severity 658264 grave thanks Fri, 10 Aug 2012 18:38:38 +0200, David Madore <david+b...@madore.org>: > Is there any hope of this fix entering Debian Wheezy before it > completely freezes? To reiterate what has been said earlier in the > thread, accessing uninitialized memory has potential security issues, > so this should be treated as more than a simple bugfix.
We haven't heard of Michael for some time, and the xpdf package hasn't notably changed in the last 6 months, so we could assume the maintainer has no interest in getting the package to a sane state? To reiterate again, the current wheezy xpdf package is in a terribly defunct state, possibly imposing severe security problems and should under no circumstances be included into the stable release. Here are other related bugs: #622877 #640515 #606885 #628591 #662882 https://bugs.launchpad.net/ubuntu/+source/xpdf/+bug/669211 (see comment 47) Having read all that I am at a loss understanding how those bugs' severities could be lowered to not being RC. So, sorry for being so impolite to have bug control requests included (dunno if it works, at all). At my workplace, we have rebuilt the lenny xpdf package for wheezy. And we think, for Debian, too, it would be better to revert to the old version (upstream is close to dead anyway). Poppler might be out of reach. -- Have a nice day Jens Stimpfle -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org