Your message dated Mon, 12 Sep 2011 00:17:33 +0000
with message-id <[email protected]>
and subject line Bug#427632: fixed in xpdf 3.03-3
has caused the Debian Bug report #427632,
regarding Segmentation fault
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
427632: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=427632
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: xpdf
Version: 3.02-9
Severity: wishlist
On many pdf files, hitting ALT-F several times rather fast will produce
Segmentation fault
Also similar keystrokes, which I already forgot, produced:
$ xpdf file.pdf
*** glibc detected *** xpdf: free(): invalid pointer: 0xb5af5008 ***
======= Backtrace: =========
/lib/i686/cmov/libc.so.6(+0x6b321)[0xb72a2321]
/lib/i686/cmov/libc.so.6(+0x6cb78)[0xb72a3b78]
/lib/i686/cmov/libc.so.6(cfree+0x6d)[0xb72a6c5d]
/usr/lib/libpoppler.so.5(gfree+0x21)[0xb75cf5f1]
/usr/lib/libpoppler.so.5(_ZN12SplashBitmapD1Ev+0x2c)[0xb75ef78c]
xpdf[0x805ee9f]
xpdf[0x80653f0]
xpdf[0x805eee9]
xpdf[0x805f241]
xpdf[0x80646c7]
xpdf[0x805a63c]
xpdf[0x8064610]
xpdf[0x8070039]
xpdf[0x807032b]
xpdf[0x8063205]
/usr/lib/libXt.so.6(XtCallCallbackList+0x12a)[0xb71f23fa]
/usr/lib/libXm.so.2(_XmDrawingAreaInput+0x4d)[0xb76e399d]
/usr/lib/libXt.so.6(+0x45231)[0xb722a231]
/usr/lib/libXt.so.6(+0x454a0)[0xb722a4a0]
/usr/lib/libXt.so.6(_XtTranslateEvent+0x65f)[0xb722acaf]
/usr/lib/libXt.so.6(XtDispatchEventToWidget+0x5e2)[0xb72009c2]
/usr/lib/libXt.so.6(+0x1bf8d)[0xb7200f8d]
/usr/lib/libXt.so.6(XtDispatchEvent+0xa7)[0xb71fff27]
/usr/lib/libXt.so.6(XtAppMainLoop+0x44)[0xb72000d4]
xpdf[0x8071c22]
/lib/i686/cmov/libc.so.6(__libc_start_main+0xe6)[0xb724dc76]
xpdf[0x8051131]
======= Memory map: ========
08048000-08080000 r-xp 00000000 08:08 65346 /usr/bin/xpdf
08080000-08084000 rw-p 00037000 08:08 65346 /usr/bin/xpdf
08084000-0808a000 rw-p 00000000 00:00 0
086ce000-088fc000 rw-p 00000000 00:00 0 [heap]
b5af5000-b5b77000 rw-p 00000000 00:00 0
b6800000-b6821000 rw-p 00000000 00:00 0
b6821000-b6900000 ---p 00000000 00:00 0 ...
--- End Message ---
--- Begin Message ---
Source: xpdf
Source-Version: 3.03-3
We believe that the bug you reported is fixed in the latest version of
xpdf, which is due to be installed in the Debian FTP archive:
xpdf_3.03-3.debian.tar.gz
to main/x/xpdf/xpdf_3.03-3.debian.tar.gz
xpdf_3.03-3.dsc
to main/x/xpdf/xpdf_3.03-3.dsc
xpdf_3.03-3_amd64.deb
to main/x/xpdf/xpdf_3.03-3_amd64.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Michael Gilbert <[email protected]> (supplier of updated xpdf package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Sun, 04 Sep 2011 14:50:57 -0400
Source: xpdf
Binary: xpdf
Architecture: source amd64
Version: 3.03-3
Distribution: unstable
Urgency: low
Maintainer: Michael Gilbert <[email protected]>
Changed-By: Michael Gilbert <[email protected]>
Description:
xpdf - Portable Document Format (PDF) reader
Closes: 427632 640486 640897 640967
Changes:
xpdf (3.03-3) unstable; urgency=low
.
* Use better quoting in the xpdf wrapper script.
* Replace deprecated "displayFontT1" option in the default xpdfrc file with
its new replacement: "fontFile" (closes: #640967, #640486).
* Disable additional zoom features patch for now (closes: #427632):
- if anyone wants this to be re-enabled, the patch needs to be corrected so
that fullscreen continuous mode no longer crashes (see closed bug).
* Fix skipping first file passed to "-m" argument (closes: #640897).
* Add binutils-gold build conflict.
Checksums-Sha1:
2a770c983c6a7a8f420142848f39ce3de9cc637c 2606 xpdf_3.03-3.dsc
2f1ae7cf1740e5e0ff7fd674b109e3f414aa395d 35994 xpdf_3.03-3.debian.tar.gz
7ac0256789963bd441b8123056d8f320d41c3e92 187172 xpdf_3.03-3_amd64.deb
Checksums-Sha256:
37e6d383c67da6f8d38015d8901f253b4025aa40db931c17fed8c692ba488325 2606
xpdf_3.03-3.dsc
617be55a30ce701fbde5a8caececf78a57172b0fa75b8abd369327b7462ea3af 35994
xpdf_3.03-3.debian.tar.gz
ab732d37f5e4a8fd0a93fe5e21eb08758f1e11b81e1e581ad6e5796e724cd400 187172
xpdf_3.03-3_amd64.deb
Files:
2cd51aee4228ba282d34dfde56fc0d51 2606 text optional xpdf_3.03-3.dsc
74db3cb8c41f9973d7b9199bb0f4c75d 35994 text optional xpdf_3.03-3.debian.tar.gz
0e6c665a5a3d33819aedb49257fb8273 187172 text optional xpdf_3.03-3_amd64.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)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=
=vwBp
-----END PGP SIGNATURE-----
--- End Message ---