Your message dated Thu, 03 Jan 2013 21:32:52 +0000
with message-id <e1tqspe-0005vh...@franck.debian.org>
and subject line Bug#696446: fixed in nmap 6.00-0.3
has caused the Debian Bug report #696446,
regarding nmap: Errors out at startup if running as root and there is a network 
interface in monitor mode
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
696446: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696446
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: nmap
Version: 6.00-0.2
Severity: important

nmap errors out at startup if it is run as root and the system has any
network interface which is in monitor mode:

root@cascade:~# nmap scanme.nmap.org

Starting Nmap 6.00 ( http://nmap.org ) at 2012-12-20 16:26 EST
route_dst_netlink: can't find interface "eth0"
root@cascade:~# ifconfig mon.wlan0
mon.wlan0 Link encap:UNSPEC  HWaddr
F8-D1-11-19-DD-F6-B0-1E-00-00-00-00-00-00-00-00
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:266716 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:63082415 (60.1 MiB)  TX bytes:0 (0.0 B)

This bug is fixed upstream in nmap-6.01. Here is the relevant changelog entry:

o Fixed a bug that caused Nmap to fail to find any network interface when
  at least one of them is in the monitor mode. The fix was to define the
  ARP_HRD_IEEE80211_RADIOTAP 802.11 radiotap header identifier in the
  libdnet-stripped code. Network interfaces that are in this mode are used
  by radiotap for 802.11 frame injection and reception. The bug was
  reported by Tom Eichstaedt and Henri Doreau.
  http://seclists.org/nmap-dev/2012/q2/449
  http://seclists.org/nmap-dev/2012/q2/478
  [Djalal Harouni, Henri Doreau]

-- System Information:
Debian Release: wheezy/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages nmap depends on:
ii  libc6        2.13-37
ii  libgcc1      1:4.7.2-4
ii  liblinear1   1.8+dfsg-1
ii  liblua5.1-0  5.1.5-4
ii  libpcap0.8   1.3.0-1
ii  libpcre3     1:8.30-5
ii  libssl1.0.0  1.0.1c-4
ii  libstdc++6   4.7.2-4
ii  python       2.7.3~rc2-1

nmap recommends no packages.

nmap suggests no packages.

--- End Message ---
--- Begin Message ---
Source: nmap
Source-Version: 6.00-0.3

We believe that the bug you reported is fixed in the latest version of
nmap, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 696...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Hilko Bengen <ben...@debian.org> (supplier of updated nmap package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Sat, 29 Dec 2012 18:43:12 +0100
Source: nmap
Binary: nmap zenmap
Architecture: source amd64
Version: 6.00-0.3
Distribution: unstable
Urgency: low
Maintainer: Hilko Bengen <ben...@debian.org>
Changed-By: Hilko Bengen <ben...@debian.org>
Description: 
 nmap       - The Network Mapper
 zenmap     - The Network Mapper Front End
Closes: 696446
Changes: 
 nmap (6.00-0.3) unstable; urgency=low
 .
   * Non-maintainer upload.
   * Apply upstream fix for interfaces in monitor mode (Closes: #696446).
Checksums-Sha1: 
 1490f650970d2b4102909e4a62e39f21a8feb477 1282 nmap_6.00-0.3.dsc
 ff0ab73af635838f99f902715fed8808a0073e44 25873 nmap_6.00-0.3.diff.gz
 2846cd8d3c1cfd190735542d48f554d446ef4f91 3717838 nmap_6.00-0.3_amd64.deb
 0670894001e8ed82fbb22c122ea8c24ccfac429a 548458 zenmap_6.00-0.3_amd64.deb
Checksums-Sha256: 
 857e29f89ef381d898dd8fd1f0e3e6caa0aed4ead041a7e16d8def6e3ee54ede 1282 
nmap_6.00-0.3.dsc
 b1967104677fcae726d956c806fe9db421bc0843461c484d7878dff51ea20d25 25873 
nmap_6.00-0.3.diff.gz
 0b2a3f3650983a3ed5db6965dbf85ff076534d3c7595a8680d791866549f05c5 3717838 
nmap_6.00-0.3_amd64.deb
 4a25a92532d6875ccb156c0495d33bbfcc39f74bd665e856248b41c9952174ee 548458 
zenmap_6.00-0.3_amd64.deb
Files: 
 a8b2c34b0dcfaddb46a7aa0e7f8c418f 1282 net extra nmap_6.00-0.3.dsc
 0ce5c0ea2ed19f9faad5f4b2f7a79457 25873 net extra nmap_6.00-0.3.diff.gz
 cd197ed6ac665207e639975c2016bded 3717838 net extra nmap_6.00-0.3_amd64.deb
 2f018b0377c9af1217889c3df18b8f22 548458 net extra zenmap_6.00-0.3_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlDfWdAACgkQUCgnLz/SlGhxBwCfY73mMG9kVIQ4YZlCt0lHjIyf
jvIAnje8KBN8EB5Oikw83kaM7MMXy30f
=7v49
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to