Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 21 Apr 2021 21:18:47 GMT
From:      Craig Leres <leres@FreeBSD.org>
To:        ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org
Subject:   git: 274b20e4c81e - main - security/zeek: Update to 4.0.1 to fix null-pointer dereference and potential DOS
Message-ID:  <202104212118.13LLIlRe082759@gitrepo.freebsd.org>

next in thread | raw e-mail | index | archive | help
The branch main has been updated by leres:

URL: https://cgit.FreeBSD.org/ports/commit/?id=274b20e4c81e57d232a19ad490684374227862c7

commit 274b20e4c81e57d232a19ad490684374227862c7
Author:     Craig Leres <leres@FreeBSD.org>
AuthorDate: 2021-04-21 21:11:05 +0000
Commit:     Craig Leres <leres@FreeBSD.org>
CommitDate: 2021-04-21 21:11:05 +0000

    security/zeek: Update to 4.0.1 to fix null-pointer dereference and potential DOS
    
        https://github.com/zeek/zeek/releases/tag/v4.0.1
    
    This release fixes the following vulnerability:
    
     - Fix null-pointer dereference when encountering an invalid enum
       name in a config/input file that tries to read it into a set[enum].
       For those that have such an input feed whose contents may come
       from external/remote sources, this is a potential DoS vulnerability.
    
    Other fixes:
    
     - Fix mime type detection bug in IRC/FTP file_transferred event
       for file data containing null-bytes
    
     - Fix potential for missing timestamps in SMB logs
    
     - Remove use of LeakSanitizer API on FreeBSD where it's unsupported
    
     - Fix incorrect parsing of ERSPAN Type I
    
     - Fix incorrect/overflowed n value for SSL_Heartbeat_Many_Requests
       notices where number of server heartbeats is greater than number
       of client heartbeats.
    
     - Fix missing user_agent existence check in smtp/software.zeek
       (causes reporter.log error noise, but no functional difference)
    
     - Fix include order of bundled headers to avoid conflicts with
       pre-existing/system-wide installs
    
     - Fix musl build (e.g. Void, Alpine, etc.)
    
     - Fix build with -DENABLE_MOBILE_IPV6 / ./configure --enable-mobile-ipv6
    
     - Add check for null packet data in pcap IOSource, which is an
       observed state in Myricom libpcap that crashes Zeek via null-pointer
       dereference
    
     - Allow CRLF line-endings in Zeek scripts and signature files
    
     - Fix armv7 build
    
     - Fix unserialization of set[function], generally now used by
       connection record removal hooks, and specifically breaking
       intel.log of Zeek clusters
    
     - Fix indexing of set/table types with a vector
    
     - Fix precision loss in ASCII logging/printing of large double,
       time, or interval values
    
     - Improve handling of invalid SIP data before requests
    
     - Fix copy()/cloning vectors that have holes (indices w/ null
       values)
    
    Reported by:    Jon Siwek
---
 security/zeek/Makefile                                        |  2 +-
 security/zeek/distinfo                                        |  6 +++---
 .../patch-auxil_highwayhash_highwayhash_arch__specific.cc     | 11 -----------
 security/zeek/files/patch-src_CMakeLists.txt                  | 10 ----------
 4 files changed, 4 insertions(+), 25 deletions(-)

diff --git a/security/zeek/Makefile b/security/zeek/Makefile
index 53c8a38718c8..a77ecf53c0b5 100644
--- a/security/zeek/Makefile
+++ b/security/zeek/Makefile
@@ -1,7 +1,7 @@
 # Created by: David O'Brien <obrien@FreeBSD.org>
 
 PORTNAME=	zeek
-PORTVERSION=	4.0.0
+PORTVERSION=	4.0.1
 CATEGORIES=	security
 MASTER_SITES=	https://old.zeek.org/downloads/
 DISTFILES=	${DISTNAME}${EXTRACT_SUFX}
diff --git a/security/zeek/distinfo b/security/zeek/distinfo
index fca030af5023..791c7d2127f7 100644
--- a/security/zeek/distinfo
+++ b/security/zeek/distinfo
@@ -1,5 +1,5 @@
-TIMESTAMP = 1615852305
-SHA256 (zeek-4.0.0.tar.gz) = f2eedab3262eaa3f58a83442b1f38bad35ed72399564917b71bba42266f1ff54
-SIZE (zeek-4.0.0.tar.gz) = 29441929
+TIMESTAMP = 1619038578
+SHA256 (zeek-4.0.1.tar.gz) = 659a890f433cb730519966bdc41f1a03fb67e27e94b5d52ad9ee890022a12c3a
+SIZE (zeek-4.0.1.tar.gz) = 29450307
 SHA256 (zeek-zeek-netmap-v2.0.0_GH0.tar.gz) = d37a69babfbb62a51a2413d6b83ae792ce1e7f1ccb1d51bd6b209a10fe5c4d75
 SIZE (zeek-zeek-netmap-v2.0.0_GH0.tar.gz) = 9100
diff --git a/security/zeek/files/patch-auxil_highwayhash_highwayhash_arch__specific.cc b/security/zeek/files/patch-auxil_highwayhash_highwayhash_arch__specific.cc
deleted file mode 100644
index eda7565aad24..000000000000
--- a/security/zeek/files/patch-auxil_highwayhash_highwayhash_arch__specific.cc
+++ /dev/null
@@ -1,11 +0,0 @@
---- auxil/highwayhash/highwayhash/arch_specific.cc.orig	2021-03-23 17:45:40 UTC
-+++ auxil/highwayhash/highwayhash/arch_specific.cc
-@@ -150,7 +150,7 @@ double DetectNominalClockRate() {
-   }
-  #elif __FreeBSD__
-   size_t length = sizeof(freq);
--  sysctlbyname("dev.cpu.0.freq"), &freq, &length, NULL, 0);
-+  sysctlbyname("dev.cpu.0.freq", &freq, &length, NULL, 0);
-   freq *= 1E6;
-   return freq;
- #endif
diff --git a/security/zeek/files/patch-src_CMakeLists.txt b/security/zeek/files/patch-src_CMakeLists.txt
deleted file mode 100644
index de12b5954a97..000000000000
--- a/security/zeek/files/patch-src_CMakeLists.txt
+++ /dev/null
@@ -1,10 +0,0 @@
---- src/CMakeLists.txt.orig	2021-04-09 11:46:37 UTC
-+++ src/CMakeLists.txt
-@@ -344,6 +344,7 @@ set(HH_SRCS
- )
- 
- if (${COMPILER_ARCHITECTURE} STREQUAL "arm")
-+  list(APPEND HH_SRCS ../auxil/highwayhash/highwayhash/hh_neon.cc)
-   set_source_files_properties(${HH_SRCS} PROPERTIES COMPILE_FLAGS
-                               -mfloat-abi=hard -march=armv7-a -mfpu=neon)
- elseif (${COMPILER_ARCHITECTURE} STREQUAL "aarch64")



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202104212118.13LLIlRe082759>