Package: iptables-1.8.2-4 Version: iptables 1.8.2-4 Severity: normal Dear Maintainer,
*** Reporter, please consider answering these questions, where appropriate *** * What led up to the situation? * What exactly did you do (or not do) that was effective (or ineffective)? * What was the outcome of this action? * What outcome did you expect instead? *** End of the template - remove these template lines *** -- System Information: Debian Release: 10.12 APT prefers oldstable-updates APT policy: (500, 'oldstable-updates'), (500, 'oldstable') Architecture: amd64 (x86_64) Kernel: Linux 4.19.0-20-amd64 (SMP w/24 CPU cores) Kernel taint flags: TAINT_FIRMWARE_WORKAROUND Locale: LANG=pl_PL.UTF-8, LC_CTYPE=pl_PL.UTF-8 (charmap=UTF-8), LANGUAGE=pl_PL.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Segmentation fault caused by iptables with no matching rules. # iptables -D INPUT -s 10.0.0.1 -j DENY Segmentation fault (core dumped) Jun 14 09:58:45 dux kernel: [6724455.363431] iptables[12347]: segfault at 2 ip 00007f9137f467be sp 00007ffed4f99f58 error 4 in libc-2.28.so[7f9137ed8000+147000]