* [Buildroot] [PATCH] package/nmap: fix ncat on Unix socket
@ 2021-07-20 22:40 ` Alexey Neyman
0 siblings, 0 replies; 6+ messages in thread
From: Alexey Neyman @ 2021-07-20 22:40 UTC (permalink / raw)
To: buildroot
[-- Attachment #1: Type: text/plain, Size: 464 bytes --]
[For some reason, this email did not appear in buildroot list archive;
resending]
Starting with nmap 7.91, ncat segfaults on an attempt to use it for a
Unix-domain socket (`ncat -U path`). The fix has been committed to nmap
in r38121.
Signed-off-by: Alexey Neyman <stilor@att.net>
---
package/nmap/0002-ncat-unix-socket.patch | 28 ++++++++++++++++++++++++
1 file changed, 28 insertions(+)
create mode 100644 package/nmap/0002-ncat-unix-socket.patch
[-- Attachment #2: 0001-package-nmap-fix-ncat-on-Unix-socket.patch --]
[-- Type: text/x-patch, Size: 1829 bytes --]
>From 6588bd602af6c6b314e375a83ceea39ff8d807a3 Mon Sep 17 00:00:00 2001
From: Alexey Neyman <stilor@att.net>
Date: Mon, 19 Jul 2021 14:45:59 -0700
Subject: [PATCH] package/nmap: fix ncat on Unix socket
Starting with nmap 7.91, ncat segfaults on an attempt to use it for a
Unix-domain socket (`ncat -U path`). The fix has been committed to nmap
in r38121.
Signed-off-by: Alexey Neyman <stilor@att.net>
---
package/nmap/0002-ncat-unix-socket.patch | 28 ++++++++++++++++++++++++
1 file changed, 28 insertions(+)
create mode 100644 package/nmap/0002-ncat-unix-socket.patch
diff --git a/package/nmap/0002-ncat-unix-socket.patch b/package/nmap/0002-ncat-unix-socket.patch
new file mode 100644
index 0000000000..adba49af01
--- /dev/null
+++ b/package/nmap/0002-ncat-unix-socket.patch
@@ -0,0 +1,28 @@
+ChangeLog:
+
+o [Ncat][GH#2154] Ncat no longer crashes when used with Unix domain sockets.
+
+Backported from: r38121
+
+Index: ncat/ncat_main.c
+===================================================================
+--- a/ncat/ncat_main.c (revision 38120)
++++ b/ncat/ncat_main.c (revision 38121)
+@@ -846,7 +846,7 @@
+ targetaddrs->addr.un.sun_family = AF_UNIX;
+ strncpy(targetaddrs->addr.un.sun_path, argv[optind], sizeof(targetaddrs->addr.un.sun_path));
+ targetaddrs->addrlen = SUN_LEN(&targetaddrs->addr.un);
+- o.target = argv[optind];
++ o.sslservername = o.target = argv[optind];
+ optind++;
+ } else
+ #endif
+@@ -865,7 +865,7 @@
+ targetaddrs->addr.vm.svm_cid = long_cid;
+
+ targetaddrs->addrlen = sizeof(targetaddrs->addr.vm);
+- o.target = argv[optind];
++ o.sslservername = o.target = argv[optind];
+ optind++;
+ }
+ } else
--
2.27.0
[-- Attachment #3: Type: text/plain, Size: 145 bytes --]
_______________________________________________
buildroot mailing list
buildroot@busybox.net
http://lists.busybox.net/mailman/listinfo/buildroot
^ permalink raw reply related [flat|nested] 6+ messages in thread
* [Buildroot] [PATCH] package/nmap: fix ncat on Unix socket
@ 2021-07-20 22:40 ` Alexey Neyman
0 siblings, 0 replies; 6+ messages in thread
From: Alexey Neyman @ 2021-07-20 22:40 UTC (permalink / raw)
To: buildroot
[For some reason, this email did not appear in buildroot list archive;
resending]
Starting with nmap 7.91, ncat segfaults on an attempt to use it for a
Unix-domain socket (`ncat -U path`). The fix has been committed to nmap
in r38121.
Signed-off-by: Alexey Neyman <stilor@att.net>
---
?package/nmap/0002-ncat-unix-socket.patch | 28 ++++++++++++++++++++++++
?1 file changed, 28 insertions(+)
?create mode 100644 package/nmap/0002-ncat-unix-socket.patch
-------------- next part --------------
A non-text attachment was scrubbed...
Name: 0001-package-nmap-fix-ncat-on-Unix-socket.patch
Type: text/x-patch
Size: 1829 bytes
Desc: not available
URL: <http://lists.busybox.net/pipermail/buildroot/attachments/20210720/d8d3d14a/attachment.bin>
^ permalink raw reply [flat|nested] 6+ messages in thread
* [Buildroot] [PATCH] package/nmap: fix ncat on Unix socket
2021-07-20 22:40 ` Alexey Neyman
(?)
@ 2021-07-28 2:15 ` Alexey Neyman
2021-07-28 19:40 ` Thomas Petazzoni
2021-08-06 20:27 ` Peter Korsgaard
-1 siblings, 2 replies; 6+ messages in thread
From: Alexey Neyman @ 2021-07-28 2:15 UTC (permalink / raw)
To: buildroot; +Cc: Alexey Neyman
Starting with nmap 7.91, ncat segfaults on an attempt to use it for a
Unix-domain socket (`ncat -U path`). The fix has been committed to nmap
in r38121.
Signed-off-by: Alexey Neyman <stilor@att.net>
---
package/nmap/0002-ncat-unix-socket.patch | 28 ++++++++++++++++++++++++
1 file changed, 28 insertions(+)
create mode 100644 package/nmap/0002-ncat-unix-socket.patch
diff --git a/package/nmap/0002-ncat-unix-socket.patch b/package/nmap/0002-ncat-unix-socket.patch
new file mode 100644
index 0000000000..adba49af01
--- /dev/null
+++ b/package/nmap/0002-ncat-unix-socket.patch
@@ -0,0 +1,28 @@
+ChangeLog:
+
+o [Ncat][GH#2154] Ncat no longer crashes when used with Unix domain sockets.
+
+Backported from: r38121
+
+Index: ncat/ncat_main.c
+===================================================================
+--- a/ncat/ncat_main.c (revision 38120)
++++ b/ncat/ncat_main.c (revision 38121)
+@@ -846,7 +846,7 @@
+ targetaddrs->addr.un.sun_family = AF_UNIX;
+ strncpy(targetaddrs->addr.un.sun_path, argv[optind], sizeof(targetaddrs->addr.un.sun_path));
+ targetaddrs->addrlen = SUN_LEN(&targetaddrs->addr.un);
+- o.target = argv[optind];
++ o.sslservername = o.target = argv[optind];
+ optind++;
+ } else
+ #endif
+@@ -865,7 +865,7 @@
+ targetaddrs->addr.vm.svm_cid = long_cid;
+
+ targetaddrs->addrlen = sizeof(targetaddrs->addr.vm);
+- o.target = argv[optind];
++ o.sslservername = o.target = argv[optind];
+ optind++;
+ }
+ } else
--
2.27.0
_______________________________________________
buildroot mailing list
buildroot@busybox.net
http://lists.busybox.net/mailman/listinfo/buildroot
^ permalink raw reply related [flat|nested] 6+ messages in thread
* Re: [Buildroot] [PATCH] package/nmap: fix ncat on Unix socket
2021-07-28 2:15 ` Alexey Neyman
@ 2021-07-28 19:40 ` Thomas Petazzoni
2021-08-06 20:27 ` Peter Korsgaard
1 sibling, 0 replies; 6+ messages in thread
From: Thomas Petazzoni @ 2021-07-28 19:40 UTC (permalink / raw)
To: Alexey Neyman; +Cc: buildroot
On Tue, 27 Jul 2021 19:15:34 -0700
Alexey Neyman <stilor@att.net> wrote:
> Starting with nmap 7.91, ncat segfaults on an attempt to use it for a
> Unix-domain socket (`ncat -U path`). The fix has been committed to nmap
> in r38121.
>
> Signed-off-by: Alexey Neyman <stilor@att.net>
> ---
> package/nmap/0002-ncat-unix-socket.patch | 28 ++++++++++++++++++++++++
> 1 file changed, 28 insertions(+)
> create mode 100644 package/nmap/0002-ncat-unix-socket.patch
Applied to master, thanks.
Thomas
--
Thomas Petazzoni, CTO, Bootlin
Embedded Linux and Kernel engineering
https://bootlin.com
_______________________________________________
buildroot mailing list
buildroot@busybox.net
http://lists.busybox.net/mailman/listinfo/buildroot
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [Buildroot] [PATCH] package/nmap: fix ncat on Unix socket
2021-07-28 2:15 ` Alexey Neyman
2021-07-28 19:40 ` Thomas Petazzoni
@ 2021-08-06 20:27 ` Peter Korsgaard
1 sibling, 0 replies; 6+ messages in thread
From: Peter Korsgaard @ 2021-08-06 20:27 UTC (permalink / raw)
To: Alexey Neyman; +Cc: buildroot
>>>>> "Alexey" == Alexey Neyman <stilor@att.net> writes:
> Starting with nmap 7.91, ncat segfaults on an attempt to use it for a
> Unix-domain socket (`ncat -U path`). The fix has been committed to nmap
> in r38121.
> Signed-off-by: Alexey Neyman <stilor@att.net>
Committed to 2021.02.x and 2021.05.x, thanks.
--
Bye, Peter Korsgaard
_______________________________________________
buildroot mailing list
buildroot@busybox.net
http://lists.busybox.net/mailman/listinfo/buildroot
^ permalink raw reply [flat|nested] 6+ messages in thread
* [Buildroot] [PATCH] package/nmap: fix ncat on Unix socket
[not found] <dfa77faa-b620-5981-1761-812886af29fc.ref@att.net>
@ 2021-07-19 21:51 ` Alexey Neyman
0 siblings, 0 replies; 6+ messages in thread
From: Alexey Neyman @ 2021-07-19 21:51 UTC (permalink / raw)
To: buildroot
Starting with nmap 7.91, ncat segfaults on an attempt to use it for a
Unix-domain socket (`ncat -U path`). The fix has been committed to nmap
in r38121.
Signed-off-by: Alexey Neyman <stilor@att.net>
---
?package/nmap/0002-ncat-unix-socket.patch | 28 ++++++++++++++++++++++++
?1 file changed, 28 insertions(+)
?create mode 100644 package/nmap/0002-ncat-unix-socket.patch
-------------- next part --------------
A non-text attachment was scrubbed...
Name: 0001-package-nmap-fix-ncat-on-Unix-socket.patch
Type: text/x-patch
Size: 1828 bytes
Desc: not available
URL: <http://lists.busybox.net/pipermail/buildroot/attachments/20210719/e7ae5d0d/attachment-0001.bin>
^ permalink raw reply [flat|nested] 6+ messages in thread
end of thread, other threads:[~2021-08-06 20:27 UTC | newest]
Thread overview: 6+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
[not found] <94578b85-8388-1cf0-5c57-d970a092a712.ref@att.net>
2021-07-20 22:40 ` [Buildroot] [PATCH] package/nmap: fix ncat on Unix socket Alexey Neyman
2021-07-20 22:40 ` Alexey Neyman
2021-07-28 2:15 ` Alexey Neyman
2021-07-28 19:40 ` Thomas Petazzoni
2021-08-06 20:27 ` Peter Korsgaard
[not found] <dfa77faa-b620-5981-1761-812886af29fc.ref@att.net>
2021-07-19 21:51 ` Alexey Neyman
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.