TLDR: Workaround: Bypass the name resolution attempt and provide the
IPv4 address directly. I cannot upload a fixed package to Debian at the
moment -- I'd be very grateful if somebody prepared an NMU.

The crash happens in sock_proxychain_new()
[sock_proxy.c:nsock_proxy.c:106] when a proxy entry has not been
properly initialized. In the reported scenario, there seem to be two
connected causes:

(1) proxy_socks4_node_new() exits with an error if the resulting address
    as returned by proxy_resolve() is not an AF_INET address. Running

        nmap -v --proxies socks4://ipv6.google.com:8909

    reproducably leads to a segfault at the same place.

(2) As the *_node_new() function has failed, proxy_noew_new()
    [nsock_proxy.c:371] returns a NULL pointer which is dereferenced in
    nsock_proxychain_new().


It does not matter why proxy_socks4_node_new() fails, either: Running

    nmap -v --proxies socks4://foo:8909

also segfaults if "foo" cannot be resolved to an IPv4 address.

Cheers,
-Hilko


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to