<html>
<head>
<base href="https://bugzilla.netfilter.org/" />
</head>
<body>
<p>
<div>
<b><a class="bz_bug_link
bz_status_ASSIGNED "
title="ASSIGNED - iptables-xml crashes on -D rules"
href="https://bugzilla.netfilter.org/show_bug.cgi?id=1152#c1">Comment # 1</a>
on <a class="bz_bug_link
bz_status_ASSIGNED "
title="ASSIGNED - iptables-xml crashes on -D rules"
href="https://bugzilla.netfilter.org/show_bug.cgi?id=1152">bug 1152</a>
from <span class="vcard"><a class="email" href="mailto:ojford@gmail.com" title="Oliver Ford <ojford@gmail.com>"> <span class="fn">Oliver Ford</span></a>
</span></b>
<pre>This particular issue was fixed by commit
f53b78e423d82b0c71c076480f52edeb5eaec5f8 and included in the 1.6.0 release.
However, there are other ways to cause a segfault. Including a jump without a
target segfaults, e.g.:
*filter
-A INPUT -p tcp --dport 2200 -j
I will add a check for this malformed jump and look for any other ways to cause
a crash.</pre>
</div>
</p>
<hr>
<span>You are receiving this mail because:</span>
<ul>
<li>You are watching all bug changes.</li>
</ul>
</body>
</html>