diff options
author | Craig Leres <leres@FreeBSD.org> | 2022-11-09 02:42:45 +0000 |
---|---|---|
committer | Craig Leres <leres@FreeBSD.org> | 2022-11-09 02:42:45 +0000 |
commit | f7beb19cdf537aacb741f1f19fccff683954371b (patch) | |
tree | 6d643e2d4a31637b46f618a2f66ac856db20f461 | |
parent | ecfd870f8286d38e6b208695e9bebd76eef77120 (diff) | |
download | ports-f7beb19cdf537aacb741f1f19fccff683954371b.tar.gz ports-f7beb19cdf537aacb741f1f19fccff683954371b.zip |
security/zeek: Update to 5.0.3
https://github.com/zeek/zeek/releases/tag/v5.0.3
This release fixes the following potential DoS vulnerabilities:
- Fix an issue where a specially-crafted FTP packet can cause Zeek
to spend large amounts of time attempting to search for valid
commands in the data stream.
- Fix a possible overflow in the Zeek dictionary code that may
lead to a memory leak.
- Fix an issue where a specially-crafted packet can cause Zeek to
spend large amounts of time reporting analyzer violations.
- Fix a possible assert and crash in the HTTP analyzer when receiving
a specially-crafted packet.
- Fix an issue where a specially-crafted HTTP or SMTP packet can
cause Zeek to spend a large amount of time attempting to search
for filenames within the packet data.
- Fix two separate possible crashes when converting processed IP
headers for logging via the raw_packet event handlers.
This release fixes the following bugs:
- Fix a possible crash with when statements where lambda captures
of local variables sometimes overflowed the frame counter.
- Reduced the amount of analyzer_confirmation events that are
raised for packets that contain tunnels.
- Fix a long-standing bug where TCP reassembly would not function
correctly for some analyzers if dpd_reassemble_first_packets was
set to false.
- Fix a performance bug in the Zeek dictionary code in certain
cases, such as copying a large number of entries from one
dictionary into another.
- Fix a performance issue when inserting large numbers of elements
into a Broker store when Broker::scheduler_policy is set to
stealing.
- Fix a Broker performance issue when distributing large amounts
of data from the input framework to proxies/workers at startup.
- Fix an issue with messaging between proxies and workers that
resulted in error messages being reported.
- Updated the list of DNS type strings to reflect the correct.
Reported by: Tim Wojtulewicz
Security: 60d4d31a-a573-41bd-8c1e-5af7513c1ee9
-rw-r--r-- | security/zeek/Makefile | 2 | ||||
-rw-r--r-- | security/zeek/distinfo | 6 | ||||
-rw-r--r-- | security/zeek/pkg-plist | 1 |
3 files changed, 4 insertions, 5 deletions
diff --git a/security/zeek/Makefile b/security/zeek/Makefile index 1b77ef4e8881..0232cb4883d1 100644 --- a/security/zeek/Makefile +++ b/security/zeek/Makefile @@ -1,5 +1,5 @@ PORTNAME= zeek -DISTVERSION= 5.0.2 +DISTVERSION= 5.0.3 CATEGORIES= security MASTER_SITES= https://download.zeek.org/ DISTFILES= ${DISTNAME}${EXTRACT_SUFX} diff --git a/security/zeek/distinfo b/security/zeek/distinfo index daab55b95599..1a56ddd50ae9 100644 --- a/security/zeek/distinfo +++ b/security/zeek/distinfo @@ -1,5 +1,5 @@ -TIMESTAMP = 1663625469 -SHA256 (zeek-5.0.2.tar.gz) = 7089fcc06d13803fc7ce19fdc49f96183efd797be3a4fdca083240b9b46e1d2f -SIZE (zeek-5.0.2.tar.gz) = 42671023 +TIMESTAMP = 1667955171 +SHA256 (zeek-5.0.3.tar.gz) = 8f16ed6b51f63f7efaca506c4ee0396b0fd03e83cb6358dbd9ea6ffe5fd0b657 +SIZE (zeek-5.0.3.tar.gz) = 42670900 SHA256 (zeek-zeek-netmap-v2.0.0_GH0.tar.gz) = d37a69babfbb62a51a2413d6b83ae792ce1e7f1ccb1d51bd6b209a10fe5c4d75 SIZE (zeek-zeek-netmap-v2.0.0_GH0.tar.gz) = 9100 diff --git a/security/zeek/pkg-plist b/security/zeek/pkg-plist index 46fe29ee08c0..283d0503be86 100644 --- a/security/zeek/pkg-plist +++ b/security/zeek/pkg-plist @@ -380,7 +380,6 @@ include/broker/zeek.hh %%SPICY%%include/hilti/rt/iterator.h %%SPICY%%include/hilti/rt/json-fwd.h %%SPICY%%include/hilti/rt/json.h -%%SPICY%%include/hilti/rt/lambda.h %%SPICY%%include/hilti/rt/libhilti.h %%SPICY%%include/hilti/rt/library.h %%SPICY%%include/hilti/rt/linker.h |