A heap-based buffer underwrite exists in ImageStream::getLine() located at Stream.cc in Poppler 0.74.0 that can (for example) be triggered by sending a crafted PDF file to the pdfimages binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact.
www.securityfocus.com/bid/107172
access.redhat.com/errata/RHSA-2019:2022
access.redhat.com/errata/RHSA-2019:2713
gitlab.freedesktop.org/poppler/poppler/issues/728
lists.debian.org/debian-lts-announce/2019/03/msg00008.html
lists.debian.org/debian-lts-announce/2020/07/msg00018.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OSCOYM3AMFFBJWSBWY6VJVLNE5JD7YS/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQ6RABASMSIMMWMDZTP6ZWUWZPTBSVB5/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZWP5XSUG6GNRI75NYKF53KIB2CZY6QQ6/
research.loginsoft.com/bugs/heap-based-buffer-underwrite-in-imagestreamgetline-poppler-0-74-0/
usn.ubuntu.com/3905-1/
usn.ubuntu.com/4042-1/