Re: My pending RFSs (xpdf, ushare, protoaculous, gordon, checksec)
On Fri, Jul 16, 2010 at 12:10:14PM -0400, Michael Gilbert wrote:
> > Is this because you are using poppler?
>
> yes. the vulnerabilities exist only in the xpdf codebase that became
> poppler. i no longer build any of that affected code (dynamically
> linking to it in poppler instead where it is already patched), so there
> is no need to retain those patches.
I build -8, and looking good.
Are you contacting upstream so these patches get into the upstream?
(With so much "sed", maybe not...)
I will test it a bit ...
Osamu
Reply to:
- References:
- My pending RFSs (xpdf, ushare, protoaculous, gordon, checksec)
- From: Michael Gilbert <michael.s.gilbert@gmail.com>
- Re: My pending RFSs (xpdf, ushare, protoaculous, gordon, checksec)
- From: Osamu Aoki <osamu@debian.org>
- Re: My pending RFSs (xpdf, ushare, protoaculous, gordon, checksec)
- From: Michael Gilbert <michael.s.gilbert@gmail.com>
- Prev by Date:
Re: My pending RFSs (xpdf, ushare, protoaculous, gordon, checksec)
- Next by Date:
Re: My pending RFSs (xpdf, ushare, protoaculous, gordon, checksec)
- Previous by thread:
Re: My pending RFSs (xpdf, ushare, protoaculous, gordon, checksec)
- Next by thread:
Re: My pending RFSs (xpdf, ushare, protoaculous, gordon, checksec)
- Index(es):