In Poppler, memory corruption occurs in a call to Object::streamGetChar in Object.h after a repeating series of Gfx::display, Gfx::go, Gfx::execOp, Gfx::opShowText, and Gfx::doShowText calls (aka a Gfx.cc infinite loop). A local attacker could use a maliciously crafted PDF document to crash the application.
This is a different vulnerability than CVE-2017-14919.
Created mingw-poppler tracking bugs for this issue:
Affects: fedora-all [bug 1499169]
Created poppler tracking bugs for this issue:
Affects: fedora-all [bug 1499168]