All of lore.kernel.org
 help / color / mirror / Atom feed
* [Buildroot] [PATCH] package/nmap: fix ncat on Unix socket
@ 2021-07-20 22:40   ` Alexey Neyman
  0 siblings, 0 replies; 6+ messages in thread
From: Alexey Neyman @ 2021-07-20 22:40 UTC (permalink / raw)
  To: buildroot

[-- Attachment #1: Type: text/plain, Size: 464 bytes --]

[For some reason, this email did not appear in buildroot list archive; 
resending]

Starting with nmap 7.91, ncat segfaults on an attempt to use it for a
Unix-domain socket (`ncat -U path`). The fix has been committed to nmap
in r38121.

Signed-off-by: Alexey Neyman <stilor@att.net>
---
  package/nmap/0002-ncat-unix-socket.patch | 28 ++++++++++++++++++++++++
  1 file changed, 28 insertions(+)
  create mode 100644 package/nmap/0002-ncat-unix-socket.patch




[-- Attachment #2: 0001-package-nmap-fix-ncat-on-Unix-socket.patch --]
[-- Type: text/x-patch, Size: 1829 bytes --]

>From 6588bd602af6c6b314e375a83ceea39ff8d807a3 Mon Sep 17 00:00:00 2001
From: Alexey Neyman <stilor@att.net>
Date: Mon, 19 Jul 2021 14:45:59 -0700
Subject: [PATCH] package/nmap: fix ncat on Unix socket

Starting with nmap 7.91, ncat segfaults on an attempt to use it for a
Unix-domain socket (`ncat -U path`). The fix has been committed to nmap
in r38121.

Signed-off-by: Alexey Neyman <stilor@att.net>
---
 package/nmap/0002-ncat-unix-socket.patch | 28 ++++++++++++++++++++++++
 1 file changed, 28 insertions(+)
 create mode 100644 package/nmap/0002-ncat-unix-socket.patch

diff --git a/package/nmap/0002-ncat-unix-socket.patch b/package/nmap/0002-ncat-unix-socket.patch
new file mode 100644
index 0000000000..adba49af01
--- /dev/null
+++ b/package/nmap/0002-ncat-unix-socket.patch
@@ -0,0 +1,28 @@
+ChangeLog:
+
+o [Ncat][GH#2154] Ncat no longer crashes when used with Unix domain sockets.
+
+Backported from: r38121
+
+Index: ncat/ncat_main.c
+===================================================================
+--- a/ncat/ncat_main.c	(revision 38120)
++++ b/ncat/ncat_main.c	(revision 38121)
+@@ -846,7 +846,7 @@
+             targetaddrs->addr.un.sun_family = AF_UNIX;
+             strncpy(targetaddrs->addr.un.sun_path, argv[optind], sizeof(targetaddrs->addr.un.sun_path));
+             targetaddrs->addrlen = SUN_LEN(&targetaddrs->addr.un);
+-            o.target = argv[optind];
++            o.sslservername = o.target = argv[optind];
+             optind++;
+         } else
+ #endif
+@@ -865,7 +865,7 @@
+                 targetaddrs->addr.vm.svm_cid = long_cid;
+ 
+                 targetaddrs->addrlen = sizeof(targetaddrs->addr.vm);
+-                o.target = argv[optind];
++                o.sslservername = o.target = argv[optind];
+                 optind++;
+             }
+         } else
-- 
2.27.0



[-- Attachment #3: Type: text/plain, Size: 145 bytes --]

_______________________________________________
buildroot mailing list
buildroot@busybox.net
http://lists.busybox.net/mailman/listinfo/buildroot

^ permalink raw reply related	[flat|nested] 6+ messages in thread

* [Buildroot] [PATCH] package/nmap: fix ncat on Unix socket
@ 2021-07-20 22:40   ` Alexey Neyman
  0 siblings, 0 replies; 6+ messages in thread
From: Alexey Neyman @ 2021-07-20 22:40 UTC (permalink / raw)
  To: buildroot

[For some reason, this email did not appear in buildroot list archive; 
resending]

Starting with nmap 7.91, ncat segfaults on an attempt to use it for a
Unix-domain socket (`ncat -U path`). The fix has been committed to nmap
in r38121.

Signed-off-by: Alexey Neyman <stilor@att.net>
---
 ?package/nmap/0002-ncat-unix-socket.patch | 28 ++++++++++++++++++++++++
 ?1 file changed, 28 insertions(+)
 ?create mode 100644 package/nmap/0002-ncat-unix-socket.patch



-------------- next part --------------
A non-text attachment was scrubbed...
Name: 0001-package-nmap-fix-ncat-on-Unix-socket.patch
Type: text/x-patch
Size: 1829 bytes
Desc: not available
URL: <http://lists.busybox.net/pipermail/buildroot/attachments/20210720/d8d3d14a/attachment.bin>

^ permalink raw reply	[flat|nested] 6+ messages in thread

* [Buildroot] [PATCH] package/nmap: fix ncat on Unix socket
  2021-07-20 22:40   ` Alexey Neyman
  (?)
@ 2021-07-28  2:15   ` Alexey Neyman
  2021-07-28 19:40     ` Thomas Petazzoni
  2021-08-06 20:27     ` Peter Korsgaard
  -1 siblings, 2 replies; 6+ messages in thread
From: Alexey Neyman @ 2021-07-28  2:15 UTC (permalink / raw)
  To: buildroot; +Cc: Alexey Neyman

Starting with nmap 7.91, ncat segfaults on an attempt to use it for a
Unix-domain socket (`ncat -U path`). The fix has been committed to nmap
in r38121.

Signed-off-by: Alexey Neyman <stilor@att.net>
---
 package/nmap/0002-ncat-unix-socket.patch | 28 ++++++++++++++++++++++++
 1 file changed, 28 insertions(+)
 create mode 100644 package/nmap/0002-ncat-unix-socket.patch

diff --git a/package/nmap/0002-ncat-unix-socket.patch b/package/nmap/0002-ncat-unix-socket.patch
new file mode 100644
index 0000000000..adba49af01
--- /dev/null
+++ b/package/nmap/0002-ncat-unix-socket.patch
@@ -0,0 +1,28 @@
+ChangeLog:
+
+o [Ncat][GH#2154] Ncat no longer crashes when used with Unix domain sockets.
+
+Backported from: r38121
+
+Index: ncat/ncat_main.c
+===================================================================
+--- a/ncat/ncat_main.c	(revision 38120)
++++ b/ncat/ncat_main.c	(revision 38121)
+@@ -846,7 +846,7 @@
+             targetaddrs->addr.un.sun_family = AF_UNIX;
+             strncpy(targetaddrs->addr.un.sun_path, argv[optind], sizeof(targetaddrs->addr.un.sun_path));
+             targetaddrs->addrlen = SUN_LEN(&targetaddrs->addr.un);
+-            o.target = argv[optind];
++            o.sslservername = o.target = argv[optind];
+             optind++;
+         } else
+ #endif
+@@ -865,7 +865,7 @@
+                 targetaddrs->addr.vm.svm_cid = long_cid;
+ 
+                 targetaddrs->addrlen = sizeof(targetaddrs->addr.vm);
+-                o.target = argv[optind];
++                o.sslservername = o.target = argv[optind];
+                 optind++;
+             }
+         } else
-- 
2.27.0

_______________________________________________
buildroot mailing list
buildroot@busybox.net
http://lists.busybox.net/mailman/listinfo/buildroot

^ permalink raw reply related	[flat|nested] 6+ messages in thread

* Re: [Buildroot] [PATCH] package/nmap: fix ncat on Unix socket
  2021-07-28  2:15   ` Alexey Neyman
@ 2021-07-28 19:40     ` Thomas Petazzoni
  2021-08-06 20:27     ` Peter Korsgaard
  1 sibling, 0 replies; 6+ messages in thread
From: Thomas Petazzoni @ 2021-07-28 19:40 UTC (permalink / raw)
  To: Alexey Neyman; +Cc: buildroot

On Tue, 27 Jul 2021 19:15:34 -0700
Alexey Neyman <stilor@att.net> wrote:

> Starting with nmap 7.91, ncat segfaults on an attempt to use it for a
> Unix-domain socket (`ncat -U path`). The fix has been committed to nmap
> in r38121.
> 
> Signed-off-by: Alexey Neyman <stilor@att.net>
> ---
>  package/nmap/0002-ncat-unix-socket.patch | 28 ++++++++++++++++++++++++
>  1 file changed, 28 insertions(+)
>  create mode 100644 package/nmap/0002-ncat-unix-socket.patch

Applied to master, thanks.

Thomas
-- 
Thomas Petazzoni, CTO, Bootlin
Embedded Linux and Kernel engineering
https://bootlin.com
_______________________________________________
buildroot mailing list
buildroot@busybox.net
http://lists.busybox.net/mailman/listinfo/buildroot

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [Buildroot] [PATCH] package/nmap: fix ncat on Unix socket
  2021-07-28  2:15   ` Alexey Neyman
  2021-07-28 19:40     ` Thomas Petazzoni
@ 2021-08-06 20:27     ` Peter Korsgaard
  1 sibling, 0 replies; 6+ messages in thread
From: Peter Korsgaard @ 2021-08-06 20:27 UTC (permalink / raw)
  To: Alexey Neyman; +Cc: buildroot

>>>>> "Alexey" == Alexey Neyman <stilor@att.net> writes:

 > Starting with nmap 7.91, ncat segfaults on an attempt to use it for a
 > Unix-domain socket (`ncat -U path`). The fix has been committed to nmap
 > in r38121.

 > Signed-off-by: Alexey Neyman <stilor@att.net>

Committed to 2021.02.x and 2021.05.x, thanks.

-- 
Bye, Peter Korsgaard
_______________________________________________
buildroot mailing list
buildroot@busybox.net
http://lists.busybox.net/mailman/listinfo/buildroot

^ permalink raw reply	[flat|nested] 6+ messages in thread

* [Buildroot] [PATCH] package/nmap: fix ncat on Unix socket
       [not found] <dfa77faa-b620-5981-1761-812886af29fc.ref@att.net>
@ 2021-07-19 21:51 ` Alexey Neyman
  0 siblings, 0 replies; 6+ messages in thread
From: Alexey Neyman @ 2021-07-19 21:51 UTC (permalink / raw)
  To: buildroot

Starting with nmap 7.91, ncat segfaults on an attempt to use it for a
Unix-domain socket (`ncat -U path`). The fix has been committed to nmap
in r38121.

Signed-off-by: Alexey Neyman <stilor@att.net>
---
 ?package/nmap/0002-ncat-unix-socket.patch | 28 ++++++++++++++++++++++++
 ?1 file changed, 28 insertions(+)
 ?create mode 100644 package/nmap/0002-ncat-unix-socket.patch

-------------- next part --------------
A non-text attachment was scrubbed...
Name: 0001-package-nmap-fix-ncat-on-Unix-socket.patch
Type: text/x-patch
Size: 1828 bytes
Desc: not available
URL: <http://lists.busybox.net/pipermail/buildroot/attachments/20210719/e7ae5d0d/attachment-0001.bin>

^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2021-08-06 20:27 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
     [not found] <94578b85-8388-1cf0-5c57-d970a092a712.ref@att.net>
2021-07-20 22:40 ` [Buildroot] [PATCH] package/nmap: fix ncat on Unix socket Alexey Neyman
2021-07-20 22:40   ` Alexey Neyman
2021-07-28  2:15   ` Alexey Neyman
2021-07-28 19:40     ` Thomas Petazzoni
2021-08-06 20:27     ` Peter Korsgaard
     [not found] <dfa77faa-b620-5981-1761-812886af29fc.ref@att.net>
2021-07-19 21:51 ` Alexey Neyman

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.