Displaying 6 results from an estimated 6 matches for "parameter_problem".
2006 Feb 01
1
[Bug 437] New: restore can segfaults when restoring corrupt policy counters
...18:34:19.000000000 +0200
+++ iptables-1.3.5/ip6tables-restore.c 2006-02-01 23:47:04.000000000 +0100
@@ -266,7 +266,10 @@
char *ctrs;
ctrs = strtok(NULL, " \t\n");
- parse_counters(ctrs, &count);
+ if (!ctrs || !parse_counters(ctrs, &count))
+ exit_error(PARAMETER_PROBLEM,
+ "invalid policy counters "
+ "for chain '%s'\n", chain);
} else {
memset(&count, 0,
diff -uNr iptables-1.3.5.org/iptables-restore.c iptables-1.3.5/iptables-restore.c
--- iptables-1.3.5.org/iptables-restore.c 2005-06-24 18:34:19.0000...
2003 Mar 17
0
[Bug 65] New: Problem with error message when tcp-flags doesn't recognize a flag
...nsions/libip6t_tcp.c,v
retrieving revision 1.10
diff -u -r1.10 libip6t_tcp.c
--- extensions/libip6t_tcp.c 26 Jul 2002 16:27:57 -0000 1.10
+++ extensions/libip6t_tcp.c 17 Mar 2003 01:00:11 -0000
@@ -122,7 +122,7 @@
}
if (i == sizeof(tcp_flag_names)/sizeof(struct tcp_flag_names))
exit_error(PARAMETER_PROBLEM,
- "Unknown TCP flag `%s'", buffer);
+ "Unknown TCP flag `%s'", ptr);
}
free(buffer);
Index: extensions/libipt_tcp.c
===================================================================
RCS file: /cvspublic/netfilter/userspace/extensions/libipt_tcp.c,v...
2013 May 30
1
[Bug 825] New: broken led-delay parameter in the LED extension
...are using (other than inf)
ends up with a rule at 0 ms.
This is due to the checked value never assigned to the structure in
https://git.netfilter.org/iptables/tree/extensions/libxt_LED.c#n63
else if (!xtables_strtoui(cb->arg, NULL, &delay, 0, UINT32_MAX))
xtables_error(PARAMETER_PROBLEM,
"Delay value must be within range 0..%u",
UINT32_MAX);
led->delay is never assigned with the value given by the user
I changed it to
else if (!xtables_strtoui(cb->arg, NULL, &led->delay, 0, UINT32_MAX))
xtables_error(PARA...
2007 Feb 14
0
[Bug 545] New: Array subscript is above array bounds
...ar from name. */
if (strlen(me->name) >= IP6T_FUNCTION_MAXNAMELEN-1) {
fprintf(stderr, "%s: target `%s' has invalid name\n",
program_name, me->name);
exit(1);
}
[ function do_command6() ]
if (chain && strlen(chain) > IP6T_FUNCTION_MAXNAMELEN)
exit_error(PARAMETER_PROBLEM,
"chain name `%s' too long (must be under %i chars)",
chain, IP6T_FUNCTION_MAXNAMELEN);
I cannot determine if changing "char name[IP6T_FUNCTION_MAXNAMELEN-1];" into
"char name[IP6T_FUNCTION_MAXNAMELEN];" in header file is sufficient fix, or
usage of consta...
2018 Apr 09
1
[Bug 1242] New: noflush actually flushes in case of custom chain
...bles-restore.c
line 369
if (noflush && ops->is_chain(chain, handle)) {
DEBUGP("Flushing existing user defined chain '%s'\n",
chain);
if (!ops->flush_entries(chain, handle))
xtables_error(PARAMETER_PROBLEM,
"error flushing chain "
"'%s':%s\n", chain,
strerror(errno));
where it should be if(!noflush %% ops->...
--
You are receiving this mail because:
You are watching all bug c...
2017 Mar 17
2
[Bug 1131] New: iptables-restore crashes on some fuzzed input
...inter gets overwritten only when -t/--table option gets
passed to do_command4() and we specifically check for this corner case:
> iptables/iptables-restore.c:157
> if (!strncmp(param_buffer, "-t", 2)
> || !strncmp(param_buffer, "--table", 8)) {
> xtables_error(PARAMETER_PROBLEM,
> "The -t option (seen in line %u) cannot be "
> "used in iptables-restore.\n", line);
> exit(1);
> }
Unfortunately, do_command4() uses getopt_long() to parse its arguments. This
function is quite smart and provides some ways to bypass the check above but
still...