Snort mailing list archives

Re: Snort Blog: Snort 2.9.16.1 has been released


From: James Lay via Snort-sigs <snort-sigs () lists snort org>
Date: Wed, 05 Aug 2020 11:25:42 -0600

Looks like a new daq as well

daq-2.0.7.tar.gz: gzip compressed data, last modified: Wed Apr  8
15:53:02 2020, from Unix

James

On Wed, 2020-08-05 at 16:45 +0000, Joel Esler (jesler) via Snort-sigs
wrote:
https://blog.snort.org/2020/08/snort-29161-has-been-released.html

Snort 2.9.16.1 has been released

Join us as we are pleased to release a bug fix version of Snort
2.9.16.1!  First, some release notes:
Snort 2.9.16.1
New Additions
      • Added support for GCC version 10.1.1.
Improvements/Fixes
      • Added packet counters to make sure flows with one-way data
don't stay pending forever.
      • Fixed potential race condition between reload and exit path.
As always this maintenance release of Snort 2.9.16.1 is available on
our Snort downloads page.  For any questions, please feel free to
visit our Snort-Users mailing list.

-- 
Joel Esler
Manager, Communities Division
Cisco Talos Intelligence Group
http://www.talosintelligence.com | https://www.snort.org
_______________________________________________Snort-sigs mailing
listSnort-sigs () lists snort org
https://lists.snort.org/mailman/listinfo/snort-sigs
Please visit http://blog.snort.org for the latest news about Snort!
Please follow these rules: 
https://snort.org/faq/what-is-the-mailing-list-etiquette
Visit the Snort.org to subscribe to the official Snort ruleset, make
sure to stay up to date to catch the most <a href=" 
https://snort.org/downloads/#rule-downloads";>emerging threats</a>!


_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists snort org
https://lists.snort.org/mailman/listinfo/snort-sigs

Please visit http://blog.snort.org for the latest news about Snort!

Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette

Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a 
href=" https://snort.org/downloads/#rule-downloads";>emerging threats</a>!

Current thread: