* [Buildroot] [PATCH] package/nmap: fix ncat on Unix socket @ 2021-07-20 22:40 ` Alexey Neyman 0 siblings, 0 replies; 6+ messages in thread From: Alexey Neyman @ 2021-07-20 22:40 UTC (permalink / raw) To: buildroot [-- Attachment #1: Type: text/plain, Size: 464 bytes --] [For some reason, this email did not appear in buildroot list archive; resending] Starting with nmap 7.91, ncat segfaults on an attempt to use it for a Unix-domain socket (`ncat -U path`). The fix has been committed to nmap in r38121. Signed-off-by: Alexey Neyman <stilor@att.net> --- package/nmap/0002-ncat-unix-socket.patch | 28 ++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 package/nmap/0002-ncat-unix-socket.patch [-- Attachment #2: 0001-package-nmap-fix-ncat-on-Unix-socket.patch --] [-- Type: text/x-patch, Size: 1829 bytes --] >From 6588bd602af6c6b314e375a83ceea39ff8d807a3 Mon Sep 17 00:00:00 2001 From: Alexey Neyman <stilor@att.net> Date: Mon, 19 Jul 2021 14:45:59 -0700 Subject: [PATCH] package/nmap: fix ncat on Unix socket Starting with nmap 7.91, ncat segfaults on an attempt to use it for a Unix-domain socket (`ncat -U path`). The fix has been committed to nmap in r38121. Signed-off-by: Alexey Neyman <stilor@att.net> --- package/nmap/0002-ncat-unix-socket.patch | 28 ++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 package/nmap/0002-ncat-unix-socket.patch diff --git a/package/nmap/0002-ncat-unix-socket.patch b/package/nmap/0002-ncat-unix-socket.patch new file mode 100644 index 0000000000..adba49af01 --- /dev/null +++ b/package/nmap/0002-ncat-unix-socket.patch @@ -0,0 +1,28 @@ +ChangeLog: + +o [Ncat][GH#2154] Ncat no longer crashes when used with Unix domain sockets. + +Backported from: r38121 + +Index: ncat/ncat_main.c +=================================================================== +--- a/ncat/ncat_main.c (revision 38120) ++++ b/ncat/ncat_main.c (revision 38121) +@@ -846,7 +846,7 @@ + targetaddrs->addr.un.sun_family = AF_UNIX; + strncpy(targetaddrs->addr.un.sun_path, argv[optind], sizeof(targetaddrs->addr.un.sun_path)); + targetaddrs->addrlen = SUN_LEN(&targetaddrs->addr.un); +- o.target = argv[optind]; ++ o.sslservername = o.target = argv[optind]; + optind++; + } else + #endif +@@ -865,7 +865,7 @@ + targetaddrs->addr.vm.svm_cid = long_cid; + + targetaddrs->addrlen = sizeof(targetaddrs->addr.vm); +- o.target = argv[optind]; ++ o.sslservername = o.target = argv[optind]; + optind++; + } + } else -- 2.27.0 [-- Attachment #3: Type: text/plain, Size: 145 bytes --] _______________________________________________ buildroot mailing list buildroot@busybox.net http://lists.busybox.net/mailman/listinfo/buildroot ^ permalink raw reply related [flat|nested] 6+ messages in thread
* [Buildroot] [PATCH] package/nmap: fix ncat on Unix socket @ 2021-07-20 22:40 ` Alexey Neyman 0 siblings, 0 replies; 6+ messages in thread From: Alexey Neyman @ 2021-07-20 22:40 UTC (permalink / raw) To: buildroot [For some reason, this email did not appear in buildroot list archive; resending] Starting with nmap 7.91, ncat segfaults on an attempt to use it for a Unix-domain socket (`ncat -U path`). The fix has been committed to nmap in r38121. Signed-off-by: Alexey Neyman <stilor@att.net> --- ?package/nmap/0002-ncat-unix-socket.patch | 28 ++++++++++++++++++++++++ ?1 file changed, 28 insertions(+) ?create mode 100644 package/nmap/0002-ncat-unix-socket.patch -------------- next part -------------- A non-text attachment was scrubbed... Name: 0001-package-nmap-fix-ncat-on-Unix-socket.patch Type: text/x-patch Size: 1829 bytes Desc: not available URL: <http://lists.busybox.net/pipermail/buildroot/attachments/20210720/d8d3d14a/attachment.bin> ^ permalink raw reply [flat|nested] 6+ messages in thread
* [Buildroot] [PATCH] package/nmap: fix ncat on Unix socket 2021-07-20 22:40 ` Alexey Neyman (?) @ 2021-07-28 2:15 ` Alexey Neyman 2021-07-28 19:40 ` Thomas Petazzoni 2021-08-06 20:27 ` Peter Korsgaard -1 siblings, 2 replies; 6+ messages in thread From: Alexey Neyman @ 2021-07-28 2:15 UTC (permalink / raw) To: buildroot; +Cc: Alexey Neyman Starting with nmap 7.91, ncat segfaults on an attempt to use it for a Unix-domain socket (`ncat -U path`). The fix has been committed to nmap in r38121. Signed-off-by: Alexey Neyman <stilor@att.net> --- package/nmap/0002-ncat-unix-socket.patch | 28 ++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 package/nmap/0002-ncat-unix-socket.patch diff --git a/package/nmap/0002-ncat-unix-socket.patch b/package/nmap/0002-ncat-unix-socket.patch new file mode 100644 index 0000000000..adba49af01 --- /dev/null +++ b/package/nmap/0002-ncat-unix-socket.patch @@ -0,0 +1,28 @@ +ChangeLog: + +o [Ncat][GH#2154] Ncat no longer crashes when used with Unix domain sockets. + +Backported from: r38121 + +Index: ncat/ncat_main.c +=================================================================== +--- a/ncat/ncat_main.c (revision 38120) ++++ b/ncat/ncat_main.c (revision 38121) +@@ -846,7 +846,7 @@ + targetaddrs->addr.un.sun_family = AF_UNIX; + strncpy(targetaddrs->addr.un.sun_path, argv[optind], sizeof(targetaddrs->addr.un.sun_path)); + targetaddrs->addrlen = SUN_LEN(&targetaddrs->addr.un); +- o.target = argv[optind]; ++ o.sslservername = o.target = argv[optind]; + optind++; + } else + #endif +@@ -865,7 +865,7 @@ + targetaddrs->addr.vm.svm_cid = long_cid; + + targetaddrs->addrlen = sizeof(targetaddrs->addr.vm); +- o.target = argv[optind]; ++ o.sslservername = o.target = argv[optind]; + optind++; + } + } else -- 2.27.0 _______________________________________________ buildroot mailing list buildroot@busybox.net http://lists.busybox.net/mailman/listinfo/buildroot ^ permalink raw reply related [flat|nested] 6+ messages in thread
* Re: [Buildroot] [PATCH] package/nmap: fix ncat on Unix socket 2021-07-28 2:15 ` Alexey Neyman @ 2021-07-28 19:40 ` Thomas Petazzoni 2021-08-06 20:27 ` Peter Korsgaard 1 sibling, 0 replies; 6+ messages in thread From: Thomas Petazzoni @ 2021-07-28 19:40 UTC (permalink / raw) To: Alexey Neyman; +Cc: buildroot On Tue, 27 Jul 2021 19:15:34 -0700 Alexey Neyman <stilor@att.net> wrote: > Starting with nmap 7.91, ncat segfaults on an attempt to use it for a > Unix-domain socket (`ncat -U path`). The fix has been committed to nmap > in r38121. > > Signed-off-by: Alexey Neyman <stilor@att.net> > --- > package/nmap/0002-ncat-unix-socket.patch | 28 ++++++++++++++++++++++++ > 1 file changed, 28 insertions(+) > create mode 100644 package/nmap/0002-ncat-unix-socket.patch Applied to master, thanks. Thomas -- Thomas Petazzoni, CTO, Bootlin Embedded Linux and Kernel engineering https://bootlin.com _______________________________________________ buildroot mailing list buildroot@busybox.net http://lists.busybox.net/mailman/listinfo/buildroot ^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [Buildroot] [PATCH] package/nmap: fix ncat on Unix socket 2021-07-28 2:15 ` Alexey Neyman 2021-07-28 19:40 ` Thomas Petazzoni @ 2021-08-06 20:27 ` Peter Korsgaard 1 sibling, 0 replies; 6+ messages in thread From: Peter Korsgaard @ 2021-08-06 20:27 UTC (permalink / raw) To: Alexey Neyman; +Cc: buildroot >>>>> "Alexey" == Alexey Neyman <stilor@att.net> writes: > Starting with nmap 7.91, ncat segfaults on an attempt to use it for a > Unix-domain socket (`ncat -U path`). The fix has been committed to nmap > in r38121. > Signed-off-by: Alexey Neyman <stilor@att.net> Committed to 2021.02.x and 2021.05.x, thanks. -- Bye, Peter Korsgaard _______________________________________________ buildroot mailing list buildroot@busybox.net http://lists.busybox.net/mailman/listinfo/buildroot ^ permalink raw reply [flat|nested] 6+ messages in thread
[parent not found: <dfa77faa-b620-5981-1761-812886af29fc.ref@att.net>]
* [Buildroot] [PATCH] package/nmap: fix ncat on Unix socket [not found] <dfa77faa-b620-5981-1761-812886af29fc.ref@att.net> @ 2021-07-19 21:51 ` Alexey Neyman 0 siblings, 0 replies; 6+ messages in thread From: Alexey Neyman @ 2021-07-19 21:51 UTC (permalink / raw) To: buildroot Starting with nmap 7.91, ncat segfaults on an attempt to use it for a Unix-domain socket (`ncat -U path`). The fix has been committed to nmap in r38121. Signed-off-by: Alexey Neyman <stilor@att.net> --- ?package/nmap/0002-ncat-unix-socket.patch | 28 ++++++++++++++++++++++++ ?1 file changed, 28 insertions(+) ?create mode 100644 package/nmap/0002-ncat-unix-socket.patch -------------- next part -------------- A non-text attachment was scrubbed... Name: 0001-package-nmap-fix-ncat-on-Unix-socket.patch Type: text/x-patch Size: 1828 bytes Desc: not available URL: <http://lists.busybox.net/pipermail/buildroot/attachments/20210719/e7ae5d0d/attachment-0001.bin> ^ permalink raw reply [flat|nested] 6+ messages in thread
end of thread, other threads:[~2021-08-06 20:27 UTC | newest] Thread overview: 6+ messages (download: mbox.gz / follow: Atom feed) -- links below jump to the message on this page -- [not found] <94578b85-8388-1cf0-5c57-d970a092a712.ref@att.net> 2021-07-20 22:40 ` [Buildroot] [PATCH] package/nmap: fix ncat on Unix socket Alexey Neyman 2021-07-20 22:40 ` Alexey Neyman 2021-07-28 2:15 ` Alexey Neyman 2021-07-28 19:40 ` Thomas Petazzoni 2021-08-06 20:27 ` Peter Korsgaard [not found] <dfa77faa-b620-5981-1761-812886af29fc.ref@att.net> 2021-07-19 21:51 ` Alexey Neyman
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.