[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Uploaded snort 1.9.1-1 (m68k all) to ftp-master



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon, 03 Mar 2003 21:15:27 +0100
Source: snort
Binary: snort-mysql snort-doc snort-rules-default snort-common snort-pgsql snort
Architecture: m68k all
Version: 1.9.1-1
Distribution: unstable
Urgency: high
Maintainer: buildd m68k user account <buildd@ax.westfalen.de>
Changed-By: Sander Smeenk <ssmeenk@debian.org>
Description: 
 snort      - Flexible Network Intrusion Detection System
 snort-common - Flexible Network Intrusion Detection System
 snort-doc  - Documentation for the Snort IDS
 snort-mysql - Flexible Network Intrusion Detection System
 snort-pgsql - Flexible Network Intrusion Detection System
 snort-rules-default - Flexible Network Intrusion Detection System
Changes: 
 snort (1.9.1-1) unstable; urgency=high
 .
   * SECURITY FIX
     ISS X-Force has discovered a remotely exploitable buffer overflow
     condition in Snort. A buffer overflow flaw exists in Snort RPC
     preprocessing code that is vulnerable to attack.
Files: 
 1172676bb228ecbff314137dc07672e0 166532 net optional snort_1.9.1-1_m68k.deb
 267859946c115a8d9a2bea45f2d16d03 59428 net optional snort-common_1.9.1-1_m68k.deb
 a462db654c8a580f84675b71e5a244e4 170186 net extra snort-mysql_1.9.1-1_m68k.deb
 82431e40d94aef0a9a7ca6cff50b0629 170128 net extra snort-pgsql_1.9.1-1_m68k.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQE+ZLaCWgZ1HEtaPf0RAoRHAKCez6o8iZyYdFbTDvGXFbftvKxoaACeKf+9
5aHZNQmTUUHkow5S6Oskc5A=
=8C3O
-----END PGP SIGNATURE-----




Reply to: