Using the latest i386 snapshot (Nov8), running netstat as root causes a
segfault. Earlier snaps may be affected, I'm just noticing this now.
Running as a non-root user seems to be fine.
# netstat -an
Active Internet connections (including servers)
Proto Recv-Q Send-Q Local Address Foreign Address (state)
tcp 0 0 192.168.1.5.22 192.168.1.4.41282 ESTABLISHED
tcp 0 216 192.168.1.5.22 192.168.1.4.18447 ESTABLISHED
tcp 0 0 192.168.1.5.22 192.168.1.4.21025 ESTABLISHED
tcp 0 0 *.6000 *.* LISTEN
tcp 0 0 127.0.0.1.587 *.* LISTEN
tcp 0 0 127.0.0.1.25 *.* LISTEN
tcp 0 0 *.22 *.* LISTEN
Active Internet connections (including servers)
Proto Recv-Q Send-Q Local Address Foreign Address (state)
udp 0 0 *.514 *.*
Active Internet connections (including servers)
Proto Recv-Q Send-Q Local Address Foreign Address (state)
tcp6 0 0 *.6000 *.* LISTEN
tcp6 0 0 ::1.587 *.* LISTEN
tcp6 0 0 ::1.25 *.* LISTEN
tcp6 0 0 *.22 *.* LISTEN
Active UNIX domain sockets
Address Type Recv-Q Send-Q Inode Conn Refs Nextref
Addr
Segmentation fault
# netstat
Active Internet connections
Proto Recv-Q Send-Q Local Address Foreign Address (state)
tcp 0 0 blackstaff.ssh 192.168.1.4.41282 ESTABLISHED
tcp 0 0 blackstaff.ssh 192.168.1.4.18447 ESTABLISHED
tcp 0 0 blackstaff.ssh 192.168.1.4.21025 ESTABLISHED
Active UNIX domain sockets
Address Type Recv-Q Send-Q Inode Conn Refs Nextref
Addr
Segmentation fault
No core file seems to be left behind. Anyone else seeing this?
--
Scott McEachern
https://www.blackstaff.ca
"Beware the Four Horsemen of the Information Apocalypse: terrorists, drug dealers,
kidnappers, and child pornographers. Seems like you can scare any public into allowing
the government to do anything with those four." -- Bruce Schneier