- Code: Select all
PAX: size overflow detected in function environ_read fs/proc/base.c:1067 cicus.472_265 min, count: 58, decl: access_remote_vm; num: 4; context: fndecl; /usr/bin/ldd[ldd:24710] uid/euid:0/0 gid/egid:0/0
CPU: 4 PID: 2522 Comm: ps Not tainted 4.2.6-hardened-r8 #1tr.so.1.1.0.debug by /lib64/ld-2.21.so[ld-linux-x86-64:24718] uid/euid:0/0 gid/egid:0/0, parent /usr/bin/ldd[ldd:24716] uid/euid:0/0 gid/egid:0/0
ffffffff81805c83 b24ca701ca6321a0 0000000000000000 ffffffff816723cf.0.debug by /lib64/ld-2.21.so[ld-linux-x86-64:24724] uid/euid:0/0 gid/egid:0/0, parent /usr/bin/ldd[ldd:24722] uid/euid:0/0 gid/egid:0/0
ffffc90007ffbc48 ffffffff8152feb7 0000000000000097 ffffffff8167246d-2.21.so.debug by /lib64/ld-2.21.so[ld-linux-x86-64:24730] uid/euid:0/0 gid/egid:0/0, parent /usr/bin/ldd[ldd:24728] uid/euid:0/0 gid/egid:0/0
ffffc90007ffbc78 ffffffff81139f96 0000000000000000 0000000000000000
Call Trace:
[<ffffffff8152feb7>] dump_stack+0x45/0x5d
[<ffffffff81139f96>] report_size_overflow+0x36/0x40
[<ffffffff811938f5>] environ_read+0x3a5/0x4f0
[<ffffffff811306dd>] __vfs_read+0x5d/0x140
[<ffffffff8126518b>] ? security_file_permission+0xbb/0xd0
[<ffffffff81130893>] vfs_read+0xd3/0x240
[<ffffffff81130f7c>] SyS_read+0x5c/0xe0
[<ffffffff81534eb0>] entry_SYSCALL_64_fastpath+0x12/0x8a
- Code: Select all
PAX: size overflow detected in function environ_read fs/proc/base.c:1064 cicus.503_265 min, count: 54, decl: access_remote_vm; num: 4; context: fndecl;
CPU: 0 PID: 18410 Comm: ps Not tainted 4.3.3-hardened-r4 #1
ffffffff00000002 14080fbf382ba2a6 0000000000000000 0000000000000428
ffffc90003bcbc20 ffffffff812c27b8 ffffffff816912de ffffc90003bcbc50
ffffffff8114397e 0000000000000000 0000000000000000 fffffc68e816d818
Call Trace:
[<ffffffff812c27b8>] dump_stack+0x44/0x5c
[<ffffffff8114397e>] report_size_overflow+0x6e/0x80
[<ffffffff811a00d3>] environ_read+0x3b3/0x510
[<ffffffff81139e96>] __vfs_read+0x56/0x130
[<ffffffff81276ff8>] ? security_file_permission+0xc8/0xe0
[<ffffffff8113a044>] vfs_read+0xd4/0x250
[<ffffffff8113a735>] SyS_read+0x55/0xd0
[<ffffffff81550ff0>] entry_SYSCALL_64_fastpath+0x12/0x8a