>From 6588bd602af6c6b314e375a83ceea39ff8d807a3 Mon Sep 17 00:00:00 2001
From: Alexey Neyman <stilor@att.net>
Date: Mon, 19 Jul 2021 14:45:59 -0700
Subject: [PATCH] package/nmap: fix ncat on Unix socket
Starting with nmap 7.91, ncat segfaults on an attempt to use it for a
Unix-domain socket (`ncat -U path`). The fix has been committed to nmap
in r38121.
Signed-off-by: Alexey Neyman <stilor@att.net>
---
package/nmap/0002-ncat-unix-socket.patch | 28 ++++++++++++++++++++++++
1 file changed, 28 insertions(+)
create mode 100644 package/nmap/0002-ncat-unix-socket.patch
new file mode 100644
@@ -0,0 +1,28 @@
+ChangeLog:
+
+o [Ncat][GH#2154] Ncat no longer crashes when used with Unix domain sockets.
+
+Backported from: r38121
+
+Index: ncat/ncat_main.c
+===================================================================
+--- a/ncat/ncat_main.c (revision 38120)
++++ b/ncat/ncat_main.c (revision 38121)
+@@ -846,7 +846,7 @@
+ targetaddrs->addr.un.sun_family = AF_UNIX;
+ strncpy(targetaddrs->addr.un.sun_path, argv[optind], sizeof(targetaddrs->addr.un.sun_path));
+ targetaddrs->addrlen = SUN_LEN(&targetaddrs->addr.un);
+- o.target = argv[optind];
++ o.sslservername = o.target = argv[optind];
+ optind++;
+ } else
+ #endif
+@@ -865,7 +865,7 @@
+ targetaddrs->addr.vm.svm_cid = long_cid;
+
+ targetaddrs->addrlen = sizeof(targetaddrs->addr.vm);
+- o.target = argv[optind];
++ o.sslservername = o.target = argv[optind];
+ optind++;
+ }
+ } else
--
2.27.0
[For some reason, this email did not appear in buildroot list archive; resending] Starting with nmap 7.91, ncat segfaults on an attempt to use it for a Unix-domain socket (`ncat -U path`). The fix has been committed to nmap in r38121. Signed-off-by: Alexey Neyman <stilor@att.net> --- package/nmap/0002-ncat-unix-socket.patch | 28 ++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 package/nmap/0002-ncat-unix-socket.patch