properly identify packet fragments that have dissimilar TTL values,
which allows remote attackers to bypass detection rules by using a
different TTL for each fragment. (CVE-2008-1804)
The updated packages have been patched to prevent this.
Additionally there were problems with two rules in the snort-rules
package for 2008.0 that is also fixed with this update.
Packages for 2008.0 are being provided due to extended support for