Upstream acknowledged this and patched 2023-07-20 but there's no new release yet. nmap-4.94 included a reworking of some list loading/processing, and in the process introduced a bug where nmap --top-ports with an argument larger than 4260 causes a segfault. Fix in https://github.com/nmap/nmap/commit/edad9c059ca45bccab8c0f41fe6fc6546c60153a I'll submit a PR shortly.
Your version here is wrong. nmap-4.94 --> nmap-7.94
(In reply to jospezial from comment #1) > Your version here is wrong. > nmap-4.94 --> nmap-7.94 Haha whoops you are right, fixed the typo in the Summary, thanks. Can't edit my comment, though.
The bug has been closed via the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=bae33e2d2aafdf4713ebd7497be221961e0359d3 commit bae33e2d2aafdf4713ebd7497be221961e0359d3 Author: Hank Leininger <hlein@korelogic.com> AuthorDate: 2023-11-29 22:33:35 +0000 Commit: Sam James <sam@gentoo.org> CommitDate: 2024-04-27 04:19:43 +0000 net-analyzer/nmap: fix segv with large --top-ports argument Signed-off-by: Hank Leininger <hlein@korelogic.com> Closes: https://bugs.gentoo.org/918874 Closes: https://github.com/gentoo/gentoo/pull/34055 Signed-off-by: Sam James <sam@gentoo.org> net-analyzer/nmap/files/nmap-7.94-topport.patch | 26 ++++ net-analyzer/nmap/nmap-7.94-r1.ebuild | 189 ++++++++++++++++++++++++ 2 files changed, 215 insertions(+)