Bug 589819
Summary: | [abrt] crash in wpa_supplicant-1:0.6.8-8.fc13: Process /usr/sbin/wpa_supplicant was killed by signal 11 (SIGSEGV) | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 6 | Reporter: | Dan Williams <dcbw> |
Component: | wpa_supplicant | Assignee: | Dan Williams <dcbw> |
Status: | CLOSED CURRENTRELEASE | QA Contact: | desktop-bugs <desktop-bugs> |
Severity: | medium | Docs Contact: | |
Priority: | low | ||
Version: | 6.0 | CC: | cmeadors, dcbw, mads, syeghiay, vbenes |
Target Milestone: | rc | ||
Target Release: | --- | ||
Hardware: | i686 | ||
OS: | Linux | ||
Whiteboard: | abrt_hash:a2204c74184b289bb94103a13762bdd2115b01b2 | ||
Fixed In Version: | wpa_supplicant-0.6.8-10.el6 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | 589507 | Environment: | |
Last Closed: | 2010-11-12 13:44:45 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 589507 | ||
Bug Blocks: |
Description
Dan Williams
2010-05-07 01:17:47 UTC
While the impact of this crash is not huge, this fix is pretty obvious and worth getting into RHEL6 I believe. Fix is to ensure the timeout gets removed when the interface goes away in wpa_supplicant-0.6.8-handle-driver-disconnect-spam.patch so that it doesn't get fired after the wpa_supplicant structure is deallocated and thus try to access invalid memory. diff -up wpa_supplicant-0.6.8/wpa_supplicant/wpa_supplicant.c.disconnect-spam wpa_supplicant-0.6.8/wpa_supplicant/wpa_supplicant.c --- wpa_supplicant-0.6.8/wpa_supplicant/wpa_supplicant.c.disconnect-spam 2010-05-06 18:10:51.340288662 -0700 +++ wpa_supplicant-0.6.8/wpa_supplicant/wpa_supplicant.c 2010-05-06 18:12:06.090413976 -0700 @@ -382,6 +382,9 @@ static void wpa_supplicant_cleanup(struc wpa_supplicant_cancel_scan(wpa_s); wpa_supplicant_cancel_auth_timeout(wpa_s); + if (eloop_is_timeout_registered(wpa_disconnect_spam_handle, wpa_s, NULL)) + eloop_cancel_timeout(wpa_disconnect_spam_handle, wpa_s, NULL); + ieee80211_sta_deinit(wpa_s); wpas_wps_deinit(wpa_s); This request was evaluated by Red Hat Product Management for inclusion in a Red Hat Enterprise Linux major release. Product Management has requested further review of this request by Red Hat Engineering, for potential inclusion in a Red Hat Enterprise Linux Major release. This request is not yet committed for inclusion. Requesting exception; fix is easy and low-risk, and has been present in Fedora for quite a while. Fixed in May cannot see any related crashes any more -> VERIFIED Red Hat Enterprise Linux 6.0 is now available and should resolve the problem described in this bug report. This report is therefore being closed with a resolution of CURRENTRELEASE. You may reopen this bug report if the solution does not work for you. |