|
|
|
|
Changelog for ncat-7.94-3.2.x86_64.rpm :
* Thu Mar 14 2024 Andreas Stieger - fix segfault with -p (boo#1221403) add nmap-7.94-handle-unknown-service-name-in-p.patch * Thu Jan 25 2024 Andreas Stieger - Update License to \'SUSE-NonFree\" until determined otherwise to please checks in openSUSE:Factory:NonFree (boo#1211571) * Sun May 28 2023 ecsos - Fix build error and wrong requires. Lua version 5.4.4 is required. But something in opensuse lua package is broken. Set it disable for Leap too and not only for Tumbleweed. * Mon May 22 2023 Robert Frohl - Update to 7.94: * Zenmap and Ndiff now use Python 3 * Nmap now prints vendor names based on MAC address for MA-S (24-bit), MA-M (28-bit), and MA-L (36-bit) registrations instead of the fixed 3-byte MAC prefix used previously for lookups. * Lots of profile-guided memory and processing improvements for Nmap, including OS fingerprint matching, probe matching and retransmission lookups for large hostgroups, and service name lookups. * Integrated many of the most-submitted IPv4 OS fingerprints for recent versions of Windows, iOS, macOS, Linux, and BSD. * Added the tftp-version script which requests a nonexistent file from a TFTP server and matches the error message to a database of known software. * Ncat can now accept \"connections\" from multiple UDP hosts in listen mode with the --keep-open option. This also enables --broker and --chat via UDP. * Upgrade included libraries: zlib 1.2.13, Lua 5.4.4, libpcap 1.10.4 * UDP port scan (-sU) and version scan (-sV) now both use the same data source, nmap-service-probes, for data payloads. Previously, the nmap-payloads file was used for port scan. * Nmap\'s service scan (-sV) can now probe the UDP service behind a DTLS tunnel, the same as it already does for TCP services with SSL/TLS encryption. * Ncat in listen mode with --udp --ssl will use DTLS to secure incoming connections. * Handle Internationalized Domain Names (IDN) like Яндекс.рф on platforms where getaddrinfo supports the AI_IDN flag. [Daniel Miller] * Improved DNS domain name parsing to avoid recursion and enforce name length limits, avoiding a theoretical stack overflow issue with certain crafted DNS server responses.- Update License to \'LicenseRef-NPSL-0.95\' * Sun May 21 2023 Andreas Stieger - The package is licenced under the \"\"Nmap Public Source License\", which is not OSI approved. Specify as \"LicenseRef-NPSL-0.93\". (boo#1211571) * Mon Sep 05 2022 Robert Frohl - Update to 7.93: * This release commemorates Nmap\'s 25th anniversary! It all started with this September 1, 1997 Phrack article by Fyodor: https://nmap.org/p51-11.html. * Ensure Nmap builds with OpenSSL 3.0 using no deprecated API functions. Binaries for this release include OpenSSL 3.0.5. * Upgrade included libraries: libssh2 1.10.0, zlib 1.2.12, Lua 5.3.6, libpcap 1.10.1 * Fix a bug that prevented Nmap from discovering interfaces on Linux when no IPv4 addresses were configured. * NSE \"exception handling\" with nmap.new_try() will no longer result in a stack traceback in debug output * Update the Nmap output DTD to match actual output since the `` element was added in Nmap 7.90. * Fix newtargets support: since Nmap 7.92, scripts could not add targets in script pre-scanning phase. * Scripts dhcp-discover and broadcast-dhcp-discover now support setting a client identifier. * Script oracle-tns-version was not reporting the version correctly for Oracle 19c or newer * Script redis-info was crashing or producing inaccurate information about client connections and/or cluster nodes. * Script ipidseq was broken due to calling an unreachable library function. * Support for EC crypto was not properly enabled if Nmap was compiled with OpenSSL in a custom location. * Improvements to event handling and pcap socket garbage collection, fixing potential hangs and crashes. * Fix TDS7 password encoding for mssql.lua, which had been assuming ASCII input even though other parts of the library had been passing it Unicode. * Replace deprecated CPEs for IIS with their updated identifier, cpe:/a:microsoft:internet_information_services * Fix script-terminating error when unknown BSON data types are encountered. Added parsers for most standard data types. * Fix hostname/certificate comparison and matching to handle ASN.1 strings without null terminators, a similar bug to OpenSSL\'s CVE-2021-3712. * Added support for SOCKS5 proxies that return bind addresses as hostnames, instead of IPv4/IPv6 addresses. * Mon Oct 04 2021 Danilo Spinella - Do not build with python2 support for SLE15-SP4, bsc#1190997 * Thu Sep 16 2021 Danilo Spinella - Tumbleweed is not affected by the following SLE issues: * bsc#1148742, CVE-2017-18594 * bsc#1135350 * bsc#1133512 * Thu Sep 09 2021 Danilo Spinella - Update to 7.92: * TLS 1.3 now supported by most scripts for which it is relevant * Other bugfixes and improvements * https://nmap.org/changelog.html#7.92 * Thu Jul 01 2021 Steve Kowalik - Also guard the python-devel BuildRequires if we\'re building for Python 2
|
|
|