Bug 1805611
Summary: | xtables-monitor crash when target TRACE rule get matched | |||
---|---|---|---|---|
Product: | Red Hat Enterprise Linux 8 | Reporter: | yiche <yiche> | |
Component: | iptables | Assignee: | Phil Sutter <psutter> | |
Status: | CLOSED ERRATA | QA Contact: | Jiri Peska <jpeska> | |
Severity: | high | Docs Contact: | ||
Priority: | unspecified | |||
Version: | 8.2 | CC: | iptables-maint-list, jpeska, todoleza | |
Target Milestone: | rc | Keywords: | Regression | |
Target Release: | 8.0 | |||
Hardware: | Unspecified | |||
OS: | Linux | |||
Whiteboard: | ||||
Fixed In Version: | iptables-1.8.4-9.el8 | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | ||
Clone Of: | ||||
: | 1806606 (view as bug list) | Environment: | ||
Last Closed: | 2020-04-28 17:00:30 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | ||||
Bug Blocks: | 1806606 |
Comment 1
Phil Sutter
2020-02-24 12:24:26 UTC
Fixed with a small RHEL-only patch: diff --git a/iptables/xtables-monitor.c b/iptables/xtables-monitor.c index a5245d1422af9..737c35f2ac60c 100644 --- a/iptables/xtables-monitor.c +++ b/iptables/xtables-monitor.c @@ -595,7 +595,9 @@ int xtables_monitor_main(int argc, char *argv[]) struct mnl_socket *nl; char buf[MNL_SOCKET_BUFFER_SIZE]; uint32_t nfgroup = 0; - struct nft_handle h = {}; + struct nft_handle h = { + .family = AF_INET, + }; struct cb_arg cb_arg = { .h = &h, }; @@ -622,6 +624,9 @@ int xtables_monitor_main(int argc, char *argv[]) strerror(errno)); exit(EXIT_FAILURE); } + h.ops = nft_family_ops_lookup(h.family); + if (!h.ops) + xtables_error(PARAMETER_PROBLEM, "Unknown family"); opterr = 0; while ((c = getopt_long(argc, argv, "ceht46V", options, NULL)) != -1) { Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHEA-2020:1889 |