From nobody Wed Nov 9 04:46:56 2022 X-Original-To: dev-commits-ports-all@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4N6XW45G7tz4dHpX; Wed, 9 Nov 2022 04:46:56 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4N6XW44l3zz4Kb4; Wed, 9 Nov 2022 04:46:56 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1667969216; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=JdXlHsUS/2zMQbxOkeW/egBVtm1B6fLGTF8JfoxWN8Y=; b=od8W2lHoO6On7MkHd3sMy5NwtXaxtnJobjTIsruJ6SXDVt4EWlwLUeoWV+qkpUwfhpaDT0 zAB+A2OvH2ISNnBrYry3sVVuRfh4h3GQpTIGqeIBsQW3huSM9CyLosm+8HvUIRg06EC3Pt +ThJJjXimW55ue6HP4a1MVET8S2Hcr/aQcKIIrDKSwbPJowUPv1M7nkqCs1tH2/ldEbkFT QfvEQLyZDbn7iO1XRh70qOhi+1lOq6R3sUCAHV2owxf8TfTu3t4cJwifLdWsrWP3jaOeuQ 0rUfLVR/nUoXDefR2RCGE1V9oomzZLEd358f78ufRo7wwPQ70uMok22U5wR+vg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1667969216; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=JdXlHsUS/2zMQbxOkeW/egBVtm1B6fLGTF8JfoxWN8Y=; b=VM4Rn9cLyeBcyt72vgzkqFtYyfeLXmiZVhOjtHLFX0bVPjZrP/czQVwDqGu+lNdfIwlkCv tLs6qgeCro38/e5ampC1Ja4/8f2VQuq4zRZl+1y2sZQVcCJGayE/gHnR6hR3iZO420IrT/ GC7ADDfNjEtqY3x+/L+wkLlHMYm4+f1Sw43lw+NLzLojdUFGR9dji48rkMSV76L2fjpIXu M59yPwsvsq1YjQp7FEeFAsGFFkIjSl+CAWFRxdAHgxBL3D5LbP39NjX78KptFyNZgHwqki psGJyrSB/Bm/Gb0zsOAOVDTMI96wrh/qNNO6B4SrXtnF84XqfAN6JilbUz6Uaw== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1667969216; a=rsa-sha256; cv=none; b=wOMNC1nO0XdGdaCY6pwLLN9gZO+8ogz0dVG7uwTqxQwZKpHzpiq23ly+jrgcqdr8t3u/Ed htTdApQVLPBTEOW/W78lgDAL+uxpgsblrkUAHa9ds72q39bqDuICw585USgongpKKwdqvI 8ijVioNbiCyZBO3CgoTvstek2mwC4AK1JNBJBvA2ElU0WO9spoOgJye0OeRqbtbk3ES0Wt 79cvjVj9K3lmACtr3ZncrkoQ8CbiI72VfIwthbZPZrOXLr2TKhHFOUMXSvwzvWRXviOyb9 ieAAIX4qoEOk3qX7NJGJqy8Yo5O4Xif6AnR5CmuxEuAv3SXhQcs7pj9PklQcuw== ARC-Authentication-Results: i=1; mx1.freebsd.org; none Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4N6XW43Xk6z187Z; Wed, 9 Nov 2022 04:46:56 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 2A94kuGq023493; Wed, 9 Nov 2022 04:46:56 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 2A94kusq023492; Wed, 9 Nov 2022 04:46:56 GMT (envelope-from git) Date: Wed, 9 Nov 2022 04:46:56 GMT Message-Id: <202211090446.2A94kusq023492@gitrepo.freebsd.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-branches@FreeBSD.org From: Craig Leres Subject: git: d90013b99c3a - 2022Q4 - security/zeek: Update to 5.0.3 List-Id: Commit messages for all branches of the ports repository List-Archive: https://lists.freebsd.org/archives/dev-commits-ports-all List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-dev-commits-ports-all@freebsd.org X-BeenThere: dev-commits-ports-all@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: leres X-Git-Repository: ports X-Git-Refname: refs/heads/2022Q4 X-Git-Reftype: branch X-Git-Commit: d90013b99c3a43310e555d52e990df3d7de3c643 Auto-Submitted: auto-generated X-ThisMailContainsUnwantedMimeParts: N The branch 2022Q4 has been updated by leres: URL: https://cgit.FreeBSD.org/ports/commit/?id=d90013b99c3a43310e555d52e990df3d7de3c643 commit d90013b99c3a43310e555d52e990df3d7de3c643 Author: Craig Leres AuthorDate: 2022-11-09 02:42:45 +0000 Commit: Craig Leres CommitDate: 2022-11-09 04:46:46 +0000 security/zeek: Update to 5.0.3 https://github.com/zeek/zeek/releases/tag/v5.0.3 This release fixes the following potential DoS vulnerabilities: - Fix an issue where a specially-crafted FTP packet can cause Zeek to spend large amounts of time attempting to search for valid commands in the data stream. - Fix a possible overflow in the Zeek dictionary code that may lead to a memory leak. - Fix an issue where a specially-crafted packet can cause Zeek to spend large amounts of time reporting analyzer violations. - Fix a possible assert and crash in the HTTP analyzer when receiving a specially-crafted packet. - Fix an issue where a specially-crafted HTTP or SMTP packet can cause Zeek to spend a large amount of time attempting to search for filenames within the packet data. - Fix two separate possible crashes when converting processed IP headers for logging via the raw_packet event handlers. This release fixes the following bugs: - Fix a possible crash with when statements where lambda captures of local variables sometimes overflowed the frame counter. - Reduced the amount of analyzer_confirmation events that are raised for packets that contain tunnels. - Fix a long-standing bug where TCP reassembly would not function correctly for some analyzers if dpd_reassemble_first_packets was set to false. - Fix a performance bug in the Zeek dictionary code in certain cases, such as copying a large number of entries from one dictionary into another. - Fix a performance issue when inserting large numbers of elements into a Broker store when Broker::scheduler_policy is set to stealing. - Fix a Broker performance issue when distributing large amounts of data from the input framework to proxies/workers at startup. - Fix an issue with messaging between proxies and workers that resulted in error messages being reported. - Updated the list of DNS type strings to reflect the correct. Reported by: Tim Wojtulewicz Security: 60d4d31a-a573-41bd-8c1e-5af7513c1ee9 (cherry picked from commit f7beb19cdf537aacb741f1f19fccff683954371b) --- security/zeek/Makefile | 2 +- security/zeek/distinfo | 6 +++--- security/zeek/pkg-plist | 1 - 3 files changed, 4 insertions(+), 5 deletions(-) diff --git a/security/zeek/Makefile b/security/zeek/Makefile index 1b77ef4e8881..0232cb4883d1 100644 --- a/security/zeek/Makefile +++ b/security/zeek/Makefile @@ -1,5 +1,5 @@ PORTNAME= zeek -DISTVERSION= 5.0.2 +DISTVERSION= 5.0.3 CATEGORIES= security MASTER_SITES= https://download.zeek.org/ DISTFILES= ${DISTNAME}${EXTRACT_SUFX} diff --git a/security/zeek/distinfo b/security/zeek/distinfo index daab55b95599..1a56ddd50ae9 100644 --- a/security/zeek/distinfo +++ b/security/zeek/distinfo @@ -1,5 +1,5 @@ -TIMESTAMP = 1663625469 -SHA256 (zeek-5.0.2.tar.gz) = 7089fcc06d13803fc7ce19fdc49f96183efd797be3a4fdca083240b9b46e1d2f -SIZE (zeek-5.0.2.tar.gz) = 42671023 +TIMESTAMP = 1667955171 +SHA256 (zeek-5.0.3.tar.gz) = 8f16ed6b51f63f7efaca506c4ee0396b0fd03e83cb6358dbd9ea6ffe5fd0b657 +SIZE (zeek-5.0.3.tar.gz) = 42670900 SHA256 (zeek-zeek-netmap-v2.0.0_GH0.tar.gz) = d37a69babfbb62a51a2413d6b83ae792ce1e7f1ccb1d51bd6b209a10fe5c4d75 SIZE (zeek-zeek-netmap-v2.0.0_GH0.tar.gz) = 9100 diff --git a/security/zeek/pkg-plist b/security/zeek/pkg-plist index 46fe29ee08c0..283d0503be86 100644 --- a/security/zeek/pkg-plist +++ b/security/zeek/pkg-plist @@ -380,7 +380,6 @@ include/broker/zeek.hh %%SPICY%%include/hilti/rt/iterator.h %%SPICY%%include/hilti/rt/json-fwd.h %%SPICY%%include/hilti/rt/json.h -%%SPICY%%include/hilti/rt/lambda.h %%SPICY%%include/hilti/rt/libhilti.h %%SPICY%%include/hilti/rt/library.h %%SPICY%%include/hilti/rt/linker.h