Source: proxychains
Version: 3.1-7
Severity: important
User: de...@kali.org
Usertags: origin-kali

$ proxychains apt-get update
[...]
**** Seccomp prevented execution of syscall 0000000056 on architecture amd64 
****
Reading package lists... Done
E: Method https has died unexpectedly!
E: Sub-process https returned an error code (31)

According to the APT developers, this is due to the use of the clone() system
call. They are unlikely to allow the use of this system call and it would be 
nice
if proxychains could work without launching sub-processes. Apparently this would
be the case of newer versions released on https://github.com/haad/proxychains
(according to APT developer Julian Andres Klode <j...@debian.org> who made a
quick test).

Alternatively, proxychains should just ship an APT configuration snippet to let
APT use the system call that proxychains needs. Julian is apparently considering
to create specific configuration entries to allow system calls only when a
specific string is found in LD_PRELOAD.

Note that I'm forwarding this bug report from Kali:
https://bugs.kali.org/view.php?id=4361

-- System Information:
Debian Release: buster/sid
  APT prefers oldoldstable
  APT policy: (500, 'oldoldstable'), (500, 'unstable'), (500, 'testing'), (500, 
'stable'), (500, 'oldstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.13.0-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), 
LANGUAGE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Reply via email to