diff options
author | kris <kris@FreeBSD.org> | 2003-04-17 21:45:03 +0000 |
---|---|---|
committer | kris <kris@FreeBSD.org> | 2003-04-17 21:45:03 +0000 |
commit | c8a3bd6eb7691d8e023213abdac36a302fdd02f6 (patch) | |
tree | 8911c422645e3ebb7304d3b5e10b319e18476b18 /security | |
parent | 837607b900edd71f5ef087d3a3b004f9045fcede (diff) | |
download | FreeBSD-ports-c8a3bd6eb7691d8e023213abdac36a302fdd02f6.zip FreeBSD-ports-c8a3bd6eb7691d8e023213abdac36a302fdd02f6.tar.gz |
Update to snort 2.0.0. This fixes a security vulnerability:
The Sourcefire Vulnerability Research Team has learned of an integer
overflow in the Snort stream4 preprocessor used by the Sourcefire
Network Sensor product line. The Snort stream4 preprocessor
(spp_stream4) incorrectly calculates segment size parameters during
stream reassembly for certain sequence number ranges which can lead to
an integer overflow that can be expanded to a heap overflow.
PR: 51106
Submitted by: Sergey A. Osokin <osa@FreeBSD.org.ru>
Diffstat (limited to 'security')
-rw-r--r-- | security/snort/Makefile | 4 | ||||
-rw-r--r-- | security/snort/distinfo | 2 | ||||
-rw-r--r-- | security/snort/files/patch-snort.c | 39 | ||||
-rw-r--r-- | security/snort/pkg-plist | 2 |
4 files changed, 10 insertions, 37 deletions
diff --git a/security/snort/Makefile b/security/snort/Makefile index 3970e97..99b9615 100644 --- a/security/snort/Makefile +++ b/security/snort/Makefile @@ -6,7 +6,7 @@ # PORTNAME= snort -PORTVERSION= 1.9.1 +PORTVERSION= 2.0.0 CATEGORIES= security MASTER_SITES= http://www.snort.org/dl/ @@ -57,7 +57,7 @@ pre-configure: @${ECHO} "" DOCS= AUTHORS NEWS README.csv BUGS README README.database \ - CREDITS README.SNMP README.xml README.FLEXRESP RULES.todo FAQ \ + CREDITS README.FLEXRESP RULES.todo FAQ \ SnortUsersManual.pdf README.PLUGINS USAGE post-install: diff --git a/security/snort/distinfo b/security/snort/distinfo index 1c7bf63..d386bb2 100644 --- a/security/snort/distinfo +++ b/security/snort/distinfo @@ -1 +1 @@ -MD5 (snort-1.9.1.tar.gz) = 50bb526b41f48fb7689bb8342b27e44d +MD5 (snort-2.0.0.tar.gz) = b7d374655c4390c07b2e38a2d381c2bd diff --git a/security/snort/files/patch-snort.c b/security/snort/files/patch-snort.c index a563db6..4404569 100644 --- a/security/snort/files/patch-snort.c +++ b/security/snort/files/patch-snort.c @@ -1,36 +1,11 @@ ---- src/snort.c.orig Fri Mar 14 19:58:33 2003 -+++ src/snort.c Fri Mar 14 19:58:19 2003 -@@ -1,4 +1,4 @@ --/* $Id: snort.c,v 1.157.2.7 2003/02/19 21:16:50 chris_reid Exp $ */ -+/* $Id: snort.c,v 1.157.2.9 2003/03/04 20:47:15 andrewbaker Exp $ */ - /* - ** Copyright (C) 1998-2002 Martin Roesch <roesch@sourcefire.com> - ** -@@ -252,6 +252,8 @@ - OpenPcap(pv.readfile, 0); - } - -+ InitOutputPlugins(); -+ - /* didn't get any conf data at the command line, try to find the default - * conf file - */ -@@ -310,9 +312,6 @@ - GoDaemon(); - } - -- /* initialize these here so we do not print unwanted messages */ -- InitOutputPlugins(); -- - /* - * creating a PID file before setting its proper - * path (in SanityChecks()) is not a good idea -@@ -2212,7 +2211,7 @@ +--- src/snort.c.orig Thu Apr 17 14:39:59 2003 ++++ src/snort.c Thu Apr 17 14:40:09 2003 +@@ -1729,7 +1729,7 @@ + { struct stat st; - int found; int i; - char *conf_files[]={"/etc/snort.conf", "./snort.conf", NULL}; -+ char *conf_files[]={"/usr/local/etc/snort.conf", "./snort.conf", NULL}; ++ char *conf_files[]={"%%PREFIX%%/etc/snort.conf", "./snort.conf", NULL}; char *fname = NULL; - char *home_dir; - char *tmp; + char *home_dir = NULL; + char *rval = NULL; diff --git a/security/snort/pkg-plist b/security/snort/pkg-plist index 1159494..fc0fd72 100644 --- a/security/snort/pkg-plist +++ b/security/snort/pkg-plist @@ -9,8 +9,6 @@ etc/snort.conf-sample %%PORTDOCS%%share/doc/snort/README %%PORTDOCS%%share/doc/snort/README.database %%PORTDOCS%%share/doc/snort/CREDITS -%%PORTDOCS%%share/doc/snort/README.SNMP -%%PORTDOCS%%share/doc/snort/README.xml %%PORTDOCS%%share/doc/snort/README.FLEXRESP %%PORTDOCS%%share/doc/snort/RULES.todo %%PORTDOCS%%share/doc/snort/FAQ |