| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
| |
2020-06-01 security/bro: Please migrate to security/zeek
Notes:
svn path=/head/; revision=537563
|
|
|
|
|
|
|
|
|
| |
to the new security/zeek port. Add CONFLICTS=zeek due to overlap.
Approved by: matthew (mentor, implicit)
Notes:
svn path=/head/; revision=517789
|
|
|
|
|
|
|
|
|
|
|
|
| |
Broccoli is deprecated in favor of broker; flag this in the BROCCOLI
option description and change the BROCTL option to imply BROKER.
PR: 240909
Submitted by: Jeremy Baggs
Approved by: ler (mentor, implicit)
Notes:
svn path=/head/; revision=514568
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Service vulnerability:
https://raw.githubusercontent.com/zeek/zeek/3b5a9f88ece1d274edee897837e280ef751bde94/NEWS
- The NTLM analyzer did not properly handle AV Pair sequences that
were either empty or unterminated, resulting in invalid memory
access or heap buffer over-read. The NTLM analyzer is enabled
by default and used in the analysis of SMB, DCE/RPC, and GSSAPI
protocols.
Approved by: ler (mentor, implicit)
MFH: 2019Q3
Security: 55571619-454e-4769-b1e5-28354659e152
Notes:
svn path=/head/; revision=512245
|
|
|
|
| |
Notes:
svn path=/head/; revision=508909
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
vulnerabilities:
https://raw.githubusercontent.com/zeek/zeek/1d874e5548a58b3b8fd2a342fe4aa0944e779809/NEWS
- Null pointer dereference in the RPC analysis code. RPC analyzers
(e.g. MOUNT or NFS) are not enabled in the default configuration.
- Signed integer overflow in BinPAC-generated parser code. The
result of this is Undefined Behavior with respect to the array
bounds checking conditions that BinPAC generates, so it's
unpredictable what an optimizing compiler may actually do under
the assumption that signed integer overlows should never happen.
The specific symptom which lead to finding this issue was with
the PE analyzer causing out-of-memory crashes due to large
allocations that were otherwise prevented when the array bounds
checking logic was changed to prevent any possible signed integer
overlow.
Approved by: matthew (mentor, implicit)
MFH: 2019Q3
Security: f56669f5-d799-4ff5-9174-64a6d571c451
Notes:
svn path=/head/; revision=508458
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
as defined in Mk/bsd.default-versions.mk which has moved from GCC 8.3
to GCC 9.1 under most circumstances now after revision 507371.
This includes ports
- with USE_GCC=yes or USE_GCC=any,
- with USES=fortran,
- using Mk/bsd.octave.mk which in turn features USES=fortran, and
- with USES=compiler specifying openmp, nestedfct, c11, c++0x, c++11-lang,
c++11-lib, c++14-lang, c++17-lang, or gcc-c++11-lib
plus, everything INDEX-11 shows with a dependency on lang/gcc9 now.
PR: 238330
Notes:
svn path=/head/; revision=507372
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
vulnerabilities:
https://raw.githubusercontent.com/zeek/zeek/bb979702cf9a2fa67b8d1a1c7f88d0b56c6af104/NEWS
- Integer type mismatches in BinPAC-generated parser code and Bro
analyzer code may allow for crafted packet data to cause
unintentional code paths in the analysis logic to be taken due
to unsafe integer conversions causing the parser and analysis
logic to each expect different fields to have been parsed. One
such example, reported by Maksim Shudrak, causes the Kerberos
analyzer to dereference a null pointer. CVE-2019-12175 was
assigned for this issue.
- The Kerberos parser allows for several fields to be left
uninitialized, but they were not marked with an &optional attribute
and several usages lacked existence checks. Crafted packet data
could potentially cause an attempt to access such uninitialized
fields, generate a runtime error/exception, and leak memory.
Existence checks and &optional attributes have been added to the
relevent Kerberos fields.
- BinPAC-generated protocol parsers commonly contain fields whose
length is derived from other packet input, and for those that
allow for incremental parsing, BinPAC did not impose a limit on
how large such a field could grow, allowing for remotely-controlled
packet data to cause growth of BinPAC's flowbuffer bounded only
by the numeric limit of an unsigned 64-bit integer, leading to
memory exhaustion. There is now a generalized limit for how
large flowbuffers are allowed to grow, tunable by setting
"BinPAC::flowbuffer_capacity_max".
Approved by: ler (mentor, implicit)
MFH: 2019Q2
Security: 177fa455-48fc-4ded-ba1b-9975caa7f62a
Notes:
svn path=/head/; revision=503191
|
|
|
|
|
|
|
|
|
|
|
| |
which defaults to enabled, mimicking pre-geoip-deprecation.
PR: 235138
Submitted by: bofh
Approved by: ler (mentor, implicit)
Notes:
svn path=/head/; revision=491993
|
|
|
|
|
|
|
|
|
| |
remove GeoIP dependency and undeprecate.
Approved by: ler (mentor, implicit)
Notes:
svn path=/head/; revision=490306
|
|
|
|
|
|
|
| |
on those ports.
Notes:
svn path=/head/; revision=490213
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Ports that build out of source now simply can use "USES=cmake"
instead of "USES=cmake:outsource". Ports that fail to build
out of source now need to specify "USES=cmake:insource".
I tried to only set insource where explictely needed.
PR: 232038
Exp-run by: antoine
Notes:
svn path=/head/; revision=488341
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
- Update the embedded SQLite library from 3.18.0 to 3.26.0 to
address a remote code execution vulnerability ("Magellan").
- Uses a bundled version of the actor-framework (caf) library so
we can remove the port-local build for caf.
Replace broctl-config.sh absolute symlink with a relative one.
Approved by: ler (mentor, implicit)
MFH: 2018Q4
Security: b80f039d-579e-4b82-95ad-b534a709f220
Notes:
svn path=/head/; revision=487823
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
defined via Mk/bsd.default-versions.mk which has moved from GCC 7.4 t
GCC 8.2 under most circumstances.
This includes ports
- with USE_GCC=yes or USE_GCC=any,
- with USES=fortran,
- using Mk/bsd.octave.mk which in turn features USES=fortran, and
- with USES=compiler specifying openmp, nestedfct, c11, c++0x, c++11-lang,
c++11-lib, c++14-lang, c++17-lang, or gcc-c++11-lib
plus, as a double check, everything INDEX-11 showed depending on lang/gcc7.
PR: 231590
Notes:
svn path=/head/; revision=487272
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
in the base. Unbreak build by statically linking against
security/openssl. This is a stopgap until Bro 2.6 which supports
openssl 1.1 is released. It is currently in beta and due in a
few weeks.
Add missing NETMAP_DESC while we're here.
Reviewed by: ler (mentor)
Approved by: ler (mentor)
Differential Revision: https://reviews.freebsd.org/D17602
Notes:
svn path=/head/; revision=482313
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
- Fix array bounds checking in BinPAC: for arrays that are
fields within a record, the bounds check was based on a pointer
to the start of the record rather than the start of the array
field, potentially resulting in a buffer over-read.
- Fix SMTP command string comparisons: the number of bytes
compared was based on the user-supplied string length and can
lead to incorrect matches. e.g. giving a command of "X"
incorrectly matched "X-ANONYMOUSTLS" (and an empty commands
match anything).
- Weird" events are now generally suppressed/sampled by default
according to some tunable parameters.
- Improved handling of empty lines in several text protocol
analyzers that can cause performance issues when seen in long
sequences.
- Add `smtp_excessive_pending_cmds' weird which serves as a
notification for when the "pending command" queue has reached
an upper limit and been cleared to prevent one from attempting
to slowly exhaust memory.
Approved by: ler (mentor, implicit)
MFH: 2018Q3
Security: d0be41fe-2a20-4633-b057-4e8b25c41780
Notes:
svn path=/head/; revision=478427
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
in the ports tree (via Mk/bsd.default-versions.mk and lang/gcc) which
has now moved from GCC 6 to GCC 7 by default.
This includes ports
- featuring USE_GCC=yes or USE_GCC=any,
- featuring USES=fortran,
- using Mk/bsd.octave.mk which in turn features USES=fortran, and those
- with USES=compiler specifying one of openmp, nestedfct, c11, c++0x,
c++11-lib, c++11-lang, c++14-lang, c++17-lang, or gcc-c++11-lib.
PR: 222542
Notes:
svn path=/head/; revision=475857
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
- Multiple fixes and improvements to BinPAC generated code
related to array parsing, with potential impact to all Bro's
BinPAC-generated analyzers in the form of buffer over-reads
or other invalid memory accesses depending on whether a
particular analyzer incorrectly assumed that the
evaulated-array-length expression is actually the number of
elements that were parsed out from the input.
- The NCP analyzer (not enabled by default and also updated
to actually work with newer Bro APIs in the release) performed
a memory allocation based directly on a field in the input
packet and using signed integer storage. This could result
in a signed integer overflow and memory allocations of
negative or very large size, leading to a crash or memory
exhaustion. The new NCP::max_frame_size tuning option now
limits the maximum amount of memory that can be allocated.
Other fixes:
- A memory leak in the SMBv1 analyzer.
- The MySQL analyzer was generally not working as intended,
for example, it now is able to parse responses that contain
multiple results/rows.
Add gettext-runtime to USES to address a poudriere testport
warning.
Reviewed by: matthew (mentor)
Approved by: matthew (mentor)
MFH: 2018Q2
Security: 2f4fd3aa-32f8-4116-92f2-68f05398348e
Differential Revision: https://reviews.freebsd.org/D15678
Notes:
svn path=/head/; revision=472014
|
|
|
|
|
|
|
| |
Sponsored by: Absolight
Notes:
svn path=/head/; revision=470610
|
|
|
|
| |
Notes:
svn path=/head/; revision=465145
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
to bin/perftools-pprof; update RUN_DEPENDS for security/bro
accordingly.
Reported by: James Welcher
Reviewed by: ler (mentor)
Approved by: ler (mentor)
Differential Revision: https://reviews.freebsd.org/D14708
Notes:
svn path=/head/; revision=464711
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
http://blog.bro.org/2018/02/bro-253-released-security-update.html
Note that a CVE has not been assigned yet.
Reviewed by: matthew (mentor)
Approved by: matthew (mentor)
MFH: 2018Q1
Differential Revision: https://reviews.freebsd.org/D14444
Notes:
svn path=/head/; revision=462460
|
|
|
|
|
|
|
|
|
|
|
| |
PR: 224918
Reported by: Shane Peters
Reviewed by: matthew (mentor)
Approved by: matthew (mentor)
Differential Revision: https://reviews.freebsd.org/D14378
Notes:
svn path=/head/; revision=462351
|
|
|
|
|
|
|
| |
Sponsored by: Absolight
Notes:
svn path=/head/; revision=461924
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
- Patch OOB write in content-line analyzer:
https://bro-tracker.atlassian.net/browse/BIT-1856
A combination of packets can trigger an out of bound write of
'0' byte in the content-line analyzer.
Reviewed by: ler (mentor)
Approved by: ler (mentor)
Differential Revision: https://reviews.freebsd.org/D12754
Notes:
svn path=/head/; revision=452618
|
|
|
|
|
|
|
| |
Approved by: portmgr blanket
Notes:
svn path=/head/; revision=450189
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
to use my @FreeBSD.org email address.
- devel/arduino
- devel/arduino-glcd
- devel/arduino-irremote
- devel/arduino-mk
- devel/arduino-sevseg
- net/hostapd
- net/py-pcap
- security/bro
- security/broccoli
- security/create-cert
- sysutils/lbl-cf
- sysutils/lbl-hf
- www/mini_httpd
Reviewed by: ler (mentor)
Approved by: ler (mentor)
Differential Revision: https://reviews.freebsd.org/D12374
Notes:
svn path=/head/; revision=449916
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
(via Mk/bsd.default-versions.mk and lang/gcc) which has moved from
GCC 5.4 to GCC 6.4 under most circumstances.
This includes ports
- with USE_GCC=yes or USE_GCC=any,
- with USES=fortran,
- using Mk/bsd.octave.mk which in turn features USES=fortran, and
- with USES=compiler specifying openmp, nestedfct, c++11-lib, c++11-lang,
c++14-lang, c++0x, c11, or gcc-c++11-lib.
PR: 219275
Notes:
svn path=/head/; revision=449591
|
|
|
|
|
|
|
|
|
|
| |
Also, unbreak build with BROKER, add rc.d script
PR: 217656
Submitted by: leres@ee.lbl.gov (maintainer)
Notes:
svn path=/head/; revision=448446
|
|
|
|
|
|
|
| |
Approved by: rakuco (mentor, implicit)
Notes:
svn path=/head/; revision=441056
|
|
|
|
|
|
|
|
|
| |
While here, pet portlint.
Approved by: portmgr (tier-2 blanket)
Notes:
svn path=/head/; revision=439789
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
lang/gcc which have moved from GCC 4.9.4 to GCC 5.4 (at least under some
circumstances such as versions of FreeBSD or platforms).
This includes ports
- with USE_GCC=yes or USE_GCC=any,
- with USES=fortran,
- using using Mk/bsd.octave.mk which in turn has USES=fortran, and
- with USES=compiler specifying openmp, nestedfct, c++11-lib, c++14-lang,
c++11-lang, c++0x, c11, or gcc-c++11-lib.
PR: 216707
Notes:
svn path=/head/; revision=437439
|
|
|
|
|
|
|
| |
Approved by: portmgr blanket
Notes:
svn path=/head/; revision=431169
|
|
|
|
|
|
|
|
| |
option description. Those ports where it meant something more specific were
left untouched.
Notes:
svn path=/head/; revision=424875
|
|
|
|
|
|
|
|
|
|
|
| |
The "build with Ports SSL" option is no longer valid. The SSL library is
selected through the SSL_DEFAULT value. While removing the PORTS_SSL
option, modernize the entire set of options under the general
infrastructure blanket. The SSL work, including the support for LibreSSL
was done under the SSL blanket.
Notes:
svn path=/head/; revision=421972
|
|
|
|
|
|
|
| |
Sponsored by: Absolight
Notes:
svn path=/head/; revision=418011
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
WITH_OPENSSL_* can't be set after bsd.port.pre.mk.
Fold all other usage into using SSL_DEFAULT == foo
PR: 210149
Submitted by: mat
Exp-run by: antoine
Sponsored by: The FreeBSD Foundation, Absolight
Differential Revision: https://reviews.freebsd.org/D6577
Notes:
svn path=/head/; revision=416966
|
|
|
|
| |
Notes:
svn path=/head/; revision=413746
|
|
|
|
|
|
|
|
| |
With hat: portmgr
Sponsored by: Absolight
Notes:
svn path=/head/; revision=412349
|
|
|
|
|
|
|
|
|
| |
- Remove always false condition
Approved by: portmgr blanket
Notes:
svn path=/head/; revision=404057
|
|
|
|
|
|
|
|
| |
PR: 203849
Submitted by: leres@ee.lbl.gov (maintainer)
Notes:
svn path=/head/; revision=400050
|
|
|
|
|
|
|
|
| |
PR: 198018
Submitted by: Craig Leres <leres@ee.lbl.gov>
Notes:
svn path=/head/; revision=380437
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This updates bro and broccoli from 2.3 and 2.3.2, which is a security
update.
Changes to the bro port:
- Rework openssl option logic
- Remove obsolete
- pkgng related changes
Changes to the broccoli port:
- Remove unused DOCS option
- Enable PYTHON by default
- pkgng related changes
- Minor portlint changes
Changes in 2.3.2:
- DNP3: fix reachable assertion and buffer over-read/overflow.
CVE number pending. (Travis Emmert, Jon Siwek)
- Update binpac: Fix potential out-of-bounds memory reads in
generated code. CVE-2014-9586. (John Villamil and Chris Rohlf
- Yahoo Paranoids, Jon Siwek)
- BIT-1234: Fix build on systems that already have ntohll/htonll.
(Jon Siwek)
- BIT-1291: Delete prebuilt python bytecode files from git. (Jon Siwek)
- Adding call to new binpac::init() function. (Robin Sommer)
Changes in 2.3.1:
- Fix a reference counting bug in ListVal ctor. (Jon Siwek)
- Fix possible buffer over-read in DNS TSIG parsing. (Jon Siwek)
- Change EDNS parsing code to use rdlength more cautiously. (Jon Siwek)
- Fix null pointer dereference in OCSP verification code in
case no certificate is sent as part as the ocsp reply. Addresses
BIT-1212. (Johanna Amann)
- Fix OCSP reply validation. Addresses BIT-1212 (Johanna Amann)
- Make links in documentation templates protocol relative. (Johanna Amann)
PR: 197107
Submitted by: Craig Leres <leres@ee.lbl.gov> (maintainer)
Reviewed by: koobs
Notes:
svn path=/head/; revision=378333
|
|
|
|
|
|
|
| |
Submitted by: maintainer (private mail)
Notes:
svn path=/head/; revision=367093
|
|
|
|
|
|
|
|
|
|
|
| |
Merge back bsd.pkgng.mk into bsd.port.mk
Add a note about @stopdaemon not being supported anymore
With hat: portmgr
Differential Revision: https://reviews.freebsd.org/D693
Notes:
svn path=/head/; revision=366875
|
|
|
|
|
|
|
|
| |
PR: 192646
Submitted by: maintainer (Craig Leres)
Notes:
svn path=/head/; revision=364876
|
|
|
|
|
|
|
|
|
| |
r364627.
Approved by: portmgr (not really, but touches unstaged ports)
Notes:
svn path=/head/; revision=364628
|
|
|
|
|
|
|
|
| |
PR: 192105
Submitted by: leres@ee.lbl.gov (maintainer)
Notes:
svn path=/head/; revision=364576
|
|
|
|
|
|
|
|
|
|
|
|
| |
- Convert to new-new OPTIONS framework.
- Use new *_DEPENDS formats.
- Fix LICENSE.
PR: ports/185455
Submitted by: Craig Leres <leres@ee.lbl.gov> (maintainer)
Notes:
svn path=/head/; revision=338927
|
|
|
|
|
|
|
| |
Submitted by: Craig Leres (maintainer)
Notes:
svn path=/head/; revision=335521
|