|
|
|
|
Changelog for zenmap-7.94-lp156.135.1.x86_64.rpm :
* Thu Mar 14 2024 Andreas Stieger - fix segfault with -p (boo#1221403) add nmap-7.94-handle-unknown-service-name-in-p.patch * Thu Jan 25 2024 Andreas Stieger - Update License to \'SUSE-NonFree\" until determined otherwise to please checks in openSUSE:Factory:NonFree (boo#1211571) * Sun May 28 2023 ecsos - Fix build error and wrong requires. Lua version 5.4.4 is required. But something in opensuse lua package is broken. Set it disable for Leap too and not only for Tumbleweed. * Mon May 22 2023 Robert Frohl - Update to 7.94: * Zenmap and Ndiff now use Python 3 * Nmap now prints vendor names based on MAC address for MA-S (24-bit), MA-M (28-bit), and MA-L (36-bit) registrations instead of the fixed 3-byte MAC prefix used previously for lookups. * Lots of profile-guided memory and processing improvements for Nmap, including OS fingerprint matching, probe matching and retransmission lookups for large hostgroups, and service name lookups. * Integrated many of the most-submitted IPv4 OS fingerprints for recent versions of Windows, iOS, macOS, Linux, and BSD. * Added the tftp-version script which requests a nonexistent file from a TFTP server and matches the error message to a database of known software. * Ncat can now accept \"connections\" from multiple UDP hosts in listen mode with the --keep-open option. This also enables --broker and --chat via UDP. * Upgrade included libraries: zlib 1.2.13, Lua 5.4.4, libpcap 1.10.4 * UDP port scan (-sU) and version scan (-sV) now both use the same data source, nmap-service-probes, for data payloads. Previously, the nmap-payloads file was used for port scan. * Nmap\'s service scan (-sV) can now probe the UDP service behind a DTLS tunnel, the same as it already does for TCP services with SSL/TLS encryption. * Ncat in listen mode with --udp --ssl will use DTLS to secure incoming connections. * Handle Internationalized Domain Names (IDN) like Яндекс.рф on platforms where getaddrinfo supports the AI_IDN flag. [Daniel Miller] * Improved DNS domain name parsing to avoid recursion and enforce name length limits, avoiding a theoretical stack overflow issue with certain crafted DNS server responses.- Update License to \'LicenseRef-NPSL-0.95\' * Sun May 21 2023 Andreas Stieger - The package is licenced under the \"\"Nmap Public Source License\", which is not OSI approved. Specify as \"LicenseRef-NPSL-0.93\". (boo#1211571) * Mon Sep 05 2022 Robert Frohl - Update to 7.93: * This release commemorates Nmap\'s 25th anniversary! It all started with this September 1, 1997 Phrack article by Fyodor: https://nmap.org/p51-11.html. * Ensure Nmap builds with OpenSSL 3.0 using no deprecated API functions. Binaries for this release include OpenSSL 3.0.5. * Upgrade included libraries: libssh2 1.10.0, zlib 1.2.12, Lua 5.3.6, libpcap 1.10.1 * Fix a bug that prevented Nmap from discovering interfaces on Linux when no IPv4 addresses were configured. * NSE \"exception handling\" with nmap.new_try() will no longer result in a stack traceback in debug output * Update the Nmap output DTD to match actual output since the `` element was added in Nmap 7.90. * Fix newtargets support: since Nmap 7.92, scripts could not add targets in script pre-scanning phase. * Scripts dhcp-discover and broadcast-dhcp-discover now support setting a client identifier. * Script oracle-tns-version was not reporting the version correctly for Oracle 19c or newer * Script redis-info was crashing or producing inaccurate information about client connections and/or cluster nodes. * Script ipidseq was broken due to calling an unreachable library function. * Support for EC crypto was not properly enabled if Nmap was compiled with OpenSSL in a custom location. * Improvements to event handling and pcap socket garbage collection, fixing potential hangs and crashes. * Fix TDS7 password encoding for mssql.lua, which had been assuming ASCII input even though other parts of the library had been passing it Unicode. * Replace deprecated CPEs for IIS with their updated identifier, cpe:/a:microsoft:internet_information_services * Fix script-terminating error when unknown BSON data types are encountered. Added parsers for most standard data types. * Fix hostname/certificate comparison and matching to handle ASN.1 strings without null terminators, a similar bug to OpenSSL\'s CVE-2021-3712. * Added support for SOCKS5 proxies that return bind addresses as hostnames, instead of IPv4/IPv6 addresses. * Mon Oct 04 2021 Danilo Spinella - Do not build with python2 support for SLE15-SP4, bsc#1190997 * Thu Sep 16 2021 Danilo Spinella - Tumbleweed is not affected by the following SLE issues: * bsc#1148742, CVE-2017-18594 * bsc#1135350 * bsc#1133512 * Thu Sep 09 2021 Danilo Spinella - Update to 7.92: * TLS 1.3 now supported by most scripts for which it is relevant * Other bugfixes and improvements * https://nmap.org/changelog.html#7.92 * Thu Jul 01 2021 Steve Kowalik - Also guard the python-devel BuildRequires if we\'re building for Python 2 * Sun Oct 11 2020 Andreas Stieger - update to 7.91: * Rectify error \"time result cannot be represented\" in the AFP library * Support setting the SNMP protocol version in via snmp.version * Fix MySQL library not properly parsing responses * mysql-audit now defaults to the bundled mysql-cis.audit for the audit rule base * Sat Oct 10 2020 Dirk Mueller - update to 7.90: * New fingerprints for better OS and service/version detection * 3 new NSE scripts, new protocol libraries and payloads for host discovery, port scanning and version detection * 70+ smaller bug fixes and improvements * Build system upgrades and code quality improvements- drop netmask_negativ_bitshift.patch (obsolete) * Sun Sep 22 2019 Christian Boltz - fix typo in description * Tue Aug 27 2019 Robert Frohl - Update to 7.80: * 11 new NSE scripts * Added AF_VSOCK (Linux VM sockets) functionality to Nsock and Ncat * Deprecate and disable the -PR (ARP ping) host discovery option. ARP ping is already used whenever possible. * Temporary RSA keys are now 2048-bit to resolve a compatibility issue with OpenSSL library configured with security level 2. * See https://nmap.org/changelog#7.80 for the complete changelog.- Removed patches included upstream: * nmap-7.70-CVE-2018-15173_pcre_limits.patch * nmap-7.70-fix_infinite_loop.patch- Added netmask_negativ_bitshift.patch to fix netmask calculation for certain architectures. * Tue Jul 30 2019 Kristyna Streitova - add nmap-7.70-fix_infinite_loop.patch to fix infinite loop in tls-alpn when server is forcing a protocol [bsc#1143277] * Fri May 03 2019 Kristýna Streitová - add nmap-7.70-CVE-2018-15173_pcre_limits.patch to reduce LibPCRE resource limits so that version detection can\'t use as much of the stack. Previously Nmap could crash when run on low-memory systems against target services which are intentionally or accidentally difficult to match [bsc#1104139] [CVE-2018-15173]. * Fri May 18 2018 jengelhAATTinai.de- Trim filler wording from description.- Trim idempotent %if..%endif blocks.- Explicitly request bash for bashisms in %install. * Thu May 10 2018 kstreitovaAATTsuse.com- don\'t build zenmap and ndiff python2 subpackages because of the python2 deprecation in Tumbleweed- run spec-cleaner- tweak Summaries and Descriptions * Thu Mar 22 2018 mvetterAATTsuse.com- Update to 7.70: * 14 new NSE scripts * iec-identify probes for the IEC 60870-5-104 SCADA protocol * ssh-brute performs brute-forcing of SSH password credentials * See https://nmap.org/changelog.html#7.70 for the complete changelog. * Wed Aug 02 2017 erwin.vandeveldeAATTgmail.com- Nmap 7.60: * NSE scripts now have complete SSH support via libssh2 * Added 14 NSE scripts from 6 authors, bringing the total up to 579! * See https://nmap.org/changelog.html#7.60 for the complete changelog. * Fri Jun 16 2017 idonmezAATTsuse.com- Nmap 7.50: * Integrated all of your service/version detection fingerprints submitted from September to March (855 of them). The signature count went up 2.9% to 11,418. We now detect 1193 protocols from apachemq, bro, and clickhouse to jmon, slmp, and zookeeper. Highlights: http://seclists.org/nmap-dev/2017/q2/140 * Many added NSE scripts, OS fingerprints, service probes * See https://nmap.org/changelog.html#7.50 for the complete changelog. * Thu Dec 29 2016 idonmezAATTsuse.com- Nmap 7.40: * Many added NSE scripts, OS fingerprints, service probes * New option --defeat-icmp-ratelimit dramatically reduces UDP scan times in exchange for labeling unresponsive (and possibly open) ports as \"closed|filtered\". * New NSE library, geoip.lua, provides a common framework for storing and retrieving IP geolocation results. * See https://nmap.org/changelog.html#7.40 for the complete changelog.- Refresh nmap-5.61-desktop_files.patch as nmap-7.40-desktop_files.patch * Fri Oct 28 2016 astiegerAATTsuse.com- Nmap 7.31: * Fix the way Nmap handles scanning names that resolve to the same IP * Zenmap: Better visual indication that display of hostname is tied to address in the Topology page * Wed Oct 05 2016 astiegerAATTsuse.com- Nmap 7.30: * Many added NSE scripts, OS fingerprints, service probes * Improved output filtering * Using Lua 5.3 * Many bug fixes, improvements and performance enhancements * Sun Apr 03 2016 astiegerAATTsuse.com- Nmap 7.12: * Zenmap: Avoid file corruption in zenmap.conf * NSE: VNC updates * NSE: Add STARTTLS support for VNC, NNTP, and LMTP * Add new service probes and match lines for OpenVPN * Wed Mar 23 2016 astiegerAATTsuse.com- Nmap 7.11: * Add support for diffie-hellman-group-exchange- * SSH key exchange methods to ssh2.lua, allowing ssh-hostkey to run on servers that only support custom Diffie-Hellman groups. * Add support in sslcert.lua for Microsoft SQL Server\'s TDS protocol, so you can now grab certs with ssl-cert or check ciphers with ssl-enum-ciphers. * Fix crashes in Zenmap * Fri Mar 18 2016 astiegerAATTsuse.com- Nmap 7.10: * Add 12 NSE scripts * Integrate OS, service/version detection fingerprint submissions * Updated to various NSE scripts * Zenmap: Remember window geometry (position and size) from the previous time Zenmap was run. * Give option parsing errors after the long usage statement * Changed Nmap\'s idea of reserved and private IP addresses to include 169.254/16 (RFC3927) and remove 6/8, 7/8, and 55/8 networks (for -iR randomly generated targets) Usage of own exclusion lists with --exclude or --exclude-file is recommended to avoid scanning newly-valid addresses belonging to the US DoD. * Allow the -4 option for Nmap to indicate IPv4 address family. * Add verbosity level of 0 (-v0): not text output * Mon Dec 14 2015 astiegerAATTsuse.com- Nmap 7.01: * various bug fixes in NSE * Sun Nov 22 2015 mardnhAATTgmx.de- Nmap 7.00: * see /usr/share/doc/packages/nmap/CHANGELOG- removed patches: * nmap-4.00-noreturn.diff * nmap-6.00-libpcap-filter.diff not needed since we do not build against the bundled libpcap- updated patch: * nmap-ncat-skip-network-tests.patch * Mon Oct 05 2015 astiegerAATTsuse.com- Unbreak everything not Factory * Mon Oct 05 2015 plinnellAATTopensuse.org- Fix the build for Factory. Insist on lua 5.2.x * Thu Jul 30 2015 dimstarAATTopensuse.org- BuildRequire lua52-devel on openSUSE > 13.2 (current Tumbleweed): nmap has not been ported to LUA 5.3 yet.- Minor fix in check session: internal lua identifies itself as 5.2.3 by now. * Tue Mar 03 2015 astiegerAATTsuse.com- fix build on SLE 12 by removing gpg-offline dependency- run spec-cleaner
|
|
|