nmap/ncat-fix-unix-domain-socket-crash.patch
Sergio Correia c673aed0aa
Backport fix for UNIX domain socket crash
This causes problems for clevis, that depends on ncat to unlock LUKS
devices upon boot.

Issue can be reproduced with `ncat -U /dev/null'

Problem:
ncat -U /dev/null
Segmentation fault (core dumped)

Expected:
ncat -U /dev/null
Ncat: Connection refused.

Upstream: f6b40614e4

Signed-off-by: Sergio Correia <scorreia@redhat.com>
2020-10-22 12:01:54 -03:00

30 lines
1.2 KiB
Diff

From f6b40614e4a8131394792d590965f8af3c635323 Mon Sep 17 00:00:00 2001
From: nnposter <nnposter@e0a8ed71-7df4-0310-8962-fdc924857419>
Date: Fri, 16 Oct 2020 02:54:52 +0000
Subject: [PATCH] Fix a Unix domain socket crash. Fixes #2154
Upstream: https://github.com/nmap/nmap/commit/f6b40614e4a8131394792d590965f8af3c635323
diff --git a/ncat/ncat_main.c b/ncat/ncat_main.c
index d59b951..92eccad 100644
--- a/ncat/ncat_main.c
+++ b/ncat/ncat_main.c
@@ -848,7 +848,7 @@ int main(int argc, char *argv[])
targetaddrs->addr.un.sun_family = AF_UNIX;
strncpy(targetaddrs->addr.un.sun_path, argv[optind], sizeof(targetaddrs->addr.un.sun_path));
targetaddrs->addrlen = SUN_LEN(&targetaddrs->addr.un);
- o.target = argv[optind];
+ o.sslservername = o.target = argv[optind];
optind++;
} else
#endif
@@ -867,7 +867,7 @@ int main(int argc, char *argv[])
targetaddrs->addr.vm.svm_cid = long_cid;
targetaddrs->addrlen = sizeof(targetaddrs->addr.vm);
- o.target = argv[optind];
+ o.sslservername = o.target = argv[optind];
optind++;
}
} else