[Bug 1382] nftables.py cmd leaking memory when ruleset contains mapping ip length to range with high limit 65535

bugzilla-daemon at netfilter.org bugzilla-daemon at netfilter.org
Wed Aug 5 11:36:43 CEST 2020


https://bugzilla.netfilter.org/show_bug.cgi?id=1382

Pablo Neira Ayuso <pablo at netfilter.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |ASSIGNED

--- Comment #3 from Pablo Neira Ayuso <pablo at netfilter.org> ---
Testing:

add table ip table1
add set ip table1 set1 { type ipv4_addr; }
add chain ip table1 chain1 { type filter hook forward priority 0; }
add counter ip table1 counter1
add rule ip table1 chain1 counter name ip length map { 0-65535: "counter1" }

Then:

nft list ruleset

shows no memleaks after this patch:

https://patchwork.ozlabs.org/project/netfilter-devel/patch/20200805093312.26212-1-pablo@netfilter.org/

-- 
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20200805/f812d139/attachment.html>


More information about the netfilter-buglog mailing list