|
|
|
|
Changelog for zenmap-7.95-144.1.x86_64.rpm :
* Thu Aug 01 2024 Andreas Stieger - fix python-gobject2 dependency of zenmap - boo#1228750 * Wed Jul 17 2024 Antonio Teixeira - Update to 7.95: * Integrated over 4,000 of your IPv4 OS fingerprints. Added 336 signatures, bringing the new total to 6,036. Additions include iOS 15 & 16, macOS Ventura & Monterey, Linux 6.1, OpenBSD 7.1, and lwIP 2.2 * Integrated over 2,500 service/version detection fingerprints. The signature count went up 1.4% to 12,089, including 9 new softmatches. We now detect 1,246 protocols, including new additions of grpc, mysqlx, essnet, remotemouse, and tuya. * Added four new scripts from the DINA community for querying industrial control systems * Improvements to OS detection fingerprint matching, including a syntax change for nmap-os-db that allows ranges within the TCP Options string. This leads to more concise and maintainable fingerprints. [Daniel Miller] * Improved the OS detection engine by using a new source port for each retry. Scans from systems such as Windows that do not send RST for unsolicited SYN|ACK responses were previously unable to get a response in subsequent tries. [Daniel Miller] * Several profile-guided optimizations of the port scan engine. [Daniel Miller] * Upgraded included libraries: Lua 5.4.6, libpcre2 10.43, zlib 1.3.1, libssh2 1.11.0, liblinear 2.47 * Zenmap and Ndiff now use setuptools, not distutils for packaging. * Fixed Ncat UDP server mode to not quit after EOF on stdin. * ssh-auth-methods will now print the pre-authentication banner text when available. Requires libssh2 1.11.0 or later. [Daniel Miller] * Fix a crash in Zenmap when changing a host comment. * Fix TLS 1.2 signature algorithms for EdDSA. [Daniel Roethlisberger] * Fix an out-of-bounds read which led to out-of-memory errors when duplicate addresses were used with --exclude * Fixed a memory leak in Nsock: compiled pcap filters were not freed. * Fixed a crash when using service name wildcards with -p, as in -p \"http *\" * Fixed DNS TXT record parsing bug which caused asn-query to fail in Nmap 7.80 and later. [David Fifield, Mike Pattrick] * Fixed packet size testing in KNX scripts [f0rw4rd]- Remove nmap-7.94-handle-unknown-service-name-in-p.patch- Add zenmap-fix-locale-install.patch * Fix locale files installation for zenmap- Use %pyproject macros for building and installing zenmap * Thu Mar 14 2024 Andreas Stieger - fix segfault with -p (boo#1221403) add nmap-7.94-handle-unknown-service-name-in-p.patch * Thu Jan 25 2024 Andreas Stieger - Update License to \'SUSE-NonFree\" until determined otherwise to please checks in openSUSE:Factory:NonFree (boo#1211571) * Sun May 28 2023 ecsos - Fix build error and wrong requires. Lua version 5.4.4 is required. But something in opensuse lua package is broken. Set it disable for Leap too and not only for Tumbleweed. * Mon May 22 2023 Robert Frohl - Update to 7.94: * Zenmap and Ndiff now use Python 3 * Nmap now prints vendor names based on MAC address for MA-S (24-bit), MA-M (28-bit), and MA-L (36-bit) registrations instead of the fixed 3-byte MAC prefix used previously for lookups. * Lots of profile-guided memory and processing improvements for Nmap, including OS fingerprint matching, probe matching and retransmission lookups for large hostgroups, and service name lookups. * Integrated many of the most-submitted IPv4 OS fingerprints for recent versions of Windows, iOS, macOS, Linux, and BSD. * Added the tftp-version script which requests a nonexistent file from a TFTP server and matches the error message to a database of known software. * Ncat can now accept \"connections\" from multiple UDP hosts in listen mode with the --keep-open option. This also enables --broker and --chat via UDP. * Upgrade included libraries: zlib 1.2.13, Lua 5.4.4, libpcap 1.10.4 * UDP port scan (-sU) and version scan (-sV) now both use the same data source, nmap-service-probes, for data payloads. Previously, the nmap-payloads file was used for port scan. * Nmap\'s service scan (-sV) can now probe the UDP service behind a DTLS tunnel, the same as it already does for TCP services with SSL/TLS encryption. * Ncat in listen mode with --udp --ssl will use DTLS to secure incoming connections. * Handle Internationalized Domain Names (IDN) like Яндекс.рф on platforms where getaddrinfo supports the AI_IDN flag. [Daniel Miller] * Improved DNS domain name parsing to avoid recursion and enforce name length limits, avoiding a theoretical stack overflow issue with certain crafted DNS server responses.- Update License to \'LicenseRef-NPSL-0.95\' * Sun May 21 2023 Andreas Stieger - The package is licenced under the \"\"Nmap Public Source License\", which is not OSI approved. Specify as \"LicenseRef-NPSL-0.93\". (boo#1211571) * Mon Sep 05 2022 Robert Frohl - Update to 7.93: * This release commemorates Nmap\'s 25th anniversary! It all started with this September 1, 1997 Phrack article by Fyodor: https://nmap.org/p51-11.html. * Ensure Nmap builds with OpenSSL 3.0 using no deprecated API functions. Binaries for this release include OpenSSL 3.0.5. * Upgrade included libraries: libssh2 1.10.0, zlib 1.2.12, Lua 5.3.6, libpcap 1.10.1 * Fix a bug that prevented Nmap from discovering interfaces on Linux when no IPv4 addresses were configured. * NSE \"exception handling\" with nmap.new_try() will no longer result in a stack traceback in debug output * Update the Nmap output DTD to match actual output since the `` element was added in Nmap 7.90. * Fix newtargets support: since Nmap 7.92, scripts could not add targets in script pre-scanning phase. * Scripts dhcp-discover and broadcast-dhcp-discover now support setting a client identifier. * Script oracle-tns-version was not reporting the version correctly for Oracle 19c or newer * Script redis-info was crashing or producing inaccurate information about client connections and/or cluster nodes. * Script ipidseq was broken due to calling an unreachable library function. * Support for EC crypto was not properly enabled if Nmap was compiled with OpenSSL in a custom location. * Improvements to event handling and pcap socket garbage collection, fixing potential hangs and crashes. * Fix TDS7 password encoding for mssql.lua, which had been assuming ASCII input even though other parts of the library had been passing it Unicode. * Replace deprecated CPEs for IIS with their updated identifier, cpe:/a:microsoft:internet_information_services * Fix script-terminating error when unknown BSON data types are encountered. Added parsers for most standard data types. * Fix hostname/certificate comparison and matching to handle ASN.1 strings without null terminators, a similar bug to OpenSSL\'s CVE-2021-3712. * Added support for SOCKS5 proxies that return bind addresses as hostnames, instead of IPv4/IPv6 addresses. * Mon Oct 04 2021 Danilo Spinella - Do not build with python2 support for SLE15-SP4, bsc#1190997 * Thu Sep 16 2021 Danilo Spinella - Tumbleweed is not affected by the following SLE issues: * bsc#1148742, CVE-2017-18594 * bsc#1135350 * bsc#1133512 * Thu Sep 09 2021 Danilo Spinella - Update to 7.92: * TLS 1.3 now supported by most scripts for which it is relevant * Other bugfixes and improvements * https://nmap.org/changelog.html#7.92 * Thu Jul 01 2021 Steve Kowalik - Also guard the python-devel BuildRequires if we\'re building for Python 2
|
|
|