>From 6588bd602af6c6b314e375a83ceea39ff8d807a3 Mon Sep 17 00:00:00 2001 From: Alexey Neyman Date: Mon, 19 Jul 2021 14:45:59 -0700 Subject: [PATCH] package/nmap: fix ncat on Unix socket Starting with nmap 7.91, ncat segfaults on an attempt to use it for a Unix-domain socket (`ncat -U path`). The fix has been committed to nmap in r38121. Signed-off-by: Alexey Neyman --- package/nmap/0002-ncat-unix-socket.patch | 28 ++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 package/nmap/0002-ncat-unix-socket.patch diff --git a/package/nmap/0002-ncat-unix-socket.patch b/package/nmap/0002-ncat-unix-socket.patch new file mode 100644 index 0000000000..adba49af01 --- /dev/null +++ b/package/nmap/0002-ncat-unix-socket.patch @@ -0,0 +1,28 @@ +ChangeLog: + +o [Ncat][GH#2154] Ncat no longer crashes when used with Unix domain sockets. + +Backported from: r38121 + +Index: ncat/ncat_main.c +=================================================================== +--- a/ncat/ncat_main.c (revision 38120) ++++ b/ncat/ncat_main.c (revision 38121) +@@ -846,7 +846,7 @@ + targetaddrs->addr.un.sun_family = AF_UNIX; + strncpy(targetaddrs->addr.un.sun_path, argv[optind], sizeof(targetaddrs->addr.un.sun_path)); + targetaddrs->addrlen = SUN_LEN(&targetaddrs->addr.un); +- o.target = argv[optind]; ++ o.sslservername = o.target = argv[optind]; + optind++; + } else + #endif +@@ -865,7 +865,7 @@ + targetaddrs->addr.vm.svm_cid = long_cid; + + targetaddrs->addrlen = sizeof(targetaddrs->addr.vm); +- o.target = argv[optind]; ++ o.sslservername = o.target = argv[optind]; + optind++; + } + } else -- 2.27.0