From a880cc28358a32f96467e248266973b6ab83f080 Mon Sep 17 00:00:00 2001 From: Phil Sutter Date: Fri, 1 Feb 2019 19:17:50 +0100 Subject: xtables: Fix for crash when comparing rules with standard target When parsing an nftnl_rule with a standard verdict, nft_rule_to_iptables_command_state() initialized cs->target but didn't care about cs->target->t. When later comparing that rule to another, compare_targets() crashed due to unconditional access to t's fields. Signed-off-by: Phil Sutter Signed-off-by: Florian Westphal --- iptables/tests/shell/testcases/iptables/0005-delete-rules_0 | 7 +++++++ 1 file changed, 7 insertions(+) create mode 100755 iptables/tests/shell/testcases/iptables/0005-delete-rules_0 (limited to 'iptables/tests/shell/testcases') diff --git a/iptables/tests/shell/testcases/iptables/0005-delete-rules_0 b/iptables/tests/shell/testcases/iptables/0005-delete-rules_0 new file mode 100755 index 00000000..9312fd53 --- /dev/null +++ b/iptables/tests/shell/testcases/iptables/0005-delete-rules_0 @@ -0,0 +1,7 @@ +#!/bin/bash + +# test for crash when comparing rules with standard target + +$XT_MULTI iptables -A FORWARD -i eth23 -o eth42 -j DROP +$XT_MULTI iptables -D FORWARD -i eth23 -o eth42 -j REJECT +[[ $? -eq 1 ]] || exit 1 -- cgit v1.2.3