From nobody Wed Nov 09 02:43:11 2022 X-Original-To: dev-commits-ports-all@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4N6TmJ1m7Xz4YRpY; Wed, 9 Nov 2022 02:43:12 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4N6TmJ1DvJz47LT; Wed, 9 Nov 2022 02:43:12 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1667961792; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=o2VC39cLUalCgZ/KMCh4XSDRJINOpl1IDyHu0/qWLDg=; b=fAkglHuV7R7+ucKIugFTy48hf9+sY4ARKuge7Dp4xMiPRFlWFSO+NstIR79nEpJcFxH/ev 9i40HVSA5ZkobpT5mbvJ+o1zdyG15dqfjWoEsv2lKdVHqCRutifNN4kaml/jR1LE+2mR6l Ay7XOYXZZeayXqCZ507nIyZ2N5Kgt8h423964uWUg5a4/WhdUsb9ub1Rnfb2E4rcYIwwsI /V1gWE183d5AUL4jsvitp2U2Cso3dS9YX5jD+A3gchkjnEgYsjsrJMcpK1qv2+2GMmpVaa NxiZJqqSmrv0wafQ4/1u0tC5Daoo/o/94+mT5fJaNBnBoUg08QD2bTB0w5xbFg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1667961792; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=o2VC39cLUalCgZ/KMCh4XSDRJINOpl1IDyHu0/qWLDg=; b=l60Hn3pY3PkNrIDc7z9RViXdJlSceyuDXjjBrc1fxQkwzpUieVqdukuvEmCenDh5YLVK8e wzQUEt5WWqFuX25sFC+KAEPtHvY8fjeTJu6QCHOY55vRrnTm1T98cQpIU1v9STLeyx61ah 3YHj0A+g9JRU3KQYVcN31FC/T3Wjywknmin8n5RFuYHO0CiyTlVhn1NiRpAswdGRrbqeS5 Jwv3CM02TWL80s52oiz2KflvwAJR1QtECBSXszlSdRCTOYxK4aB+VhCcLIIA/HQAWAtkxf q4J66n2x7SX8jC8AoW/klH8PAQ7MREQ9P7TL0uEJmD2XtNjDbgrraiwaQTF7Ug== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1667961792; a=rsa-sha256; cv=none; b=K0i1pO6BZ5qUsQsyaO8L8fTQ27tYj+XaBQdNJWVoGQ33TunMJAZeizkNP0uQwb/Sx7fUb7 mKCM8wtDLGRuHdYyHaraznly3cUGlfUy87t771zgSqUuQAge1SQIfGREukqEyQjww0zhKe udc8CSYHbOgpNe92AdZ2oy3XS5bSJH0zXSUQylHZLmogUl71JFm0F7zUNcQlrO0yBkatEg R+CZiT8b+Kqx81lcYZH9SgquzDKA9sWRvqNH1jJQnQmQab5wTU5Yh8Yw11MUskn4cqNjrn u4uKe3qdMFO1bwDvFQg6RvmJkmvL6n+9GGwjuSEhxIYUgPtWAL1gRw3vt88FLg== ARC-Authentication-Results: i=1; mx1.freebsd.org; none Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4N6TmJ0HXnz14yJ; Wed, 9 Nov 2022 02:43:12 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 2A92hBNI052254; Wed, 9 Nov 2022 02:43:11 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 2A92hBcH052253; Wed, 9 Nov 2022 02:43:11 GMT (envelope-from git) Date: Wed, 9 Nov 2022 02:43:11 GMT Message-Id: <202211090243.2A92hBcH052253@gitrepo.freebsd.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org From: Craig Leres Subject: git: f7beb19cdf53 - main - security/zeek: Update to 5.0.3 List-Id: Commit messages for all branches of the ports repository List-Archive: https://lists.freebsd.org/archives/dev-commits-ports-all List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-dev-commits-ports-all@freebsd.org X-BeenThere: dev-commits-ports-all@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: leres X-Git-Repository: ports X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: f7beb19cdf537aacb741f1f19fccff683954371b Auto-Submitted: auto-generated X-ThisMailContainsUnwantedMimeParts: N The branch main has been updated by leres: URL: https://cgit.FreeBSD.org/ports/commit/?id=f7beb19cdf537aacb741f1f19fccff683954371b commit f7beb19cdf537aacb741f1f19fccff683954371b Author: Craig Leres AuthorDate: 2022-11-09 02:42:45 +0000 Commit: Craig Leres CommitDate: 2022-11-09 02:42:45 +0000 security/zeek: Update to 5.0.3 https://github.com/zeek/zeek/releases/tag/v5.0.3 This release fixes the following potential DoS vulnerabilities: - Fix an issue where a specially-crafted FTP packet can cause Zeek to spend large amounts of time attempting to search for valid commands in the data stream. - Fix a possible overflow in the Zeek dictionary code that may lead to a memory leak. - Fix an issue where a specially-crafted packet can cause Zeek to spend large amounts of time reporting analyzer violations. - Fix a possible assert and crash in the HTTP analyzer when receiving a specially-crafted packet. - Fix an issue where a specially-crafted HTTP or SMTP packet can cause Zeek to spend a large amount of time attempting to search for filenames within the packet data. - Fix two separate possible crashes when converting processed IP headers for logging via the raw_packet event handlers. This release fixes the following bugs: - Fix a possible crash with when statements where lambda captures of local variables sometimes overflowed the frame counter. - Reduced the amount of analyzer_confirmation events that are raised for packets that contain tunnels. - Fix a long-standing bug where TCP reassembly would not function correctly for some analyzers if dpd_reassemble_first_packets was set to false. - Fix a performance bug in the Zeek dictionary code in certain cases, such as copying a large number of entries from one dictionary into another. - Fix a performance issue when inserting large numbers of elements into a Broker store when Broker::scheduler_policy is set to stealing. - Fix a Broker performance issue when distributing large amounts of data from the input framework to proxies/workers at startup. - Fix an issue with messaging between proxies and workers that resulted in error messages being reported. - Updated the list of DNS type strings to reflect the correct. Reported by: Tim Wojtulewicz Security: 60d4d31a-a573-41bd-8c1e-5af7513c1ee9 --- security/zeek/Makefile | 2 +- security/zeek/distinfo | 6 +++--- security/zeek/pkg-plist | 1 - 3 files changed, 4 insertions(+), 5 deletions(-) diff --git a/security/zeek/Makefile b/security/zeek/Makefile index 1b77ef4e8881..0232cb4883d1 100644 --- a/security/zeek/Makefile +++ b/security/zeek/Makefile @@ -1,5 +1,5 @@ PORTNAME= zeek -DISTVERSION= 5.0.2 +DISTVERSION= 5.0.3 CATEGORIES= security MASTER_SITES= https://download.zeek.org/ DISTFILES= ${DISTNAME}${EXTRACT_SUFX} diff --git a/security/zeek/distinfo b/security/zeek/distinfo index daab55b95599..1a56ddd50ae9 100644 --- a/security/zeek/distinfo +++ b/security/zeek/distinfo @@ -1,5 +1,5 @@ -TIMESTAMP = 1663625469 -SHA256 (zeek-5.0.2.tar.gz) = 7089fcc06d13803fc7ce19fdc49f96183efd797be3a4fdca083240b9b46e1d2f -SIZE (zeek-5.0.2.tar.gz) = 42671023 +TIMESTAMP = 1667955171 +SHA256 (zeek-5.0.3.tar.gz) = 8f16ed6b51f63f7efaca506c4ee0396b0fd03e83cb6358dbd9ea6ffe5fd0b657 +SIZE (zeek-5.0.3.tar.gz) = 42670900 SHA256 (zeek-zeek-netmap-v2.0.0_GH0.tar.gz) = d37a69babfbb62a51a2413d6b83ae792ce1e7f1ccb1d51bd6b209a10fe5c4d75 SIZE (zeek-zeek-netmap-v2.0.0_GH0.tar.gz) = 9100 diff --git a/security/zeek/pkg-plist b/security/zeek/pkg-plist index 46fe29ee08c0..283d0503be86 100644 --- a/security/zeek/pkg-plist +++ b/security/zeek/pkg-plist @@ -380,7 +380,6 @@ include/broker/zeek.hh %%SPICY%%include/hilti/rt/iterator.h %%SPICY%%include/hilti/rt/json-fwd.h %%SPICY%%include/hilti/rt/json.h -%%SPICY%%include/hilti/rt/lambda.h %%SPICY%%include/hilti/rt/libhilti.h %%SPICY%%include/hilti/rt/library.h %%SPICY%%include/hilti/rt/linker.h