There is an invalid memory access in the TextLine class in TextOutputDev.cc in Xpdf 4.0.4 because the text extractor mishandles characters at large y coordinates. It can be triggered by (for example) sending a crafted pdf file to the pdftotext binary, which allows a remote attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact. https://forum.xpdfreader.com/viewtopic.php?f=3&t=42261
Created xpdf tracking bugs for this issue: Affects: epel-7 [bug 2083393] Affects: fedora-34 [bug 2083394] Affects: fedora-35 [bug 2083395]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.