diff options
author | Craig Leres <leres@FreeBSD.org> | 2023-04-12 06:18:39 +0000 |
---|---|---|
committer | Craig Leres <leres@FreeBSD.org> | 2023-04-12 06:18:39 +0000 |
commit | 7705f7bbc42db52bc8bb6686738580b89b49f347 (patch) | |
tree | fb848e7596990992dcfa4d1564d4246cb6b3360b | |
parent | 8045c67d846f4264582d0833fbd114363e05cf27 (diff) | |
download | ports-7705f7bbc42db52bc8bb6686738580b89b49f347.tar.gz ports-7705f7bbc42db52bc8bb6686738580b89b49f347.zip |
security/zeek: Update to 5.0.8
https://github.com/zeek/zeek/releases/tag/v5.0.8
This release fixes the following potential DoS vulnerabilities:
- A specially-crafted stream of FTP packets containing a command
reply with many intermediate lines can cause Zeek to spend a
large amount of time processing data.
- A specially-crafted set of packets containing extremely large
file offsets cause cause the reassembler code to allocate large
amounts of memory.
- The DNS manager does not correctly expire responses that don't
contain any data, such those containing NXDOMAIN or NODATA status
codes. This can lead to Zeek allocating large amounts of memory
for these responses and never deallocating them.
- A specially-crafted stream of RDP packets can cause Zeek to spend
large protocol validation.
- A specially-crafted stream of SMTP packets can cause Zeek to
spend large amounts of time processing data.
This release fixes the following bugs:
- Data stores used by the known-{hosts,certs,services} policies
now default to using local stores instead of Broker stores.
- The VXLAN and Geneve report analyzer confirmations once their
protocols have been fully parsed, but before attempting to forward
to the tunneled packets to other analyzers.
- New wierds were added to the AYIYA, Geneve, and VXLAN analyzers
(ayiya_empty_packet, geneve_empty_packet, and vxlan_empty_packet).
- A new script-level option Pcap::non_fd_timeout was added to allow
fine-tuning the amount of time to sleep on each IO loop when
using a packet source that doesn't provide a file descriptor
(e.g. Myricom).
- Avoid attempting to retrieve packets during every loop for a
packet source, instead switching to a predictive approach that
keeps track of whether or not that packet source has previously
seen traffic.
Reported by: Tim Wojtulewicz
Security: 96d6809a-81df-46d4-87ed-2f78c79f06b1
-rw-r--r-- | security/zeek/Makefile | 2 | ||||
-rw-r--r-- | security/zeek/distinfo | 6 | ||||
-rw-r--r-- | security/zeek/pkg-plist | 1 |
3 files changed, 5 insertions, 4 deletions
diff --git a/security/zeek/Makefile b/security/zeek/Makefile index bd19db02f84e..c574c4be6b51 100644 --- a/security/zeek/Makefile +++ b/security/zeek/Makefile @@ -1,5 +1,5 @@ PORTNAME= zeek -DISTVERSION= 5.0.7 +DISTVERSION= 5.0.8 CATEGORIES= security MASTER_SITES= https://download.zeek.org/ DISTFILES= ${DISTNAME}${EXTRACT_SUFX} diff --git a/security/zeek/distinfo b/security/zeek/distinfo index e7a1a8a92fc2..a0457e156766 100644 --- a/security/zeek/distinfo +++ b/security/zeek/distinfo @@ -1,5 +1,5 @@ -TIMESTAMP = 1677013835 -SHA256 (zeek-5.0.7.tar.gz) = dbb9788260269c5a75eb5d18fd9ad0df1f06f00757cdde9d86994b35428b5776 -SIZE (zeek-5.0.7.tar.gz) = 42798267 +TIMESTAMP = 1681277857 +SHA256 (zeek-5.0.8.tar.gz) = 82fd72c7078fbdb4c025569a6e31fa7f8b9876ca37aab8ac24db92b0c589d2bf +SIZE (zeek-5.0.8.tar.gz) = 42896663 SHA256 (zeek-zeek-netmap-v2.0.0_GH0.tar.gz) = d37a69babfbb62a51a2413d6b83ae792ce1e7f1ccb1d51bd6b209a10fe5c4d75 SIZE (zeek-zeek-netmap-v2.0.0_GH0.tar.gz) = 9100 diff --git a/security/zeek/pkg-plist b/security/zeek/pkg-plist index 687552ce21bc..bfae01ab3d1e 100644 --- a/security/zeek/pkg-plist +++ b/security/zeek/pkg-plist @@ -1288,6 +1288,7 @@ lib/zeek/python/broker/zeek.py %%ZEEKCTL%%lib/zeek/python/zeekctl/plugins/lb_myricom.py %%ZEEKCTL%%lib/zeek/python/zeekctl/plugins/lb_pf_ring.py %%ZEEKCTL%%lib/zeek/python/zeekctl/plugins/ps.py +%%ZEEKCTL%%lib/zeek/python/zeekctl/plugins/zeek_port_warning.py %%ZEEKCTL%%man/man1/trace-summary.1.gz man/man1/zeek-cut.1.gz man/man8/zeek.8.gz |