It seems that this is fixed in Xenial and Yakkety then, and exists in Trusty only?
It also seems that a workaround is available (reduce the number of concurrent fds) and fixing this properly would involve refactoring to use poll() instead of select(). I suspect this would be too invasive for an SRU (see https://wiki.ubuntu.com/StableReleaseUpdates for the policy) but I would consider a patch. Nevertheless, I'm setting this to Won't Fix to make it clear that I don't expect this to be fixed in Trusty (affected users can use the workaround). This isn't final though - discussion welcome, though I think any proponent for a fix in Trusty would also need to supply a patch - only then can we consider the regression risk. ** Summary changed: - AppArmor kills StronSwan daemon 'charon' + Buffer overflow when open fds exceed FD_SETSIZE ** Also affects: strongswan (Ubuntu Trusty) Importance: Undecided Status: New ** Changed in: strongswan (Ubuntu) Status: Confirmed => Fix Released ** Changed in: strongswan (Ubuntu Trusty) Status: New => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1549436 Title: Buffer overflow when open fds exceed FD_SETSIZE To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/strongswan/+bug/1549436/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
