Date: Thu, 17 Apr 2003 17:46:55 -0400 From: Christopher Nehren <apeiron@comcast.net> To: osa@FreeBSD.org.ru Cc: security@freebsd.org Subject: Re: CERT Advisory for Snort in Ports Message-ID: <1050616015.1534.44.camel@prophecy.dyndns.org> In-Reply-To: <20030417211451.GM82446@freebsd.org.ru> References: <1050612674.1534.22.camel@prophecy.dyndns.org> <20030417211451.GM82446@freebsd.org.ru>
next in thread | previous in thread | raw e-mail | index | archive | help
[-- Attachment #1 --] On Thu, 2003-04-17 at 17:14, Sergey A. Osokin wrote: > Yes, you are right. > Please look at > http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/51106 > for review/test. > Thanks. Ah, thanks. For some reason I'm not surprised that the information for the update is already there. =) I applied the patch that you submitted, and removed the files/patch-snort.c file, and everything works quite well. [-- Attachment #2 --] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (FreeBSD) iD8DBQA+nyDPUdqurN0fljsRAj8DAKCkTb1UY2fJx15WqSoemHx5d5yMeQCdHs91 ZVWZMht0UN9qLGoalCeVUI0= =e4Wu -----END PGP SIGNATURE-----
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1050616015.1534.44.camel>
