search for: parameter_problem

Displaying 6 results from an estimated 6 matches for "parameter_problem".

2006 Feb 01
1
[Bug 437] New: restore can segfaults when restoring corrupt policy counters
...18:34:19.000000000 +0200 +++ iptables-1.3.5/ip6tables-restore.c 2006-02-01 23:47:04.000000000 +0100 @@ -266,7 +266,10 @@ char *ctrs; ctrs = strtok(NULL, " \t\n"); - parse_counters(ctrs, &count); + if (!ctrs || !parse_counters(ctrs, &count)) + exit_error(PARAMETER_PROBLEM, + "invalid policy counters " + "for chain '%s'\n", chain); } else { memset(&count, 0, diff -uNr iptables-1.3.5.org/iptables-restore.c iptables-1.3.5/iptables-restore.c --- iptables-1.3.5.org/iptables-restore.c 2005-06-24 18:34:19.0000...
2003 Mar 17
0
[Bug 65] New: Problem with error message when tcp-flags doesn't recognize a flag
...nsions/libip6t_tcp.c,v retrieving revision 1.10 diff -u -r1.10 libip6t_tcp.c --- extensions/libip6t_tcp.c 26 Jul 2002 16:27:57 -0000 1.10 +++ extensions/libip6t_tcp.c 17 Mar 2003 01:00:11 -0000 @@ -122,7 +122,7 @@ } if (i == sizeof(tcp_flag_names)/sizeof(struct tcp_flag_names)) exit_error(PARAMETER_PROBLEM, - "Unknown TCP flag `%s'", buffer); + "Unknown TCP flag `%s'", ptr); } free(buffer); Index: extensions/libipt_tcp.c =================================================================== RCS file: /cvspublic/netfilter/userspace/extensions/libipt_tcp.c,v...
2013 May 30
1
[Bug 825] New: broken led-delay parameter in the LED extension
...are using (other than inf) ends up with a rule at 0 ms. This is due to the checked value never assigned to the structure in https://git.netfilter.org/iptables/tree/extensions/libxt_LED.c#n63 else if (!xtables_strtoui(cb->arg, NULL, &delay, 0, UINT32_MAX)) xtables_error(PARAMETER_PROBLEM, "Delay value must be within range 0..%u", UINT32_MAX); led->delay is never assigned with the value given by the user I changed it to else if (!xtables_strtoui(cb->arg, NULL, &led->delay, 0, UINT32_MAX)) xtables_error(PARA...
2007 Feb 14
0
[Bug 545] New: Array subscript is above array bounds
...ar from name. */ if (strlen(me->name) >= IP6T_FUNCTION_MAXNAMELEN-1) { fprintf(stderr, "%s: target `%s' has invalid name\n", program_name, me->name); exit(1); } [ function do_command6() ] if (chain && strlen(chain) > IP6T_FUNCTION_MAXNAMELEN) exit_error(PARAMETER_PROBLEM, "chain name `%s' too long (must be under %i chars)", chain, IP6T_FUNCTION_MAXNAMELEN); I cannot determine if changing "char name[IP6T_FUNCTION_MAXNAMELEN-1];" into "char name[IP6T_FUNCTION_MAXNAMELEN];" in header file is sufficient fix, or usage of consta...
2018 Apr 09
1
[Bug 1242] New: noflush actually flushes in case of custom chain
...bles-restore.c line 369 if (noflush && ops->is_chain(chain, handle)) { DEBUGP("Flushing existing user defined chain '%s'\n", chain); if (!ops->flush_entries(chain, handle)) xtables_error(PARAMETER_PROBLEM, "error flushing chain " "'%s':%s\n", chain, strerror(errno)); where it should be if(!noflush %% ops->... -- You are receiving this mail because: You are watching all bug c...
2017 Mar 17
2
[Bug 1131] New: iptables-restore crashes on some fuzzed input
...inter gets overwritten only when -t/--table option gets passed to do_command4() and we specifically check for this corner case: > iptables/iptables-restore.c:157 > if (!strncmp(param_buffer, "-t", 2) > || !strncmp(param_buffer, "--table", 8)) { > xtables_error(PARAMETER_PROBLEM, > "The -t option (seen in line %u) cannot be " > "used in iptables-restore.\n", line); > exit(1); > } Unfortunately, do_command4() uses getopt_long() to parse its arguments. This function is quite smart and provides some ways to bypass the check above but still...