It seems that this is fixed in Xenial and Yakkety then, and exists in
Trusty only?

It also seems that a workaround is available (reduce the number of
concurrent fds) and fixing this properly would involve refactoring to
use poll() instead of select().

I suspect this would be too invasive for an SRU (see
https://wiki.ubuntu.com/StableReleaseUpdates for the policy) but I would
consider a patch. Nevertheless, I'm setting this to Won't Fix to make it
clear that I don't expect this to be fixed in Trusty (affected users can
use the workaround). This isn't final though - discussion welcome,
though I think any proponent for a fix in Trusty would also need to
supply a patch - only then can we consider the regression risk.

** Summary changed:

- AppArmor kills StronSwan daemon 'charon'
+ Buffer overflow when open fds exceed FD_SETSIZE

** Also affects: strongswan (Ubuntu Trusty)
   Importance: Undecided
       Status: New

** Changed in: strongswan (Ubuntu)
       Status: Confirmed => Fix Released

** Changed in: strongswan (Ubuntu Trusty)
       Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1549436

Title:
  Buffer overflow when open fds exceed FD_SETSIZE

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/strongswan/+bug/1549436/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to