On Wed, Jan 20, 2021 at 10:36:59PM +0100, Antonio Radici wrote:
yes that will definitely help so we will get additional commits that are not 
yet in 2.0.4.

If you can't make it by the weekend I should be able to find some time on Mon/Tue to do the upload!

I've just released 2.0.5. For this bug, it only contains the actual memory leak fix <https://gitlab.com/muttmua/mutt/-/commit/c059e20ea4c7cb3ee9ffd3500ffe313ae84b2545>.

I was sorely tempted to include the other fix <https://gitlab.com/muttmua/mutt/-/commit/939b02b33ae29bc0d642570c1dcfd4b339037d19>, but in the end decided to be disciplined with a stable release.

There are actually a couple more fixes I plan on making to group parsing, but again in master, where they will have a bit more time to bake and uncover potential problems.

Thanks for making an upload. It will be good to have the bug fixes in 2.0.3+ in the next Debian release!

-Kevin



Attachment: signature.asc
Description: PGP signature

Reply via email to