It seems that this is fixed in Xenial and Yakkety then, and exists in
It also seems that a workaround is available (reduce the number of
concurrent fds) and fixing this properly would involve refactoring to
use poll() instead of select().
I suspect this would be too invasive for an SRU (see
https://wiki.ubuntu.com/StableReleaseUpdates for the policy) but I would
consider a patch. Nevertheless, I'm setting this to Won't Fix to make it
clear that I don't expect this to be fixed in Trusty (affected users can
use the workaround). This isn't final though - discussion welcome,
though I think any proponent for a fix in Trusty would also need to
supply a patch - only then can we consider the regression risk.
** Summary changed:
- AppArmor kills StronSwan daemon 'charon'
+ Buffer overflow when open fds exceed FD_SETSIZE
** Also affects: strongswan (Ubuntu Trusty)
** Changed in: strongswan (Ubuntu)
Status: Confirmed => Fix Released
** Changed in: strongswan (Ubuntu Trusty)
Status: New => Won't Fix
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Buffer overflow when open fds exceed FD_SETSIZE
To manage notifications about this bug go to:
ubuntu-bugs mailing list