It seems that this is fixed in Xenial and Yakkety then, and exists in
Trusty only?

It also seems that a workaround is available (reduce the number of
concurrent fds) and fixing this properly would involve refactoring to
use poll() instead of select().

I suspect this would be too invasive for an SRU (see for the policy) but I would
consider a patch. Nevertheless, I'm setting this to Won't Fix to make it
clear that I don't expect this to be fixed in Trusty (affected users can
use the workaround). This isn't final though - discussion welcome,
though I think any proponent for a fix in Trusty would also need to
supply a patch - only then can we consider the regression risk.

** Summary changed:

- AppArmor kills StronSwan daemon 'charon'
+ Buffer overflow when open fds exceed FD_SETSIZE

** Also affects: strongswan (Ubuntu Trusty)
   Importance: Undecided
       Status: New

** Changed in: strongswan (Ubuntu)
       Status: Confirmed => Fix Released

** Changed in: strongswan (Ubuntu Trusty)
       Status: New => Won't Fix

You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

  Buffer overflow when open fds exceed FD_SETSIZE

To manage notifications about this bug go to:

ubuntu-bugs mailing list

Reply via email to