Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 18 Apr 2003 02:01:25 +0400
From:      "Sergey A. Osokin" <osa@freebsd.org.ru>
To:        Christopher Nehren <apeiron@comcast.net>
Cc:        security@freebsd.org
Subject:   Re: CERT Advisory for Snort in Ports
Message-ID:  <20030417220125.GO82446@freebsd.org.ru>
In-Reply-To: <1050616015.1534.44.camel@prophecy.dyndns.org>
References:  <1050612674.1534.22.camel@prophecy.dyndns.org> <20030417211451.GM82446@freebsd.org.ru> <1050616015.1534.44.camel@prophecy.dyndns.org>

next in thread | previous in thread | raw e-mail | index | archive | help

[-- Attachment #1 --]
On Thu, Apr 17, 2003 at 05:46:55PM -0400, Christopher Nehren wrote:
> On Thu, 2003-04-17 at 17:14, Sergey A. Osokin wrote:
> > Yes, you are right.
> > Please look at
> > http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/51106
> > for review/test.
> > Thanks.
> 
> Ah, thanks. For some reason I'm not surprised that the information for
> the update is already there. =) I applied the patch that you submitted,
> and removed the files/patch-snort.c file, and everything works quite
> well. 

Please use a fresh copy of security/snort.
Its much more complete.

-- 

Rgdz,                        /"\  ASCII RIBBON CAMPAIGN
Sergey Osokin aka oZZ,       \ /    AGAINST HTML MAIL
http://ozz.pp.ru/             X          AND NEWS
                             / \

[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (FreeBSD)

iQCVAwUBPp8kNY/Va73vhFLNAQHRWgQAolP6jHhZAntZn06+ePOfDGdAv/qRt47U
c9c4UqaFtU9XCLLS30UtruXyNQNF+xNZqed1uhVrUT68kGU1b+Vyn1DObG+B1Jcc
nCzBAUeB+CrXKJ/3N6XJgKKjmgFqQKE+RuiDF27K7Q28X+T7N9Dj09raF/RoudLy
ppQR6LOKOzw=
=3mVw
-----END PGP SIGNATURE-----

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030417220125.GO82446>