Name: | nmap |
---|---|
Epoch: | 2 |
Version: | 6.40 |
Release: | 13.el7 |
Architecture: | aarch64 |
Group: | Applications/System |
Size: | 16892094 |
License: | GPLv2 and LGPLv2+ and GPLv2+ and BSD |
RPM: | nmap-6.40-13.el7.aarch64.rpm |
Source RPM: | nmap-6.40-13.el7.src.rpm |
Build Date: | Mon May 07 2018 |
Build Host: | ca-buildarm01.us.oracle.com |
Vendor: | Oracle America |
URL: | http://nmap.org/ |
Summary: | Network exploration tool and security scanner |
Description: | Nmap is a utility for network exploration or security auditing. It supports ping scanning (determine which hosts are up), many port scanning techniques (determine what services the hosts are offering), and TCP/IP fingerprinting (remote host operating system identification). Nmap also offers flexible target and port specification, decoy scanning, determination of TCP sequence predictability characteristics, reverse-identd scanning, and more. In addition to the classic command-line nmap executable, the Nmap suite includes a flexible data transfer, redirection, and debugging tool (netcat utility ncat), a utility for comparing scan results (ndiff), and a packet generation and response analysis tool (nping). |
- Resolves: #1436402 - nc from nmap ncat crash if ipv6 disabled
- Add eproto to list of hanled errnos
- Related: ##1460249 - Replace memleak patch with one provided by upstream
- Related: #1460249 - Fix memory leaks (covscan errors)
- Resolves: #1460249, #1436402, #1317924, #1379008 - Rebase ncat on 7.50
- Resolves: #1390326 - Failback to system resolver for truncated dns replies
- explicitely disable modules we don't want to build to have consistent results (#1246453)
- fix coverity found issue (#1192143)
- ncat should try to connect to all resolved addresses, not only the first one (#1192143) - do not print debug messages during normal use (#1134412)
- Mass rebuild 2014-01-24