<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to bugs</title><link>https://sourceforge.net/p/openl2tp/bugs/</link><description>Recent changes to bugs</description><atom:link href="https://sourceforge.net/p/openl2tp/bugs/feed.rss" rel="self"/><language>en</language><lastBuildDate>Tue, 20 Sep 2016 13:28:13 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/openl2tp/bugs/feed.rss" rel="self" type="application/rss+xml"/><item><title>#46 concurrent compiles sometimes fails</title><link>https://sourceforge.net/p/openl2tp/bugs/46/?limit=25#c5bd</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Additionally the pattern %.o : %.c really should get | generated-files appended as an additional dependency as well (line 274).&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jaco Kroon</dc:creator><pubDate>Tue, 20 Sep 2016 13:28:13 -0000</pubDate><guid>https://sourceforge.net774a9e2fe28856942d00c602688cd3827cc26361</guid></item><item><title>concurrent compiles sometimes fails</title><link>https://sourceforge.net/p/openl2tp/bugs/46/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;On line 214 of the Makefile:&lt;/p&gt;
&lt;p&gt;l2tp_config_token.o should depend on l2tp_config_parse.h&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jaco Kroon</dc:creator><pubDate>Tue, 20 Sep 2016 13:24:04 -0000</pubDate><guid>https://sourceforge.netf035a39a2dca7be6aa4ffd0891a4b55feaa7c7cc</guid></item><item><title>incorrect-fsf-address</title><link>https://sourceforge.net/p/openl2tp/bugs/45/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;openl2tp-devel.i586: W: incorrect-fsf-address /usr/lib/openl2tp/l2tp_rpc.x&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">StrPt</dc:creator><pubDate>Wed, 08 Oct 2014 12:29:18 -0000</pubDate><guid>https://sourceforge.net55d61408cd332fd04620559883610b3d5ebfe424</guid></item><item><title>openl2tpd: page allocation failure</title><link>https://sourceforge.net/p/openl2tp/bugs/44/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;I use openl2tp on openwrt as a l2tp client. When i connect to a l2tp server I set up with xl2tp,it works very well. But when i connect to a cisco 7206 l2tp server. After CHAP authentication succeeded, the kernel warn :pppd: page allocation failure: order:7, mode:0x4020&lt;br /&gt;
the log was:&lt;/p&gt;
&lt;p&gt;pppd&lt;span&gt;[3291]&lt;/span&gt;: rcvd &lt;span&gt;[CHAP Success id=0x1 ""]&lt;/span&gt; &lt;br /&gt;
daemon.info pppd&lt;span&gt;[3291]&lt;/span&gt;: CHAP authentication succeeded                                                                             &lt;br /&gt;
daemon.notice pppd&lt;span&gt;[3291]&lt;/span&gt;: CHAP authentication succeeded                                                                           &lt;br /&gt;
daemon.debug pppd&lt;span&gt;[3291]&lt;/span&gt;: sent &lt;span&gt;[IPCP ConfReq id=0x1 ]&lt;/span&gt; &lt;br /&gt;
daemon.debug pppd&lt;span&gt;[3291]&lt;/span&gt;: rcvd &lt;span&gt;[IPCP ConfReq id=0x1 ]&lt;/span&gt; &lt;br /&gt;
daemon.debug pppd&lt;span&gt;[3291]&lt;/span&gt;: sent &lt;span&gt;[IPCP ConfAck id=0x1 ]&lt;/span&gt; &lt;br /&gt;
daemon.debug pppd&lt;span&gt;[3291]&lt;/span&gt;: rcvd &lt;span&gt;[IPCP ConfNak id=0x1 ]&lt;/span&gt; &lt;br /&gt;
daemon.debug pppd&lt;span&gt;[3291]&lt;/span&gt;: sent &lt;span&gt;[IPCP ConfReq id=0x2 ]&lt;/span&gt; &lt;br /&gt;
daemon.debug pppd&lt;span&gt;[3291]&lt;/span&gt;: rcvd &lt;span&gt;[IPCP ConfAck id=0x2 ]&lt;/span&gt; &lt;br /&gt;
daemon.err pppd&lt;span&gt;[3291]&lt;/span&gt;: not replacing existing default route via 192.168.5.253                                                     &lt;br /&gt;
daemon.notice pppd&lt;span&gt;[3291]&lt;/span&gt;: local  IP address 10.0.0.2                                                                              &lt;br /&gt;
daemon.notice pppd&lt;span&gt;[3291]&lt;/span&gt;: remote IP address 61.154.237.10                                                                         &lt;br /&gt;
daemon.debug pppd&lt;span&gt;[3291]&lt;/span&gt;: openl2tp send: sent PPP_UPDOWN_IND, 52 bytes                                                             &lt;br /&gt;
daemon.debug pppd&lt;span&gt;[3291]&lt;/span&gt;: Script /etc/ppp/ip-up started (pid 3453)                                                                 &lt;br /&gt;
kern.warn kernel: &lt;span&gt;[55094.050000]&lt;/span&gt; pppd: page allocation failure: order:7, mode:0x4020                                              &lt;br /&gt;
Hiwifi kern.warn kernel: &lt;span&gt;[55094.060000]&lt;/span&gt; Call Trace:                                                                                      &lt;br /&gt;
daemon.debug pppd&lt;span&gt;[3291]&lt;/span&gt;: Script /etc/ppp/ip-up finished (pid 3453), status = 0x1                                                  &lt;br /&gt;
Hiwifi kern.warn kernel: &lt;span&gt;[55094.060000]&lt;/span&gt; &lt;span&gt;[&amp;lt;80269d14&amp;gt;]&lt;/span&gt; dump_stack+0x8/0x34                                                                 &lt;br /&gt;
kern.warn kernel: &lt;span&gt;[55094.060000]&lt;/span&gt; &lt;span&gt;[&amp;lt;800af668&amp;gt;]&lt;/span&gt; warn_alloc_failed+0xe8/0x10c                                                        &lt;br /&gt;
kern.warn kernel: &lt;span&gt;[55094.070000]&lt;/span&gt; &lt;span&gt;[&amp;lt;800b1968&amp;gt;]&lt;/span&gt; &lt;strong&gt;alloc_pages_nodemask+0x5a0/0x600                                                  &lt;br /&gt;
kern.warn kernel: &lt;span&gt;&lt;span&gt;[55094.080000]&lt;/span&gt;&lt;/span&gt; &lt;span&gt;&lt;span&gt;[&amp;lt;800b19e0&amp;gt;]&lt;/span&gt;&lt;/span&gt; &lt;/strong&gt;get_free_pages+0x18/0x4c                                                          &lt;br /&gt;
kern.warn kernel: &lt;span&gt;[55094.080000]&lt;/span&gt; &lt;span&gt;[&amp;lt;801dae24&amp;gt;]&lt;/span&gt; pskb_expand_head+0xf8/0x2d4                                                         &lt;br /&gt;
kern.warn kernel: &lt;span&gt;[55094.090000]&lt;/span&gt; &lt;span&gt;[&amp;lt;83395298&amp;gt;]&lt;/span&gt; 0x83395298                                                                          &lt;br /&gt;
kern.warn kernel: &lt;span&gt;[55094.090000]&lt;/span&gt; &lt;br /&gt;
&lt;/p&gt;
&lt;p&gt;there are some other people also find this problem.&lt;br /&gt;
&lt;a href="https://dev.openwrt.org/ticket/12011#comment:11" rel="nofollow"&gt;https://dev.openwrt.org/ticket/12011#comment:11&lt;/a&gt;&amp;gt;&lt;br /&gt;
we guess that there are some problems in the kernel module because when user xl2tp this also happen, can you help me about this or give me some guide to find the reason?&lt;br /&gt;
much thanks&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">jacquesqiao</dc:creator><pubDate>Thu, 11 Jul 2013 03:16:13 -0000</pubDate><guid>https://sourceforge.netc027d718ad597709d4daa4bedb54d4bd4fe31be7</guid></item><item><title>ppp segfaults when ippool plugin is used</title><link>https://sourceforge.net/p/openl2tp/bugs/43/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;ppp segfaults when&lt;br /&gt;
- ippool.so plugin must be is used within ppp option file, AND&lt;br /&gt;
- "dump" directive is present also within ppp option file&lt;/p&gt;
&lt;p&gt;after initiating IPSec/L2TP connection by Windows client to linux VPN server and after ppp process started by L2TP daemon, pppd crashed with following details:&lt;br /&gt;
pppd[31761]: segfault at 0 ip 00007ff71d770858 sp 00007fff04db57a0 error 4 in pppd[7ff71d748000+52000]&lt;br /&gt;
------------[ cut here ]------------&lt;br /&gt;
WARNING: at include/net/sock.h:472 udp_lib_unhash+0xbf/0xd0() (Tainted: G        W  ----------------  )&lt;br /&gt;
Modules linked in: pppol2tp ppp_deflate pppoe pppox ppp_async crc_ccitt authenc esp4 xfrm4_mode_transport arc4 ppp_mppe_mppc nf_conntrack_netlink nfnetlink ip_vs ppp_generic slhc deflate zlib_deflate ctr twofish_x86_64 twofish_common camellia serpent blowfish cast5 des_generic cbc cryptd aes_x86_64 aes_generic xcbc rmd160 sha256_generic tun crypto_null af_key xenfs iptable_mangle iptable_nat nf_nat xt_pkttype nf_conntrack_ipv4 nf_defrag_ipv4 iptable_filter ip_tables xt_MARK ip6table_mangle xt_limit xt_policy nf_conntrack_ipv6 nf_defrag_ipv6 xt_state nf_conntrack xt_multiport ip6table_filter ip6_tables ipv6 xen_netfront ext4 mbcache jbd2 xen_blkfront dm_mirror dm_region_hash dm_log dm_mod [last unloaded: pppol2tp]&lt;br /&gt;
Pid: 31501, comm: openl2tpd Tainted: G        W  ----------------   2.6.32-220.4.1.el6.mppc_saref.x86_64 #1&lt;br /&gt;
Call Trace:&lt;br /&gt;
[&amp;lt;ffffffff81069a17&amp;gt;] ? warn_slowpath_common+0x87/0xc0&lt;br /&gt;
[&amp;lt;ffffffff81069a6a&amp;gt;] ? warn_slowpath_null+0x1a/0x20&lt;br /&gt;
[&amp;lt;ffffffff8148a22f&amp;gt;] ? udp_lib_unhash+0xbf/0xd0&lt;br /&gt;
[&amp;lt;ffffffff8141e8f2&amp;gt;] ? sk_common_release+0x32/0xd0&lt;br /&gt;
[&amp;lt;ffffffff81488ffe&amp;gt;] ? udp_lib_close+0xe/0x10&lt;br /&gt;
[&amp;lt;ffffffff81493df7&amp;gt;] ? inet_release+0x67/0x90&lt;br /&gt;
[&amp;lt;ffffffff81418a69&amp;gt;] ? sock_release+0x29/0x90&lt;br /&gt;
[&amp;lt;ffffffff81418ae7&amp;gt;] ? sock_close+0x17/0x30&lt;br /&gt;
[&amp;lt;ffffffff81177d25&amp;gt;] ? __fput+0xf5/0x210&lt;br /&gt;
[&amp;lt;ffffffff81177e65&amp;gt;] ? fput+0x25/0x30&lt;br /&gt;
[&amp;lt;ffffffff811738ad&amp;gt;] ? filp_close+0x5d/0x90&lt;br /&gt;
[&amp;lt;ffffffff81173985&amp;gt;] ? sys_close+0xa5/0x100&lt;br /&gt;
[&amp;lt;ffffffff8100b0f2&amp;gt;] ? system_call_fastpath+0x16/0x1b&lt;br /&gt;
---[ end trace 8a3a8d1bc708fc3d ]---&lt;/p&gt;
&lt;p&gt;Jan 18 11:49:06 vpn01 openl2tpd[19195]: checking for optionsfile&lt;br /&gt;
Jan 18 11:49:06 vpn01 openl2tpd[19195]: setting options=/etc/ppp/options.openl2tpd&lt;br /&gt;
Jan 18 11:49:06 vpn01 pppd[19195]: Plugin radius.so loaded.&lt;br /&gt;
Jan 18 11:49:06 vpn01 pppd[19195]: Using EAP TLS.&lt;br /&gt;
Jan 18 11:49:06 vpn01 pppd[19195]: RADIUS plugin initialized.&lt;br /&gt;
Jan 18 11:49:06 vpn01 pppd[19195]: Plugin ippool.so loaded.&lt;br /&gt;
Jan 18 11:49:06 vpn01 pppd[19195]: Plugin pppol2tp.so loaded.&lt;br /&gt;
Jan 18 11:49:06 vpn01 pppd[19195]: Plugin openl2tp.so loaded.&lt;br /&gt;
Jan 18 11:49:06 vpn01 pppd[19195]: pppd options in effect:&lt;br /&gt;
Jan 18 11:49:06 vpn01 pppd[19195]: debug                # (from /etc/ppp/options.openl2tpd)&lt;br /&gt;
Jan 18 11:49:06 vpn01 pppd[19195]: nodetach             # (from command line)&lt;br /&gt;
Jan 18 11:49:06 vpn01 pppd[19195]: idle 1800            # (from /etc/ppp/options.openl2tpd)&lt;br /&gt;
Jan 18 11:49:06 vpn01 pppd[19195]: dump         # (from /etc/ppp/options.openl2tpd)&lt;br /&gt;
Jan 18 11:49:06 vpn01 pppd[19195]: nomp         # (from command line)&lt;br /&gt;
Jan 18 11:49:06 vpn01 pppd[19195]: plugin radius.so             # (from /etc/ppp/options.openl2tpd)&lt;br /&gt;
Jan 18 11:49:06 vpn01 pppd[19195]: plugin ippool.so             # (from command line)&lt;br /&gt;
Jan 18 11:49:06 vpn01 pppd[19195]: plugin pppol2tp.so           # (from command line)&lt;br /&gt;
Jan 18 11:49:06 vpn01 pppd[19195]: plugin openl2tp.so           # (from command line)&lt;br /&gt;
Jan 18 11:49:06 vpn01 pppd[19195]: auth         # (from command line)&lt;br /&gt;
Jan 18 11:49:06 vpn01 pppd[19195]: refuse-pap           # (from /etc/ppp/options.openl2tpd)&lt;br /&gt;
Jan 18 11:49:06 vpn01 pppd[19195]: refuse-chap          # (from /etc/ppp/options.openl2tpd)&lt;br /&gt;
Jan 18 11:49:06 vpn01 pppd[19195]: refuse-mschap                # (from /etc/ppp/options.openl2tpd)&lt;br /&gt;
Jan 18 11:49:06 vpn01 pppd[19195]: require-eap          # (from /etc/ppp/options.openl2tpd)&lt;br /&gt;
Jan 18 11:49:06 vpn01 pppd[19195]: name openl2tp                # (from /etc/ppp/options.openl2tpd)&lt;/p&gt;
&lt;p&gt;but in general when I comment out "dump" directive, the ppp process continue to work without problems.&lt;/p&gt;
&lt;p&gt;so this bug is not directly related to openl2tp as I can reproduce it with xl2tpd daemon.&lt;/p&gt;
&lt;p&gt;used versions: &lt;br /&gt;
ppp-2.4.5&lt;br /&gt;
openl2tp-1.8&lt;br /&gt;
ippool-1.3&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">timeos</dc:creator><pubDate>Fri, 18 Jan 2013 14:24:21 -0000</pubDate><guid>https://sourceforge.net45a3bd7a3a21f73a6ce54a3e73ed85c971932b22</guid></item><item><title>Potential problem with not null-terminated strings in AVPs</title><link>https://sourceforge.net/p/openl2tp/bugs/42/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;There might be an issue in the method l2tp_session_store_avps (l2tp_session.c) if the AVPs are not null-terminated. We are using v1.8 and when I do a "session show" in l2tpconfig I get trailing garbage after "calling number" and "called number" on the sessions from some equipment (vendor name "StarentNetworks"). Since the AVPs have a length-information I am guessing that the Starent does not send null-terminated strings and since l2tp_session_store_avps simply uses strdup without looking at the length information the resulting strings stored in struct l2tp_session can be to long. Using strndup with the length-information should avoid this.&lt;/p&gt;
&lt;p&gt;AVPs that are stored in struct tunnel (l2tp_tunnel_store_avps in l2tp_tunnel.c) are handled differently, for example VENDOR_NAME/HOST_NAME are always stored null-terminated&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Anonymous</dc:creator><pubDate>Tue, 08 May 2012 13:48:41 -0000</pubDate><guid>https://sourceforge.netf53922b223b56db7cb88fb05c954787ba6a4b42b</guid></item><item><title>Cannot enable IPv6</title><link>https://sourceforge.net/p/openl2tp/bugs/41/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;This is the 21st century. Arguably '+ipv6' ought to be the default behaviour of pppd anyway; there's no excuse for not supporting IPv6, when the worst that can happen is that you get a ProtRej when you attempt to talk IPv6CP.&lt;/p&gt;
&lt;p&gt;But it's worse than that. I don't see any way to enable IPv6 at all. I can't even pass extra options to pppd (which I want to for things like naming the interface, when invoking it from NetworkManager, on openwrt, etc.)&lt;/p&gt;
&lt;p&gt;Unless I'm missing something...?&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David Woodhouse</dc:creator><pubDate>Tue, 24 Apr 2012 20:52:31 -0000</pubDate><guid>https://sourceforge.net4bd2db528d94f6659e233f67cd0d8025cc25e48b</guid></item><item><title>WARNING: at include/net/sock.h:471</title><link>https://sourceforge.net/p/openl2tp/bugs/40/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;CentOS 6, kernel 2.6.32-220.2.1.el6.x86_64.  OpenL2TP 1.8 source, used rpmbuild and installed as openl2tp-1.8-1.el6.x86_64.&lt;/p&gt;
&lt;p&gt;VPN from Windows XP client using L2TP over IPsec works perfectly using our_udp_port=1701 in /etc/openl2tpd.conf and 'OPENL2TPDARGS=' in /etc/sysconfig/openl2tpd.&lt;/p&gt;
&lt;p&gt;When I remove our_udp_port=1701 from /etc/openl2tpd.conf, define OPENL2TPDARGS="-p ipsec.so" in /etc/sysconfig/openl2tpd and restart openl2tpd, client fails to connect and I get the following in syslog:&lt;/p&gt;
&lt;p&gt;Jan 11 11:04:57 pdc-polly kernel: ------------[ cut here ]------------&lt;br /&gt;
Jan 11 11:04:57 pdc-polly kernel: WARNING: at include/net/sock.h:471 udp_lib_unhash+0xbf/0xd0() (Tainted: G        W  ----------------  )&lt;br /&gt;
Jan 11 11:04:57 pdc-polly kernel: Hardware name: ProLiant DL360 G7&lt;br /&gt;
Jan 11 11:04:57 pdc-polly kernel: Modules linked in: pppol2tp pppox iptable_filter iptable_nat nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 iptable_mangle ip_tables arc4 ecb ppp_mppe authenc esp4 xfrm4_mode_transport ppp_generic slhc deflate zlib_deflate ctr twofish_x86_64 twofish_common camellia serpent blowfish cast5 des_generic cbc aesni_intel cryptd aes_x86_64 aes_generic xcbc rmd160 sha256_generic crypto_null af_key xt_policy ipt_LOG xt_multiport ip6t_REJECT nf_conntrack_ipv6 nf_defrag_ipv6 xt_state nf_conntrack ip6table_filter ip6_tables ipv6 power_meter bnx2 sg serio_raw iTCO_wdt iTCO_vendor_support hpilo hpwdt i7core_edac edac_core shpchp ext4 mbcache jbd2 sd_mod crc_t10dif hpsa radeon ttm drm_kms_helper drm i2c_algo_bit i2c_core dm_mirror dm_region_hash dm_log dm_mod [last unloaded: pppox]&lt;br /&gt;
Jan 11 11:04:57 pdc-polly kernel: Pid: 23184, comm: openl2tpd Tainted: G        W  ----------------   2.6.32-220.2.1.el6.x86_64 #1&lt;br /&gt;
Jan 11 11:04:57 pdc-polly kernel: Call Trace:&lt;br /&gt;
Jan 11 11:04:57 pdc-polly kernel: [&amp;lt;ffffffff81069997&amp;gt;] ? warn_slowpath_common+0x87/0xc0&lt;br /&gt;
Jan 11 11:04:57 pdc-polly kernel: [&amp;lt;ffffffff810699ea&amp;gt;] ? warn_slowpath_null+0x1a/0x20&lt;br /&gt;
Jan 11 11:04:57 pdc-polly kernel: [&amp;lt;ffffffff81489fcf&amp;gt;] ? udp_lib_unhash+0xbf/0xd0&lt;br /&gt;
Jan 11 11:04:57 pdc-polly kernel: [&amp;lt;ffffffff8141e992&amp;gt;] ? sk_common_release+0x32/0xd0&lt;br /&gt;
Jan 11 11:04:57 pdc-polly kernel: [&amp;lt;ffffffff81488d9e&amp;gt;] ? udp_lib_close+0xe/0x10&lt;br /&gt;
Jan 11 11:04:57 pdc-polly kernel: [&amp;lt;ffffffff81493b17&amp;gt;] ? inet_release+0x67/0x90&lt;br /&gt;
Jan 11 11:04:57 pdc-polly kernel: [&amp;lt;ffffffff81418b39&amp;gt;] ? sock_release+0x29/0x90&lt;br /&gt;
Jan 11 11:04:57 pdc-polly kernel: [&amp;lt;ffffffff81418bb7&amp;gt;] ? sock_close+0x17/0x30&lt;br /&gt;
Jan 11 11:04:57 pdc-polly kernel: [&amp;lt;ffffffff81177ca5&amp;gt;] ? __fput+0xf5/0x210&lt;br /&gt;
Jan 11 11:04:57 pdc-polly kernel: [&amp;lt;ffffffff81177de5&amp;gt;] ? fput+0x25/0x30&lt;br /&gt;
Jan 11 11:04:57 pdc-polly kernel: [&amp;lt;ffffffff8117382d&amp;gt;] ? filp_close+0x5d/0x90&lt;br /&gt;
Jan 11 11:04:57 pdc-polly kernel: [&amp;lt;ffffffff8106c4bf&amp;gt;] ? put_files_struct+0x7f/0xf0&lt;br /&gt;
Jan 11 11:04:57 pdc-polly kernel: [&amp;lt;ffffffff8106c583&amp;gt;] ? exit_files+0x53/0x70&lt;br /&gt;
Jan 11 11:04:57 pdc-polly kernel: [&amp;lt;ffffffff8106e625&amp;gt;] ? do_exit+0x185/0x860&lt;br /&gt;
Jan 11 11:04:57 pdc-polly kernel: [&amp;lt;ffffffff810d4502&amp;gt;] ? audit_syscall_entry+0x272/0x2a0&lt;br /&gt;
Jan 11 11:04:57 pdc-polly kernel: [&amp;lt;ffffffff8106ed58&amp;gt;] ? do_group_exit+0x58/0xd0&lt;br /&gt;
Jan 11 11:04:57 pdc-polly kernel: [&amp;lt;ffffffff8106ede7&amp;gt;] ? sys_exit_group+0x17/0x20&lt;br /&gt;
Jan 11 11:04:57 pdc-polly kernel: [&amp;lt;ffffffff8100b0f2&amp;gt;] ? system_call_fastpath+0x16/0x1b&lt;br /&gt;
Jan 11 11:04:57 pdc-polly kernel: ---[ end trace 5b6ae84af4d6d236 ]---&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Chris Tucker</dc:creator><pubDate>Wed, 11 Jan 2012 12:07:06 -0000</pubDate><guid>https://sourceforge.net194904aa62ae7a052cd774d704b0b5499f27be9f</guid></item><item><title>ipsec plugin uses insecure temporary file</title><link>https://sourceforge.net/p/openl2tp/bugs/39/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;From plugins/ipsec.c:&lt;/p&gt;
&lt;p&gt;#define IPSEC_SETKEY_FILE       "/tmp/openl2tpd-tmp"&lt;/p&gt;
&lt;p&gt;and later:&lt;/p&gt;
&lt;p&gt;FILE *f = fopen(IPSEC_SETKEY_FILE, "w");&lt;/p&gt;
&lt;p&gt;This is insecure code – any user on the local system, that can write to /tmp could create a symlink to any root-owned file and openl2tpd will overwrite the file when preparing input for 'setkey'.&lt;/p&gt;
&lt;p&gt;The solution is to use a secure temporary file, e.g. created with mkstemp(), or write the file in a directory only root can write to (e.g. /var/run/openl2tp).&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jacek Konieczny</dc:creator><pubDate>Sat, 26 Nov 2011 16:50:04 -0000</pubDate><guid>https://sourceforge.net7f03c34ae43563800095d520ec814afc50b5f733</guid></item><item><title>libreadline5 and libreadline6 for deb-packages</title><link>https://sourceforge.net/p/openl2tp/bugs/38/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;I think that the deb-packages incorrectly compiled, the error in control, so as Ubuntu to have pre-installed libreadline6,&lt;br /&gt;
but the package openl2tp still requires additional install libreadline5.&lt;br /&gt;
libreadline5 is not required for rpm-distributions, if already installed libreadline6.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">StrPt</dc:creator><pubDate>Fri, 22 Jul 2011 11:07:58 -0000</pubDate><guid>https://sourceforge.net029db81460a790875f9b4dd2356af02cfbff41c1</guid></item></channel></rss>