1
0
mirror of https://git.FreeBSD.org/ports.git synced 2024-10-19 19:59:43 +00:00
freebsd-ports/security/bro/distinfo
Craig Leres 3cd67449f8 security/bro: Update to 2.6.3 and address potential denial of service
vulnerabilities:

    https://raw.githubusercontent.com/zeek/zeek/1d874e5548a58b3b8fd2a342fe4aa0944e779809/NEWS

 - Null pointer dereference in the RPC analysis code. RPC analyzers
   (e.g. MOUNT or NFS) are not enabled in the default configuration.

 - Signed integer overflow in BinPAC-generated parser code.  The
   result of this is Undefined Behavior with respect to the array
   bounds checking conditions that BinPAC generates, so it's
   unpredictable what an optimizing compiler may actually do under
   the assumption that signed integer overlows should never happen.
   The specific symptom which lead to finding this issue was with
   the PE analyzer causing out-of-memory crashes due to large
   allocations that were otherwise prevented when the array bounds
   checking logic was changed to prevent any possible signed integer
   overlow.

Approved by:	matthew (mentor, implicit)
MFH:		2019Q3
Security:	f56669f5-d799-4ff5-9174-64a6d571c451
2019-08-09 16:59:52 +00:00

6 lines
376 B
Plaintext

TIMESTAMP = 1565320389
SHA256 (bro-2.6.3.tar.gz) = 469dd7456af388ba65d8722fbfdd5b9182f14def16149aa5ebceb1cfd881697f
SIZE (bro-2.6.3.tar.gz) = 28480249
SHA256 (bro-bro-netmap-cf88debf487b31ab30dc3b5bac64783b4e49997e_GH0.tar.gz) = 383423f92932c3ef244194954708b3a237b4f37ebc358014f51dcb3b9786896b
SIZE (bro-bro-netmap-cf88debf487b31ab30dc3b5bac64783b4e49997e_GH0.tar.gz) = 24630