Package: stunnel4 Version: 3:5.37-1 Severity: grave Justification: renders package unusable
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 I'm using stunnel4 in client mode on my laptop to let leafnode's fetchnews access newsservers over SSL. # egrep -v '^(;|$)' /etc/stunnel/stunnel.leafnode.conf chroot = /var/lib/stunnel4/ setuid = stunnel4 setgid = stunnel4 pid = /stunnel4.leafnode.pid socket = l:TCP_NODELAY=1 socket = r:TCP_NODELAY=1 debug = warning syslog = yes client = yes [guinan] connect = somehost:563 accept = localhost:563 [colleen] connect = anotherhost:563 accept = localhost:564 And then /etc/news/leafnode/config contains: server = localhost port = 563 server = localhost port = 564 As soon as fetchnews connects, stunnel4 segfaults. Hm, no, according to strace, the first server works, and there's lots of talk to the second, even including a QUIT and a Bye and then it explodes: ... [pid 7488] read(3, "QUIT\r\n", 18432) = 6 [pid 7488] poll([{fd=3, events=POLLIN|0x2000}, {fd=9, events=POLLIN|POLLOUT|0x2000}], 2, 43200000) = 2 ([{fd=3, revents=POLLIN|0x2000}, {fd=9, revents=POLLOUT}]) [pid 7488] read(3, "", 18426) = 0 [pid 7488] write(9, "\27\3\3\0\36[s\5^\360\365\365\315H\n\f\261\333\26\211\216\35#37]\245\265\224\26\202\276"..., 35) = 35 [pid 7488] poll([{fd=3, events=0}, {fd=9, events=POLLIN|POLLOUT|0x2000}], 2, 60000) = 1 ([{fd=9, revents=POLLOUT}]) [pid 7488] write(9, "\25\3\3\0\32[s\5^\360\365\365\316\353\327\225\312\23\247\362\36s4:\5}\334C6=\t", 31) = 31 [pid 7488] poll([{fd=3, events=0}, {fd=9, events=POLLIN|0x2000}], 2, 60000 <unfinished ...> [pid 4055] <... poll resumed> ) = 1 ([{fd=8, revents=POLLIN}]) [pid 4055] accept4(8, {sa_family=AF_INET, sin_port=htons(37104), sin_addr=inet_addr("127.0.0.1")}, [112->16], SOCK_CLOEXEC|SOCK_NONBLOCK) = 10 [pid 4055] mmap(NULL, 40960, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f634aae8000 [pid 4055] rt_sigprocmask(SIG_SETMASK, ~[RTMIN RT_1], [], 8) = 0 [pid 4055] clone(strace: Process 7489 attached <unfinished ...> [pid 7489] set_robust_list(0x7f634ab029e0, 24 <unfinished ...> [pid 4055] <... clone resumed> child_stack=0x7f634ab01e70, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, parent_tidptr=0x7f634ab029d0, tls=0x7f634ab02700, child_tidptr=0x7f634ab029d0) = 7489 [pid 7489] <... set_robust_list resumed> ) = 0 [pid 4055] rt_sigprocmask(SIG_SETMASK, [], <unfinished ...> [pid 7489] getpeername(10, <unfinished ...> [pid 4055] <... rt_sigprocmask resumed> NULL, 8) = 0 [pid 7489] <... getpeername resumed> {sa_family=AF_INET, sin_port=htons(37104), sin_addr=inet_addr("127.0.0.1")}, [112->16]) = 0 [pid 4055] poll([{fd=4, events=POLLIN|0x2000}, {fd=7, events=POLLIN|0x2000}, {fd=8, events=POLLIN|0x2000}], 3, -1 <unfinished ...> [pid 7489] setsockopt(10, SOL_TCP, TCP_NODELAY, [1], 4) = 0 [pid 7489] socket(AF_INET, SOCK_STREAM|SOCK_CLOEXEC|SOCK_NONBLOCK, IPPROTO_IP) = 11 [pid 7489] connect(11, {sa_family=AF_INET, sin_port=htons(563), sin_addr=inet_addr("82.150.197.101")}, 16) = -1 EINPROGRESS (Operation now in progress) [pid 7489] poll([{fd=11, events=POLLIN|POLLOUT|0x2000}], 1, 10000 <unfinished ...> [pid 7488] <... poll resumed> ) = 1 ([{fd=9, revents=POLLIN}]) [pid 7488] read(9, "\27\3\3\0\"", 5) = 5 [pid 7488] read(9, "\337l^\354\21\223\214\360G\213:\207\33I\225S\21}\6\276RE\220\373\325F\335\235\367\355\263\260"..., 34) = 34 [pid 7488] poll([{fd=3, events=POLLOUT}, {fd=9, events=POLLIN|0x2000}], 2, 43200000) = 1 ([{fd=3, revents=POLLOUT}]) [pid 7488] write(3, "205 Bye!\r\n", 10) = 10 [pid 7488] poll([{fd=3, events=0}, {fd=9, events=POLLIN|0x2000}], 2, 60000) = 1 ([{fd=3, revents=POLLERR|POLLHUP}]) [pid 7488] getsockopt(3, SOL_SOCKET, SO_ERROR, [32], [4]) = 0 [pid 7488] sendto(6, "<27>Nov 11 15:53:55 stunnel: LOG"..., 65, MSG_NOSIGNAL, NULL, 0) = 65 [pid 7488] write(3, "", 0) = -1 EPIPE (Broken pipe) [pid 7488] close(9) = 0 [pid 7488] close(3) = 0 [pid 7488] madvise(0x7f634aa36000, 45056, MADV_DONTNEED) = 0 [pid 7488] exit(0) = ? [pid 7488] +++ exited with 0 +++ [pid 7489] <... poll resumed> ) = 1 ([{fd=11, revents=POLLOUT}]) [pid 7489] getsockopt(11, SOL_SOCKET, SO_ERROR, [0], [4]) = 0 [pid 7489] setsockopt(11, SOL_TCP, TCP_NODELAY, [1], 4) = 0 [pid 7489] write(11, "\26\3\1\1{\1\0\1w\3\3\337\3\230\270\233\317*3\241\246\207\377\364,\211\f\213\\\331\350\177"..., 384) = 384 [pid 7489] read(11, 0x7f634000f0c3, 5) = -1 EAGAIN (Resource temporarily unavailable) [pid 7489] poll([{fd=11, events=POLLIN|0x2000}], 1, 300000) = 1 ([{fd=11, revents=POLLIN}]) [pid 7489] read(11, "\26\3\3\0=", 5) = 5 [pid 7489] read(11, "\2\0\0009\3\3h\363\27\246\0243\20|5\24M\325\232b\355_\342\266\212A}\243\234\304Pn"..., 61) = 61 [pid 7489] read(11, "\26\3\3\4\21", 5) = 5 [pid 7489] read(11, "\v\0\4\r\0\4\n\0\4\0070\202\4\0030\202\2\353\240\3\2\1\2\2\t\0\207\314\32C@@"..., 1041) = 1041 [pid 7489] read(11, "\26\3\3\1M", 5) = 5 [pid 7489] read(11, "\f\0\1I\3\0\27A\4\0232\344\236uYe\266V\23\314\365W_\5;\224\365:\353.\332\213"..., 333) = 333 [pid 7489] read(11, "\26\3\3\0\4", 5) = 5 [pid 7489] read(11, "\16\0\0\0", 4) = 4 [pid 7489] write(11, "\26\3\3\0F\20\0\0BA\4\242d\360\337\305u<\2\204\207\5\276\5\371\226Um.I\263\306"..., 126) = 126 [pid 7489] read(11, 0x7f6340012d93, 5) = -1 EAGAIN (Resource temporarily unavailable) [pid 7489] poll([{fd=11, events=POLLIN|0x2000}], 1, 300000) = 1 ([{fd=11, revents=POLLIN}]) [pid 7489] read(11, "\26\3\3\0\252", 5) = 5 [pid 7489] read(11, "\4\0\0\246\0\0\1,\0\2408\216\32\32\351p|\205\361\241\26\37\234\0108\326:\317D?VV"..., 170) = 170 [pid 7489] read(11, "\24\3\3\0\1", 5) = 5 [pid 7489] read(11, "\1", 1) = 1 [pid 7489] read(11, "\26\3\3\0(", 5) = 5 [pid 7489] read(11, "\231W\374\323A\352H\373\263\207\222h\3\f\362\333HJ1\343\260\21vM\254K\232\25\354w\325\245"..., 40) = 40 [pid 7489] sendto(6, "<26>Nov 11 15:53:55 stunnel: LOG"..., 180, MSG_NOSIGNAL, NULL, 0) = 180 [pid 7489] sendto(6, "<26>Nov 11 15:53:55 stunnel: LOG"..., 140, MSG_NOSIGNAL, NULL, 0) = 140 [pid 7489] sendto(6, "<26>Nov 11 15:53:55 stunnel: INT"..., 90, MSG_NOSIGNAL, NULL, 0) = 90 [pid 7489] rt_sigprocmask(SIG_UNBLOCK, [ABRT], NULL, 8) = 0 [pid 7489] rt_sigprocmask(SIG_BLOCK, ~[RTMIN RT_1], ~[ABRT KILL STOP RTMIN RT_1], 8) = 0 [pid 7489] getpid() = 4055 [pid 7489] gettid() = 7489 [pid 7489] tgkill(4055, 7489, SIGABRT) = 0 [pid 7489] rt_sigprocmask(SIG_SETMASK, ~[ABRT KILL STOP RTMIN RT_1], NULL, 8) = 0 [pid 7489] --- SIGABRT {si_signo=SIGABRT, si_code=SI_TKILL, si_pid=4055, si_uid=105} --- [pid 7489] +++ killed by SIGABRT (core dumped) +++ +++ killed by SIGABRT (core dumped) +++ The messages in the syslog: Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: ptr=0x7f6340010430 alloc=crypto/asn1/asn1_lib.c:277 free#1=str.c:200 free#2=crypto/asn1/asn1_lib.c:323 Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: ptr=0x7f634000fe30 alloc=crypto/asn1/asn1_lib.c:277 free#1=str.c:200 free#2=crypto/asn1/asn1_lib.c:323 Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: ptr=0x7f63400102a0 alloc=crypto/asn1/asn1_lib.c:277 free#1=str.c:200 free#2=crypto/asn1/asn1_lib.c:323 Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: ptr=0x7f634000fc40 alloc=crypto/buffer/buffer.c:96 free#1=str.c:200 free#2=crypto/buffer/buffer.c:52 Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: ptr=0x7f634000f210 alloc=crypto/asn1/asn1_lib.c:277 free#1=str.c:200 free#2=crypto/asn1/asn1_lib.c:323 Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: ptr=0x7f634000dc20 alloc=crypto/asn1/asn1_lib.c:277 free#1=str.c:200 free#2=crypto/asn1/asn1_lib.c:323 Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: ptr=0x7f634000e5f0 alloc=crypto/asn1/asn1_lib.c:277 free#1=str.c:200 free#2=crypto/asn1/asn1_lib.c:323 Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: ptr=0x7f634000e3e0 alloc=crypto/asn1/asn1_lib.c:277 free#1=str.c:200 free#2=crypto/asn1/asn1_lib.c:323 Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: ptr=0x7f634000f5c0 alloc=crypto/asn1/asn1_lib.c:277 free#1=str.c:200 free#2=crypto/asn1/asn1_lib.c:323 Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: ptr=0x7f634000efc0 alloc=crypto/asn1/asn1_lib.c:277 free#1=str.c:200 free#2=crypto/asn1/asn1_lib.c:323 Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: ptr=0x7f634000fbc0 alloc=crypto/asn1/asn1_lib.c:277 free#1=str.c:200 free#2=crypto/asn1/asn1_lib.c:323 Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: ptr=0x7f634000f4a0 alloc=crypto/asn1/asn1_lib.c:277 free#1=str.c:200 free#2=crypto/asn1/asn1_lib.c:323 Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: ptr=0x7f634000f730 alloc=crypto/asn1/asn1_lib.c:277 free#1=str.c:200 free#2=crypto/asn1/asn1_lib.c:323 Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: ptr=0x7f634000edd0 alloc=crypto/buffer/buffer.c:96 free#1=str.c:200 free#2=crypto/buffer/buffer.c:52 Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: ptr=0x7f634000ddd0 alloc=crypto/asn1/asn1_lib.c:277 free#1=str.c:200 free#2=crypto/asn1/asn1_lib.c:323 Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: ptr=0x7f634000e060 alloc=crypto/asn1/asn1_lib.c:277 free#1=str.c:200 free#2=crypto/asn1/asn1_lib.c:323 Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: ptr=0x7f634000e2f0 alloc=crypto/asn1/asn1_lib.c:277 free#1=str.c:200 free#2=crypto/asn1/asn1_lib.c:323 Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: ptr=0x7f634000e580 alloc=crypto/asn1/asn1_lib.c:277 free#1=str.c:200 free#2=crypto/asn1/asn1_lib.c:323 Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: ptr=0x7f634000e830 alloc=crypto/asn1/asn1_lib.c:277 free#1=str.c:200 free#2=crypto/asn1/asn1_lib.c:323 Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: ptr=0x7f634000eac0 alloc=crypto/asn1/asn1_lib.c:277 free#1=str.c:200 free#2=crypto/asn1/asn1_lib.c:323 Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: ptr=0x7f634000ed50 alloc=crypto/asn1/asn1_lib.c:277 free#1=str.c:200 free#2=crypto/asn1/asn1_lib.c:323 Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: ptr=0x7f634000d9a0 alloc=crypto/asn1/asn1_lib.c:277 free#1=str.c:200 free#2=crypto/asn1/asn1_lib.c:323 Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: ptr=0x7f634000d930 alloc=crypto/asn1/asn1_lib.c:277 free#1=str.c:200 free#2=crypto/asn1/asn1_lib.c:323 Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: ptr=0x7f6340008f80 alloc=crypto/asn1/asn1_lib.c:277 free#1=str.c:200 free#2=crypto/asn1/asn1_lib.c:323 Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: ptr=0x7f634000abc0 alloc=crypto/asn1/asn1_lib.c:277 free#1=str.c:200 free#2=crypto/asn1/asn1_lib.c:323 Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: ptr=0x7f634000a260 alloc=crypto/buffer/buffer.c:96 free#1=str.c:200 free#2=crypto/buffer/buffer.c:52 Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: ptr=0x7f634000f280 alloc=crypto/asn1/asn1_lib.c:277 free#1=str.c:200 free#2=crypto/asn1/asn1_lib.c:323 Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: ptr=0x7f6340009880 alloc=crypto/asn1/asn1_lib.c:277 free#1=str.c:200 free#2=crypto/asn1/asn1_lib.c:323 Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: ptr=0x7f6340009b10 alloc=crypto/asn1/asn1_lib.c:277 free#1=str.c:200 free#2=crypto/asn1/asn1_lib.c:323 Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: ptr=0x7f6340009da0 alloc=crypto/asn1/asn1_lib.c:277 free#1=str.c:200 free#2=crypto/asn1/asn1_lib.c:323 Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: ptr=0x7f634000e0d0 alloc=crypto/asn1/asn1_lib.c:277 free#1=str.c:200 free#2=crypto/asn1/asn1_lib.c:323 Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: ptr=0x7f63400101a0 alloc=crypto/asn1/asn1_lib.c:277 free#1=str.c:200 free#2=crypto/asn1/asn1_lib.c:323 Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: ptr=0x7f6340009fa0 alloc=crypto/asn1/asn1_lib.c:277 free#1=str.c:200 free#2=crypto/asn1/asn1_lib.c:323 Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: ptr=0x7f6340009100 alloc=crypto/asn1/asn1_lib.c:277 free#1=str.c:200 free#2=crypto/asn1/asn1_lib.c:323 Nov 11 15:53:55 jadzia stunnel: LOG3[2]: socket fd: Broken pipe (32) Nov 11 15:53:55 jadzia stunnel: LOG2[3]: Double free attempt: ptr=0x7f633800fee0 alloc=crypto/threads_pthread.c:16 free#1=crypto/threads_pthread.c:58 free#2=crypto/asn1/asn1_lib.c:323 Nov 11 15:53:55 jadzia stunnel: LOG2[3]: Double free attempt: ptr=0x7f633800ff60 alloc=`..8c.:277 free#1=:200 free#2=crypto/asn1/asn1_lib.c:323 Nov 11 15:53:55 jadzia stunnel: INTERNAL ERROR: Bad magic at crypto/asn1/asn1_lib.c, line 323 gdb (with the debug package and the core file): (gdb) bt full #0 __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:58 set = {__val = {18446744067266838239, 139971088433280, 139970970976944, 139970970976944, 0, 139971085634131, 139970970976944, 1, 1, 0, 139970970976944, 139971110897464, 20, 139971085609993, 139971110897424, 94051479907827}} pid = <optimized out> tid = <optimized out> #1 0x00007f4d8ecb340a in __GI_abort () at abort.c:89 save_stage = 2 act = {__sigaction_handler = {sa_handler = 0x7f4d88011c20, sa_sigaction = 0x7f4d88011c20}, sa_mask = {__val = {139971110897680, 1, 61, 139971110897856, 139971110897616, 184683593754, 47244640271, 498216206346, 1352914698245, 139968689209344, 3600, 94051495557568, 139970970977024, 139970970967808, 52, 139970836758368}}, sa_flags = -2147483448, sa_restorer = 0x115} sigs = {__val = {32, 0 <repeats 15 times>}} #2 0x0000558a110ba547 in fatal_debug (txt=txt@entry=0x558a110ca344 "Bad magic", file=file@entry=0x7f4d8fc4e444 "crypto/asn1/asn1_lib.c", line=line@entry=323) at log.c:357 msg = "INTERNAL ERROR: Bad magic at crypto/asn1/asn1_lib.c, line 323\000\000\000d\253\000\210M\177\000\000p\bX\220M\177\000" #3 0x0000558a110b5583 in get_alloc_list_ptr (ptr=ptr@entry=0x7f4d8000f3f0, file=file@entry=0x7f4d8fc4e444 "crypto/asn1/asn1_lib.c", line=line@entry=323) at str.c:385 alloc_list = 0x7f4d8000f3a0 #4 0x0000558a110b5f5e in str_detach_debug (ptr=ptr@entry=0x7f4d8000f3f0, file=file@entry=0x7f4d8fc4e444 "crypto/asn1/asn1_lib.c", line=line@entry=323) at str.c:334 alloc_list = <optimized out> #5 0x0000558a110b5ff4 in str_free_debug (ptr=0x7f4d8000f3f0, file=0x7f4d8fc4e444 "crypto/asn1/asn1_lib.c", line=323) at str.c:369 alloc_list = 0x7f4d8000f3a0 #6 0x00007f4d8faff0dd in ?? () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #7 0x00007f4d8fb08e8f in ?? () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #8 0x00007f4d8fb09310 in ?? () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #9 0x00007f4d8fb09146 in ?? () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #10 0x00007f4d8fb092c2 in ?? () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #11 0x00007f4d8fb09146 in ?? () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #12 0x00007f4d8fb09310 in ?? () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #13 0x00007f4d8fb09146 in ?? () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #14 0x00007f4d8fb09235 in ASN1_item_free () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #15 0x00007f4d8fc207b1 in OPENSSL_sk_pop_free () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #16 0x00007f4d8ff2a28f in SSL_SESSION_free () from /usr/lib/x86_64-linux-gnu/libssl.so.1.1 No symbol table info available. #17 0x0000558a110b6f23 in ssl_start (c=c@entry=0x7f4d90567060) at client.c:504 i = <optimized out> err = <optimized out> old_session = 0x7f4d80012c40 unsafe_openssl = <optimized out> peer_cert = <optimized out> #18 0x0000558a110b86e1 in client_try (c=0x7f4d90567060) at client.c:268 No locals. #19 client_run (c=c@entry=0x7f4d90567060) at client.c:179 err = 0 rst = <optimized out> num_clients_copy = <optimized out> #20 0x0000558a110b9aea in client_main (c=c@entry=0x7f4d90567060) at client.c:138 No locals. #21 0x0000558a110b9b10 in client_thread (arg=0x7f4d90567060) at client.c:97 c = 0x7f4d90567060 #22 0x00007f4d8f024464 in start_thread (arg=0x7f4d90581700) at pthread_create.c:333 __res = <optimized out> pd = 0x7f4d90581700 now = <optimized out> unwind_buf = {cancel_jmp_buf = {{jmp_buf = {139971110901504, 4100207356887948678, 0, 140735246775919, 139971110901504, 94051495736320, -4143878532205912698, -4143941838188454522}, mask_was_saved = 0}}, priv = {pad = {0x0, 0x0, 0x0, 0x0}, data = {prev = 0x0, cleanup = 0x0, canceltype = 0}}} not_first_call = <optimized out> pagesize_m1 = <optimized out> sp = <optimized out> freesize = <optimized out> __PRETTY_FUNCTION__ = "start_thread" #23 0x00007f4d8ed679df in clone () at ../sysdeps/unix/sysv/linux/x86_64/clone.S:105 No locals. The server is in both cases inn2{,-inews} 2.6.0-2+b1. It seems that the problems are somehow related to openssl; and stunnel4 3:5.37-1 is linked against openssl 1.1.0, stunnel4 3:5.36-1 against openssl 1.0.2. And with 3:5.36-1 I don't see any problems. Cheers, gregor - -- System Information: Debian Release: stretch/sid APT prefers unstable APT policy: (990, 'unstable'), (500, 'unstable-debug'), (500, 'experimental'), (500, 'testing'), (500, 'stable'), (500, 'oldstable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 4.8.0-1-amd64 (SMP w/4 CPU cores) Locale: LANG=C, LC_CTYPE=de_AT.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Init: sysvinit (via /sbin/init) Versions of packages stunnel4 depends on: ii adduser 3.115 ii libc6 2.24-5 ii libssl1.1 1.1.0c-1 ii libsystemd0 232-3 ii libwrap0 7.6.q-25 ii lsb-base 9.20161101 ii netbase 5.3 ii openssl 1.1.0c-1 pn perl:any <none> stunnel4 recommends no packages. Versions of packages stunnel4 suggests: pn logcheck-database <none> - -- Configuration Files: /etc/default/stunnel4 changed: ENABLED=1 FILES="/etc/stunnel/*.conf" OPTIONS="" PPP_RESTART=0 RLIMITS="" - -- no debconf information -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEE0eExbpOnYKgQTYX6uzpoAYZJqgYFAlgl3iFfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEQx RTEzMTZFOTNBNzYwQTgxMDREODVGQUJCM0E2ODAxODY0OUFBMDYACgkQuzpoAYZJ qgZc6xAAjs0VOkhE2UVaEwKIQpUHLgC2dhItIIQIxnrc55x4JYWjQ6aFd4Ct/blZ Cctl053I/66VkvpRXnbtU0AGCW5YQpw17jxaGHb9KAgrJbRAlAmxULXQWGT/cTdI Dkqr6poW5AVUQsSmWCGSgY171Fn/ityiRBB88yJw0vDNHmGsGJrxQNvL+VVpXGkg br1hIcL7RZDliTnU6C9lHpoHHYQSU6t0F9C14YKjMWImGOmoZF9MeRxTEABk/3UE VcV6mQYJqgQY1gKU94AgvB3OdynmGTT/HxjrzjgsYhW7TeRf12zJxQfAm8LN5j1W Y0kpjLbEouVPqAokkQ1oBqJBI8fmrtu/v2kxd9SBiTzQYWJ23Qo4w/v/8GNdTweH Kz3KJCePn5wjZ6IZ7OFjhK/ZlOEnItwz6r/hKa1ZfRC+u6fenBTFuGbjswSpmvUN V5nudYfFaSNVb6fIlZ/R1axu842Qz4faQVp04X+/xUTyx6f/VeL94cjQQLZFmHER DOfzWL2TZs2D+TsahEreAowuy4w2NGx3igsmtfIWszflDSnOjHxKKXqs/kaK2WC6 azmPC0Y+HxBNE9DP+RWq+W8mHI66e1REjrcOoV3k8pUQZkk5Eqnsg+as1DuluZSl 6WLBvcZP5UNV6Ac3KIBtNhidLqwSrbxZFPkRipXrZSfsS8HfJnE= =mamB -----END PGP SIGNATURE-----