security/zeek: Update to 3.0.13
https://github.com/zeek/zeek/releases/tag/v3.0.13
This release fixes the following vulnerability:
- Fix ASCII Input reader's treatment of input files containing null-bytes. An input file containing null-bytes could lead to a buffer-over-read, crash Zeek, and be exploited to cause Denial of Service.
And fixes the following bugs:
- MIME sub-entities overwrote top-level header values cause misleading SMTP log
- Fix incorrect major_subsys_version field in pe_optional_header event
Reported by: Jon Siwek