Hello community, here is the log from the commit of package nmap for openSUSE:Factory checked in at 2019-08-30 14:42:31 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/nmap (Old) and /work/SRC/openSUSE:Factory/.nmap.new.7948 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "nmap" Fri Aug 30 14:42:31 2019 rev:62 rq:727169 version:7.80 Changes: -------- --- /work/SRC/openSUSE:Factory/nmap/nmap.changes 2019-07-31 14:28:14.002154145 +0200 +++ /work/SRC/openSUSE:Factory/.nmap.new.7948/nmap.changes 2019-08-30 14:42:54.061411733 +0200 @@ -1,0 +2,17 @@ +Tue Aug 27 07:28:22 UTC 2019 - Robert Frohl <rfr...@suse.com> + +- Update to 7.80: + * 11 new NSE scripts + * Added AF_VSOCK (Linux VM sockets) functionality to Nsock and Ncat + * Deprecate and disable the -PR (ARP ping) host discovery option. ARP ping is + already used whenever possible. + * Temporary RSA keys are now 2048-bit to resolve a compatibility issue with + OpenSSL library configured with security level 2. + * See https://nmap.org/changelog#7.80 for the complete changelog. +- Removed patches included upstream: + * nmap-7.70-CVE-2018-15173_pcre_limits.patch + * nmap-7.70-fix_infinite_loop.patch +- Added netmask_negativ_bitshift.patch to fix netmask calculation for certain + architectures. + +------------------------------------------------------------------- Old: ---- nmap-7.70-CVE-2018-15173_pcre_limits.patch nmap-7.70-fix_infinite_loop.patch nmap-7.70.tar.bz2 nmap-7.70.tar.bz2.asc New: ---- netmask_negativ_bitshift.patch nmap-7.80.tar.bz2 nmap-7.80.tar.bz2.asc ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ nmap.spec ++++++ --- /var/tmp/diff_new_pack.1CmVHl/_old 2019-08-30 14:42:56.037411530 +0200 +++ /var/tmp/diff_new_pack.1CmVHl/_new 2019-08-30 14:42:56.041411530 +0200 @@ -27,7 +27,7 @@ %define with_python2 1 %endif Name: nmap -Version: 7.70 +Version: 7.80 Release: 0 Summary: Network exploration tool and security scanner License: GPL-2.0-or-later @@ -40,8 +40,7 @@ Patch2: nmap-4.75-nostrip.patch Patch3: su-to-zenmap.patch Patch4: nmap-ncat-skip-network-tests.patch -Patch5: nmap-7.70-CVE-2018-15173_pcre_limits.patch -Patch6: nmap-7.70-fix_infinite_loop.patch +Patch5: netmask_negativ_bitshift.patch BuildRequires: dos2unix BuildRequires: fdupes BuildRequires: gcc-c++ @@ -124,7 +123,6 @@ %endif %patch4 -p1 %patch5 -p1 -%patch6 -p1 # use system provided libraries rm -rf libpcap libpcre macosx mswin32 @@ -204,7 +202,7 @@ [[ $compiled_with == *\ liblua-5.3* ]] %else # lua in nmap tarball identifies itself as "liblua-5.3.3" -[[ $compiled_with == *\ liblua-5.3.3* ]] +[[ $compiled_with == *\ nmap-liblua-5.3.* ]] %endif # ++++++ netmask_negativ_bitshift.patch ++++++ commit 146e21d8aa24b176be6a4f6638dbfd37df85cffb Author: Robert Frohl <rfr...@suse.com> Date: Wed Aug 28 13:21:04 2019 +0200 Fixed undefined behavior in netmask generation #1717 diff --git a/nbase/nbase_addrset.c b/nbase/nbase_addrset.c index 6f91bc1b2..19e3f1119 100644 --- a/nbase/nbase_addrset.c +++ b/nbase/nbase_addrset.c @@ -500,7 +500,7 @@ static int sockaddr_to_mask (const struct sockaddr *sa, int bits, u32 *mask) mask[i] = 0; } else { - mask[i] = ~((1 << (unmasked_bits - (32 * (4 - i)))) - 1); + mask[i] = ~(0xffffffff % (1 << unmasked_bits)); } } return 1; ++++++ nmap-7.70.tar.bz2 -> nmap-7.80.tar.bz2 ++++++ /work/SRC/openSUSE:Factory/nmap/nmap-7.70.tar.bz2 /work/SRC/openSUSE:Factory/.nmap.new.7948/nmap-7.80.tar.bz2 differ: char 11, line 1