In Poppler, memory corruption occurs in a call to Object::streamGetChar in Object.h after a repeating series of Gfx::display, Gfx::go, Gfx::execOp, Gfx::opShowText, and Gfx::doShowText calls (aka a Gfx.cc infinite loop). A local attacker could use a maliciously crafted PDF document to crash the application. This is a different vulnerability than CVE-2017-14919. Upstream issue: https://bugs.freedesktop.org/show_bug.cgi?id=102969
Created mingw-poppler tracking bugs for this issue: Affects: fedora-all [bug 1499169] Created poppler tracking bugs for this issue: Affects: fedora-all [bug 1499168]