This bug was fixed in the package snort - 2.7.0-19ubuntu1
---------------
snort (2.7.0-19ubuntu1) intrepid; urgency=low
* src/preprocessors/flow/portscan/server_stats.c:
- Specify mode permission during open call, fix FTBFS.
* Apply patch from upstream CVS to let frag3 to remove enforcement of
ttl_limit. Add preprocessor alert for min_ttl anomaly (LP: #235901).
* References:
- CVE-2008-1804
- http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-1804
snort (2.7.0-19) unstable; urgency=low
* Make the snort_rules_update example script use bash instead of sh.
(Closes: #489662)
snort (2.7.0-18) unstable; urgency=low
* Romain debconf translation provided by Eddy Petrior (Closes: 486137)
* Swedish debconf translation provided by Martin Bagge (Closes: 491785)
-- Luca Falavigna <[EMAIL PROTECTED]> Mon, 15 Sep 2008 21:22:19
+0200
** Changed in: snort (Ubuntu)
Status: Confirmed => Fix Released
--
[CVE-2008-1804] Snort IP fragment TTL evasion vulnerability
https://bugs.launchpad.net/bugs/235901
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs