Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 18 Apr 2003 01:14:51 +0400
From:      "Sergey A. Osokin" <osa@freebsd.org.ru>
To:        Christopher Nehren <apeiron@comcast.net>
Cc:        security@freebsd.org
Subject:   Re: [Fwd: CERT Advisory CA-2003-13 Multiple Vulnerabilities in Snort Preprocessors]
Message-ID:  <20030417211451.GM82446@freebsd.org.ru>
In-Reply-To: <1050612674.1534.22.camel@prophecy.dyndns.org>
References:  <1050612674.1534.22.camel@prophecy.dyndns.org>

next in thread | previous in thread | raw e-mail | index | archive | help

[-- Attachment #1 --]
On Thu, Apr 17, 2003 at 04:51:15PM -0400, Christopher Nehren wrote:
> I figured that someone reading this list might want to take a look at
> the proceeding, considering that the version of Snort in FreeBSD ports
> -is- affected.

Yes, you are right.
Please look at
http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/51106
for review/test.
Thanks.

-- 

Rgdz,                        /"\  ASCII RIBBON CAMPAIGN
Sergey Osokin aka oZZ,       \ /    AGAINST HTML MAIL
http://ozz.pp.ru/             X          AND NEWS
                             / \

[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (FreeBSD)

iQCVAwUBPp8ZS4/Va73vhFLNAQGQzAQAkdz2IrsGpyf9a0QlY+NyEft2IpLJ1WOi
fw8+41z53gq4JVV1OoDdFSV0xnABapK6rbhrzD1ESvr0j6ozSyeMGqSqhrjKENqo
gsguR3lHVLqm9yueE1B76pRbOT8br4fHdfaXJTRVFgTDUjwcZNNVzodn/BTpl2Ws
jQvSDfXoESo=
=lIMD
-----END PGP SIGNATURE-----

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030417211451.GM82446>