bugzilla-daemon at netfilter.org
2017-May-21 16:57 UTC
[Bug 1150] New: Iptables fails to match rules with malloc perturberation activated
https://bugzilla.netfilter.org/show_bug.cgi?id=1150 Bug ID: 1150 Summary: Iptables fails to match rules with malloc perturberation activated Product: iptables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: enhancement Priority: P5 Component: iptables Assignee: netfilter-buglog at lists.netfilter.org Reporter: goeran at uddeborg.se On my Fedora system, I've upgraded to Fedora 26 versions of iptables and, in case it matters, glibc. iptables-1.6.1-2.fc26.x86_64 glibc-2.25-4.fc26.x86_64 I also have the debugmode package installed, which sets the environment variable MALLOC_PERTURB_ to a random value. The variable is meant to "detecting errors where programs incorrectly rely on allocated memory being initialized to zero, or reuse values in memory that has already been freed." It appears iptables in some cases do this. I haven't figured out exactly what conditions trigger the bug, but here is one way to reliably reproduce the behaviour: iptables -t nat -N testchain iptables -t nat -A testchain -j SNAT --to-source 1.2.3.4 MALLOC_PERTURB_=42 iptables -t nat -D testchain -j SNAT --to-source 1.2.3.4 The last command gives the error message iptables: No chain/target/match by that name. The rule I try to remove is still present. If I disable malloc perturberation by setting the variable to 0, the command succeeds MALLOC_PERTURB_=0 iptables -t nat -D testchain -j SNAT --to-source 1.2.3.4 This gives no error message, and the rule is indeed gone. -- You are receiving this mail because: You are watching all bug changes. -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20170521/a5b2dadf/attachment.html>
bugzilla-daemon at netfilter.org
2017-May-21 17:07 UTC
[Bug 1150] Iptables fails to match rules with malloc perturberation activated
https://bugzilla.netfilter.org/show_bug.cgi?id=1150 Florian Westphal <fw at strlen.de> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |fw at strlen.de --- Comment #1 from Florian Westphal <fw at strlen.de> --- Do you use 4.11 kernel? If so, this is most likely fixed by: https://git.kernel.org/pub/scm/linux/kernel/git/pablo/nf.git/commit/?id=324318f0248c31be8a08984146e7e4dd7cdd091d nevertheless, this should also be fixed on iptables side. -- You are receiving this mail because: You are watching all bug changes. -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20170521/e7598187/attachment.html>
bugzilla-daemon at netfilter.org
2017-May-21 17:12 UTC
[Bug 1150] Iptables fails to match rules with malloc perturberation activated
https://bugzilla.netfilter.org/show_bug.cgi?id=1150 --- Comment #2 from G�ran Uddeborg <goeran at uddeborg.se> ---> Do you use 4.11 kernel?I guess "almost" is an appropriate answer :-), more exactly: 4.11.0-0.rc8.git0.1.fc26.x86_64 -- You are receiving this mail because: You are watching all bug changes. -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20170521/8fbf76ce/attachment.html>
bugzilla-daemon at netfilter.org
2019-Sep-10 20:44 UTC
[Bug 1150] Iptables fails to match rules with malloc perturberation activated
https://bugzilla.netfilter.org/show_bug.cgi?id=1150 Florian Westphal <fw at strlen.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Resolution|--- |FIXED Status|NEW |RESOLVED -- You are receiving this mail because: You are watching all bug changes. -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20190910/b739d777/attachment.html>
Apparently Analagous Threads
- [Bug 1168] New: type nat hook output doesn't work anymore
- [PATCH] Prepend local library path to LD_LIBRARY_PATH for tests, instead of replacing it
- [PATCH 3/3] export MALLOC_PERTURB_ and MALLOC_CHECK_ in test suite
- [PATCH libguestfs] tests: increase likelihood that heap abuse triggers failure
- Font confusion