1
0
mirror of https://git.FreeBSD.org/ports.git synced 2024-12-01 01:17:02 +00:00

Update to snort-1.9.1. This is an important security update:

A buffer overflow has been found in the snort RPC normalization
routines by ISS X-Force. This can cause snort to execute
arbitrary code embedded within sniffed network packets. This
preprocessor is enabled by default.
This commit is contained in:
Kris Kennaway 2003-03-04 07:21:22 +00:00
parent 38800a4941
commit e0fd2d97eb
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=76833
3 changed files with 3 additions and 2 deletions

View File

@ -6,7 +6,7 @@
#
PORTNAME= snort
PORTVERSION= 1.9.0
PORTVERSION= 1.9.1
CATEGORIES= security
MASTER_SITES= http://www.snort.org/dl/

View File

@ -1 +1 @@
MD5 (snort-1.9.0.tar.gz) = bcd3cbd0e6982345871d02fe60444c5c
MD5 (snort-1.9.1.tar.gz) = 50bb526b41f48fb7689bb8342b27e44d

View File

@ -46,6 +46,7 @@ share/snort/oracle.rules
share/snort/other-ids.rules
share/snort/p2p.rules
share/snort/policy.rules
share/snort/pop2.rules
share/snort/pop3.rules
share/snort/porn.rules
@unexec if [ -f %B/reference.config ] && cmp -s %B/reference.config %B/reference.config-sample; then rm -f %B/reference.config; fi