My two F23 boxes are only at 4.4.9 and 4.7.9. No problems with your script and nmap on them. 

I'll see if I have time to do an update tonight and test with the newest kernel. 

--
Wyatt Zacharias


On Thu, Dec 1, 2016 at 2:53 AM, Trevor Cordes <trevor@tecnopolis.ca> wrote:
No solution yet, but I was able to reproduce the bug with nmap, yay!!!

#nmap -PE 192.168.101.0/24
Starting Nmap 7.12 ( https://nmap.org ) at 2016-12-01 02:50 CST
sendto in send_ip_packet_sd: sendto(5, packet, 44, 0, 192.168.101.102,16) => Operation not permitted
Offending packet: TCP 192.168.101.1:57520 > 192.168.101.102:21 S ttl=51 id=5430 iplen=44 seq=879361804 win=1024 <mss 1460>

Looks like -sP does more than just ping and it's not fast enough to
trigger the bug.  -PE is what I need to reproduce the conditions of my
script.
_______________________________________________
Roundtable mailing list
Roundtable@muug.ca
https://muug.ca/mailman/listinfo/roundtable