severity 658264 grave
thanks

Fri, 10 Aug 2012 18:38:38 +0200, David Madore <david+b...@madore.org>:
> Is there any hope of this fix entering Debian Wheezy before it
> completely freezes?  To reiterate what has been said earlier in the
> thread, accessing uninitialized memory has potential security issues,
> so this should be treated as more than a simple bugfix.

We haven't heard of Michael for some time, and the xpdf package hasn't
notably changed in the last 6 months, so we could assume the maintainer
has no interest in getting the package to a sane state?

To reiterate again, the current wheezy xpdf package is in a terribly
defunct state, possibly imposing severe security problems and should
under no circumstances be included into the stable release.

Here are other related bugs:

#622877
#640515
#606885
#628591
#662882
https://bugs.launchpad.net/ubuntu/+source/xpdf/+bug/669211 (see comment 47)

Having read all that I am at a loss understanding how those bugs'
severities could be lowered to not being RC. So, sorry for being so
impolite to have bug control requests included (dunno if it
works, at all).

At my workplace, we have rebuilt the lenny xpdf package for wheezy. And
we think, for Debian, too, it would be better to revert to the old
version (upstream is close to dead anyway). Poppler might be out of
reach.

--
Have a nice day
Jens Stimpfle


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to