Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 17 Apr 2003 17:46:55 -0400
From:      Christopher Nehren <apeiron@comcast.net>
To:        osa@FreeBSD.org.ru
Cc:        security@freebsd.org
Subject:   Re: CERT Advisory for Snort in Ports
Message-ID:  <1050616015.1534.44.camel@prophecy.dyndns.org>
In-Reply-To: <20030417211451.GM82446@freebsd.org.ru>
References:  <1050612674.1534.22.camel@prophecy.dyndns.org> <20030417211451.GM82446@freebsd.org.ru>

next in thread | previous in thread | raw e-mail | index | archive | help

[-- Attachment #1 --]
On Thu, 2003-04-17 at 17:14, Sergey A. Osokin wrote:
> Yes, you are right.
> Please look at
> http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/51106
> for review/test.
> Thanks.

Ah, thanks. For some reason I'm not surprised that the information for
the update is already there. =) I applied the patch that you submitted,
and removed the files/patch-snort.c file, and everything works quite
well. 

[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (FreeBSD)

iD8DBQA+nyDPUdqurN0fljsRAj8DAKCkTb1UY2fJx15WqSoemHx5d5yMeQCdHs91
ZVWZMht0UN9qLGoalCeVUI0=
=e4Wu
-----END PGP SIGNATURE-----

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1050616015.1534.44.camel>