Public bug reported: On Xenial, when an application is used through tsocks, it will systematically segfqult:
$ ssh machine [connection OK] $ wget http://example.com/some/path [download succeeds] $ tsocks ssh machine Segmentation fault $ tsocks wget http://example.com/some/path Segmentation fault $ lsb_release -rd Description: Ubuntu 16.04 LTS Release: 16.04 $ apt-cache policy tsocks tsocks: Installed: 1.8beta5-9.3 Candidate: 1.8beta5-9.3 Version table: *** 1.8beta5-9.3 500 500 http://fr.archive.ubuntu.com/ubuntu xenial/universe amd64 Packages 100 /var/lib/dpkg/status Expected: connections through tsocks succeed What happens: connections through tsocks systematically segfault Here's my tsocks.conf: $ cat /etc/tsocks.conf local = 192.168.0.0/255.255.0.0 server = 127.0.0.1 server_port = 8083 server_type = 5 Running through gdb: $ gdb ssh machine [...] (gdb) run Starting program: /usr/bin/ssh [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". Program received signal SIGSEGV, Segmentation fault. 0x0000000000000000 in ?? () (gdb) bt #0 0x0000000000000000 in ?? () #1 0x00007ffff7670e77 in poll (__timeout=10, __nfds=1, __fds=0x7fffffffdb70) at /usr/include/x86_64-linux-gnu/bits/poll2.h:46 #2 RAND_poll () at rand_unix.c:325 #3 0x00007ffff766fbd5 in ssleay_rand_bytes (buf=0x555555804010 "\212\003", num=num@entry=60, pseudo=pseudo@entry=0, lock=lock@entry=0) at md_rand.c:398 #4 0x00007ffff7670603 in drbg_get_entropy (ctx=<optimized out>, pout=0x7fffffffdec0, entropy=<optimized out>, min_len=60, max_len=<optimized out>) at rand_lib.c:199 #5 0x00007ffff76e6278 in fips_get_entropy (dctx=dctx@entry=0x7ffff79a9960 <ossl_dctx>, pout=pout@entry=0x7fffffffdf30, entropy=<optimized out>, min_len=<optimized out>, max_len=2147483632) at fips_drbg_lib.c:151 #6 0x00007ffff76e6904 in FIPS_drbg_instantiate (dctx=dctx@entry=0x7ffff79a9960 <ossl_dctx>, pers=pers@entry=0x7fffffffdf80 "OpenSSL DRBG2.0", perslen=perslen@entry=32) at fips_drbg_lib.c:223 #7 0x00007ffff7670993 in RAND_init_fips () at rand_lib.c:302 #8 0x00007ffff75b3f7a in OPENSSL_init_library () at o_init.c:119 #9 0x00007ffff7de74ea in call_init (l=<optimized out>, argc=argc@entry=1, argv=argv@entry=0x7fffffffe078, env=env@entry=0x7fffffffe088) at dl-init.c:72 #10 0x00007ffff7de75fb in call_init (env=0x7fffffffe088, argv=0x7fffffffe078, argc=1, l=<optimized out>) at dl-init.c:30 #11 _dl_init (main_map=0x7ffff7ffe168, argc=1, argv=0x7fffffffe078, env=0x7fffffffe088) at dl-init.c:120 #12 0x00007ffff7dd7cfa in _dl_start_user () from /lib64/ld-linux-x86-64.so.2 #13 0x0000000000000001 in ?? () #14 0x00007fffffffe4da in ?? () #15 0x0000000000000000 in ?? () Since Xenial does not have debugging symbols for tsocks, I can't provide much more (although I'd gladly follow a quick and simple tutorial on doing so). For the record, it was working in Wily (15.10) and all previous versions. ** Affects: tsocks (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1574270 Title: applications segfault systematically with tsocks To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/tsocks/+bug/1574270/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs