Quoting Thierry Carrez (thierry.car...@ubuntu.com):
> I'm kinda busy those days, but I'll refresh my PPA tomorrow with a
> 2:3.2.3-1ubuntu3.5~ppa1 that builds on the recent security release.
> 
> Concerning the official intrepid update, I'll file a SRU report and let
> the ubuntu-sru powers decide if the fix is worth the regression risk, as
> this is definitely a complex patch. I welcome Samba developers comments

Indeed, when I saw the patch sent by Kai to Debian bug #500129, I was
a little bit scared....:-)

I initially intended to have the patch in Debian lenny but its size
makes me hesitate (the policy for lenny as of now is not as strict as
the polocy to update Debian stable....but, still, we're quite close
to the release and our release managers ask all Debian maintainers to
be very careful about patches fixing no release-crtical bugs.

I think that, for Debian, I'll finally balance to include the patch,
putting confidence in the work of two Samba Team
developers...:-)...but that will not be an update for a stable version
and I would not push it if it was for Debian stable.

I suspect that Ubuntu's policy is about the same and, as Kai
mentioned, it would be perfectly understandable if the patch is not
accepted.

-- 
gvfsd-smb crashed with SIGSEGV in strlen()
https://bugs.launchpad.net/bugs/264943
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to