Bug 33606 - Nmap 7.94 on Mageia 9 errors but downloaded Nmap 7.95 from http://nmap.org works OK
Summary: Nmap 7.94 on Mageia 9 errors but downloaded Nmap 7.95 from http://nmap.org wo...
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: RPM Packages (show other bugs)
Version: 9
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact:
URL:
Whiteboard: MGA9-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2024-10-04 02:04 CEST by Paul Blackburn
Modified: 2024-10-14 21:54 CEST (History)
2 users (show)

See Also:
Source RPM: nmap-7.94-2.mga9.src.rpm
CVE:
Status comment:


Attachments

Description Paul Blackburn 2024-10-04 02:04:57 CEST
Description of problem:
Running nmap (version 7.94) in Mageia 9 fails.
I downloaded the current version 7.95 from http://nmap.org which works OK.



Version-Release number of selected component (if applicable): Nmap 7.94


How reproducible: Happens every time

Steps to Reproduce:

1. Nmap version 7.94 (current as of 4 October 2024 Mageia 9 latest release)

ip=192.168.1.1; /bin/sudo nmap -sV -T4 -O -F --version-light -oA $(date "+%Y_%m_%d_at_%T")"_nmap_quick_scan_plus_"${ip} ${ip}
[sudo] password for user: 
Starting Nmap 7.94 ( https://nmap.org ) at 2024-10-04 00:38 BST
nmap: service_scan.cc:807: char* substvar(char*, char**, const u8*, int, int*, int): Assertion `offstart >= 0 && offstart <= subjectlen' failed.
Aborted

2. Nmap version 7.95 (current latest release from https://nmap.org):

ip=192.168.1.1; /bin/sudo nmap -sV -T4 -O -F --version-light -oA $(date "+%Y_%m_%d_at_%T")"_nmap_quick_scan_plus_"${ip} ${ip}
[sudo] password for user: 

Starting Nmap 7.95 ( https://nmap.org ) at 2024-10-04 00:46 BST
Nmap scan report for dhcp-192-168-1-1.home (192.168.1.1)
Host is up (0.0010s latency).
Not shown: 99 filtered tcp ports (no-response)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 9.3 (protocol 2.0)
MAC Address: E4:E7:49:0A:04:8E (Hewlett Packard)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: Linux 4.15 - 5.19 (97%), Linux 4.19 (97%), Linux 5.0 - 5.14 (97%), OpenWrt 21.02 (Linux 5.4) (97%), MikroTik RouterOS 7.2 - 7.5 (Linux 5.6.3) (97%), Linux 6.0 (95%), Linux 5.4 - 5.10 (91%), Linux 2.6.32 (91%), Linux 2.6.32 - 3.13 (91%), Linux 3.10 - 4.11 (91%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 1 hop

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 6.20 seconds

3.
katnatek 2024-10-04 02:09:28 CEST

Summary: Nmap 7.94 on Mageia 9 errors but downloaded Nmap 9.95 from http://nmap.org works OK => Nmap 7.94 on Mageia 9 errors but downloaded Nmap 7.95 from http://nmap.org works OK

Comment 1 Lewis Smith 2024-10-04 21:13:53 CEST
Thank you for the report, especially confirmation that the latest version fixes it.
We already have v7.95 in Cauldron; it needs doing for M9:
Apr 23 2024
- new version: 7.95
- remove merged upstream patch

Assigning directly to DavidG who did that.

Assignee: bugsquad => geiger.david68210

Comment 2 David GEIGER 2024-10-13 08:28:47 CEST
Assigning to QA,


Packages in 9/Core/Updates_testing:
======================
nmap-7.95-1.mga9
nmap-frontend-7.95-1.mga9
libssh2-devel-1.11.0-1.mga9
libssh2_1-1.11.0-1.mga9
lib64ssh2-devel-1.11.0-1.mga9
lib64ssh2_1-1.11.0-1.mga9

From SRPMS
nmap-7.95-1.mga9.src.rpm
libssh2-1.11.0-1.mga9.src.rpm

Assignee: geiger.david68210 => qa-bugs

katnatek 2024-10-13 19:11:23 CEST

Keywords: (none) => advisory

Comment 3 katnatek 2024-10-13 22:31:12 CEST
RH x86_64

confirmed the bug

LC_ALL=C urpmi --auto --auto-update 
adding 4 new rpms not available in existing hdlist
replacing /var/cache/urpmi/partial/synthesis.hdlist.cz with synthesis.hdlist.cz.tmp
updating /var/cache/urpmi/partial/MD5SUM
updated medium "QA Testing (64-bit)"
medium "QA Testing (32-bit)" is up-to-date
medium "Core Release (distrib1)" is up-to-date
medium "Core Updates (distrib3)" is up-to-date
medium "Nonfree Release (distrib11)" is up-to-date
medium "Nonfree Updates (distrib13)" is up-to-date
medium "Tainted Release (distrib21)" is up-to-date
medium "Tainted Updates (distrib23)" is up-to-date
medium "Core 32bit Release (distrib31)" is up-to-date
medium "Core 32bit Updates (distrib32)" is up-to-date
medium "Nonfree 32bit Release (distrib36)" is up-to-date
medium "Nonfree 32bit Updates (distrib37)" is up-to-date
medium "Tainted 32bit Release (distrib41)" is up-to-date
medium "Tainted 32bit Updates (distrib42)" is up-to-date


installing nmap-7.95-1.mga9.x86_64.rpm lib64ssh2_1-1.11.0-1.mga9.x86_64.rpm from //home/katnatek/qa-testing/x86_64
Preparing...                     ##################################################################################################
      1/2: lib64ssh2_1           ##################################################################################################
      2/2: nmap                  ##################################################################################################
      1/2: removing nmap-1:7.94-2.mga9.x86_64
                                 ##################################################################################################
      2/2: removing lib64ssh2_1-1.10.0-3.1.mga9.x86_64
                                 ##################################################################################################

Note ip value should be the assigned to your network interface, if you use dynamic ip, you canget the current ip with ifconfig 

ip=192.168.1.3 ; nmap -sV -T4 -O -F --version-light -oA $(date "+%Y_%m_%d_at_%T")"_nmap_quick_scan_plus_"${ip} ${ip}
Starting Nmap 7.95 ( https://nmap.org ) at 2024-10-13 14:28 CST
Nmap scan report for 192.168.1.3
Host is up (0.000060s latency).
Not shown: 97 closed tcp ports (reset)
PORT    STATE SERVICE  VERSION
22/tcp  open  ssh      OpenSSH 9.3 (protocol 2.0)
80/tcp  open  http     Apache httpd 2.4.62 ((Mageia) OpenSSL/3.0.15)
443/tcp open  ssl/http Apache httpd 2.4.62 ((Mageia) OpenSSL/3.0.15)
Device type: general purpose
Running: Linux 3.X|4.X
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
OS details: Linux 3.7 - 4.19
Network Distance: 0 hops

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 13.92 seconds

Looks good to me

CC: (none) => andrewsfarm
Whiteboard: (none) => MGA9-64-OK

Comment 4 Thomas Andrews 2024-10-14 04:28:48 CEST
Validating.

Keywords: (none) => validated_update
CC: (none) => sysadmin-bugs

Comment 5 Mageia Robot 2024-10-14 21:54:49 CEST
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGAA-2024-0209.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.