Uploaded snort 1.9.1-1 (m68k all) to ftp-master
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Mon, 03 Mar 2003 21:15:27 +0100
Source: snort
Binary: snort-mysql snort-doc snort-rules-default snort-common snort-pgsql snort
Architecture: m68k all
Version: 1.9.1-1
Distribution: unstable
Urgency: high
Maintainer: buildd m68k user account <buildd@ax.westfalen.de>
Changed-By: Sander Smeenk <ssmeenk@debian.org>
Description:
snort - Flexible Network Intrusion Detection System
snort-common - Flexible Network Intrusion Detection System
snort-doc - Documentation for the Snort IDS
snort-mysql - Flexible Network Intrusion Detection System
snort-pgsql - Flexible Network Intrusion Detection System
snort-rules-default - Flexible Network Intrusion Detection System
Changes:
snort (1.9.1-1) unstable; urgency=high
.
* SECURITY FIX
ISS X-Force has discovered a remotely exploitable buffer overflow
condition in Snort. A buffer overflow flaw exists in Snort RPC
preprocessing code that is vulnerable to attack.
Files:
1172676bb228ecbff314137dc07672e0 166532 net optional snort_1.9.1-1_m68k.deb
267859946c115a8d9a2bea45f2d16d03 59428 net optional snort-common_1.9.1-1_m68k.deb
a462db654c8a580f84675b71e5a244e4 170186 net extra snort-mysql_1.9.1-1_m68k.deb
82431e40d94aef0a9a7ca6cff50b0629 170128 net extra snort-pgsql_1.9.1-1_m68k.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
iD8DBQE+ZLaCWgZ1HEtaPf0RAoRHAKCez6o8iZyYdFbTDvGXFbftvKxoaACeKf+9
5aHZNQmTUUHkow5S6Oskc5A=
=8C3O
-----END PGP SIGNATURE-----
Reply to: