[Bug 1702] iptables fails to parse interface wildcard "-i +" correctly
bugzilla-daemon at netfilter.org
bugzilla-daemon at netfilter.org
Tue Sep 5 15:31:27 CEST 2023
https://bugzilla.netfilter.org/show_bug.cgi?id=1702
--- Comment #7 from thomas.strangert at emblasoft.com ---
(In reply to Phil Sutter from comment #2)
> I can neither reproduce this with current HEAD nor v1.8.7 tag. Is this a
> downstream issue? I see you're facing the problem with
> iptables-1.8.7-1ubuntu5.1, can you try to reproduce with a vanilla build?
>
> Also, you could try calling:
>
> valgrind --leak-check=full iptables -A INPUT -i + -d 192.168.1.10 -j DROP
>
> It should report garbage data read and give some
> details as to where/why it happens.
I noticed it when I moved to a Ubuntu 22.04 LTS from 20.04 LTS, all using
native/standard distro/downstream builds I suppose.
I have reported the bug to Ubuntu as well, so I hope that they can do the
"flavored" tests. I don't have the servers/setup/bandwidth to go much deeper
that I'm already in at.
Ubuntu bug report:
https://bugs.launchpad.net/ubuntu/+source/iptables/+bug/2033663
--
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20230905/6c8a5a97/attachment.html>
More information about the netfilter-buglog
mailing list