{"id":"CVE-2022-38171","details":"Xpdf prior to version 4.04 contains an integer overflow in the JBIG2 decoder (JBIG2Stream::readTextRegionSeg() in JBIG2Stream.cc). Processing a specially crafted PDF file or JBIG2 image could lead to a crash or the execution of arbitrary code. This is similar to the vulnerability described by CVE-2021-30860 (Apple CoreGraphics).","modified":"2026-04-09T08:57:46.807343Z","published":"2022-08-22T19:15:11.060Z","related":["MGASA-2022-0320"],"references":[{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2022/09/02/11"},{"type":"ADVISORY","url":"http://www.xpdfreader.com/security-fixes.html"},{"type":"ADVISORY","url":"https://dl.xpdfreader.com/xpdf-4.04.tar.gz"},{"type":"ADVISORY","url":"https://github.com/jeffssh/CVE-2021-30860"},{"type":"ADVISORY","url":"https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-30860"},{"type":"FIX","url":"https://github.com/zmanion/Vulnerabilities/blob/main/CVE-2022-38171.md"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.freedesktop.org/poppler/poppler","events":[{"introduced":"0"},{"fixed":"4602cac96104b74037862e223bb774be26bfd67c"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"22.09.0"}]}}],"versions":["poppler-0.10.0","poppler-0.11.0","poppler-0.11.1","poppler-0.11.2","poppler-0.11.3","poppler-0.12.0","poppler-0.13.1","poppler-0.13.2","poppler-0.13.3","poppler-0.13.4","poppler-0.14.0","poppler-0.15.0","poppler-0.15.1","poppler-0.15.2","poppler-0.15.3","poppler-0.16.0","poppler-0.17.0","poppler-0.17.1","poppler-0.17.2","poppler-0.17.3","poppler-0.17.4","poppler-0.18.0","poppler-0.19.0","poppler-0.19.1","poppler-0.19.2","poppler-0.19.3","poppler-0.19.4","poppler-0.2.0","poppler-0.20.0","poppler-0.21.0","poppler-0.21.1","poppler-0.21.3","poppler-0.21.4","poppler-0.22.0","poppler-0.23.0","poppler-0.23.1","poppler-0.23.2","poppler-0.23.3","poppler-0.23.4","poppler-0.24.0","poppler-0.25.0","poppler-0.25.1","poppler-0.25.2","poppler-0.25.3","poppler-0.26.0","poppler-0.28.0","poppler-0.28.1","poppler-0.29.0","poppler-0.3.0","poppler-0.3.1","poppler-0.3.2","poppler-0.3.3","poppler-0.30.0","poppler-0.31.0","poppler-0.32.0","poppler-0.33.0","poppler-0.34.0","poppler-0.35.0","poppler-0.36","poppler-0.37","poppler-0.38.0","poppler-0.39","poppler-0.4.0","poppler-0.40.0","poppler-0.41.0","poppler-0.42.0","poppler-0.43","poppler-0.44","poppler-0.45","poppler-0.46","poppler-0.47","poppler-0.48","poppler-0.49","poppler-0.5.0","poppler-0.5.1","poppler-0.5.2","poppler-0.5.3","poppler-0.5.4","poppler-0.50","poppler-0.51","poppler-0.52","poppler-0.53","poppler-0.54","poppler-0.58","poppler-0.59","poppler-0.6.0","poppler-0.6.0.RC1","poppler-0.60","poppler-0.60.1","poppler-0.61","poppler-0.61.1","poppler-0.62.0","poppler-0.63.0","poppler-0.64.0","poppler-0.65.0","poppler-0.66.0","poppler-0.67.0","poppler-0.68.0","poppler-0.69.0","poppler-0.7.0","poppler-0.7.2","poppler-0.7.3","poppler-0.70.0","poppler-0.70.1","poppler-0.71.0","poppler-0.72.0","poppler-0.73.0","poppler-0.74.0","poppler-0.75.0","poppler-0.76.0","poppler-0.76.1","poppler-0.77.0","poppler-0.78.0","poppler-0.79.0","poppler-0.8.0","poppler-0.80.0","poppler-0.81.0","poppler-0.82.0","poppler-0.83.0","poppler-0.84.0","poppler-0.85.0","poppler-0.86.0","poppler-0.86.1","poppler-0.87.0","poppler-0.88.0","poppler-0.89.0","poppler-0.9.0","poppler-0.9.1","poppler-0.9.2","poppler-0.9.3","poppler-0.90.0","poppler-0.90.1","poppler-20.08.0","poppler-20.09.0","poppler-20.10.0","poppler-20.11.0","poppler-20.12.0","poppler-20.12.1","poppler-21.01.0","poppler-21.02.0","poppler-21.03.0","poppler-21.04.0","poppler-21.05.0","poppler-21.06.0","poppler-21.06.1","poppler-21.07.0","poppler-21.08.0","poppler-21.09.0","poppler-21.10.0","poppler-21.11.0","poppler-21.12.0","poppler-22.01.0","poppler-22.02.0","poppler-22.03.0","poppler-22.04.0","poppler-22.05.0","poppler-22.06.0","poppler-22.07.0","poppler-22.08.0","poppler-before-fontconfig"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"4.04"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-38171.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}