From 2f99483a59edc4e0ad9482551b3af2d8f4be1793 Mon Sep 17 00:00:00 2001 From: Alexey Neyman Date: Tue, 27 Jul 2021 19:15:34 -0700 Subject: [PATCH] package/nmap: fix ncat on Unix socket Starting with nmap 7.91, ncat segfaults on an attempt to use it for a Unix-domain socket (`ncat -U path`). The fix has been committed to nmap in r38121. Signed-off-by: Alexey Neyman Signed-off-by: Thomas Petazzoni --- package/nmap/0002-ncat-unix-socket.patch | 30 ++++++++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 package/nmap/0002-ncat-unix-socket.patch diff --git a/package/nmap/0002-ncat-unix-socket.patch b/package/nmap/0002-ncat-unix-socket.patch new file mode 100644 index 0000000000..b6484ebeea --- /dev/null +++ b/package/nmap/0002-ncat-unix-socket.patch @@ -0,0 +1,30 @@ +ChangeLog: + +o [Ncat][GH#2154] Ncat no longer crashes when used with Unix domain sockets. + +Backported from: r38121 + +Signed-off-by: Alexey Neyman + +Index: ncat/ncat_main.c +=================================================================== +--- a/ncat/ncat_main.c (revision 38120) ++++ b/ncat/ncat_main.c (revision 38121) +@@ -846,7 +846,7 @@ + targetaddrs->addr.un.sun_family = AF_UNIX; + strncpy(targetaddrs->addr.un.sun_path, argv[optind], sizeof(targetaddrs->addr.un.sun_path)); + targetaddrs->addrlen = SUN_LEN(&targetaddrs->addr.un); +- o.target = argv[optind]; ++ o.sslservername = o.target = argv[optind]; + optind++; + } else + #endif +@@ -865,7 +865,7 @@ + targetaddrs->addr.vm.svm_cid = long_cid; + + targetaddrs->addrlen = sizeof(targetaddrs->addr.vm); +- o.target = argv[optind]; ++ o.sslservername = o.target = argv[optind]; + optind++; + } + } else -- 2.30.2