From nobody Fri Oct 27 22:26:09 2023 X-Original-To: dev-commits-ports-main@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4SHHLp1vwVz4y1xn; Fri, 27 Oct 2023 22:26:10 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4SHHLp1P6Nz4Y1h; Fri, 27 Oct 2023 22:26:10 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1698445570; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=Zzs9/YMm+um9SUKF57K4dda9nNy2UFTTFV7k6plWaYw=; b=ij3HYT23FLHx5MN8rpc5e+K4kVJqWhE4QbFFwWqHQptNfUT5hJDv9ES1X1VCYu2BfvJGMe Mv9mZZAhIxY3dWYolX1rqtMhYl095LYWABQegqDeDXRX/mZfF58zzQAGNuKN4nCOQAvrdN 4K18jq1YLcSH0+6Fed1Xdk1sWlpq1HqfCUUWBf3HVku6/V3FOVFTIHiAeDStuI4xbR6673 S5CsfAe3KGzBrhfpbplGnrGWI+2QpGO4zKquYBwVF2zV1JxQ79jtSXyA9INKStj2vNtjol KYJrbooONyY2KFqP6hAIISzwqbYMT/hbsGS36xfvEGozMNKmTSLavyVKCbh+Lg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1698445570; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=Zzs9/YMm+um9SUKF57K4dda9nNy2UFTTFV7k6plWaYw=; b=OWhmBYLfx88ji8YxNrjV5J8+60zNv0UlIHUBx/BRur5jnASNO308Z605R0favks8G84YPc 6asDVBBk76RyvDkde4KDMTkyhvI4BBasZHSnF//psdNuVPFI9Nr6zDHZRf4TNy5qAiLt+B KnI7lL6Izhgq/n2IIb18uOngw0zrKZMlNS6x4Wvq6YK8/tRzb+WDdLz76uMFW+IyQg1hTu 1Fozc0s/ITxE/+QDPtPkrQKmOgqNDUidYA+sP6KOWT6GO9HAcSWrmDOuTH3qHxSywBQs6U 4bBiDoCIGHmfActrkIQ85n1GGfN/Rz6qqfUrd/w3WThYgdy5mxCzMTFOi/UPFQ== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1698445570; a=rsa-sha256; cv=none; b=DAxyPEs2UmNOIhVRlBXyDGjFNkaCbtviIcuef1YTHRFOZs0qZ2I2L1qQYgpQf5NvblHpMl KDaYyfk9en7QbpAB//B/iOtUNwZ30GJreTsuZsKJrm4AveKv2pTPzqnSZUdOXy9gGIGMSs NhxTxAwDEIGzDf7/HbRIo7gFFRVoxjtkcGi1U1UA8JiohM3x9iSwSi72QoWjd6bChUtAJj 5r+sDiJQ9w2yJNSOIrIMNo/Nh6PU52GufEy2uwjTi0rGy4TW13Vv43attdMeRlgnOZg0Si PnDx7LKims71ivcSPPDsrmj94wHTq0XOHIAXpqZi6AzAVms6aNaXGB3+JxdELg== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4SHHLp0SSnzXLD; Fri, 27 Oct 2023 22:26:10 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.17.1/8.17.1) with ESMTP id 39RMQ9Md077897; Fri, 27 Oct 2023 22:26:09 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.17.1/8.17.1/Submit) id 39RMQ9jC077894; Fri, 27 Oct 2023 22:26:09 GMT (envelope-from git) Date: Fri, 27 Oct 2023 22:26:09 GMT Message-Id: <202310272226.39RMQ9jC077894@gitrepo.freebsd.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org From: Craig Leres Subject: git: f85e384228a2 - main - security/vuxml: Mark zeek < 6.0.2 as vulnerable as per: List-Id: Commits to the main branch of the FreeBSD ports repository List-Archive: https://lists.freebsd.org/archives/dev-commits-ports-main List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-dev-commits-ports-main@freebsd.org X-BeenThere: dev-commits-ports-main@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: leres X-Git-Repository: ports X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: f85e384228a28b33a3bd9c076a2ad4d1f22d021d Auto-Submitted: auto-generated The branch main has been updated by leres: URL: https://cgit.FreeBSD.org/ports/commit/?id=f85e384228a28b33a3bd9c076a2ad4d1f22d021d commit f85e384228a28b33a3bd9c076a2ad4d1f22d021d Author: Craig Leres AuthorDate: 2023-10-27 22:25:39 +0000 Commit: Craig Leres CommitDate: 2023-10-27 22:25:39 +0000 security/vuxml: Mark zeek < 6.0.2 as vulnerable as per: https://github.com/zeek/zeek/releases/tag/v6.0.2 This release fixes the following potential DoS vulnerabilities: - A specially-crafted SSL packet could cause Zeek to leak memory and potentially crash. - A specially-crafted series of FTP packets could cause Zeek to log entries for requests that have already been completed, using resources unnecessarily and potentially causing Zeek to lose other traffic. - A specially-crafted series of SSL packets could cause Zeek to output a very large number of unnecessary alerts for the same record. - A specially-crafted series of SSL packets could cause Zeek to generate very long ssl_history fields in the ssl.log, potentially using a large amount of memory due to unbounded state growth - A specially-crafted IEEE802.11 packet could cause Zeek to overflow memory and potentially crash Reported by: Tim Wojtulewicz --- security/vuxml/vuln/2023.xml | 39 +++++++++++++++++++++++++++++++++++++++ security/zeek/Makefile | 2 +- security/zeek/distinfo | 6 +++--- 3 files changed, 43 insertions(+), 4 deletions(-) diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml index c619e019378f..7f47de9a2486 100644 --- a/security/vuxml/vuln/2023.xml +++ b/security/vuxml/vuln/2023.xml @@ -1,3 +1,42 @@ + + zeek -- potential DoS vulnerabilities + + + zeek + 6.0.2 + + + + +

Tim Wojtulewicz of Corelight reports:

+
+

A specially-crafted SSL packet could cause Zeek to + leak memory and potentially crash.

+

A specially-crafted series of FTP packets could cause + Zeek to log entries for requests that have already been + completed, using resources unnecessarily and potentially + causing Zeek to lose other traffic.

+

A specially-crafted series of SSL packets could cause + Zeek to output a very large number of unnecessary alerts + for the same record.

+

A specially-crafted series of SSL packets could cause + Zeek to generate very long ssl_history fields in the + ssl.log, potentially using a large amount of memory due + to unbounded state growth

+

A specially-crafted IEEE802.11 packet could cause + Zeek to overflow memory and potentially crash

+
+ +
+ + https://github.com/zeek/zeek/releases/tag/v6.0.2 + + + 2023-10-27 + 2023-10-27 + +
+ chromium -- multiple vulnerabilities diff --git a/security/zeek/Makefile b/security/zeek/Makefile index c82778ba542a..4623ee6c804a 100644 --- a/security/zeek/Makefile +++ b/security/zeek/Makefile @@ -1,5 +1,5 @@ PORTNAME= zeek -DISTVERSION= 6.0.1 +DISTVERSION= 6.0.2 CATEGORIES= security MASTER_SITES= https://download.zeek.org/ DISTFILES= ${DISTNAME}${EXTRACT_SUFX} diff --git a/security/zeek/distinfo b/security/zeek/distinfo index 760fbcbfb021..2f9b2eae87e8 100644 --- a/security/zeek/distinfo +++ b/security/zeek/distinfo @@ -1,3 +1,3 @@ -TIMESTAMP = 1694552456 -SHA256 (zeek-6.0.1.tar.gz) = cfc329a170439195d7070ec5387d95cdda7eb6b86ac85ec707b9ed0e9d576a29 -SIZE (zeek-6.0.1.tar.gz) = 60152791 +TIMESTAMP = 1698437165 +SHA256 (zeek-6.0.2.tar.gz) = 2421989adcee6a29f48a8f7272f719edbe954d66c2e86e3a52e79cae177f887c +SIZE (zeek-6.0.2.tar.gz) = 60175209