security/zeek: Update to 3.0.7 and address various vulnerabilities:
https://raw.githubusercontent.com/zeek/zeek/v3.0.7/NEWS
- Fix potential stack overflow in NVT analyzer
- Fix NVT analyzer memory leak from multiple telnet authn name options
- Fix multiple content-transfer-encoding headers causing a memory leak
- Fix potential leak of Analyzers added to tree during Analyzer::Done
- Prevent IP fragment reassembly on packets without minimal IP header
Other fixes:
- Limit rate of logging MaxMind DB diagnostic messages
- Fix wrong return value type for topk_get_top() BIF
- Fix opaque Broker types lacking a Type after (de)serialization
- Fix lack of descriptive printing for intervals converted from double_to_interval()
- Fix some cases of known-services not being logged
MFH: 2020Q3
Security: 9f7ae7ea-da93-4f86-b257-ba76707f6d5d