Feb 27 13:34:50 r1.server rspamd[29895]: <9i1dgi>; map; rspamd_map_read_cached: https://www.openphish.com/feed.txt: read map data cached 234504 bytes Feb 27 13:34:50 r1.server rspamd[29895]: <>; ; rspamd_lua_check_udata_common: lua type error: expected rspamd{text} at position 2, but userdata has userdata metatable; trace: [1]:{/usr/share/rspamd/plugins/phishing.lua:438 - [Lua]}; stack(2): [1: ud=(NULL)] [2: ud=userdata] Feb 27 13:34:50 r1.server rspamd[29895]: <9i1dgi>; map; lua_map_fin: call to local function failed: /usr/share/rspamd/plugins/phishing.lua:438: bad argument #2 to 'rspamd_str_split_fun' ('text' expected) Feb 27 13:34:50 r1.server rspamd[29474]: ================================================================= Feb 27 13:34:50 r1.server rspamd[29474]: ==29895==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffe0687a5f0 at pc 0x7f0b9ca14c4a bp 0x7ffe0687a5a0 sp 0x7ffe0687a590 Feb 27 13:34:50 r1.server rspamd[29474]: WRITE of size 8 at 0x7ffe0687a5e0 thread T0 Feb 27 13:34:51 r1.server rspamd[29474]: #0 0x7f0b9ca14c49 in init_ab /usr/src/debug/rspamd-2.4/contrib/t1ha/t1ha2.c:49 Feb 27 13:34:51 r1.server rspamd[29474]: #1 0x7f0b9ca14c49 in t1ha2_atonce /usr/src/debug/rspamd-2.4/contrib/t1ha/t1ha2.c:203 Feb 27 13:34:51 r1.server rspamd[29474]: #2 0x7f0b9bf5aa73 in rspamd_cryptobox_fast_hash_machdep /usr/src/debug/rspamd-2.4/src/libcryptobox/cryptobox.c:1668 Feb 27 13:34:51 r1.server rspamd[29474]: #3 0x7f0b9bf9754a in rspamd_str_hash /usr/src/debug/rspamd-2.4/src/libutil/str_util.c:262 Feb 27 13:34:51 r1.server rspamd[29474]: #4 0x7f0b9c153f80 in kh_get_lua_class_set /usr/src/debug/rspamd-2.4/src/lua/lua_common.c:64 Feb 27 13:34:51 r1.server rspamd[29474]: #5 0x7f0b9c17383e in lua_periodic_callback /usr/src/debug/rspamd-2.4/src/lua/lua_config.c:3213 Feb 27 13:34:51 r1.server rspamd[29474]: #6 0x7f0b9cfb5005 in ev_invoke_pending /usr/src/debug/rspamd-2.4/contrib/libev/ev.c:3361 Feb 27 13:34:51 r1.server rspamd[29474]: #7 0x7f0b9cfc1038 in ev_run (/usr/lib64/rspamd/librspamd-ev.so+0x11038) Feb 27 13:34:51 r1.server rspamd[29474]: #8 0x547fd1 (/usr/bin/rspamd+0x547fd1) Feb 27 13:34:51 r1.server rspamd[29474]: #9 0x7f0b9c090c64 in rspamd_fork_worker (/usr/lib64/rspamd/librspamd-server.so+0x3f9c64) Feb 27 13:34:51 r1.server rspamd[29474]: #10 0x538709 in rspamd_fork_delayed_cb /usr/src/debug/rspamd-2.4/src/rspamd.c:368 Feb 27 13:34:51 r1.server rspamd[29474]: #11 0x7f0b9cfb5005 in ev_invoke_pending /usr/src/debug/rspamd-2.4/contrib/libev/ev.c:3361 Feb 27 13:34:51 r1.server rspamd[29474]: #12 0x7f0b9cfc1038 in ev_run (/usr/lib64/rspamd/librspamd-ev.so+0x11038) Feb 27 13:34:51 r1.server rspamd[29474]: #13 0x53a550 (/usr/bin/rspamd+0x53a550) Feb 27 13:34:51 r1.server rspamd[29474]: #14 0x7f0b9737f504 in __libc_start_main ../csu/libc-start.c:266 Feb 27 13:34:51 r1.server rspamd[29474]: #15 0x41016b (/usr/bin/rspamd+0x41016b) Feb 27 13:34:51 r1.server rspamd[29474]: Address 0x7ffe0687a5f0 is located in stack of thread T0 at offset 32 in frame Feb 27 13:34:51 r1.server rspamd[29474]: #0 0x7f0b9ca14b56 in t1ha2_atonce /usr/src/debug/rspamd-2.4/contrib/t1ha/t1ha2.c:201 Feb 27 13:34:51 r1.server rspamd[29474]: This frame has 1 object(s): Feb 27 13:34:51 r1.server rspamd[29474]: [32, 64) 'state' <== Memory access at offset 32 is inside this variable Feb 27 13:34:51 r1.server rspamd[29474]: HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext Feb 27 13:34:51 r1.server rspamd[29474]: (longjmp and C++ exceptions *are* supported) Feb 27 13:34:51 r1.server rspamd[29474]: SUMMARY: AddressSanitizer: stack-buffer-overflow /usr/src/debug/rspamd-2.4/contrib/t1ha/t1ha2.c:49 in init_ab Feb 27 13:34:51 r1.server rspamd[29474]: Shadow bytes around the buggy address: Feb 27 13:34:51 r1.server rspamd[29474]: 0x100040d07460: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Feb 27 13:34:51 r1.server rspamd[29474]: 0x100040d07470: 00 00 f1 f1 f1 f1 00 f2 f2 f2 f2 f2 f2 f2 00 00 Feb 27 13:34:51 r1.server rspamd[29474]: 0x100040d07480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Feb 27 13:34:51 r1.server rspamd[29474]: 0x100040d07490: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Feb 27 13:34:51 r1.server rspamd[29474]: 0x100040d074a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Feb 27 13:34:51 r1.server rspamd[29474]: =>0x100040d074b0: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1[f3]f3 Feb 27 13:34:51 r1.server rspamd[29474]: 0x100040d074c0: f3 f3 f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 Feb 27 13:34:51 r1.server rspamd[29474]: 0x100040d074d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Feb 27 13:34:51 r1.server rspamd[29474]: 0x100040d074e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Feb 27 13:34:51 r1.server rspamd[29474]: 0x100040d074f0: 00 00 00 00 f1 f1 f1 f1 f8 f8 f2 f2 f2 f2 f2 f2 Feb 27 13:34:51 r1.server rspamd[29474]: 0x100040d07500: 00 00 f2 f2 f2 f2 f2 f2 f8 f8 f2 f2 f2 f2 f2 f2 Feb 27 13:34:51 r1.server rspamd[29474]: Shadow byte legend (one shadow byte represents 8 application bytes): Feb 27 13:34:51 r1.server rspamd[29474]: Addressable: 00 Feb 27 13:34:51 r1.server rspamd[29474]: Partially addressable: 01 02 03 04 05 06 07 Feb 27 13:34:51 r1.server rspamd[29474]: Heap left redzone: fa Feb 27 13:34:51 r1.server rspamd[29474]: Freed heap region: fd Feb 27 13:34:51 r1.server rspamd[29474]: Stack left redzone: f1 Feb 27 13:34:51 r1.server rspamd[29474]: Stack mid redzone: f2 Feb 27 13:34:51 r1.server rspamd[29474]: Stack right redzone: f3 Feb 27 13:34:51 r1.server rspamd[29474]: Stack after return: f5 Feb 27 13:34:51 r1.server rspamd[29474]: Stack use after scope: f8 Feb 27 13:34:51 r1.server rspamd[29474]: Global redzone: f9 Feb 27 13:34:51 r1.server rspamd[29474]: Global init order: f6 Feb 27 13:34:51 r1.server rspamd[29474]: Poisoned by user: f7 Feb 27 13:34:51 r1.server rspamd[29474]: Container overflow: fc Feb 27 13:34:51 r1.server rspamd[29474]: Array cookie: ac Feb 27 13:34:51 r1.server rspamd[29474]: Intra object redzone: bb Feb 27 13:34:51 r1.server rspamd[29474]: ASan internal: fe Feb 27 13:34:51 r1.server rspamd[29474]: Left alloca redzone: ca Feb 27 13:34:51 r1.server rspamd[29474]: Right alloca redzone: cb Feb 27 13:34:51 r1.server rspamd[29474]: ==29895==ABORTING Feb 27 13:34:51 r1.server rspamd[29474]: ; main; rspamd_check_termination_clause: rspamd_proxy process 29895 terminated abnormally (but it was not killed by a signal) with exit code 1 Feb 27 13:34:51 r1.server rspamd[29474]: ; main; rspamd_cld_handler: respawn process rspamd_proxy in lieu of terminated process with pid 29895 Feb 27 13:34:51 r1.server rspamd[29474]: #0 0x7f0b9ca14c49 in init_ab /usr/src/debug/rspamd-2.4/contrib/t1ha/t1ha2.c:49 Feb 27 13:34:51 r1.server rspamd[29474]: #1 0x7f0b9ca14c49 in t1ha2_atonce /usr/src/debug/rspamd-2.4/contrib/t1ha/t1ha2.c:203 Feb 27 13:34:51 r1.server rspamd[29474]: #2 0x7f0b9bf5aa73 in rspamd_cryptobox_fast_hash_machdep /usr/src/debug/rspamd-2.4/src/libcryptobox/cryptobox.c:1668 Feb 27 13:34:51 r1.server rspamd[29474]: #3 0x7f0b9bf9754a in rspamd_str_hash /usr/src/debug/rspamd-2.4/src/libutil/str_util.c:262 Feb 27 13:34:51 r1.server rspamd[29474]: #4 0x7f0b9c153f80 in kh_get_lua_class_set /usr/src/debug/rspamd-2.4/src/lua/lua_common.c:64 Feb 27 13:34:51 r1.server rspamd[29474]: #5 0x7f0b9c17383e in lua_periodic_callback /usr/src/debug/rspamd-2.4/src/lua/lua_config.c:3213 Feb 27 13:34:51 r1.server rspamd[29474]: #6 0x7f0b9cfb5005 in ev_invoke_pending /usr/src/debug/rspamd-2.4/contrib/libev/ev.c:3361 Feb 27 13:34:51 r1.server rspamd[29474]: #7 0x7f0b9cfc1038 in ev_run (/usr/lib64/rspamd/librspamd-ev.so+0x11038) Feb 27 13:34:51 r1.server rspamd[29474]: #8 0x53d431 (/usr/bin/rspamd+0x53d431) Feb 27 13:34:51 r1.server rspamd[29474]: #9 0x7f0b9c090c64 in rspamd_fork_worker (/usr/lib64/rspamd/librspamd-server.so+0x3f9c64) Feb 27 13:34:51 r1.server rspamd[29474]: #10 0x538709 in rspamd_fork_delayed_cb /usr/src/debug/rspamd-2.4/src/rspamd.c:368 Feb 27 13:34:51 r1.server rspamd[29474]: #11 0x7f0b9cfb5005 in ev_invoke_pending /usr/src/debug/rspamd-2.4/contrib/libev/ev.c:3361 Feb 27 13:34:51 r1.server rspamd[29474]: #12 0x7f0b9cfc1038 in ev_run (/usr/lib64/rspamd/librspamd-ev.so+0x11038) Feb 27 13:34:51 r1.server rspamd[29474]: #13 0x53a550 (/usr/bin/rspamd+0x53a550) Feb 27 13:34:51 r1.server rspamd[29474]: #14 0x7f0b9737f504 in __libc_start_main ../csu/libc-start.c:266 Feb 27 13:34:51 r1.server rspamd[29474]: #15 0x41016b (/usr/bin/rspamd+0x41016b) Feb 27 13:34:51 r1.server rspamd[29474]: Address 0x7ffe0687a5e0 is located in stack of thread T0 at offset 32 in frame Feb 27 13:34:51 r1.server rspamd[29474]: #0 0x7f0b9ca14b56 in t1ha2_atonce /usr/src/debug/rspamd-2.4/contrib/t1ha/t1ha2.c:201 Feb 27 13:34:51 r1.server rspamd[29474]: This frame has 1 object(s): Feb 27 13:34:51 r1.server rspamd[29474]: [32, 64) 'state' <== Memory access at offset 32 is inside this variable Feb 27 13:34:51 r1.server rspamd[29474]: HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext Feb 27 13:34:51 r1.server rspamd[29474]: (longjmp and C++ exceptions *are* supported) Feb 27 13:34:51 r1.server rspamd[29474]: SUMMARY: AddressSanitizer: stack-buffer-overflow /usr/src/debug/rspamd-2.4/contrib/t1ha/t1ha2.c:49 in init_ab Feb 27 13:34:51 r1.server rspamd[29474]: Shadow bytes around the buggy address: Feb 27 13:34:51 r1.server rspamd[29474]: 0x100040d07460: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Feb 27 13:34:51 r1.server rspamd[29474]: 0x100040d07470: f1 f1 f1 f1 00 f2 f2 f2 f2 f2 f2 f2 00 00 00 00 Feb 27 13:34:51 r1.server rspamd[29474]: 0x100040d07480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Feb 27 13:34:51 r1.server rspamd[29474]: 0x100040d07490: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Feb 27 13:34:51 r1.server rspamd[29474]: 0x100040d074a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Feb 27 13:34:51 r1.server rspamd[29474]: =>0x100040d074b0: 00 00 00 00 00 00 00 00 f1 f1 f1 f1[f3]f3 f3 f3 Feb 27 13:34:51 r1.server rspamd[29474]: 0x100040d074c0: f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 Feb 27 13:34:51 r1.server rspamd[29474]: 0x100040d074d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Feb 27 13:34:51 r1.server rspamd[29474]: 0x100040d074e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Feb 27 13:34:51 r1.server rspamd[29474]: 0x100040d074f0: 00 00 f1 f1 f1 f1 f8 f8 f2 f2 f2 f2 f2 f2 00 00 Feb 27 13:34:51 r1.server rspamd[29474]: 0x100040d07500: f2 f2 f2 f2 f2 f2 f8 f8 f2 f2 f2 f2 f2 f2 00 00 Feb 27 13:34:51 r1.server rspamd[29474]: Shadow byte legend (one shadow byte represents 8 application bytes): Feb 27 13:34:51 r1.server rspamd[29474]: Addressable: 00 Feb 27 13:34:51 r1.server rspamd[29474]: Partially addressable: 01 02 03 04 05 06 07 Feb 27 13:34:51 r1.server rspamd[29474]: Heap left redzone: fa Feb 27 13:34:51 r1.server rspamd[29474]: Freed heap region: fd Feb 27 13:34:51 r1.server rspamd[29474]: Stack left redzone: f1 Feb 27 13:34:51 r1.server rspamd[29474]: Stack mid redzone: f2 Feb 27 13:34:51 r1.server rspamd[29474]: Stack right redzone: f3 Feb 27 13:34:51 r1.server rspamd[29474]: Stack after return: f5 Feb 27 13:34:51 r1.server rspamd[29474]: Stack use after scope: f8 Feb 27 13:34:51 r1.server rspamd[29474]: Global redzone: f9 Feb 27 13:34:51 r1.server rspamd[29474]: Global init order: f6 Feb 27 13:34:51 r1.server rspamd[29474]: Poisoned by user: f7 Feb 27 13:34:51 r1.server rspamd[29474]: Container overflow: fc Feb 27 13:34:51 r1.server rspamd[29474]: Array cookie: ac Feb 27 13:34:51 r1.server rspamd[29474]: Intra object redzone: bb Feb 27 13:34:51 r1.server rspamd[29474]: ASan internal: fe Feb 27 13:34:51 r1.server rspamd[29474]: Left alloca redzone: ca Feb 27 13:34:51 r1.server rspamd[29474]: Right alloca redzone: cb Feb 27 13:34:51 r1.server rspamd[29474]: ==29896==ABORTING Feb 27 13:34:51 r1.server rspamd[29474]: ; main; rspamd_check_termination_clause: normal process 29896 terminated abnormally (but it was not killed by a signal) with exit code 1 Feb 27 13:34:51 r1.server rspamd[29474]: ; main; rspamd_cld_handler: respawn process normal in lieu of terminated process with pid 29896