freebsd-ports/security/zeek/distinfo
Craig Leres d284e4a152 security/zeek: Update to 3.0.6 and address multiple vulnerabilites:
https://raw.githubusercontent.com/zeek/zeek/v3.0.6/NEWS

 - Fix buffer over-read in Ident analyzer

 - Fix SSL scripting error leading to uninitialized field access
   and memory leak

 - Fix POP3 analyzer global buffer over-read

 - Fix potential stack overflows due to use of Variable-Length-Arrays

Other changes since 3.0.5 include:

 - Fix unusable `subscriber.poll()` method in Broker Python bindings

 - Fix uninitialized field access in `ssl/log-hostcerts-only.zeek`

 - Fix missing default function for Kerberos constant-lookup-tables

 - Fix cloning of `TypeType` values

 - Remove misleading error message on empty bloomfilter lookup

 - Fix `misc/stats.zeek` skipping log entry on termination

MFH:		2020Q2
2020-05-06 23:37:35 +00:00

5 lines
312 B
Text

TIMESTAMP = 1588807625
SHA256 (zeek-3.0.6.tar.gz) = 57cd56c21a1c55dbe3e65f704835496fd8ba6f7b1e3166dac9d8b5579cb78ad1
SIZE (zeek-3.0.6.tar.gz) = 29331321
SHA256 (bro-bro-netmap-f3620df_GH0.tar.gz) = e51f420781c9a01b0494f93d82f94a1b045725c1cff406c33887974a9940c655
SIZE (bro-bro-netmap-f3620df_GH0.tar.gz) = 24661