Bug 1214618 (CVE-2022-38349) - VUL-0: CVE-2022-38349: poppler: reachable assertion in Object.h, will lead to denial of service because PDFDoc:replacePageDict in PDFDoc.cc lacks a stream
Summary: VUL-0: CVE-2022-38349: poppler: reachable assertion in Object.h, will lead to...
Status: NEW
Alias: CVE-2022-38349
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Minor
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/376035/
Whiteboard: CVSSv3.1:SUSE:CVE-2022-38349:3.3:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-08-25 12:30 UTC by Alexander Bergmann
Modified: 2023-10-06 16:29 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2023-08-25 12:30:22 UTC
CVE-2022-38349

An issue was discovered in Poppler 22.08.0. There is a reachable assertion in
Object.h, will lead to denial of service because PDFDoc::replacePageDict in
PDFDoc.cc lacks a stream check before saving an embedded file.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38349
https://www.cve.org/CVERecord?id=CVE-2022-38349
https://gitlab.freedesktop.org/poppler/poppler/-/commit/4564a002bcb6094cc460bc0d5ddff9423fe6dd28
https://gitlab.freedesktop.org/poppler/poppler/-/issues/1282
Comment 1 Petr Gajdos 2023-09-25 15:46:48 UTC
BEFORE

TW/poppler

:/214618/poc # pdfunite bug t.pdf
[..]
Syntax Error (7446): Object '16 0 obj' is being already parsed
Syntax Error: PDFDoc::replacePageDict failed.
:/214618/poc #


15sp4,15sp2,15,12sp2/poppler:

:/214618/poc # pdfunite bug t.pdf
[..]
Syntax Error (7446): Object '16 0 obj' is being already parsed
Internal Error (0): Call to Object where the object was type 11, not the expected type 7
Aborted (core dumped)
:/214618/poc #

12/poppler

:/214618/poc # pdfunite bug t.pdf a
[..]
Syntax Error (7446): Object '16 0 obj' is being already parsed
Syntax Error (7446): Object '16 0 obj' is being already parsed
Internal Error (0): Call to Object where the object was type 11, not the expected type 7
Aborted (core dumped)
:/214618/poc #


PATCH

see comment 0
TW,15sp5/poppler already has this in
12/poppler: needs the patch


AFTER

15sp4,15sp2,15,12sp2/poppler

:/214618/poc # pdfunite bug t.pdf 
[..]
Syntax Error (7446): Object '16 0 obj' is being already parsed
Syntax Error (7446): Object '16 0 obj' is being already parsed
Syntax Error: PDFDoc::replacePageDict failed.
:/214618/poc #
[fixed]

12/poppler

:/214618/poc # pdfunite bug t.pdf a
[..]
Syntax Error (7446): Object '16 0 obj' is being already parsed
Syntax Error: PDFDoc::replacePageDict failed.
:/214618/poc #
[fixed]
Comment 2 Petr Gajdos 2023-09-25 15:47:41 UTC
Submitted for 15sp4,15sp2,12sp2,12/poppler.

I believe all fixed.
Comment 5 Maintenance Automation 2023-10-03 20:30:33 UTC
SUSE-SU-2023:3947-1: An update that solves three vulnerabilities can now be installed.

Category: security (moderate)
Bug References: 1214618, 1214621, 1214622
CVE References: CVE-2022-37050, CVE-2022-37051, CVE-2022-38349
Sources used:
openSUSE Leap 15.4 (src): poppler-qt6-22.01.0-150400.3.11.2, poppler-qt5-22.01.0-150400.3.11.2, poppler-22.01.0-150400.3.11.2
Basesystem Module 15-SP4 (src): poppler-22.01.0-150400.3.11.2
SUSE Package Hub 15 15-SP4 (src): poppler-qt5-22.01.0-150400.3.11.2, poppler-22.01.0-150400.3.11.2
SUSE Linux Enterprise Workstation Extension 15 SP5 (src): poppler-22.01.0-150400.3.11.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 6 Maintenance Automation 2023-10-05 12:29:16 UTC
SUSE-SU-2023:3983-1: An update that solves five vulnerabilities can now be installed.

Category: security (important)
Bug References: 1214257, 1214618, 1214621, 1214622, 1215422
CVE References: CVE-2020-23804, CVE-2020-36024, CVE-2022-37050, CVE-2022-37051, CVE-2022-38349
Sources used:
openSUSE Leap 15.4 (src): poppler-0.62.0-150000.4.25.2
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): poppler-0.62.0-150000.4.25.2
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): poppler-0.62.0-150000.4.25.2
SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): poppler-0.62.0-150000.4.25.2
SUSE CaaS Platform 4.0 (src): poppler-0.62.0-150000.4.25.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 7 Maintenance Automation 2023-10-05 12:29:19 UTC
SUSE-SU-2023:3982-1: An update that solves five vulnerabilities can now be installed.

Category: security (important)
Bug References: 1214257, 1214618, 1214621, 1214622, 1215422
CVE References: CVE-2020-23804, CVE-2020-36024, CVE-2022-37050, CVE-2022-37051, CVE-2022-38349
Sources used:
SUSE Linux Enterprise Software Development Kit 12 SP5 (src): poppler-qt-0.43.0-16.35.2, poppler-0.43.0-16.35.2
SUSE Linux Enterprise High Performance Computing 12 SP5 (src): poppler-qt-0.43.0-16.35.2, poppler-0.43.0-16.35.2
SUSE Linux Enterprise Server 12 SP5 (src): poppler-qt-0.43.0-16.35.2, poppler-0.43.0-16.35.2
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): poppler-qt-0.43.0-16.35.2, poppler-0.43.0-16.35.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 8 Maintenance Automation 2023-10-05 12:29:21 UTC
SUSE-SU-2023:3981-1: An update that solves four vulnerabilities can now be installed.

Category: security (important)
Bug References: 1214257, 1214618, 1214622, 1215422
CVE References: CVE-2020-23804, CVE-2020-36024, CVE-2022-37050, CVE-2022-38349
Sources used:
SUSE Linux Enterprise Software Development Kit 12 SP5 (src): poppler-0.24.4-14.36.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 9 Maintenance Automation 2023-10-06 16:29:12 UTC
SUSE-SU-2023:3998-1: An update that solves five vulnerabilities can now be installed.

Category: security (important)
Bug References: 1214257, 1214618, 1214621, 1214622, 1215422
CVE References: CVE-2020-23804, CVE-2020-36024, CVE-2022-37050, CVE-2022-37051, CVE-2022-38349
Sources used:
SUSE Manager Server 4.2 (src): poppler-0.79.0-150200.3.21.2
SUSE Enterprise Storage 7.1 (src): poppler-0.79.0-150200.3.21.2
openSUSE Leap 15.4 (src): poppler-0.79.0-150200.3.21.2
Basesystem Module 15-SP4 (src): poppler-0.79.0-150200.3.21.2
Basesystem Module 15-SP5 (src): poppler-0.79.0-150200.3.21.2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): poppler-0.79.0-150200.3.21.2
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): poppler-0.79.0-150200.3.21.2
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): poppler-0.79.0-150200.3.21.2
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): poppler-0.79.0-150200.3.21.2
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): poppler-0.79.0-150200.3.21.2
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): poppler-0.79.0-150200.3.21.2
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): poppler-0.79.0-150200.3.21.2
SUSE Manager Proxy 4.2 (src): poppler-0.79.0-150200.3.21.2
SUSE Manager Retail Branch Server 4.2 (src): poppler-0.79.0-150200.3.21.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.