PAX: size overflow in xfrm4_transport_output
Posted: Fri Dec 04, 2015 1:19 pm
- Code: Select all
[427905.464831] PAX: size overflow detected in function xfrm4_transport_output net/ipv4/xfrm4_mode_transport.c:27 cicus.35_50 max, count: 15, decl: mac_header; num: 0; context: sk_buff;
[427905.465007] CPU: 2 PID: 8220 Comm: xl2tpd Not tainted 4.2.6.201511282239-1-grsec #1
[427905.465011] Hardware name: To Be Filled By O.E.M. To Be Filled By O.E.M./Q1900DC-ITX, BIOS P1.20 07/08/2014
[427905.465015] ffffffff85a04847 46f9994cb2fbe0b0 0000000000000000 ffffffffc088c700
[427905.465021] ffffc90004d43838 ffffffff855d2198 00000000000000a9 ffffffffc088c796
[427905.465027] ffffc90004d43868 ffffffff851a6e24 0000000000010019 ffff8800ab075000
[427905.465032] Call Trace:
[427905.465044] [<ffffffffc088c700>] ? xfrm4_transport_exit+0x35e/0x4f0 [xfrm4_mode_transport]
[427905.465051] [<ffffffff855d2198>] dump_stack+0x4c/0x7f
[427905.465057] [<ffffffffc088c796>] ? xfrm4_transport_exit+0x3f4/0x4f0 [xfrm4_mode_transport]
[427905.465063] [<ffffffff851a6e24>] report_size_overflow+0x34/0x40
[427905.465068] [<ffffffffc088c2dd>] xfrm4_transport_output+0x1ad/0x272 [xfrm4_mode_transport]
[427905.465075] [<ffffffff8555c073>] xfrm_output_resume+0x173/0x530
[427905.465079] [<ffffffff8555c523>] xfrm_output+0x43/0xe0
[427905.465084] [<ffffffff8554fb9c>] xfrm4_output_finish+0x2c/0x40
[427905.465088] [<ffffffff8554fa22>] __xfrm4_output+0x42/0x70
[427905.465092] [<ffffffff8554fbf3>] xfrm4_output+0x43/0xc0
[427905.465097] [<ffffffff8554f9e0>] ? xfrm4_udp_encap_rcv+0x330/0x330
[427905.465102] [<ffffffff854ebc5c>] ip_local_out_sk+0x3c/0x50
[427905.465107] [<ffffffff854efeb9>] ip_send_skb+0x19/0x50
[427905.465112] [<ffffffff85520a8b>] udp_send_skb+0x15b/0x270
[427905.465116] [<ffffffff85522501>] udp_sendmsg+0x4b1/0x9c0
[427905.465122] [<ffffffff852e114c>] ? import_iovec+0x4c/0xf0
[427905.465128] [<ffffffff8552f42a>] inet_sendmsg+0x8a/0xc0
[427905.465133] [<ffffffff85475f81>] sock_sendmsg+0x51/0x60
[427905.465138] [<ffffffff85476cb7>] ___sys_sendmsg+0x377/0x420
[427905.465144] [<ffffffff854782eb>] __sys_sendmsg+0x5b/0xb0
[427905.465149] [<ffffffff85478367>] SyS_sendmsg+0x27/0x50
[427905.465155] [<ffffffff855d83b0>] entry_SYSCALL_64_fastpath+0x12/0x8a
Arch Linux running linux-grsec-4.2.6.201511282239-1, the above happens when running xl2tpd-1.3.6-1:
- Code: Select all
Dec 04 18:10:26 wardrobe systemd[1]: Started Level 2 Tunnel Protocol Daemon (L2TP).
Dec 04 18:10:26 wardrobe xl2tpd[8220]: xl2tpd[8220]: setsockopt recvref[30]: Protocol not available
Dec 04 18:10:26 wardrobe xl2tpd[8220]: xl2tpd[8220]: Using l2tp kernel support.
Dec 04 18:10:26 wardrobe xl2tpd[8220]: xl2tpd[8220]: xl2tpd version xl2tpd-1.3.6 started on wardrobe PID:8220
Dec 04 18:10:26 wardrobe xl2tpd[8220]: xl2tpd[8220]: Written by Mark Spencer, Copyright (C) 1998, Adtran, Inc.
Dec 04 18:10:26 wardrobe xl2tpd[8220]: xl2tpd[8220]: Forked by Scott Balmos and David Stipp, (C) 2001
Dec 04 18:10:26 wardrobe xl2tpd[8220]: xl2tpd[8220]: Inherited by Jeff McAdams, (C) 2002
Dec 04 18:10:26 wardrobe xl2tpd[8220]: xl2tpd[8220]: Forked again by Xelerance (www.xelerance.com) (C) 2006
Dec 04 18:10:26 wardrobe xl2tpd[8220]: xl2tpd[8220]: Listening on IP address 0.0.0.0, port 1701
Dec 04 18:10:28 wardrobe xl2tpd[8220]: xl2tpd[8220]: network_thread: recv packet from XX.XX.XX.XX, size = 69, tunnel = 0, call = 0 ref=0 refhim=0
Dec 04 18:10:28 wardrobe xl2tpd[8220]: xl2tpd[8220]: get_call: allocating new tunnel for host XX.XX.XX.XX, port 40288.
Dec 04 18:10:28 wardrobe xl2tpd[8220]: xl2tpd[8220]: handle_avps: handling avp's for tunnel 6537, call 0
Dec 04 18:10:28 wardrobe xl2tpd[8220]: xl2tpd[8220]: message_type_avp: message type 1 (Start-Control-Connection-Request)
Dec 04 18:10:28 wardrobe xl2tpd[8220]: xl2tpd[8220]: protocol_version_avp: peer is using version 1, revision 0.
Dec 04 18:10:28 wardrobe systemd[1]: xl2tpd.service: Main process exited, code=killed, status=9/KILL