Package: arp-scan Version: 1.9-2 Severity: important Hi!
While calling a simple "arp-scan" with an unprivileged user it segfaults. gdb output with arp-scan-dbgsym and "thread apply all bt full" is attached. Thank you! Best regards, Nelson -- System Information: Debian Release: buster/sid APT prefers unstable-debug APT policy: (500, 'unstable-debug'), (500, 'unstable'), (100, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 4.13.0-1-amd64 (SMP w/8 CPU cores) Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8), LANGUAGE=pt_BR:pt:en (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages arp-scan depends on: ii ieee-data 20160613.1 ii libc6 2.24-17 ii libpcap0.8 1.8.1-5 Versions of packages arp-scan recommends: ii libwww-perl 6.27-1 arp-scan suggests no packages. -- no debconf information
Starting program: /usr/sbin/arp-scan Program received signal SIGSEGV, Segmentation fault. get_hardware_address (if_name=0x7ffff7dd8600 "wlan0", hw_address=0x7fffffffddea "") at link-packet-socket.c:127 127 link-packet-socket.c: No such file or directory. Thread 1 (process 20764): #0 get_hardware_address (if_name=0x7ffff7dd8600 "wlan0", hw_address=0x7fffffffddea "") at link-packet-socket.c:127 No locals. #1 0x0000555555556890 in main (argc=1, argv=0x7fffffffe188) at arp-scan.c:165 now = {tv_sec = 10, tv_usec = 0} diff = {tv_sec = 0, tv_usec = 0} select_timeout = <optimized out> loop_timediff = <optimized out> host_timediff = <optimized out> last_packet_time = {tv_sec = 0, tv_usec = 140737351918452} req_interval = <optimized out> cum_err = 0 start_time = {tv_sec = 1510107635, tv_usec = 114334} end_time = {tv_sec = 140737354131208, tv_usec = 140737354113448} elapsed_time = {tv_sec = 8, tv_usec = 140737354113688} elapsed_seconds = <optimized out> reset_cum_err = <optimized out> pass_no = 0 first_timeout = 1 i = <optimized out> errbuf = "\000\000\000\000\000\000\000\000\b\347\377\367\377\177", '\000' <repeats 26 times>, "\220\352\377\367\377\177\000\000\320\337\377\377\377\177\000\000\000\000\000\000\000\000\000\000\b\347\377\367\377\177\000\000\300\337\377\377\377\177\000\000\307\262\225\367\377\177\000\000&\260be\000\000\000\000\377\377\377\377", '\000' <repeats 12 times>, "h\242\377\367\377\177\000\000\b\347\377\367\377\177", '\000' <repeats 90 times>... filter = {bf_len = 4160725656, bf_insns = 0x7ffff7de2bb3} filter_string = <optimized out> netmask = 32767 localnet = 8192 datalink = <optimized out> get_addr_status = 0 pcap_fd = <optimized out> interface_mac = "\000\000\000\000\000" pcap_handle = <optimized out>