[Bug 984] New: nft v0.3 - Segmentation fault when read input file specifies the "num" queue's option

bugzilla-daemon at netfilter.org bugzilla-daemon at netfilter.org
Mon Oct 27 21:52:02 CET 2014


https://bugzilla.netfilter.org/show_bug.cgi?id=984

            Bug ID: 984
           Summary: nft v0.3 - Segmentation fault when read input file
                    specifies the "num" queue's option
           Product: nftables
           Version: unspecified
          Hardware: x86_64
                OS: Gentoo
            Status: NEW
          Severity: blocker
          Priority: P5
         Component: nft
          Assignee: pablo at netfilter.org
          Reporter: lucazorzo at gmail.com

Created attachment 452
  --> https://bugzilla.netfilter.org/attachment.cgi?id=452&action=edit
Strace with "queue num 0"

Hello,
as described in the summary if the file passed to nft contains a "queue num x"
rule, nft segfauls with si_signo=SIGSEGV and si_code=SEGV_MAPERR, as you can
see in the attached strace files. Deleting the "num x" option solves the
problem.

Testing input file:

table ip filter {
  chain forward {
    type filter hook forward priority 0;
    queue num 0
  }
}

Environment ("-r*" releases can be gentoo specific):
- kernel: hardened-sources-3.17.1-r1
- nftables: nftables-0.3-r2
- gcc: gcc-4.7.3-r1

I found a similar problem in the wrong bugzilla:
https://bugs.launchpad.net/zope3/+bug/1353458

-- 
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20141027/3ade71c8/attachment.html>


More information about the netfilter-buglog mailing list