notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
All times are UTC
Ukraine
non port: security/zeek/Makefile
SVNWeb

Number of commits found: 57

Fri, 19 May 2023
[ 17:37 Craig Leres (leres) search for other commits by this committer ]    commit hash:21ea6c36f4c73c801e038519a0bed76cf212059c  commit hash:21ea6c36f4c73c801e038519a0bed76cf212059c  commit hash:21ea6c36f4c73c801e038519a0bed76cf212059c  21ea6c3 
security/zeek: Update to 5.0.9

    https://github.com/zeek/zeek/releases/tag/v5.0.9

This release fixes the following potential DoS vulnerabilities:

 - A specially-crafted series of FTP packets with a CMD command
   with a large path followed by a very large number of replies
   could cause Zeek to spend a long time processing the data.

 - A specially-crafted with a truncated header can cause Zeek to
   overflow memory and potentially crash.

 - A specially-crafted series of SMTP packets can cause Zeek to
   generate a very large number of events and take a long time to
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Wed, 12 Apr 2023
[ 06:18 Craig Leres (leres) search for other commits by this committer ]    commit hash:7705f7bbc42db52bc8bb6686738580b89b49f347  commit hash:7705f7bbc42db52bc8bb6686738580b89b49f347  commit hash:7705f7bbc42db52bc8bb6686738580b89b49f347  7705f7bbc 
security/zeek: Update to 5.0.8

    https://github.com/zeek/zeek/releases/tag/v5.0.8

This release fixes the following potential DoS vulnerabilities:

 - A specially-crafted stream of FTP packets containing a command
   reply with many intermediate lines can cause Zeek to spend a
   large amount of time processing data.

 - A specially-crafted set of packets containing extremely large
   file offsets cause cause the reassembler code to allocate large
   amounts of memory.

 - The DNS manager does not correctly expire responses that don't
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Tue, 21 Feb 2023
[ 22:39 Craig Leres (leres) search for other commits by this committer ]    commit hash:4e0e0f48d7e3d4f0c495e2f6ac03fd70988f8777  commit hash:4e0e0f48d7e3d4f0c495e2f6ac03fd70988f8777  commit hash:4e0e0f48d7e3d4f0c495e2f6ac03fd70988f8777  4e0e0f4 
security/zeek: Update to 5.0.7

    https://github.com/zeek/zeek/releases/tag/v5.0.7

This release fixes the following potential DoS vulnerabilities:

 - Receiving DNS responses from async DNS requests (via the
   lookup_addr, etc BIF methods) with the TTL set to zero could
   cause the DNS manager to eventually stop being able to make new
   requests.

 - Specially-crafted FTP packets with excessively long usernames,
   passwords, or other fields could cause log writes to use large
   amounts of disk space.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Wed, 1 Feb 2023
[ 19:06 Craig Leres (leres) search for other commits by this committer ]    commit hash:85faac2f4c4a9a545a15ffb797ecb41ea3d985e5  commit hash:85faac2f4c4a9a545a15ffb797ecb41ea3d985e5  commit hash:85faac2f4c4a9a545a15ffb797ecb41ea3d985e5  85faac2 
security/zeek: Update to 5.0.6

    https://github.com/zeek/zeek/releases/tag/v5.0.6

This release fixes the following potential DoS vulnerabilities:

 - A missing field in the SMB FSControl script-land record could
   cause a heap buffer overflow when receiving packets containing
   those header types.

 - Receiving a series of packets that start with HTTP/1.0 and then
   switch to HTTP/0.9 could cause Zeek to spend a large amount of
   time processing the packets.

 - Receiving large numbers of FTP commands sequentially from the
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Tue, 10 Jan 2023
[ 01:07 Craig Leres (leres) search for other commits by this committer ]    commit hash:5f6df5b5e8a9b58c3b75c0057680bc85a2583871  commit hash:5f6df5b5e8a9b58c3b75c0057680bc85a2583871  commit hash:5f6df5b5e8a9b58c3b75c0057680bc85a2583871  5f6df5b 
security/zeek: Update to 5.0.5

    https://github.com/zeek/zeek/releases/tag/v5.0.5

This release fixes the following bugs:

 - Update broker to version 2.3.6. This broker release fixes some
   failures when building against Python 3.11 and above.

Reported by:	Tim Wojtulewicz
Thu, 24 Nov 2022
[ 18:29 Craig Leres (leres) search for other commits by this committer ]    commit hash:a940eea46e391fb788b2663c20ccdf6a8554fe4f  commit hash:a940eea46e391fb788b2663c20ccdf6a8554fe4f  commit hash:a940eea46e391fb788b2663c20ccdf6a8554fe4f  a940eea 
security/zeek: Update to 5.0.4

    https://github.com/zeek/zeek/releases/tag/v5.0.4

This release fixes the following potential DoS vulnerabilities:

 - A specially-crafted series of HTTP 0.9 packets can cause Zeek
   to spend large amounts of time processing the packets.

 - A specially-crafted FTP packet can cause Zeek to spend large
   amounts of time processing the command.

 - A specially-crafted IPv6 packet can cause Zeek to overflow memory
   and potentially crash.

This release fixes the following bugs:

 - Fix a potential stall in Broker’s internal data pipeline.

Reported by:	Tim Wojtulewicz
Security:	???
Wed, 9 Nov 2022
[ 02:42 Craig Leres (leres) search for other commits by this committer ]    commit hash:f7beb19cdf537aacb741f1f19fccff683954371b  commit hash:f7beb19cdf537aacb741f1f19fccff683954371b  commit hash:f7beb19cdf537aacb741f1f19fccff683954371b  f7beb19 
security/zeek: Update to 5.0.3

    https://github.com/zeek/zeek/releases/tag/v5.0.3

This release fixes the following potential DoS vulnerabilities:

 - Fix an issue where a specially-crafted FTP packet can cause Zeek
   to spend large amounts of time attempting to search for valid
   commands in the data stream.

 - Fix a possible overflow in the Zeek dictionary code that may
   lead to a memory leak.

 - Fix an issue where a specially-crafted packet can cause Zeek to
   spend large amounts of time reporting analyzer violations.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Tue, 20 Sep 2022
[ 00:02 Craig Leres (leres) search for other commits by this committer ]    commit hash:2f3600ba29635cc0d536f58f6feea755cc4c7c94  commit hash:2f3600ba29635cc0d536f58f6feea755cc4c7c94  commit hash:2f3600ba29635cc0d536f58f6feea755cc4c7c94  2f3600b 
security/zeek: Update to 5.0.2

    https://github.com/zeek/zeek/releases/tag/v5.0.2

Security fixes:

 - Fix a possible overflow and crash in the ICMP analyzer when
   receiving a specially crafted packet

 - Fix a possible overflow and crash in the IRC analyzer when
   receiving a specially crafted packet

 - Fix a possible overflow and crash in the SMB analyzer when
   receiving a specially crafted packet
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Thu, 15 Sep 2022
[ 00:53 Craig Leres (leres) search for other commits by this committer ]    commit hash:095788766cc2d89548e39d49051999613680b72d  commit hash:095788766cc2d89548e39d49051999613680b72d  commit hash:095788766cc2d89548e39d49051999613680b72d  0957887 
security/zeek: Port improvements

 - Remove useless BROKER option.

 - Remove USES=ninja (now implied by USES=cmake).

 - Make bison, flex, and swig hard dependencies.

 - Strip several installed binaries.

 - Remove some test files and directories mistakenly installed by
   spicy.

 - While we're here, run portfmt.

Thanks to @diizzy for the bulk of these changes.

PR:		266345
Reported by:	diizzy
Wed, 7 Sep 2022
[ 21:10 Stefan Eßer (se) search for other commits by this committer ]    commit hash:b7f05445c00f2625aa19b4154ebcbce5ed2daa52  commit hash:b7f05445c00f2625aa19b4154ebcbce5ed2daa52  commit hash:b7f05445c00f2625aa19b4154ebcbce5ed2daa52  b7f0544  (Only the first 10 of 27931 ports in this commit are shown above. View all ports for this commit)
Add WWW entries to port Makefiles

It has been common practice to have one or more URLs at the end of the
ports' pkg-descr files, one per line and prefixed with "WWW:". These
URLs should point at a project website or other relevant resources.

Access to these URLs required processing of the pkg-descr files, and
they have often become stale over time. If more than one such URL was
present in a pkg-descr file, only the first one was tarnsfered into
the port INDEX, but for many ports only the last line did contain the
port specific URL to further information.

There have been several proposals to make a project URL available as
a macro in the ports' Makefiles, over time.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Fri, 26 Aug 2022
[ 23:54 Craig Leres (leres) search for other commits by this committer ]    commit hash:8afc679517af7a25ec736e5a44cea6a1c548c35d  commit hash:8afc679517af7a25ec736e5a44cea6a1c548c35d  commit hash:8afc679517af7a25ec736e5a44cea6a1c548c35d  8afc679 
security/zeek: Update to 5.0.1

    https://github.com/zeek/zeek/releases/tag/v5.0.1

Security fixes since 5.0.0:

 - Fix a possible overflow and crash in the ARP analyzer when
   receiving a specially crafted packet.

 - Fix a possible overflow and crash in the Modbus analyzer when
   receiving a specially crafted packet.

 - Fix two possible crashes when converting IP headers for output
   via the raw_packet event.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Wed, 20 Jul 2022
[ 14:22 Tobias C. Berner (tcberner) search for other commits by this committer ]    commit hash:857c05f8674c5f4c990f49f9d0fb7034ebd340fe  commit hash:857c05f8674c5f4c990f49f9d0fb7034ebd340fe  commit hash:857c05f8674c5f4c990f49f9d0fb7034ebd340fe  857c05f  (Only the first 10 of 840 ports in this commit are shown above. View all ports for this commit)
security: remove 'Created by' lines

A big Thank You to the original contributors of these ports:

  *  <ports@c0decafe.net>
  *  Aaron Dalton <aaron@FreeBSD.org>
  *  Adam Weinberger <adamw@FreeBSD.org>
  *  Ade Lovett <ade@FreeBSD.org>
  *  Aldis Berjoza <aldis@bsdroot.lv>
  *  Alex Dupre <ale@FreeBSD.org>
  *  Alex Kapranoff <kappa@rambler-co.ru>
  *  Alex Samorukov <samm@freebsd.org>
  *  Alexander Botero-Lowry <alex@foxybanana.com>
  *  Alexander Kriventsov <avk@vl.ru>
  *  Alexander Leidinger <netchild@FreeBSD.org>
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Mon, 18 Jul 2022
[ 07:16 Piotr Kubaj (pkubaj) search for other commits by this committer ]    commit hash:f7731a46b82fb1a578193ef508e4c5707cf5b04b  commit hash:f7731a46b82fb1a578193ef508e4c5707cf5b04b  commit hash:f7731a46b82fb1a578193ef508e4c5707cf5b04b  f7731a4 
security/zeek: fix build on non aarch64 / amd64 / armv? / i386

1. Enable SPICY only on aarch64 / amd64 / armv? / i386 as specified in
https://github.com/zeek/spicy/blob/d0bc60537b53c3a951a0bdcb7b1c080bbb068abf/hilti/runtime/src/fiber.cc#L252
2. Correct a parameter passed to CMake to disable Spicy.
3. Correct pkg-plist for build with disabled Spicy.

Approved by:	portmgr (blanket)
Wed, 13 Jul 2022
[ 16:50 Craig Leres (leres) search for other commits by this committer ]    commit hash:818eb4ca23d81c98170bdf38b9c80e97cf939c14  commit hash:818eb4ca23d81c98170bdf38b9c80e97cf939c14  commit hash:818eb4ca23d81c98170bdf38b9c80e97cf939c14  818eb4c 
security/zeek: Update input framework patch

    https://github.com/zeek/zeek/pull/2266

This version of the patch fixes tail -F semantics when want_record=F.
Sat, 9 Jul 2022
[ 19:52 Craig Leres (leres) search for other commits by this committer ]    commit hash:619c9efdbb5b809b2187706427c1ee1d0e57ca1f  commit hash:619c9efdbb5b809b2187706427c1ee1d0e57ca1f  commit hash:619c9efdbb5b809b2187706427c1ee1d0e57ca1f  619c9ef 
security/zeek: Patch to allow building without ENABLE_ZEEK_UNIT_TESTS

5.0.0 does not build without ENABLE_ZEEK_UNIT_TESTS enabled.
Apply upstream patch which solves this:

    https://github.com/zeek/zeek/pull/2256

Obtained from:	Benjamin Bannier
[ 02:44 Craig Leres (leres) search for other commits by this committer ]    commit hash:c356da85916e14c0844fdf42340a8429e34990f2  commit hash:c356da85916e14c0844fdf42340a8429e34990f2  commit hash:c356da85916e14c0844fdf42340a8429e34990f2  c356da8 
security/zeek: Update to 5.0.0 (latest LTS release)

    https://github.com/zeek/zeek/releases/tag/v5.0.0

Changes incompatiable with 4.0.7:

 - The script-land ``union`` and ``timer`` types have been removed.
   They haven't had any actual semantics backing them for some time
   and shouldn't have functioned in any useable way. We opted to
   skip the deprecation cycle for these types for that reason.

 - Broker now uses a new network backend with a custom network
   protocol that is incompatible with the pre-5.0 backend. In
   practice, this means Zeek 4.x will not be able to exchange events
   with Zeek 5.x. Going forward, this new backend will allow us to
   keep the Broker protocol more stable and add new capabilities
   in a backwards compatible way.

While we're here add a comment explaining why we really need uname
-p instead of using ARCH (uname -m). Also solve a portlint nag.

Reported by:	Tim Wojtulewicz
Fri, 1 Jul 2022
[ 21:19 Craig Leres (leres) search for other commits by this committer ]    commit hash:b8b4094a465f9fcc646b4d1f01871f8f220cfc92  commit hash:b8b4094a465f9fcc646b4d1f01871f8f220cfc92  commit hash:b8b4094a465f9fcc646b4d1f01871f8f220cfc92  b8b4094 
security/zeek: Patch to provide  tail -F semantics for input framework
MODE_STREAM

This is a backport of this github pull request:

    https://github.com/zeek/zeek/pull/2097
Fri, 3 Jun 2022
[ 17:34 Craig Leres (leres) search for other commits by this committer ]    commit hash:d1628eb541ac68c1cc0d21c2906a75d8fe11d972  commit hash:d1628eb541ac68c1cc0d21c2906a75d8fe11d972  commit hash:d1628eb541ac68c1cc0d21c2906a75d8fe11d972  d1628eb 
security/zeek: Update to 4.0.7

    https://github.com/zeek/zeek/releases/tag/v4.0.7

Security fixes since 4.0.6:

 - Fix potential hang in the DNS analyzer when receiving a
   specially-crafted packet. Due to the possibility of this happening
   with packets received from the network, this is a potential DoS
   vulnerability.

Other changes:

 - Fix issue with broken libpcaps that return repeat packets, most
   notably the version provided with Myricom hardware.

Reported by:	Tim Wojtulewicz
Thu, 21 Apr 2022
[ 22:48 Craig Leres (leres) search for other commits by this committer ]    commit hash:23f90b966845047ab40be2f9921d5d95f785d6e6  commit hash:23f90b966845047ab40be2f9921d5d95f785d6e6  commit hash:23f90b966845047ab40be2f9921d5d95f785d6e6  23f90b9 
security/zeek: Update to 4.0.6

    https://github.com/zeek/zeek/releases/tag/v4.0.6

Security fixes since 4.0.5:

 - Fix potential unbounded state growth in the FTP analyzer when
   receiving a specially-crafted stream of commands. This may lead
   to a buffer overflow and cause Zeek to crash. Due to the possibility
   of this happening with packets received from the network, this
   is a potential DoS vulnerabilty.

Other changes:

 - Empty table constructors with &default attributes may cause a
   crash.

 - Fix a bug in ZAM when a function containing a loop is inlined

 - Fix a number of bugs with robust dictionary iteration.

 - Fix missing "Reporter" entries when reporting hooks via zeek.

Reported by:    Tim Wojtulewicz
Tue, 25 Jan 2022
[ 22:38 Craig Leres (leres) search for other commits by this committer ]    commit hash:02c1f1a6efdc5211e1c5dead4ec2393cd134daf6  commit hash:02c1f1a6efdc5211e1c5dead4ec2393cd134daf6  commit hash:02c1f1a6efdc5211e1c5dead4ec2393cd134daf6  02c1f1a 
security/zeek: Update to 4.0.5

Changes since 4.0.4:

 - The highwayhash module was updated to fix a build failure on
   FreeBSD.

 - A number of fixes for various problems on the CI infrastructure.

 - Writers were not being cleaned up correctly when recreating log
   streams with the same ID as an existing stream. This could lead
   to a crash.

 - IP packets with bad/incorrect IP header lengths were not reporting
   weirds as they should be.

Reported by:	Tim Wojtulewicz
Sat, 16 Oct 2021
[ 09:51 Jimmy Olgeni (olgeni) search for other commits by this committer ]    commit hash:4460cf727a7788c9ce21f3344ce5745e5cd9fc4a  commit hash:4460cf727a7788c9ce21f3344ce5745e5cd9fc4a  commit hash:4460cf727a7788c9ce21f3344ce5745e5cd9fc4a  4460cf7  (Only the first 10 of 476 ports in this commit are shown above. View all ports for this commit)
*: fix tab vs. space issues, and comments according to the guide.
Thu, 30 Sep 2021
[ 21:23 Rene Ladan (rene) search for other commits by this committer ]    commit hash:620968a43a5f9bb3fa98ab20f257a4c0d864caa7  commit hash:620968a43a5f9bb3fa98ab20f257a4c0d864caa7  commit hash:620968a43a5f9bb3fa98ab20f257a4c0d864caa7  620968a  (Only the first 10 of 399 ports in this commit are shown above. View all ports for this commit)
cleanup: drop support for EOL FreeBSD 11.X

Search criteria used:
- 11.4
- OSREL*
- OSVER*
- *_FreeBSD_11

Input from:
- adridg: devel/qca-legacy
- jbeich: _WITH_DPRINTF, _WITH_GETLINE, GNU bfd workarounds
- sunpoet: security/p5-*OpenSSL*

Reviewed by:	doceng, kde, multimedia, perl, python, ruby, rust
Differential Revision: https://reviews.freebsd.org/D32008
Test Plan: make index
Wed, 22 Sep 2021
[ 22:15 Craig Leres (leres) search for other commits by this committer ]    commit hash:b45eb65a92c227e19553d291f1855c203d472e0f  commit hash:b45eb65a92c227e19553d291f1855c203d472e0f  commit hash:b45eb65a92c227e19553d291f1855c203d472e0f  b45eb65 
security/zeek: Update to 4.0.4

    https://github.com/zeek/zeek/releases/tag/v4.0.4

This release fixes two vulnerabilities:

 - Paths from log stream make it into system() unchecked, potentially
   leading to commands being run on the system unintentionally.
   This requires either bad scripting or a malicious package to be
   installed, and is considered low severity.

 - Fix potential unbounded state growth in the PIA analyzer when
   receiving a connection with either a large number of zero-length
   packets, or one which continues ack-ing unseen segments. It is
   possible to run Zeek out of memory in these instances and cause
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Thu, 2 Sep 2021
[ 09:03 Bernhard Froehlich (decke) search for other commits by this committer ]    commit hash:d95d0cfd846bdf61ec728462c20006f2f73eadc4  commit hash:d95d0cfd846bdf61ec728462c20006f2f73eadc4  commit hash:d95d0cfd846bdf61ec728462c20006f2f73eadc4  d95d0cf 
security/zeek: Add CPE information

Approved by:    portmgr (blanket)
Mon, 19 Jul 2021
[ 17:08 Craig Leres (leres) search for other commits by this committer ]    commit hash:7c9b2f40c5f2557d87cc1d2ce7d968377b13d6b3  commit hash:7c9b2f40c5f2557d87cc1d2ce7d968377b13d6b3  commit hash:7c9b2f40c5f2557d87cc1d2ce7d968377b13d6b3  7c9b2f4 
security/zeek: Add @sample for local.zeek

This github issue:

    https://github.com/zeek/zeekctl/issues/35

complained about the lack of a local.zeek file on a fresh install;
adding @sample for local.zeek solves this.

Reported by:	shadonet
Tue, 6 Jul 2021
[ 21:31 Craig Leres (leres) search for other commits by this committer ]    commit hash:9ffa41537310b846c210cdbaa9217c9fd361c6ae  commit hash:9ffa41537310b846c210cdbaa9217c9fd361c6ae  commit hash:9ffa41537310b846c210cdbaa9217c9fd361c6ae  9ffa415 
security/zeek: Update to 4.0.3

    https://github.com/zeek/zeek/releases/tag/v4.0.3

This release fixes the following bugs:

 - Zeek now accepts unset fields in the input data only when the
   corresponding record field is &optional.

 - The version field in ssh.log is now optional and will not be set
   if we cannot determine the version that was negotiated by the
   client and server.

 - Zeekctl could crash at startup on certain compilers and platforms
   due to a memory corruption issue in the Broker python bindings.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Thu, 24 Jun 2021
[ 02:05 Craig Leres (leres) search for other commits by this committer ]    commit hash:fbc07756268d7f9c368e70e14f876b96d521354f  commit hash:fbc07756268d7f9c368e70e14f876b96d521354f  commit hash:fbc07756268d7f9c368e70e14f876b96d521354f  fbc0775 
security/zeek: Add a ZKG option to pull in py-zkg
Thu, 3 Jun 2021
[ 00:14 Craig Leres (leres) search for other commits by this committer ]    commit hash:b9d6624c2bf0584095d15260716597c9e31e37a4  commit hash:b9d6624c2bf0584095d15260716597c9e31e37a4  commit hash:b9d6624c2bf0584095d15260716597c9e31e37a4  b9d6624 
security/zeek: Update to 4.0.2

    https://github.com/zeek/zeek/releases/tag/v4.0.2

This release fixes several potential DoS vulnerabilities:

 - Fix potential Undefined Behavior in decode_netbios_name() and
   decode_netbios_name_type() BIFs. The latter has a possibility
   of a remote heap-buffer-overread, making this a potential DoS
   vulnerability.

 - Add some extra length checking when parsing mobile ipv6 packets.
   Due to the possibility of reading invalid headers from remote
   sources, this is a potential DoS vulnerability.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Wed, 12 May 2021
[ 23:47 Craig Leres (leres) search for other commits by this committer ]    commit hash:560db241dceb91e8dae36b14ce39e89b3ecbebe3  commit hash:560db241dceb91e8dae36b14ce39e89b3ecbebe3  commit hash:560db241dceb91e8dae36b14ce39e89b3ecbebe3  560db24 
security/zeek: Unbreak build when PREFIX is not /usr/local
Tue, 11 May 2021
[ 02:09 Craig Leres (leres) search for other commits by this committer ]    commit hash:e068ee22a21c86db0ab3b5be1d15ff7d0cad3903  commit hash:e068ee22a21c86db0ab3b5be1d15ff7d0cad3903  commit hash:e068ee22a21c86db0ab3b5be1d15ff7d0cad3903  e068ee2 
security/zeek: Add fine grained DEBUG options

Allow the user to pick from DEBUG, MINSIZEREL, RELEASE, and
RELWITHDEBINFO options instead of just DEBUG. Don't STRIP with DEBUG
or RELWITHDEBINFO. Make some minor whitespace changes suggested by
portfmt.
Wed, 21 Apr 2021
[ 21:11 Craig Leres (leres) search for other commits by this committer ]    commit hash:274b20e4c81e57d232a19ad490684374227862c7  commit hash:274b20e4c81e57d232a19ad490684374227862c7  commit hash:274b20e4c81e57d232a19ad490684374227862c7  274b20e 
security/zeek: Update to 4.0.1 to fix null-pointer dereference and potential DOS

    https://github.com/zeek/zeek/releases/tag/v4.0.1

This release fixes the following vulnerability:

 - Fix null-pointer dereference when encountering an invalid enum
   name in a config/input file that tries to read it into a set[enum].
   For those that have such an input feed whose contents may come
   from external/remote sources, this is a potential DoS vulnerability.

Other fixes:

 - Fix mime type detection bug in IRC/FTP file_transferred event
   for file data containing null-bytes
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Wed, 14 Apr 2021
[ 05:13 Craig Leres (leres) search for other commits by this committer ]    commit hash:9c36d02b932e632613f6a3948afa2a65afbfdf6b  commit hash:9c36d02b932e632613f6a3948afa2a65afbfdf6b  commit hash:9c36d02b932e632613f6a3948afa2a65afbfdf6b  9c36d02 
security/zeek: Unbreak armv7 build and fix testport issue

Add a patch from upstream to fix building on armv7 (used by pfsense):

    https://github.com/zeek/zeek/issues/1496

Thanks to @garga for the pointer.

Fix a testport "left over" file @adridg reported. When zeek is run
as part of package installation, it copies some config files to
spool/installed-scripts-do-not-touch/site and local.zeek.sample
hitches a ride and needs to be removed on uninstall. But it is not
really a @sample candidate.

While we're here fix some minor portlint (env -> ${SETENV}) and
clean up some commented out directives.

Reported by:	garga adridg
Tue, 6 Apr 2021
[ 14:31 Mathieu Arnold (mat) search for other commits by this committer ]    commit hash:305f148f482daf30dcf728039d03d019f88344eb  commit hash:305f148f482daf30dcf728039d03d019f88344eb  commit hash:305f148f482daf30dcf728039d03d019f88344eb  305f148  (Only the first 10 of 29333 ports in this commit are shown above. View all ports for this commit)
Remove # $FreeBSD$ from Makefiles.
Tue, 23 Mar 2021
[ 18:43 pkubaj search for other commits by this committer ] Original commit   Revision:569048
security/zeek: fix build on powerpc64 elfv2

-mpowerp8-vector is now necessary due to use of highwayhash.

Fix typo on sysctlbyname.

Also correct typo in BROKEN entries.
Sat, 20 Mar 2021
[ 01:16 leres search for other commits by this committer ] Original commit   Revision:568827
security/zeek: Update to 4.0.0

This is the next Long-Term Support (LTS) major version:

    https://github.com/zeek/zeek/releases/tag/v4.0.0
    https://zeek.org/2020/12/15/zeek-4-0-release-candidate/

Support for the previous LTS (3.0.x) will end in about two months.

Reported by:	Jon Siwek
Tue, 23 Feb 2021
[ 01:54 leres search for other commits by this committer ] Original commit   Revision:566365
security/zeek: Update to 3.0.13

    https://github.com/zeek/zeek/releases/tag/v3.0.13

This release fixes the following vulnerability:

 - Fix ASCII Input reader's treatment of input files containing
   null-bytes. An input file containing null-bytes could lead to a
   buffer-over-read, crash Zeek, and be exploited to cause Denial
   of Service.

And fixes the following bugs:

 - MIME sub-entities overwrote top-level header values cause
   misleading SMTP log

 - Fix incorrect major_subsys_version field in pe_optional_header
   event

Reported by:	Jon Siwek
Tue, 22 Dec 2020
[ 17:02 pkubaj search for other commits by this committer ] Original commit   Revision:558927
security/zeek: enable on powerpc64 head
Thu, 17 Dec 2020
[ 22:01 leres search for other commits by this committer ] Original commit   Revision:558335
security/zeek: Install cmake files

Unstream requested that share/zeek/cmake/* be installed as the files
are used to build zeek plugins.

While here update some pkg-plist @preunexec entries (*.bro -> *.zeek).

Reported by:	Robin Sommer, Benjamin Bannier
Wed, 16 Dec 2020
[ 01:05 leres search for other commits by this committer ] Original commit   Revision:558195
security/zeek: Improve the pkg upgrade experience

Don't remove %%PREFIX%%/spool/state.db otherwise when zeek is
upgraded zeekctl doesn't detect the running instance and "restart"
fails.

Split uninstall related info in pkg-message.in to a new remove
section (and fix some typos).
Tue, 15 Dec 2020
[ 22:17 leres search for other commits by this committer ] Original commit   Revision:558190
security/zeek: Update to 3.0.12

    https://github.com/zeek/zeek/releases/tag/v3.0.12

This release fixes the following bugs:

 - Incorrect ICMP Neighbor Discovery Option length calculation

 - Fix SMB2 response status parsing

 - Fix excessive connection_status_update events for ICMP connections

Reported by:	Jon Siwek
Thu, 19 Nov 2020
[ 00:34 leres search for other commits by this committer ] Original commit   Revision:555669
security/zeek: Remove deprecated security/broccoli option

Upstream confirms that support for the broccoli protocol will be
removed in a future version of zeek. And given that security/broccoli
requires python2 which will be deprecated at the end of December,
lets remove broccoli support from zeek now.
Fri, 6 Nov 2020
[ 18:38 leres search for other commits by this committer ] Original commit   Revision:554309
security/zeek: Fix build on armv7 and allow running as non-root user

Apply Renato Botelho's fix for the ARCH used in PLIST_SUB (with
some changes). Essentially use uname -m instead of trying to fix
up the ARCH defined by bsd.port.mk (uname -p).

While we're here:

 - Convert networks.cfg, node.cfg, and zeekctl.cfg to use @sample

 - Use @sample to avoid clobbering site.zeek (oops).

 - Remove unnecessary subshell for the post-build-NETMAP-on target.

 - Silence the annoying "use ZeekControl.plugin instead of
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Wed, 7 Oct 2020
[ 21:29 leres search for other commits by this committer ] Original commit   Revision:551667
security/zeek: Update to 3.0.11 to fix memory leaks and potential DOS:

    https://github.com/zeek/zeek/releases/tag/v3.0.11

 - A memory leak in multipart MIME code has potential for remote
   exploitation and cause for Denial of Service via resource
   exhaustion.

Other fixes:

 - Fix incorrect RSTOS0 conn_state determinations

Reported by:	Jon Siwek
MFH:		2020Q4
Security:	769a4f60-9056-4c27-89a1-1758a59a21f8
Thu, 10 Sep 2020
[ 00:15 leres search for other commits by this committer ] Original commit   Revision:548170
security/zeek: Update to 3.0.10 to fix memory leaks and potential DOS:

    https://github.com/zeek/zeek/releases/tag/v3.0.10

 - Fix memory leak caused by re-entering AYIYA parsing

 - Fix memory leak caused by re-entering GTPv1 parsing

Other fixes:

 - Fix Input Framework 'change' events for 'set' destinations

 - Fix reported body-length of HTTP messages w/ sub-entities

Reported by:	Jon Siwek
MFH:		2020Q3
Security:	2c92fdd3-896c-4a5a-a0d8-52acee69182d
Tue, 28 Jul 2020
[ 01:09 leres search for other commits by this committer ] Original commit   Revision:543560
security/zeek: Update to 3.0.8 and address various vulnerabilities:

    https://github.com/zeek/zeek/releases/tag/v3.0.8

 - Fix potential DNS analyzer stack overflow

 - Fix potential NetbiosSSN analyzer stack overflow

Other fixes:

 - Fix DHCP Client ID Option misformat for Hardware Type 0

 - Fix/allow copying/cloning of opaque of Broker::Store

 - Fix ConnPolling memory over-use
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Sun, 5 Jul 2020
[ 09:44 mikael search for other commits by this committer ] Original commit   Revision:541270
security/zeek: fix packaging on aarch64

pkg-static: Unable to access file
/wrkdirs/usr/ports/security/zeek/work/stage/usr/local/lib/zeek/plugins/Bro_Netmap/lib/Bro-Netmap.freebsd-aarch64.so:No
such file or directory

Approved by:	portmgr (tier-2 blanket)
Wed, 17 Jun 2020
[ 18:17 sunpoet search for other commits by this committer ] Original commit   Revision:539491 (Only the first 10 of 84 ports in this commit are shown above. View all ports for this commit)
Move devel/swig30 to devel/swig and update to 4.0.1

- Do not silence installation message
- Update dependent ports:
  - Fix build with swig 4.0.1
  - Update *_DEPENDS
  - Remove BINARY_ALIAS

Changes:	http://www.swig.org/news.php
PR:		246613
Exp-run by:	antoine
Wed, 10 Jun 2020
[ 19:15 leres search for other commits by this committer ] Original commit   Revision:538431
security/zeek: Update to 3.0.7 and address various vulnerabilities:

    https://raw.githubusercontent.com/zeek/zeek/v3.0.7/NEWS

 - Fix potential stack overflow in NVT analyzer

 - Fix NVT analyzer memory leak from multiple telnet authn name options

 - Fix multiple content-transfer-encoding headers causing a memory leak

 - Fix potential leak of Analyzers added to tree during Analyzer::Done

 - Prevent IP fragment reassembly on packets without minimal IP header

Other fixes:
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Fri, 8 May 2020
[ 20:51 leres search for other commits by this committer ] Original commit   Revision:534434
security/zeek: Fix build with PERFTOOLS which needed BUILD_DEPENDS.

While we're here sort options related.

Reported by:	James Welcher
Wed, 6 May 2020
[ 23:37 leres search for other commits by this committer ] Original commit   Revision:534211
security/zeek: Update to 3.0.6 and address multiple vulnerabilites:

    https://raw.githubusercontent.com/zeek/zeek/v3.0.6/NEWS

 - Fix buffer over-read in Ident analyzer

 - Fix SSL scripting error leading to uninitialized field access
   and memory leak

 - Fix POP3 analyzer global buffer over-read

 - Fix potential stack overflows due to use of Variable-Length-Arrays

Other changes since 3.0.5 include:
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Wed, 15 Apr 2020
[ 00:01 leres search for other commits by this committer ] Original commit   Revision:531735
security/zeek: Update to 3.0.5

Chase latest version number that contains a simple fix not relevant
to supported versions of FreeBSD (hence no MFH).

  
https://raw.githubusercontent.com/zeek/zeek/3ad19762770c567edc3498b3c1f9f216f46970b0/NEWS

 - Same as 3.0.4 but fixes compilation on various platforms with
   older compilers, for example GCC 4.8.x.
Tue, 14 Apr 2020
[ 20:55 leres search for other commits by this committer ] Original commit   Revision:531729
security/zeek: Update to 3.0.4 and address a remote crash vulnerability:

  
https://github.com/zeek/zeek/blob/e059d4ec2e689b3c8942f4aa08b272f24ed3f612/NEWS

 - Fix stack overflow in POP3 analyzer. An attacker can crash Zeek
   remotely via crafted packet sequence.

Other fixes:

 - Fix use-after-free in Zeek lambda functions with uninitialized
   locals

 - Fix buffer overflow due to tables/records created at parse-time
   not rebuilt on record redef
(Only the first 15 lines of the commit message are shown above View all of this commit message)
[ 18:10 leres search for other commits by this committer ] Original commit   Revision:531711
security/zeek: Fix typo in the rc.d script

(From the PR) "bro_stop" should say "zeek_stop" instead.

PR:		245612
Reported by:	bugs@codejammer.se
MFH:		2020Q2
Wed, 18 Mar 2020
[ 00:34 leres search for other commits by this committer ] Original commit   Revision:528618
security/zeek: Limit portscout to even long term support release versions

    https://github.com/zeek/zeek/releases

    Zeek 3.0.x is the Long-Term Support release, receiving bug fixes
    until at least October 2020 while Zeek 3.1.x is the current
    feature release, receiving bug fixes until approximately July
    2020 when the 3.2.x release series begins.

Approved by:	matthew (mentor, implicit)
Sun, 15 Mar 2020
[ 22:44 leres search for other commits by this committer ] Original commit   Revision:528508
security/bro: Update to 3.0.3 and address a number of potential
denial of service issues:

   https://github.com/zeek/zeek/releases/tag/v3.0.2
   https://github.com/zeek/zeek/releases/tag/v3.0.3

 - Potential Denial of Service due to memory leak in DNS TSIG message
   parsing.

 - Potential Denial of Service due to memory leak (or assertion
   when compiling with assertions enabled) when receiving a second
   SSH KEX message after a first.

 - Potential Denial of Service due to buffer read overflow and/or
   memory leaks in Kerberos analyzer.  The buffer read overflow
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Wed, 11 Dec 2019
[ 21:43 leres search for other commits by this committer ] Original commit   Revision:519842
security/bro: Update to 3.0.1. As announced by Jon Siwek:

    This is a bug-fix release that most notably addresses a JSON
    logging performance regression in 3.0.0, but also fixes other
    minor bugs. A list which details the changes can be found here:

    https://github.com/zeek/zeek/releases/tag/v3.0.1

Approved by:	ler (mentor, implicit)
Sun, 17 Nov 2019
[ 01:03 leres search for other commits by this committer ] Original commit   Revision:517788
security/zeek: This adds security/zeek, the new version of security/bro.
This is being done as svn copy instead of rename so that users of
security/bro can have some time to migrate. It also allows for
possible security updates to the old bro port which upstream has
indicated is possible for at least a few months.

Reviewed by:	ler (mentor)
Approved by:	ler (mentor)
Differential Revision:	https://reviews.freebsd.org/D22376

Number of commits found: 57