similar to the vulnerability described by CVE-2022-38171 in Xpdf.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 freedesktop poppler * Up to
(including)
22.08.0
运行在以下环境
系统 alibaba_cloud_linux_3 poppler * Up to
(excluding)
20.11.0-6.0.1.al8
运行在以下环境
系统 alma_linux_8 poppler * Up to
(excluding)
20.11.0-6.el8
运行在以下环境
系统 alma_linux_9 poppler * Up to
(excluding)
21.01.0-14.el9
运行在以下环境
系统 amazon_2 poppler * Up to
(excluding)
0.26.5-43.amzn2.1.1
运行在以下环境
系统 amazon_2023 poppler * Up to
(excluding)
22.08.0-3.amzn2023.0.1
运行在以下环境
系统 anolis_os_8 poppler * Up to
(excluding)
20.11.0-6.0.1
运行在以下环境
系统 debian_10 poppler * Up to
(excluding)
0.71.0-5+deb10u1
运行在以下环境
系统 debian_11 poppler * Up to
(excluding)
20.09.0-3.1+deb11u1
运行在以下环境
系统 debian_12 poppler * Up to
(excluding)
22.08.0-2.1
运行在以下环境
系统 fedora_35 poppler * Up to
(excluding)
21.08.0-3.fc35
运行在以下环境
系统 fedora_36 poppler * Up to
(excluding)
22.01.0-6.fc36
运行在以下环境
系统 fedora_37 poppler * Up to
(excluding)
22.08.0-2.fc37
运行在以下环境
系统 kylinos_aarch64_V10SP1 poppler * Up to
(excluding)
0.67.0-8.ky10
运行在以下环境
系统 kylinos_aarch64_V10SP2 poppler * Up to
(excluding)
0.67.0-8.ky10
运行在以下环境
系统 kylinos_loongarch64_V10SP1 poppler * Up to
(excluding)
0.67.0-8.a.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP1 poppler * Up to
(excluding)
0.67.0-8.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP2 poppler * Up to
(excluding)
0.67.0-8.ky10
运行在以下环境
系统 opensuse_Leap_15.4 libpoppler89 * Up to
(excluding)
0.79.0-150200.3.8.1
运行在以下环境
系统 oracle_8 poppler * Up to
(excluding)
20.11.0-6.el8
运行在以下环境
系统 oracle_9 poppler * Up to
(excluding)
21.01.0-14.el9
运行在以下环境
系统 redhat_8 poppler * Up to
(excluding)
20.11.0-6.el8
运行在以下环境
系统 redhat_9 poppler * Up to
(excluding)
21.01.0-14.el9
运行在以下环境
系统 rocky_linux_8 poppler * Up to
(excluding)
20.11.0-6.el8
运行在以下环境
系统 suse_12_SP5 libpoppler60 * Up to
(excluding)
0.43.0-16.22.1
运行在以下环境
系统 ubuntu_18.04 poppler * Up to
(excluding)
0.62.0-2ubuntu2.14
运行在以下环境
系统 ubuntu_20.04 poppler * Up to
(excluding)
0.86.1-0ubuntu1.1
运行在以下环境
系统 ubuntu_22.04 poppler * Up to
(excluding)
22.02.0-2ubuntu0.1
阿里云评分
6.6
  • 攻击路径
    本地
  • 攻击复杂度
    复杂
  • 权限要求
    无需权限
  • 影响范围
    越权影响
  • EXP成熟度
    未验证
  • 补丁情况
    官方补丁
  • 数据保密性
    数据泄露
  • 数据完整性
    无影响
  • 服务器危害
    无影响
  • 全网数量
    N/A
CWE-ID 漏洞类型
CWE-190 整数溢出或超界折返
阿里云安全产品覆盖情况