Activity log for bug #1629241

Date Who What changed Old value New value Message
2016-09-30 09:34:22 EOLE team bug added bug
2016-09-30 09:34:22 EOLE team attachment added fix-several-auth-crash https://bugs.launchpad.net/bugs/1629241/+attachment/4751596/+files/fix-several-auth-crash
2016-09-30 13:01:20 Ubuntu Foundations Team Bug Bot tags patch
2016-09-30 13:01:30 Ubuntu Foundations Team Bug Bot bug added subscriber Ubuntu Review Team
2016-10-03 16:53:13 Robie Basak tags patch bitesize patch server-next
2016-10-03 16:53:23 Robie Basak nominated for series Ubuntu Trusty
2016-10-03 16:53:23 Robie Basak bug task added strongswan (Ubuntu Trusty)
2016-10-03 16:53:35 Robie Basak bug added subscriber Ubuntu Server Team
2016-10-03 16:56:38 Jon Grimm bug added subscriber Jon Grimm
2016-10-05 20:20:02 Nish Aravamudan strongswan (Ubuntu): assignee Nish Aravamudan (nacc)
2016-10-05 20:20:05 Nish Aravamudan strongswan (Ubuntu Trusty): assignee Nish Aravamudan (nacc)
2016-10-05 20:20:08 Nish Aravamudan strongswan (Ubuntu): status New Fix Released
2016-10-05 20:21:00 Nish Aravamudan strongswan (Ubuntu Trusty): importance Undecided High
2016-10-05 20:21:02 Nish Aravamudan strongswan (Ubuntu Trusty): status New In Progress
2016-10-05 22:50:08 Launchpad Janitor merge proposal linked https://code.launchpad.net/~nacc/ubuntu/+source/strongswan/+git/strongswan/+merge/307772
2016-10-05 22:56:33 Nish Aravamudan strongswan (Ubuntu): assignee Nish Aravamudan (nacc)
2016-10-14 16:14:05 Nish Aravamudan description $ lsb_release -rd Description: Ubuntu 14.04.5 LTS Release: 14.04 $ apt-cache policy strongswan strongswan: Installé : 5.1.2-0ubuntu2.4 Candidat : 5.1.2-0ubuntu2.4 Table de version : *** 5.1.2-0ubuntu2.4 0 500 http://eole.ac-dijon.fr/ubuntu/ trusty-security/main amd64 Packages 500 http://eole.ac-dijon.fr/ubuntu/ trusty-updates/main amd64 Packages 100 /var/lib/dpkg/status 5.1.2-0ubuntu2 0 500 http://eole.ac-dijon.fr/ubuntu/ trusty/main amd64 Packages We have several production servers running with the same configuration. When the plugin revocation is loaded, the daemon crashes in most every IKE_SA reauthentication (not each time). You can see in this thread[1] what Tobias Brunner answers about our problem. So, we have recompile the source package version including the joined patch (quilt), and all is OK now. We would be grateful if you provide a new package including this patch. Regards, EOLE Team [1] https://lists.strongswan.org/pipermail/users/2016-September/009991.html [2] https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=8ca9a67f [Impact] * Users report a crash when the revocation plugin is loaded, after a few rounds of IKE_SA reauthentication. * Users do not expect strongswan to crash under valid configurations. [Test Case] * While not an explicit testcase, the original bug report indicates all that is needed is a loading of the revocation plugin and several runs of IKE_SA reauthentication. Upstream strongswan fixed this issue and referred to multiple reauthentication rounds being the primary culprit. [Regression Potential] * Currently, the code crashes without this fix. Upstream has accepted this fix and applied it all versions. I believe the regression potential is very low, as the bug resulted from a coding error. --- $ lsb_release -rd Description: Ubuntu 14.04.5 LTS Release: 14.04 $ apt-cache policy strongswan strongswan:   Installé : 5.1.2-0ubuntu2.4   Candidat : 5.1.2-0ubuntu2.4  Table de version :  *** 5.1.2-0ubuntu2.4 0         500 http://eole.ac-dijon.fr/ubuntu/ trusty-security/main amd64 Packages         500 http://eole.ac-dijon.fr/ubuntu/ trusty-updates/main amd64 Packages         100 /var/lib/dpkg/status      5.1.2-0ubuntu2 0         500 http://eole.ac-dijon.fr/ubuntu/ trusty/main amd64 Packages We have several production servers running with the same configuration. When the plugin revocation is loaded, the daemon crashes in most every IKE_SA reauthentication (not each time). You can see in this thread[1] what Tobias Brunner answers about our problem. So, we have recompile the source package version including the joined patch (quilt), and all is OK now. We would be grateful if you provide a new package including this patch. Regards, EOLE Team [1] https://lists.strongswan.org/pipermail/users/2016-September/009991.html [2] https://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=8ca9a67f
2016-10-14 16:20:12 Brian Murray strongswan (Ubuntu Trusty): status In Progress Fix Committed
2016-10-14 16:20:16 Brian Murray bug added subscriber Ubuntu Stable Release Updates Team
2016-10-14 16:20:24 Brian Murray bug added subscriber SRU Verification
2016-10-14 16:20:33 Brian Murray tags bitesize patch server-next bitesize patch server-next verification-needed
2016-10-14 19:49:24 Mathew Hodson strongswan (Ubuntu): importance Undecided High
2016-10-19 13:43:11 Simon Déziel tags bitesize patch server-next verification-needed bitesize patch server-next verification-done
2016-10-26 12:27:57 Chris J Arges removed subscriber Ubuntu Stable Release Updates Team
2016-10-26 12:38:02 Launchpad Janitor strongswan (Ubuntu Trusty): status Fix Committed Fix Released