mirror of
https://github.com/nmap/nmap.git
synced 2026-01-01 12:29:03 +00:00
23625913a813de7cd39549855eecc49881d258fb
It appears that connecting more than one with the same nse_nsock socket leaks socket descriptor. For example, local s = nmap.new_socket() s:connect(host, port) --> TIMEOUT s:connect(host, port) --> TIMEOUT s:close() leaks a socket descriptor, the one used in the first connect. Nsock should really take care of this, but let's do this workaround because rpc-grind has been causing problems due to using the above pattern: http://seclists.org/nmap-dev/2012/q3/864 http://seclists.org/nmap-dev/2012/q3/872 http://seclists.org/nmap-dev/2012/q3/949 The difficulty is that the rpc library will tolerate around 400 of those timeouts per RPC connection, which leads to rapidly running out of descriptors.
Fix a bug in the argparser. When users pass 'random' as an IPv6 address, the randomly generated address never gets stored. This was reported and fixed by Mark Atkinson. More info: http://seclists.org/nmap-dev/2012/q3/950
Here is some documentation for Nmap, but these files are much less comprehensive than what you'll find at the actual Nmap documentation site ( http://nmap.org ).
Description
Languages
C
37.8%
Lua
28.1%
C++
16.7%
Shell
5.8%
Python
4.2%
Other
7.2%