Package: iptables-persistent Severity: critical Tags: security patch ipv6 Justification: root security hole
Dear Maintainer, * What led up to the situation? Running '/usr/sbin/netfilter-persistent save' from root's crontab. * What was the outcome of this action? A mail message from cron, explaining that 'iptables' could not be found. * What outcome did you expect instead? I expected a file to be written which contained the current iptables rules. Unfortunately the result of this error left the iptables ruleset empty on iptables-restore after a reboot today, hence the classification of this bug as a security issue. -- System Information: Debian Release: 8.7 APT prefers stable APT policy: (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 3.16.0-4-amd64 (SMP w/2 CPU cores) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init) This isn't the system on which I installed netfilter-persistent, but that's irrelevant - they're both up-to-date Debian Jessie on AMD. PATCH - the same is needed for 25-ip6tables --- 15-ip4tables~ 2016-01-02 21:18:13.000000000 +0000 +++ 15-ip4tables 2017-03-09 18:22:39.206872371 +0000 @@ -20,7 +20,7 @@ if [ ! -f /etc/iptables/rules.v4 ]; then echo "Warning: skipping IPv4 (no rules to load)" else - iptables-restore < /etc/iptables/rules.v4 2> /dev/null + /sbin/iptables-restore < /etc/iptables/rules.v4 2> /dev/null if [ $? -ne 0 ]; then rc=1 fi @@ -37,7 +37,7 @@ elif [ -x /sbin/iptables-save ]; then touch /etc/iptables/rules.v4 chmod 0640 /etc/iptables/rules.v4 - iptables-save > /etc/iptables/rules.v4 + /sbin/iptables-save > /etc/iptables/rules.v4 if [ $? -ne 0 ]; then rc=1 fi