Name: | nmap |
---|---|
Epoch: | 2 |
Version: | 6.40 |
Release: | 19.el7 |
Architecture: | x86_64 |
Group: | Applications/System |
Size: | 16917086 |
License: | GPLv2 and LGPLv2+ and GPLv2+ and BSD |
RPM: | nmap-6.40-19.el7.x86_64.rpm |
Source RPM: | nmap-6.40-19.el7.src.rpm |
Build Date: | Sun Jun 09 2019 |
Build Host: | x86-ol7-builder-01.us.oracle.com |
Vendor: | Oracle America |
URL: | http://nmap.org/ |
Summary: | Network exploration tool and security scanner |
Description: | Nmap is a utility for network exploration or security auditing. It supports ping scanning (determine which hosts are up), many port scanning techniques (determine what services the hosts are offering), and TCP/IP fingerprinting (remote host operating system identification). Nmap also offers flexible target and port specification, decoy scanning, determination of TCP sequence predictability characteristics, reverse-identd scanning, and more. In addition to the classic command-line nmap executable, the Nmap suite includes a flexible data transfer, redirection, and debugging tool (netcat utility ncat), a utility for comparing scan results (ndiff), and a packet generation and response analysis tool (nping). |
- Resolves: #1591959 - Fix ipv6 literal parsing
- Resolves: #1597611 - Do not crash in case of nsock parameters errors
- Resolves: #1573411 - Populate ncat env. variables in UDP mode
- Resolves: #1525105 - Fix use after free error (Coverity) - Patches renumbered
- Resolves: #1546246 - Don't use http proxy port for socks proxies
- Resolves: #1436402 - nc from nmap ncat crash if ipv6 disabled
- Add eproto to list of hanled errnos
- Related: ##1460249 - Replace memleak patch with one provided by upstream
- Related: #1460249 - Fix memory leaks (covscan errors)
- Resolves: #1460249, #1436402, #1317924, #1379008 - Rebase ncat on 7.50