for dapper everything seems to be fine, at least for x86 machines. On 8/10/07, Ringo Kamens <[EMAIL PROTECTED]> wrote: > As you know, a major security vulnerability was just patched with the > 0.1.2.16 release. I have been using the noreply.org deb packages but > they didn't update to the newest version (at least not under amd64 > feisty). If you are in my situation you can compile from source or > disable your controlport and wait out the storm until a new version is > released. Is the package maintainer busy or..? > Comrade Ringo Kamens >
-- PGP Key ID: 0xF1EBDE9C /* "They who would give up essential Liberty to purchase a little temporary Safety, deserve neither Liberty or Safety" Benjamin Franklin */

