Merge ~sergiodj/ubuntu/+source/strongswan:bug1964977-ipsec-pki-segfault into ubuntu/+source/strongswan:ubuntu/devel
Status: | Merged | ||||
---|---|---|---|---|---|
Merged at revision: | 6bdb73f7ec8c8e04ec7c8654f2bdc172bc0d2675 | ||||
Proposed branch: | ~sergiodj/ubuntu/+source/strongswan:bug1964977-ipsec-pki-segfault | ||||
Merge into: | ubuntu/+source/strongswan:ubuntu/devel | ||||
Diff against target: |
120 lines (+98/-0) 3 files modified
debian/changelog (+8/-0) debian/patches/lp1964977-fix-ipsec-pki-segfault.patch (+89/-0) debian/patches/series (+1/-0) |
||||
Related bugs: |
|
Reviewer | Review Type | Date Requested | Status |
---|---|---|---|
Simon Déziel (community) | drive-by ;) | Approve | |
Canonical Server packageset reviewers | Pending | ||
Canonical Server | Pending | ||
Review via email:
|
Description of the change
This MP fixes bug 1964977.
This is about a segmentation fault that is occurring when using the "ipsec pki" command. It's very easy to reproduce:
$ lxc launch ubuntu-daily:jammy ipsec-bug1964977
$ lxc shell ipsec-bug1964977
# apt update && apt full-upgrade -y
# apt install strongswan strongswan-pki
# ipsec pki --gen --size 4096 --outform pem
Upstream has a patch for it:
https:/
As explained in the commit message, the problem happens because of some bad interaction between atexit handlers for both strongswan and openssl. Strongswan uses these handlers to unload/destroy its plugins, and the problem is that it tried to access openssl objects during these operations. However, with openssl's atexit handlers in place, this will now generate a segmentation fault. There's also an openssl bug about this problem here:
https:/
You can find a PPA with the proposed changes here:
https:/
autopkgtest is still OK:
autopkgtest [14:54:23]: @@@@@@@
admin-strongswa
admin-strongswa
daemon PASS
plugins PASS
LGTM and I confirmed your package to work, thanks!