On Fri, Jun 02, 2017 at 03:34:37PM +0000, Oliver Ford wrote: > As reported in Bugzilla #1152, a segfault occurs in iptables-xml if a > jump or goto argument lacks a target argument. The following input will > segfault: > *filter > :INPUT ACCEPT [0:0] > -A INPUT -p tcp --dport 2200 -j > > Problem occurs in do_rule_part, where the existsChain() function is called > with argv[arg + 1]. If the jump/goto argument is the last argument, then > arg + 1 is out of the array bounds. The fix ensures that arg + 1 is within > the array bounds before the call to existsChain() is made. Applied, thanks. -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html