Date: Fri, 18 Apr 2003 02:01:25 +0400 From: "Sergey A. Osokin" <osa@freebsd.org.ru> To: Christopher Nehren <apeiron@comcast.net> Cc: security@freebsd.org Subject: Re: CERT Advisory for Snort in Ports Message-ID: <20030417220125.GO82446@freebsd.org.ru> In-Reply-To: <1050616015.1534.44.camel@prophecy.dyndns.org> References: <1050612674.1534.22.camel@prophecy.dyndns.org> <20030417211451.GM82446@freebsd.org.ru> <1050616015.1534.44.camel@prophecy.dyndns.org>
next in thread | previous in thread | raw e-mail | index | archive | help
[-- Attachment #1 --] On Thu, Apr 17, 2003 at 05:46:55PM -0400, Christopher Nehren wrote: > On Thu, 2003-04-17 at 17:14, Sergey A. Osokin wrote: > > Yes, you are right. > > Please look at > > http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/51106 > > for review/test. > > Thanks. > > Ah, thanks. For some reason I'm not surprised that the information for > the update is already there. =) I applied the patch that you submitted, > and removed the files/patch-snort.c file, and everything works quite > well. Please use a fresh copy of security/snort. Its much more complete. -- Rgdz, /"\ ASCII RIBBON CAMPAIGN Sergey Osokin aka oZZ, \ / AGAINST HTML MAIL http://ozz.pp.ru/ X AND NEWS / \ [-- Attachment #2 --] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (FreeBSD) iQCVAwUBPp8kNY/Va73vhFLNAQHRWgQAolP6jHhZAntZn06+ePOfDGdAv/qRt47U c9c4UqaFtU9XCLLS30UtruXyNQNF+xNZqed1uhVrUT68kGU1b+Vyn1DObG+B1Jcc nCzBAUeB+CrXKJ/3N6XJgKKjmgFqQKE+RuiDF27K7Q28X+T7N9Dj09raF/RoudLy ppQR6LOKOzw= =3mVw -----END PGP SIGNATURE-----
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030417220125.GO82446>
