From nobody Fri Oct 27 22:46:58 2023 X-Original-To: dev-commits-ports-main@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4SHHpq30Hpz4y2xL; Fri, 27 Oct 2023 22:46:59 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4SHHpq2MHpz4bSc; Fri, 27 Oct 2023 22:46:59 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1698446819; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=kLF2Ajd9iXRlwwcv4c2Tr83j8lnKtAJ/XSxPt204z0g=; b=gLhu3+Gop05z7/6Qw8n9T9uqhkxn7xOxgYVSGg/5r8f4cuqIn4s/y0wQApkxxypD2lJ1oR wIOZLG1cqvUlHTdwIzxNCAPzoTeeNwCqar7yfpre/qJBaoh+t2CXxayNcBXHw7ISCsECT8 PN3yJLRqG//zMhzTigH5r/uOjGqcBLRMF4X/DPUwFLOnLsGy/0lVp1y1YqmCmkpOBq5o6M EUYDgTEXwdkzh5Jf0IxsqEAFlNHkrhsr1UTG/7yO3YSYs6WKyBPqsMPNysmVcBSmArGiyz ssfBjgo4zqGXhjrBTqz7nYwWn1rpHEJGFGgLLCePhQd91vVrgTF2R25JZ5XIng== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1698446819; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=kLF2Ajd9iXRlwwcv4c2Tr83j8lnKtAJ/XSxPt204z0g=; b=v0qLFz2g391fHfSQ0KmoO9WfYfLzXv0LXwfBPYdYlOz1YIv/CxreQt5q8QpuPHFClEwEn7 6YnBlR6VasZk4Fv5pXhyml26B4KlqqUbV6lMbQJAjeVnArY2tKlnEgg9ijRoZXVb9UJmFb csRbUesVbJmnE7SxpMkAx0wLlnTausEaPVeSrEAdTw3M+OpzAr3hrRj37ypmbDOvQowV3R Ohsl1M5VRFdz6Voy8qSVqd8d/15CBfVUyAJwa3N/ug5xQNJGbTirvvMCSnum2FN0LE8W/1 5BrJye37vLKBGIAbLmIhX34E5wIVVwdqmtnpC5tlfHPINQcUYh7hLrIxbEqVUw== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1698446819; a=rsa-sha256; cv=none; b=ZEOosSgDRFVrJc5mHM4IGp5fSrprGk4Mn7m6WkvlIs0VeCfTJ1FB+OLEUJ9FFtORN4v0nW IoTtLT+eTIj4l2tPFt6hQhuYVJM7t9yCl8DORpX1sLOryuwc1ev3SWVzbtZhtxNGBUfKZX YcbUAFqgfDIjFZlxOWpyDSr8klivX7vktgHhWcsdWIZhWJoOuQ5qphlbRJ7/N1s3qwWqzy eyYAjqgC2iLZXIsxVHYG487N8cQkZnXD4VpkrWmGi6+dHbC51n9MsmacrIbJGPQvtqJcYS xPa8JH5fMUu78S0D0aa0STjYpdexcZuG46U7MJ+HuQr7H9lbVp3WcngnkOQxAQ== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4SHHpq1BDVzX7T; Fri, 27 Oct 2023 22:46:59 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.17.1/8.17.1) with ESMTP id 39RMkwuJ010648; Fri, 27 Oct 2023 22:46:58 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.17.1/8.17.1/Submit) id 39RMkwX3010645; Fri, 27 Oct 2023 22:46:58 GMT (envelope-from git) Date: Fri, 27 Oct 2023 22:46:58 GMT Message-Id: <202310272246.39RMkwX3010645@gitrepo.freebsd.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org From: Craig Leres Subject: git: 5f0ef242a10c - main - security/zeek: Update to 6.0.2 List-Id: Commits to the main branch of the FreeBSD ports repository List-Archive: https://lists.freebsd.org/archives/dev-commits-ports-main List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-dev-commits-ports-main@freebsd.org X-BeenThere: dev-commits-ports-main@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: leres X-Git-Repository: ports X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 5f0ef242a10cb712c5e1e930e490b197b3d997af Auto-Submitted: auto-generated The branch main has been updated by leres: URL: https://cgit.FreeBSD.org/ports/commit/?id=5f0ef242a10cb712c5e1e930e490b197b3d997af commit 5f0ef242a10cb712c5e1e930e490b197b3d997af Author: Craig Leres AuthorDate: 2023-10-27 22:46:35 +0000 Commit: Craig Leres CommitDate: 2023-10-27 22:46:35 +0000 security/zeek: Update to 6.0.2 https://github.com/zeek/zeek/releases/tag/v6.0.2 This release fixes the following potential DoS vulnerabilities: - A specially-crafted SSL packet could cause Zeek to leak memory and potentially crash. - A specially-crafted series of FTP packets could cause Zeek to log entries for requests that have already been completed, using resources unnecessarily and potentially causing Zeek to lose other traffic. - A specially-crafted series of SSL packets could cause Zeek to output a very large number of unnecessary alerts for the same record. - A specially-crafted series of SSL packets could cause Zeek to generate very long ssl_history fields in the ssl.log, potentially using a large amount of memory due to unbounded state growth - A specially-crafted IEEE802.11 packet could cause Zeek to overflow memory and potentially crash This release fixes the following bugs: - Fixed Spicy type names from causing collisions with existing Zeek types. - On some systems with low values for the maximum number of file descriptors, it was possible to run into crashes when doing DNS lookups if all of the file descriptors were used. - Tables backed by a Broker backend now correctly support deletion if they have complex index types. - A significant performance issue with Zeek's supervisor code was fixed, revolving around the re-initialization of the Event Manager object used to track events. - The MaxMind DB code now cleans up after itself, resolving a memory leak with the loaded database files. - The ZeekJS submodule was updated to version 0.9.6, bringing fixes for zeek.invoke and zeek.event crashes, garbage collection, and an issue where Zeek may stop executing events from ZeekJS. Reported by: Tim Wojtulewicz Security: 386a14bb-1a21-41c6-a2cf-08d79213379b --- security/zeek/Makefile | 2 +- security/zeek/distinfo | 6 +++--- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/security/zeek/Makefile b/security/zeek/Makefile index c82778ba542a..4623ee6c804a 100644 --- a/security/zeek/Makefile +++ b/security/zeek/Makefile @@ -1,5 +1,5 @@ PORTNAME= zeek -DISTVERSION= 6.0.1 +DISTVERSION= 6.0.2 CATEGORIES= security MASTER_SITES= https://download.zeek.org/ DISTFILES= ${DISTNAME}${EXTRACT_SUFX} diff --git a/security/zeek/distinfo b/security/zeek/distinfo index 760fbcbfb021..2f9b2eae87e8 100644 --- a/security/zeek/distinfo +++ b/security/zeek/distinfo @@ -1,3 +1,3 @@ -TIMESTAMP = 1694552456 -SHA256 (zeek-6.0.1.tar.gz) = cfc329a170439195d7070ec5387d95cdda7eb6b86ac85ec707b9ed0e9d576a29 -SIZE (zeek-6.0.1.tar.gz) = 60152791 +TIMESTAMP = 1698437165 +SHA256 (zeek-6.0.2.tar.gz) = 2421989adcee6a29f48a8f7272f719edbe954d66c2e86e3a52e79cae177f887c +SIZE (zeek-6.0.2.tar.gz) = 60175209