[xml/sgml-pkgs] Bug#287371: xsltproc: Probable memory leak (when using document()?)

Diederik de Haas didi.debian at cknow.org
Sat Feb 18 11:33:38 GMT 2023


Control: tag -1 -security
Control: severity -1 wishlist

On vrijdag 17 februari 2023 23:47:55 CET you wrote:
> And the final message in this bug is that you run Out Of Memory, so the OOM
> killer does exactly what it needs to do: kill other programs.

It may be annoying, but the system is working as it should be/do, so I'm 
removing the 'security' tag.
If this bug turns out to be an actual security issue and there is thus a CVE, 
the tag can be added back.

> I'll leave changing the severity to the maintainer, but 'wishlist' seems
> appropriate to me.

It was earlier concluded, including by OP, that this was a wishlist type of 
bug and it was previously already set to that, so there is no need to postpone 
setting an appropriate severity level.

FTR: I'm not contesting that you may have found a valid bug.
In upstream's 1.1.36 there seems to be at least 1 fix for a potential memory 
leak (IIUC). 
But the lack of cooperation by OP combined with the severity and the age of 
the bug, did (apparently) bug me.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 228 bytes
Desc: This is a digitally signed message part.
URL: <http://alioth-lists.debian.net/pipermail/debian-xml-sgml-pkgs/attachments/20230218/b65d6ce5/attachment.sig>


More information about the debian-xml-sgml-pkgs mailing list