Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 17 Apr 2003 14:49:43 -0700
From:      Kris Kennaway <kris@freebsd.org>
To:        security@freeBSD.org
Subject:   [kris@FreeBSD.org: cvs commit: ports/security/snort Makefile distinfo pkg-plist ports/security/snort/files patch-snort.c]
Message-ID:  <20030417214943.GA92499@rot13.obsecurity.org>

next in thread | raw e-mail | index | archive | help

[-- Attachment #1 --]
FYI

Kris

----- Forwarded message from Kris Kennaway <kris@FreeBSD.org> -----

X-Original-To: kkenn@localhost
Delivered-To: kkenn@localhost.obsecurity.org
Delivered-To: kris@freebsd.org
Delivered-To: ports-committers@freebsd.org
From: Kris Kennaway <kris@FreeBSD.org>
Date: Thu, 17 Apr 2003 14:45:03 -0700 (PDT)
To: ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org,
	cvs-all@FreeBSD.org
Subject: cvs commit: ports/security/snort Makefile distinfo pkg-plist
         ports/security/snort/files patch-snort.c
X-FreeBSD-CVS-Branch: HEAD
Precedence: bulk
X-Loop: FreeBSD.ORG
X-UIDL: 58a7d456fd799ddf67cd2a767f5369f1

kris        2003/04/17 14:45:03 PDT

  FreeBSD ports repository

  Modified files:
    security/snort       Makefile distinfo pkg-plist 
    security/snort/files patch-snort.c 
  Log:
  Update to snort 2.0.0.  This fixes a security vulnerability:
  
    The Sourcefire Vulnerability Research Team has learned of an integer
    overflow in the Snort stream4 preprocessor used by the Sourcefire
    Network Sensor product line. The Snort stream4 preprocessor
    (spp_stream4) incorrectly calculates segment size parameters during
    stream reassembly for certain sequence number ranges which can lead to
    an integer overflow that can be expanded to a heap overflow.
  
  PR:     51106
  Submitted by:   Sergey A. Osokin <osa@FreeBSD.org.ru>
  
  Revision  Changes    Path
  1.34      +2 -2      ports/security/snort/Makefile
http://cvsweb.FreeBSD.org/ports/security/snort/Makefile.diff?r1=1.33&r2=1.34
  1.19      +1 -1      ports/security/snort/distinfo
http://cvsweb.FreeBSD.org/ports/security/snort/distinfo.diff?r1=1.18&r2=1.19
  1.4       +7 -32     ports/security/snort/files/patch-snort.c
http://cvsweb.FreeBSD.org/ports/security/snort/files/patch-snort.c.diff?r1=1.3&r2=1.4
  1.10      +0 -2      ports/security/snort/pkg-plist
http://cvsweb.FreeBSD.org/ports/security/snort/pkg-plist.diff?r1=1.9&r2=1.10

----- End forwarded message -----

[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (FreeBSD)

iD8DBQE+nyF3Wry0BWjoQKURAhbBAJ49iJvBICar5Rv9e/i+5gZfkEQOfgCfWDa6
mDdm251aF1CT26LnOvGykMw=
=SwWe
-----END PGP SIGNATURE-----

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030417214943.GA92499>