mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-28 18:28:23 -05:00
5db86df6a8
In case wpa_supplicant is using driver_macsec_linux, but macsec module is not (yet) loaded in the kernel, nl_socket_alloc() fails and drv->sk is NULL. In this case, don't call libnl functions rntl_link_add() or rtnl_link_change() using such NULL pointer, to prevent program from getting segmentation faults like: Program received signal SIGSEGV, Segmentation fault. nl_socket_get_local_port (sk=sk@entry=0x0) at socket.c:365 365 if (sk->s_local.nl_pid == 0) { (gdb) p sk $1 = (const struct nl_sock *) 0x0 (gdb) bt #0 nl_socket_get_local_port (sk=sk@entry=0x0) at socket.c:365 #1 0x00007ffff79c56a0 in nl_complete_msg (sk=sk@entry=0x0, msg=msg@entry=0x55555595a1f0) at nl.c:491 #2 0x00007ffff79c56d1 in nl_send_auto (sk=sk@entry=0x0, msg=msg@entry=0x55555595a1f0) at nl.c:522 #3 0x00007ffff79c652f in nl_send_sync (sk=sk@entry=0x0, msg=0x55555595a1f0) at nl.c:556 #4 0x00007ffff755faf5 in rtnl_link_add (sk=0x0, link=link@entry=0x55555595b0f0, flags=flags@entry=1024) at route/link.c:1548 #5 0x000055555567a298 in macsec_drv_create_transmit_sc (priv=0x55555593b130, sc=0x55555593b320, conf_offset=<optimized out>) at ../src/drivers/driver_macsec_linux.c:998 Signed-off-by: Davide Caratti <davide.caratti@gmail.com> |
||
---|---|---|
.. | ||
ap | ||
common | ||
crypto | ||
drivers | ||
eap_common | ||
eap_peer | ||
eap_server | ||
eapol_auth | ||
eapol_supp | ||
fst | ||
l2_packet | ||
p2p | ||
pae | ||
radius | ||
rsn_supp | ||
tls | ||
utils | ||
wps | ||
lib.rules | ||
Makefile |