Package: snort Severity: important According to the advisory at http://www.frsirt.com/english/advisories/2005/1721 (also mentioned on the snort site at http://www.snort.org/pub-bin/snortnews.cgi#58), versions <= 2.4 of snort, without the relevant patch, are vulnerable to a DoS when snort's run in verbose mode. As it is uncommon that it be run in this mode in production situations, this will not affect many people, but it is a security issue none the less.
I believe this adds weight to the argument for an update to v2.4 and beyond (see #320920). -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]