Bug#881125: arp-scan: Segmentation fault at link-packet-socket.c:127
Nelson A. de Oliveira
naoliv at debian.org
Wed Nov 8 02:27:02 UTC 2017
Package: arp-scan
Version: 1.9-2
Severity: important
Hi!
While calling a simple "arp-scan" with an unprivileged user it segfaults.
gdb output with arp-scan-dbgsym and "thread apply all bt full" is
attached.
Thank you!
Best regards,
Nelson
-- System Information:
Debian Release: buster/sid
APT prefers unstable-debug
APT policy: (500, 'unstable-debug'), (500, 'unstable'), (100, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Kernel: Linux 4.13.0-1-amd64 (SMP w/8 CPU cores)
Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8), LANGUAGE=pt_BR:pt:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
Versions of packages arp-scan depends on:
ii ieee-data 20160613.1
ii libc6 2.24-17
ii libpcap0.8 1.8.1-5
Versions of packages arp-scan recommends:
ii libwww-perl 6.27-1
arp-scan suggests no packages.
-- no debconf information
-------------- next part --------------
Starting program: /usr/sbin/arp-scan
Program received signal SIGSEGV, Segmentation fault.
get_hardware_address (if_name=0x7ffff7dd8600 "wlan0",
hw_address=0x7fffffffddea "") at link-packet-socket.c:127
127 link-packet-socket.c: No such file or directory.
Thread 1 (process 20764):
#0 get_hardware_address (if_name=0x7ffff7dd8600 "wlan0",
hw_address=0x7fffffffddea "") at link-packet-socket.c:127
No locals.
#1 0x0000555555556890 in main (argc=1, argv=0x7fffffffe188) at arp-scan.c:165
now = {tv_sec = 10, tv_usec = 0}
diff = {tv_sec = 0, tv_usec = 0}
select_timeout = <optimized out>
loop_timediff = <optimized out>
host_timediff = <optimized out>
last_packet_time = {tv_sec = 0, tv_usec = 140737351918452}
req_interval = <optimized out>
cum_err = 0
start_time = {tv_sec = 1510107635, tv_usec = 114334}
end_time = {tv_sec = 140737354131208, tv_usec = 140737354113448}
elapsed_time = {tv_sec = 8, tv_usec = 140737354113688}
elapsed_seconds = <optimized out>
reset_cum_err = <optimized out>
pass_no = 0
first_timeout = 1
i = <optimized out>
errbuf = "\000\000\000\000\000\000\000\000\b\347\377\367\377\177", '\000' <repeats 26 times>, "\220\352\377\367\377\177\000\000\320\337\377\377\377\177\000\000\000\000\000\000\000\000\000\000\b\347\377\367\377\177\000\000\300\337\377\377\377\177\000\000\307\262\225\367\377\177\000\000&\260be\000\000\000\000\377\377\377\377", '\000' <repeats 12 times>, "h\242\377\367\377\177\000\000\b\347\377\367\377\177", '\000' <repeats 90 times>...
filter = {bf_len = 4160725656, bf_insns = 0x7ffff7de2bb3}
filter_string = <optimized out>
netmask = 32767
localnet = 8192
datalink = <optimized out>
get_addr_status = 0
pcap_fd = <optimized out>
interface_mac = "\000\000\000\000\000"
pcap_handle = <optimized out>
More information about the Pkg-security-team
mailing list