notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
All times are UTC
Ukraine
We just patched an SQL injection. There is no evidence it was exploited. That doesn’t mean it wasn’t. Please change your password. You might want to hold off on that change. We have a few more to fix.
non port: security/bro/distinfo
SVNWeb

Number of commits found: 25

Tue, 17 Sep 2019
[ 23:13 leres search for other commits by this committer ] Original commit   Revision:512245
security/bro: Update to 2.6.4 and address a potential Denial of
Service vulnerability:

  
https://raw.githubusercontent.com/zeek/zeek/3b5a9f88ece1d274edee897837e280ef751bde94/NEWS

 - The NTLM analyzer did not properly handle AV Pair sequences that
   were either empty or unterminated, resulting in invalid memory
   access or heap buffer over-read.  The NTLM analyzer is enabled
   by default and used in the analysis of SMB, DCE/RPC, and GSSAPI
   protocols.

Approved by:	ler (mentor, implicit)
MFH:		2019Q3
Security:	55571619-454e-4769-b1e5-28354659e152
Fri, 9 Aug 2019
[ 16:59 leres search for other commits by this committer ] Original commit   Revision:508458
security/bro: Update to 2.6.3 and address potential denial of service
vulnerabilities:

   
https://raw.githubusercontent.com/zeek/zeek/1d874e5548a58b3b8fd2a342fe4aa0944e779809/NEWS

 - Null pointer dereference in the RPC analysis code. RPC analyzers
   (e.g. MOUNT or NFS) are not enabled in the default configuration.

 - Signed integer overflow in BinPAC-generated parser code.  The
   result of this is Undefined Behavior with respect to the array
   bounds checking conditions that BinPAC generates, so it's
   unpredictable what an optimizing compiler may actually do under
   the assumption that signed integer overlows should never happen.
   The specific symptom which lead to finding this issue was with
   the PE analyzer causing out-of-memory crashes due to large
   allocations that were otherwise prevented when the array bounds
   checking logic was changed to prevent any possible signed integer
   overlow.

Approved by:	matthew (mentor, implicit)
MFH:		2019Q3
Security:	f56669f5-d799-4ff5-9174-64a6d571c451
Fri, 31 May 2019
[ 19:23 leres search for other commits by this committer ] Original commit   Revision:503191
security/bro: Update to 2.6.2 and address several denial of service
vulnerabilities:

  
https://raw.githubusercontent.com/zeek/zeek/bb979702cf9a2fa67b8d1a1c7f88d0b56c6af104/NEWS

 - Integer type mismatches in BinPAC-generated parser code and Bro
   analyzer code may allow for crafted packet data to cause
   unintentional code paths in the analysis logic to be taken due
   to unsafe integer conversions causing the parser and analysis
   logic to each expect different fields to have been parsed.  One
   such example, reported by Maksim Shudrak, causes the Kerberos
   analyzer to dereference a null pointer.  CVE-2019-12175 was
   assigned for this issue.

 - The Kerberos parser allows for several fields to be left
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Thu, 20 Dec 2018
[ 01:25 leres search for other commits by this committer ] Original commit   Revision:487823
Update to 2.6.1:

 - Update the embedded SQLite library from 3.18.0 to 3.26.0 to
   address a remote code execution vulnerability ("Magellan").

 - Uses a bundled version of the actor-framework (caf) library so
   we can remove the port-local build for caf.

Replace broctl-config.sh absolute symlink with a relative one.

Approved by:	ler (mentor, implicit)
MFH:		2018Q4
Security:	b80f039d-579e-4b82-95ad-b534a709f220
Thu, 30 Aug 2018
[ 00:13 leres search for other commits by this committer ] Original commit   Revision:478427
Update to 2.5.5 which addresses security issues:

    - Fix array bounds checking in BinPAC: for arrays that are
      fields within a record, the bounds check was based on a pointer
      to the start of the record rather than the start of the array
      field, potentially resulting in a buffer over-read.

    - Fix SMTP command string comparisons: the number of bytes
      compared was based on the user-supplied string length and can
      lead to incorrect matches. e.g. giving a command of "X"
      incorrectly matched "X-ANONYMOUSTLS" (and an empty commands
      match anything).

    - Weird" events are now generally suppressed/sampled by default
      according to some tunable parameters.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Fri, 8 Jun 2018
[ 16:40 leres search for other commits by this committer ] Original commit   Revision:472014
Update to 2.5.4 which fixes multiple memory allocation issues:

 - Multiple fixes and improvements to BinPAC generated code
   related to array parsing, with potential impact to all Bro's
   BinPAC-generated analyzers in the form of buffer over-reads
   or other invalid memory accesses depending on whether a
   particular analyzer incorrectly assumed that the
   evaulated-array-length expression is actually the number of
   elements that were parsed out from the input.

 - The NCP analyzer (not enabled by default and also updated
   to actually work with newer Bro APIs in the release) performed
   a memory allocation based directly on a field in the input
   packet and using signed integer storage. This could result
   in a signed integer overflow and memory allocations of
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Tue, 20 Feb 2018
[ 22:29 leres search for other commits by this committer ] Original commit   Revision:462460
Update to 2.5.3 which fixes an integer overflow:

    http://blog.bro.org/2018/02/bro-253-released-security-update.html

Note that a CVE has not been assigned yet.

Reviewed by:	matthew (mentor)
Approved by:	matthew (mentor)
MFH:		2018Q1
Differential Revision:	https://reviews.freebsd.org/D14444
Mon, 19 Feb 2018
[ 22:04 leres search for other commits by this committer ] Original commit   Revision:462351
Add a NETMAP option to build and install the bro netmap plugin.

PR: 224918
Reported by: Shane Peters
Reviewed by: matthew (mentor)
Approved by: matthew (mentor)
Differential Revision: https://reviews.freebsd.org/D14378
Sun, 22 Oct 2017
[ 00:00 leres search for other commits by this committer ] Original commit   Revision:452618
Update to 2.5.2. Changes since 2.5.1:

 - Patch OOB write in content-line analyzer:

     https://bro-tracker.atlassian.net/browse/BIT-1856

     A combination of packets can trigger an out of bound write of
     '0' byte in the content-line analyzer.

Reviewed by:	ler (mentor)
Approved by:	ler (mentor)
Differential Revision:	https://reviews.freebsd.org/D12754
Mon, 21 Aug 2017
[ 02:12 swills search for other commits by this committer ] Original commit   Revision:448446 (Only the first 10 of 25 ports in this commit are shown above. View all ports for this commit)
security/bro: Update to 2.5.1

Also, unbreak build with BROKER, add rc.d script

PR:		217656
Submitted by:	leres@ee.lbl.gov (maintainer)
Fri, 23 Oct 2015
[ 19:04 riggs search for other commits by this committer ] Original commit   Revision:400050 (Only the first 10 of 20 ports in this commit are shown above. View all ports for this commit)
Update to upstream version 2.4.1, add BROKER OPTION

PR:		203849
Submitted by:	leres@ee.lbl.gov (maintainer)
Mon, 2 Feb 2015
[ 22:25 pi search for other commits by this committer ] Original commit   Revision:378333
security/bro, security/broccoli: 2.3 -> 2.3.2

This updates bro and broccoli from 2.3 and 2.3.2, which is a security
update.

Changes to the bro port:
- Rework openssl option logic
- Remove obsolete
- pkgng related changes

Changes to the broccoli port:
- Remove unused DOCS option
- Enable PYTHON by default
- pkgng related changes
- Minor portlint changes
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Sun, 10 Aug 2014
[ 21:51 cs search for other commits by this committer ] Original commit   Revision:364576 (Only the first 10 of 13 ports in this commit are shown above. View all ports for this commit)
Update to 2.3

PR:		192105
Submitted by:	leres@ee.lbl.gov (maintainer)
Fri, 22 Nov 2013
[ 15:02 jadawin search for other commits by this committer ] Original commit   Revision:334597
- Update to 2.2
- Support STAGE
- Update MASTER_SITES
- Add LICENSE

PR:		ports/183940
Submitted by:	maintainer
Mon, 3 Dec 2012
[ 05:20 kevlo search for other commits by this committer ] Original commit   Revision:308122
Update to 2.1.

Feature safe:	yes

PR:	ports/174016
Submitted by:	Paul Schmehl <pauls at utdallas dot edu>
Wed, 12 Sep 2012
[ 08:09 kevlo search for other commits by this committer ] Original commit   Revision:304137
Update to 2.0; with some help from rm@

PR:	ports/169690
Submitted by:	Paul Dokas <paul at dokas dot name>
Sat, 11 Feb 2012
[ 22:27 pgollucci search for other commits by this committer ] Original commit 
- Update to 1.5.3
- Mark MAKE_JOBS_UNSAFE
- Remove < 7.0

PR:             ports/160897
Submitted by:   Dikshie <dikshie@sfc.wide.ad.jp>
Approved by:    maintainer timeout (kevlo ; 141 days)
Sun, 3 Jul 2011
[ 14:03 ohauer search for other commits by this committer ] Original commit  (Only the first 10 of 576 ports in this commit are shown above. View all ports for this commit)
-remove MD5
Fri, 15 Oct 2010
[ 06:42 kevlo search for other commits by this committer ] Original commit 
Update to 1.5.1

PR:     ports/150987
Submitted by:   dikshie <dikshie at sfc dot wide dot ad dot jp>
Thu, 18 Dec 2008
[ 06:43 kevlo search for other commits by this committer ] Original commit  (Only the first 10 of 20 ports in this commit are shown above. View all ports for this commit)
- Update to 1.4
- Take maintainership

PR: ports/129715
Submitted by: kevlo
Mon, 10 Sep 2007
[ 13:28 edwin search for other commits by this committer ] Original commit  (Only the first 10 of 27 ports in this commit are shown above. View all ports for this commit)
security/bro, port upgrade to version 1.2.1, take over maintainership

        This is an upgrade of the security/bro port to the current
        stable version.  The port is very complex, so it needs to
        be tested carefully to make sure that I'm not screwing
        anything up or using wrong conventions. Also, I'm willing
        to take over maintainership of the port if it's accepted
        into the tree.

        Please note, there are several files that need to be removed
        from the port and quite a few that need to be added. All
        these files are in FILESDIR.  I have provided blank patches
        for the files that need to be removed, so the patches will
        create blank files.

Added IS_INTERACTIVE to the port
Left original freebsd header comments in it.
Next time please use one big patch-file instead of lots of little ones :-)

PR:             ports/114999
Submitted by:   Paul Schmehl <pauls@utdallas.edu>
Fri, 25 Nov 2005
[ 18:01 pav search for other commits by this committer ] Original commit  (Only the first 10 of 121 ports in this commit are shown above. View all ports for this commit)
- Add SHA256
Thu, 29 Jan 2004
[ 16:13 trevor search for other commits by this committer ] Original commit  (Only the first 10 of 967 ports in this commit are shown above. View all ports for this commit)
SIZEify.
Tue, 4 Nov 2003
[ 16:00 osa search for other commits by this committer ] Original commit 
Fix broken (checksum mismatch) by change suffix of distro
from "-current" to "a37".

No changes for MD5.
Tue, 14 Oct 2003
[ 14:50 osa search for other commits by this committer ] Original commit 
Update to 0.8, fix RESTRICTED.

Number of commits found: 25