Re: [SECURITY] [DSA 222-1] New xpdf packages fix arbitrary command execution
On Tue, Jan 07, 2003 at 10:56:58AM -0500, Raymond Wood wrote:
> > We recommend that you upgrade your xpdf package.
> [snip]
>
> Does anyone know if the 'xpdf-i' is affected by this also, or
> not?
xpdf-i in woody is a dummy package, as the standard xpdf package now
implements the same functionality. However, xpdf-i 0.90-8 in potato likely
_is_ affected by this vulnerability and needs to be fixed. I'll investigate
this shortly.
--
- mdz
Reply to: