Date: Fri, 18 Apr 2003 01:14:51 +0400 From: "Sergey A. Osokin" <osa@freebsd.org.ru> To: Christopher Nehren <apeiron@comcast.net> Cc: security@freebsd.org Subject: Re: [Fwd: CERT Advisory CA-2003-13 Multiple Vulnerabilities in Snort Preprocessors] Message-ID: <20030417211451.GM82446@freebsd.org.ru> In-Reply-To: <1050612674.1534.22.camel@prophecy.dyndns.org> References: <1050612674.1534.22.camel@prophecy.dyndns.org>
next in thread | previous in thread | raw e-mail | index | archive | help
[-- Attachment #1 --] On Thu, Apr 17, 2003 at 04:51:15PM -0400, Christopher Nehren wrote: > I figured that someone reading this list might want to take a look at > the proceeding, considering that the version of Snort in FreeBSD ports > -is- affected. Yes, you are right. Please look at http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/51106 for review/test. Thanks. -- Rgdz, /"\ ASCII RIBBON CAMPAIGN Sergey Osokin aka oZZ, \ / AGAINST HTML MAIL http://ozz.pp.ru/ X AND NEWS / \ [-- Attachment #2 --] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (FreeBSD) iQCVAwUBPp8ZS4/Va73vhFLNAQGQzAQAkdz2IrsGpyf9a0QlY+NyEft2IpLJ1WOi fw8+41z53gq4JVV1OoDdFSV0xnABapK6rbhrzD1ESvr0j6ozSyeMGqSqhrjKENqo gsguR3lHVLqm9yueE1B76pRbOT8br4fHdfaXJTRVFgTDUjwcZNNVzodn/BTpl2Ws jQvSDfXoESo= =lIMD -----END PGP SIGNATURE-----
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030417211451.GM82446>
