SEARCH
NEW RPMS
DIRECTORIES
ABOUT
FAQ
VARIOUS
BLOG

 
 
Changelog for zenmap-7.94-lp156.1.2.i586.rpm :

* Thu Mar 14 2024 Andreas Stieger - fix segfault with -p (boo#1221403) add nmap-7.94-handle-unknown-service-name-in-p.patch
* Thu Jan 25 2024 Andreas Stieger - Update License to \'SUSE-NonFree\" until determined otherwise to please checks in openSUSE:Factory:NonFree (boo#1211571)
* Sun May 28 2023 ecsos - Fix build error and wrong requires. Lua version 5.4.4 is required. But something in opensuse lua package is broken. Set it disable for Leap too and not only for Tumbleweed.
* Mon May 22 2023 Robert Frohl - Update to 7.94:
* Zenmap and Ndiff now use Python 3
* Nmap now prints vendor names based on MAC address for MA-S (24-bit), MA-M (28-bit), and MA-L (36-bit) registrations instead of the fixed 3-byte MAC prefix used previously for lookups.
* Lots of profile-guided memory and processing improvements for Nmap, including OS fingerprint matching, probe matching and retransmission lookups for large hostgroups, and service name lookups.
* Integrated many of the most-submitted IPv4 OS fingerprints for recent versions of Windows, iOS, macOS, Linux, and BSD.
* Added the tftp-version script which requests a nonexistent file from a TFTP server and matches the error message to a database of known software.
* Ncat can now accept \"connections\" from multiple UDP hosts in listen mode with the --keep-open option. This also enables --broker and --chat via UDP.
* Upgrade included libraries: zlib 1.2.13, Lua 5.4.4, libpcap 1.10.4
* UDP port scan (-sU) and version scan (-sV) now both use the same data source, nmap-service-probes, for data payloads. Previously, the nmap-payloads file was used for port scan.
* Nmap\'s service scan (-sV) can now probe the UDP service behind a DTLS tunnel, the same as it already does for TCP services with SSL/TLS encryption.
* Ncat in listen mode with --udp --ssl will use DTLS to secure incoming connections.
* Handle Internationalized Domain Names (IDN) like Яндекс.рф on platforms where getaddrinfo supports the AI_IDN flag. [Daniel Miller]
* Improved DNS domain name parsing to avoid recursion and enforce name length limits, avoiding a theoretical stack overflow issue with certain crafted DNS server responses.- Update License to \'LicenseRef-NPSL-0.95\'
* Sun May 21 2023 Andreas Stieger - The package is licenced under the \"\"Nmap Public Source License\", which is not OSI approved. Specify as \"LicenseRef-NPSL-0.93\". (boo#1211571)
* Mon Sep 05 2022 Robert Frohl - Update to 7.93:
* This release commemorates Nmap\'s 25th anniversary! It all started with this September 1, 1997 Phrack article by Fyodor: https://nmap.org/p51-11.html.
* Ensure Nmap builds with OpenSSL 3.0 using no deprecated API functions. Binaries for this release include OpenSSL 3.0.5.
* Upgrade included libraries: libssh2 1.10.0, zlib 1.2.12, Lua 5.3.6, libpcap 1.10.1
* Fix a bug that prevented Nmap from discovering interfaces on Linux when no IPv4 addresses were configured.
* NSE \"exception handling\" with nmap.new_try() will no longer result in a stack traceback in debug output
* Update the Nmap output DTD to match actual output since the `` element was added in Nmap 7.90.
* Fix newtargets support: since Nmap 7.92, scripts could not add targets in script pre-scanning phase.
* Scripts dhcp-discover and broadcast-dhcp-discover now support setting a client identifier.
* Script oracle-tns-version was not reporting the version correctly for Oracle 19c or newer
* Script redis-info was crashing or producing inaccurate information about client connections and/or cluster nodes.
* Script ipidseq was broken due to calling an unreachable library function.
* Support for EC crypto was not properly enabled if Nmap was compiled with OpenSSL in a custom location.
* Improvements to event handling and pcap socket garbage collection, fixing potential hangs and crashes.
* Fix TDS7 password encoding for mssql.lua, which had been assuming ASCII input even though other parts of the library had been passing it Unicode.
* Replace deprecated CPEs for IIS with their updated identifier, cpe:/a:microsoft:internet_information_services
* Fix script-terminating error when unknown BSON data types are encountered. Added parsers for most standard data types.
* Fix hostname/certificate comparison and matching to handle ASN.1 strings without null terminators, a similar bug to OpenSSL\'s CVE-2021-3712.
* Added support for SOCKS5 proxies that return bind addresses as hostnames, instead of IPv4/IPv6 addresses.
* Mon Oct 04 2021 Danilo Spinella - Do not build with python2 support for SLE15-SP4, bsc#1190997
* Thu Sep 16 2021 Danilo Spinella - Tumbleweed is not affected by the following SLE issues:
* bsc#1148742, CVE-2017-18594
* bsc#1135350
* bsc#1133512
* Thu Sep 09 2021 Danilo Spinella - Update to 7.92:
* TLS 1.3 now supported by most scripts for which it is relevant
* Other bugfixes and improvements
* https://nmap.org/changelog.html#7.92
* Thu Jul 01 2021 Steve Kowalik - Also guard the python-devel BuildRequires if we\'re building for Python 2
* Sun Oct 11 2020 Andreas Stieger - update to 7.91:
* Rectify error \"time result cannot be represented\" in the AFP library
* Support setting the SNMP protocol version in via snmp.version
* Fix MySQL library not properly parsing responses
* mysql-audit now defaults to the bundled mysql-cis.audit for the audit rule base
* Sat Oct 10 2020 Dirk Mueller - update to 7.90:
* New fingerprints for better OS and service/version detection
* 3 new NSE scripts, new protocol libraries and payloads for host discovery, port scanning and version detection
* 70+ smaller bug fixes and improvements
* Build system upgrades and code quality improvements- drop netmask_negativ_bitshift.patch (obsolete)
* Sun Sep 22 2019 Christian Boltz - fix typo in description
* Tue Aug 27 2019 Robert Frohl - Update to 7.80:
* 11 new NSE scripts
* Added AF_VSOCK (Linux VM sockets) functionality to Nsock and Ncat
* Deprecate and disable the -PR (ARP ping) host discovery option. ARP ping is already used whenever possible.
* Temporary RSA keys are now 2048-bit to resolve a compatibility issue with OpenSSL library configured with security level 2.
* See https://nmap.org/changelog#7.80 for the complete changelog.- Removed patches included upstream:
* nmap-7.70-CVE-2018-15173_pcre_limits.patch
* nmap-7.70-fix_infinite_loop.patch- Added netmask_negativ_bitshift.patch to fix netmask calculation for certain architectures.
* Tue Jul 30 2019 Kristyna Streitova - add nmap-7.70-fix_infinite_loop.patch to fix infinite loop in tls-alpn when server is forcing a protocol [bsc#1143277]
* Fri May 03 2019 Kristýna Streitová - add nmap-7.70-CVE-2018-15173_pcre_limits.patch to reduce LibPCRE resource limits so that version detection can\'t use as much of the stack. Previously Nmap could crash when run on low-memory systems against target services which are intentionally or accidentally difficult to match [bsc#1104139] [CVE-2018-15173].
* Fri May 18 2018 jengelhAATTinai.de- Trim filler wording from description.- Trim idempotent %if..%endif blocks.- Explicitly request bash for bashisms in %install.
* Thu May 10 2018 kstreitovaAATTsuse.com- don\'t build zenmap and ndiff python2 subpackages because of the python2 deprecation in Tumbleweed- run spec-cleaner- tweak Summaries and Descriptions
* Thu Mar 22 2018 mvetterAATTsuse.com- Update to 7.70:
* 14 new NSE scripts
* iec-identify probes for the IEC 60870-5-104 SCADA protocol
* ssh-brute performs brute-forcing of SSH password credentials
* See https://nmap.org/changelog.html#7.70 for the complete changelog.
* Wed Aug 02 2017 erwin.vandeveldeAATTgmail.com- Nmap 7.60:
* NSE scripts now have complete SSH support via libssh2
* Added 14 NSE scripts from 6 authors, bringing the total up to 579!
* See https://nmap.org/changelog.html#7.60 for the complete changelog.
* Fri Jun 16 2017 idonmezAATTsuse.com- Nmap 7.50:
* Integrated all of your service/version detection fingerprints submitted from September to March (855 of them). The signature count went up 2.9% to 11,418. We now detect 1193 protocols from apachemq, bro, and clickhouse to jmon, slmp, and zookeeper. Highlights: http://seclists.org/nmap-dev/2017/q2/140
* Many added NSE scripts, OS fingerprints, service probes
* See https://nmap.org/changelog.html#7.50 for the complete changelog.
* Thu Dec 29 2016 idonmezAATTsuse.com- Nmap 7.40:
* Many added NSE scripts, OS fingerprints, service probes
* New option --defeat-icmp-ratelimit dramatically reduces UDP scan times in exchange for labeling unresponsive (and possibly open) ports as \"closed|filtered\".
* New NSE library, geoip.lua, provides a common framework for storing and retrieving IP geolocation results.
* See https://nmap.org/changelog.html#7.40 for the complete changelog.- Refresh nmap-5.61-desktop_files.patch as nmap-7.40-desktop_files.patch
* Fri Oct 28 2016 astiegerAATTsuse.com- Nmap 7.31:
* Fix the way Nmap handles scanning names that resolve to the same IP
* Zenmap: Better visual indication that display of hostname is tied to address in the Topology page
* Wed Oct 05 2016 astiegerAATTsuse.com- Nmap 7.30:
* Many added NSE scripts, OS fingerprints, service probes
* Improved output filtering
* Using Lua 5.3
* Many bug fixes, improvements and performance enhancements
* Sun Apr 03 2016 astiegerAATTsuse.com- Nmap 7.12:
* Zenmap: Avoid file corruption in zenmap.conf
* NSE: VNC updates
* NSE: Add STARTTLS support for VNC, NNTP, and LMTP
* Add new service probes and match lines for OpenVPN
* Wed Mar 23 2016 astiegerAATTsuse.com- Nmap 7.11:
* Add support for diffie-hellman-group-exchange-
* SSH key exchange methods to ssh2.lua, allowing ssh-hostkey to run on servers that only support custom Diffie-Hellman groups.
* Add support in sslcert.lua for Microsoft SQL Server\'s TDS protocol, so you can now grab certs with ssl-cert or check ciphers with ssl-enum-ciphers.
* Fix crashes in Zenmap
* Fri Mar 18 2016 astiegerAATTsuse.com- Nmap 7.10:
* Add 12 NSE scripts
* Integrate OS, service/version detection fingerprint submissions
* Updated to various NSE scripts
* Zenmap: Remember window geometry (position and size) from the previous time Zenmap was run.
* Give option parsing errors after the long usage statement
* Changed Nmap\'s idea of reserved and private IP addresses to include 169.254/16 (RFC3927) and remove 6/8, 7/8, and 55/8 networks (for -iR randomly generated targets) Usage of own exclusion lists with --exclude or --exclude-file is recommended to avoid scanning newly-valid addresses belonging to the US DoD.
* Allow the -4 option for Nmap to indicate IPv4 address family.
* Add verbosity level of 0 (-v0): not text output
* Mon Dec 14 2015 astiegerAATTsuse.com- Nmap 7.01:
* various bug fixes in NSE
* Sun Nov 22 2015 mardnhAATTgmx.de- Nmap 7.00:
* see /usr/share/doc/packages/nmap/CHANGELOG- removed patches:
* nmap-4.00-noreturn.diff
* nmap-6.00-libpcap-filter.diff not needed since we do not build against the bundled libpcap- updated patch:
* nmap-ncat-skip-network-tests.patch
* Mon Oct 05 2015 astiegerAATTsuse.com- Unbreak everything not Factory
* Mon Oct 05 2015 plinnellAATTopensuse.org- Fix the build for Factory. Insist on lua 5.2.x
* Thu Jul 30 2015 dimstarAATTopensuse.org- BuildRequire lua52-devel on openSUSE > 13.2 (current Tumbleweed): nmap has not been ported to LUA 5.3 yet.- Minor fix in check session: internal lua identifies itself as 5.2.3 by now.
* Tue Mar 03 2015 astiegerAATTsuse.com- fix build on SLE 12 by removing gpg-offline dependency- run spec-cleaner
 
ICM