mirror of
https://git.FreeBSD.org/ports.git
synced 2024-12-01 01:17:02 +00:00
Update to snort-1.9.1. This is an important security update:
A buffer overflow has been found in the snort RPC normalization routines by ISS X-Force. This can cause snort to execute arbitrary code embedded within sniffed network packets. This preprocessor is enabled by default.
This commit is contained in:
parent
38800a4941
commit
e0fd2d97eb
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=76833
@ -6,7 +6,7 @@
|
||||
#
|
||||
|
||||
PORTNAME= snort
|
||||
PORTVERSION= 1.9.0
|
||||
PORTVERSION= 1.9.1
|
||||
CATEGORIES= security
|
||||
MASTER_SITES= http://www.snort.org/dl/
|
||||
|
||||
|
@ -1 +1 @@
|
||||
MD5 (snort-1.9.0.tar.gz) = bcd3cbd0e6982345871d02fe60444c5c
|
||||
MD5 (snort-1.9.1.tar.gz) = 50bb526b41f48fb7689bb8342b27e44d
|
||||
|
@ -46,6 +46,7 @@ share/snort/oracle.rules
|
||||
share/snort/other-ids.rules
|
||||
share/snort/p2p.rules
|
||||
share/snort/policy.rules
|
||||
share/snort/pop2.rules
|
||||
share/snort/pop3.rules
|
||||
share/snort/porn.rules
|
||||
@unexec if [ -f %B/reference.config ] && cmp -s %B/reference.config %B/reference.config-sample; then rm -f %B/reference.config; fi
|
||||
|
Loading…
Reference in New Issue
Block a user