Date: Thu, 17 Apr 2003 14:49:43 -0700 From: Kris Kennaway <kris@freebsd.org> To: security@freeBSD.org Subject: [kris@FreeBSD.org: cvs commit: ports/security/snort Makefile distinfo pkg-plist ports/security/snort/files patch-snort.c] Message-ID: <20030417214943.GA92499@rot13.obsecurity.org>
next in thread | raw e-mail | index | archive | help
[-- Attachment #1 --]
FYI
Kris
----- Forwarded message from Kris Kennaway <kris@FreeBSD.org> -----
X-Original-To: kkenn@localhost
Delivered-To: kkenn@localhost.obsecurity.org
Delivered-To: kris@freebsd.org
Delivered-To: ports-committers@freebsd.org
From: Kris Kennaway <kris@FreeBSD.org>
Date: Thu, 17 Apr 2003 14:45:03 -0700 (PDT)
To: ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org,
cvs-all@FreeBSD.org
Subject: cvs commit: ports/security/snort Makefile distinfo pkg-plist
ports/security/snort/files patch-snort.c
X-FreeBSD-CVS-Branch: HEAD
Precedence: bulk
X-Loop: FreeBSD.ORG
X-UIDL: 58a7d456fd799ddf67cd2a767f5369f1
kris 2003/04/17 14:45:03 PDT
FreeBSD ports repository
Modified files:
security/snort Makefile distinfo pkg-plist
security/snort/files patch-snort.c
Log:
Update to snort 2.0.0. This fixes a security vulnerability:
The Sourcefire Vulnerability Research Team has learned of an integer
overflow in the Snort stream4 preprocessor used by the Sourcefire
Network Sensor product line. The Snort stream4 preprocessor
(spp_stream4) incorrectly calculates segment size parameters during
stream reassembly for certain sequence number ranges which can lead to
an integer overflow that can be expanded to a heap overflow.
PR: 51106
Submitted by: Sergey A. Osokin <osa@FreeBSD.org.ru>
Revision Changes Path
1.34 +2 -2 ports/security/snort/Makefile
http://cvsweb.FreeBSD.org/ports/security/snort/Makefile.diff?r1=1.33&r2=1.34
1.19 +1 -1 ports/security/snort/distinfo
http://cvsweb.FreeBSD.org/ports/security/snort/distinfo.diff?r1=1.18&r2=1.19
1.4 +7 -32 ports/security/snort/files/patch-snort.c
http://cvsweb.FreeBSD.org/ports/security/snort/files/patch-snort.c.diff?r1=1.3&r2=1.4
1.10 +0 -2 ports/security/snort/pkg-plist
http://cvsweb.FreeBSD.org/ports/security/snort/pkg-plist.diff?r1=1.9&r2=1.10
----- End forwarded message -----
[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (FreeBSD)
iD8DBQE+nyF3Wry0BWjoQKURAhbBAJ49iJvBICar5Rv9e/i+5gZfkEQOfgCfWDa6
mDdm251aF1CT26LnOvGykMw=
=SwWe
-----END PGP SIGNATURE-----
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030417214943.GA92499>
