[xml/sgml-pkgs] Bug#287371: xsltproc: Probable memory leak (when using document()?)
Diederik de Haas
didi.debian at cknow.org
Sat Feb 18 11:33:38 GMT 2023
Control: tag -1 -security
Control: severity -1 wishlist
On vrijdag 17 februari 2023 23:47:55 CET you wrote:
> And the final message in this bug is that you run Out Of Memory, so the OOM
> killer does exactly what it needs to do: kill other programs.
It may be annoying, but the system is working as it should be/do, so I'm
removing the 'security' tag.
If this bug turns out to be an actual security issue and there is thus a CVE,
the tag can be added back.
> I'll leave changing the severity to the maintainer, but 'wishlist' seems
> appropriate to me.
It was earlier concluded, including by OP, that this was a wishlist type of
bug and it was previously already set to that, so there is no need to postpone
setting an appropriate severity level.
FTR: I'm not contesting that you may have found a valid bug.
In upstream's 1.1.36 there seems to be at least 1 fix for a potential memory
leak (IIUC).
But the lack of cooperation by OP combined with the severity and the age of
the bug, did (apparently) bug me.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 228 bytes
Desc: This is a digitally signed message part.
URL: <http://alioth-lists.debian.net/pipermail/debian-xml-sgml-pkgs/attachments/20230218/b65d6ce5/attachment.sig>
More information about the debian-xml-sgml-pkgs
mailing list