I'd like to suggest that for Intrepid, we push 1.2.9 in intrepid-
security. It's going to be a real PITA to extract a reduced patch for
this issue and 1.2.8 was uploaded very late in the development process,
so we haven't undone a lot of testing.

We'll get better upstream support this was and avoid a pile of C hacking
that I certainly can't do. Also the changes from 1.2.9 got a lot of
review by other users of the package, so I'm reasonable confident it's
in good shape. I do know it corrects at least one regression in 1.2.8.

-- 
Unspecified buffer overflow
https://bugs.launchpad.net/bugs/287534
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to