This bug was fixed in the package snort - 2.7.0-19ubuntu1

---------------
snort (2.7.0-19ubuntu1) intrepid; urgency=low

  * src/preprocessors/flow/portscan/server_stats.c:
    - Specify mode permission during open call, fix FTBFS.
  * Apply patch from upstream CVS to let frag3 to remove enforcement of
    ttl_limit. Add preprocessor alert for min_ttl anomaly (LP: #235901).
  * References:
    - CVE-2008-1804
    - http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-1804

snort (2.7.0-19) unstable; urgency=low

  * Make the snort_rules_update example script use bash instead of sh.
    (Closes: #489662)

snort (2.7.0-18) unstable; urgency=low

  * Romain debconf translation provided by Eddy Petrior (Closes: 486137)
  * Swedish debconf translation provided by Martin Bagge (Closes: 491785)

 -- Luca Falavigna <[EMAIL PROTECTED]>   Mon, 15 Sep 2008 21:22:19
+0200

** Changed in: snort (Ubuntu)
       Status: Confirmed => Fix Released

-- 
[CVE-2008-1804] Snort IP fragment TTL evasion vulnerability
https://bugs.launchpad.net/bugs/235901
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to