Public bug reported:
On Xenial, when an application is used through tsocks, it will
systematically segfqult:
$ ssh machine
[connection OK]
$ wget http://example.com/some/path
[download succeeds]
$ tsocks ssh machine
Segmentation fault
$ tsocks wget http://example.com/some/path
Segmentation fault
$ lsb_release -rd
Description: Ubuntu 16.04 LTS
Release: 16.04
$ apt-cache policy tsocks
tsocks:
Installed: 1.8beta5-9.3
Candidate: 1.8beta5-9.3
Version table:
*** 1.8beta5-9.3 500
500 http://fr.archive.ubuntu.com/ubuntu xenial/universe amd64
Packages
100 /var/lib/dpkg/status
Expected: connections through tsocks succeed
What happens: connections through tsocks systematically segfault
Here's my tsocks.conf:
$ cat /etc/tsocks.conf
local = 192.168.0.0/255.255.0.0
server = 127.0.0.1
server_port = 8083
server_type = 5
Running through gdb:
$ gdb ssh machine
[...]
(gdb) run
Starting program: /usr/bin/ssh
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Program received signal SIGSEGV, Segmentation fault.
0x0000000000000000 in ?? ()
(gdb) bt
#0 0x0000000000000000 in ?? ()
#1 0x00007ffff7670e77 in poll (__timeout=10, __nfds=1,
__fds=0x7fffffffdb70)
at /usr/include/x86_64-linux-gnu/bits/poll2.h:46
#2 RAND_poll () at rand_unix.c:325
#3 0x00007ffff766fbd5 in ssleay_rand_bytes (buf=0x555555804010 "\212\003",
num=num@entry=60,
pseudo=pseudo@entry=0, lock=lock@entry=0) at md_rand.c:398
#4 0x00007ffff7670603 in drbg_get_entropy (ctx=<optimized out>,
pout=0x7fffffffdec0,
entropy=<optimized out>, min_len=60, max_len=<optimized out>) at
rand_lib.c:199
#5 0x00007ffff76e6278 in fips_get_entropy (dctx=dctx@entry=0x7ffff79a9960
<ossl_dctx>,
pout=pout@entry=0x7fffffffdf30, entropy=<optimized out>,
min_len=<optimized out>,
max_len=2147483632) at fips_drbg_lib.c:151
#6 0x00007ffff76e6904 in FIPS_drbg_instantiate
(dctx=dctx@entry=0x7ffff79a9960 <ossl_dctx>,
pers=pers@entry=0x7fffffffdf80 "OpenSSL DRBG2.0",
perslen=perslen@entry=32)
at fips_drbg_lib.c:223
#7 0x00007ffff7670993 in RAND_init_fips () at rand_lib.c:302
#8 0x00007ffff75b3f7a in OPENSSL_init_library () at o_init.c:119
#9 0x00007ffff7de74ea in call_init (l=<optimized out>, argc=argc@entry=1,
argv=argv@entry=0x7fffffffe078, env=env@entry=0x7fffffffe088) at
dl-init.c:72
#10 0x00007ffff7de75fb in call_init (env=0x7fffffffe088,
argv=0x7fffffffe078, argc=1,
l=<optimized out>) at dl-init.c:30
#11 _dl_init (main_map=0x7ffff7ffe168, argc=1, argv=0x7fffffffe078,
env=0x7fffffffe088)
at dl-init.c:120
#12 0x00007ffff7dd7cfa in _dl_start_user () from /lib64/ld-linux-x86-64.so.2
#13 0x0000000000000001 in ?? ()
#14 0x00007fffffffe4da in ?? ()
#15 0x0000000000000000 in ?? ()
Since Xenial does not have debugging symbols for tsocks, I can't provide much
more (although
I'd gladly follow a quick and simple tutorial on doing so).
For the record, it was working in Wily (15.10) and all previous
versions.
** Affects: tsocks (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1574270
Title:
applications segfault systematically with tsocks
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tsocks/+bug/1574270/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs