Your message dated Thu, 04 Oct 2007 13:19:26 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#439642: fixed in snort 2.7.0-6
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: snort
Version: 2.7.0-3
Severity: grave



-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.22-1-amd64 (SMP w/2 CPU cores)
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/bash

Versions of packages snort depends on:
ii  adduser                 3.104            add and remove users and groups
ii  coreutils               5.97-5.4         The GNU core utilities
ii  debconf [debconf-2.0]   1.5.14           Debian configuration management sy
ii  libc6                   2.6.1-1          GNU C Library: Shared libraries
ii  libgcrypt11             1.2.4-2          LGPL Crypto library - runtime libr
ii  libgnutls13             1.7.18-2         the GNU TLS library - runtime libr
ii  libgpg-error0           1.4-2            library for common error values an
ii  libltdl3                1.5.24-1         A system independent dlopen wrappe
ii  libpcap0.8              0.9.7-1          System interface for user-level pa
ii  libpcre3                7.2-1            Perl 5 Compatible Regular Expressi
ii  libprelude2             0.9.15-1         Hybrid Intrusion Detection System 
ii  libtasn1-3              0.3.10-1         Manage ASN.1 structures (runtime)
ii  logrotate               3.7.1-3          Log rotation utility
ii  snort-common            2.7.0-3          Flexible Network Intrusion Detecti
ii  snort-rules-default     2.7.0-3          Flexible Network Intrusion Detecti
ii  sysklogd [system-log-da 1.5-1            System Logging Daemon
ii  zlib1g                  1:1.2.3.3.dfsg-5 compression library - runtime

Versions of packages snort recommends:
pn  snort-doc                     <none>     (no description available)

-- debconf information:
* snort/startup: boot
  snort/please_restart_manually:
* snort/stats_treshold: 1
* snort/address_range: any
* snort/options:
* snort/invalid_interface:
* snort/interface: ath0 eth0
* snort/stats_rcpt: ullhan63
* snort/send_stats: true
  snort/config_parameters:
* snort/config_error:
* snort/reverse_order: false
* snort/disable_promiscuous: false

Dear maintainers,

on my AMD64 X2 system the latest version inhibits to start. It is looking 
like an dependency or lib related problem.

This is out of the log:

------------  snip  --------------------------
Aug 26 11:16:16 protheus2 snort[7724]: Rule application order:
activation->dynamic->pass->drop->alert->log
Aug 26 11:16:16 protheus2 snort[7724]: Log directory = /var/log/snort
Aug 26 11:16:16 protheus2 snort[7724]: Loading dynamic engine
/usr/lib/snort_dynamicengine/libsf_engine.so...
Aug 26 11:16:16 protheus2 snort[7724]: FATAL ERROR: Failed to load
//usr/lib/snort_dynamicengine/libsf_engine.so:
///usr/lib/snort_dynamicengine/libsf_engine.so: wrong ELF class: ELFCLASS32


------------  snap ------------

Thank you !


Best regards

Hans-J. Ullrich


--- End Message ---
--- Begin Message ---
Source: snort
Source-Version: 2.7.0-6

We believe that the bug you reported is fixed in the latest version of
snort, which is due to be installed in the Debian FTP archive:

snort-common-libraries_2.7.0-6_i386.deb
  to pool/main/s/snort/snort-common-libraries_2.7.0-6_i386.deb
snort-common_2.7.0-6_all.deb
  to pool/main/s/snort/snort-common_2.7.0-6_all.deb
snort-doc_2.7.0-6_all.deb
  to pool/main/s/snort/snort-doc_2.7.0-6_all.deb
snort-mysql_2.7.0-6_i386.deb
  to pool/main/s/snort/snort-mysql_2.7.0-6_i386.deb
snort-pgsql_2.7.0-6_i386.deb
  to pool/main/s/snort/snort-pgsql_2.7.0-6_i386.deb
snort-rules-default_2.7.0-6_all.deb
  to pool/main/s/snort/snort-rules-default_2.7.0-6_all.deb
snort_2.7.0-6.diff.gz
  to pool/main/s/snort/snort_2.7.0-6.diff.gz
snort_2.7.0-6.dsc
  to pool/main/s/snort/snort_2.7.0-6.dsc
snort_2.7.0-6_i386.deb
  to pool/main/s/snort/snort_2.7.0-6_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Javier Fernandez-Sanguino Pen~a <[EMAIL PROTECTED]> (supplier of updated snort 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon, 01 Oct 2007 01:24:32 +0200
Source: snort
Binary: snort-mysql snort-doc snort-rules-default snort-common snort-pgsql 
snort snort-common-libraries
Architecture: source i386 all
Version: 2.7.0-6
Distribution: unstable
Urgency: low
Maintainer: Javier Fernandez-Sanguino Pen~a <[EMAIL PROTECTED]>
Changed-By: Javier Fernandez-Sanguino Pen~a <[EMAIL PROTECTED]>
Description: 
 snort      - Flexible Network Intrusion Detection System
 snort-common - Flexible Network Intrusion Detection System [common files]
 snort-common-libraries - Flexible Network Intrusion Detection System ruleset
 snort-doc  - Documentation for the Snort IDS [documentation]
 snort-mysql - Flexible Network Intrusion Detection System [MySQL]
 snort-pgsql - Flexible Network Intrusion Detection System [PostgreSQL]
 snort-rules-default - Flexible Network Intrusion Detection System ruleset
Closes: 439642
Changes: 
 snort (2.7.0-6) unstable; urgency=low
 .
   * Create a separate snort-libraries package and move all the libraries that
     were previously (wrongly) included in the snort-common package there
     (Closes: #439642)
   * Add proper LSB headers, license and copyright to the init.d file
   * Also add proper messages to the init script and proper checks to generate
     the correct errors when non-root users try to run the script. Exit status
     of the script should now reflect better the problems found.
   * Removed dependencies on essential packages (coreutils)
   * Recode Debian changelog to UTF-8
Files: 
 f590ad91aa24add6cd1d6777ab44fe0b 903 net optional snort_2.7.0-6.dsc
 bc8d3681d01d916edce12d801351d623 1521470 net optional snort_2.7.0-6.diff.gz
 1c93691eb9f18d2e8ad10633d810220e 133260 net optional 
snort-common_2.7.0-6_all.deb
 cf8a5c8cbd1d35b46e0a0ad5adf3ee25 2306456 doc optional snort-doc_2.7.0-6_all.deb
 05600c4da4cc50d02c3761ad63f4a46b 395858 net optional 
snort-rules-default_2.7.0-6_all.deb
 b498620d5f95d820f6c52f4aca8ecb20 465772 net optional snort_2.7.0-6_i386.deb
 d64e2766045167a0d8125e2a66f94ab4 472446 net extra snort-mysql_2.7.0-6_i386.deb
 b7609f3b188170e4138f06708ab45262 472292 net optional 
snort-pgsql_2.7.0-6_i386.deb
 3609e5b31c5d2228b22ea7b986e6f1e2 254364 net optional 
snort-common-libraries_2.7.0-6_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHAEZWsandgtyBSwkRAk4pAJ998Xf4j796EYxN97fJQYQjEPgCBwCdGdKy
gL8QjF5vkli5xE6ejyq/Eg0=
=YQL9
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to