Overview
Artifact ID: | 063b481d85fcdee3b1234f0277f4c64e6e864536f2860fd394337b90731f6839 |
---|---|
Ticket: | b1c2d07148abc1d84c97b44f0e3d1ef56cf04504
ip::version and ip::mask accepts invalid netmask and other input after / |
User & Date: | buzzdeee 2019-06-13 11:54:21 |
Changes
- assignee changed to: ""
- comment changed to:
IP version happily accepts and returns invalid netmasks: <pre> % ::ip::version 10.0.0.1/64 4 </pre> even worse, basically accepts all sorts of input: <pre> % ip::version 10.0.0.1/dsffds/44 4 </pre> The same is true for ip::mask I'm attaching a patch that makes things more strict in ip::version and then at the beginning of ip::mask, check ip::version. Then if ip::mask fails, also similariy to ip::version, return -1 on failure.
- login: "buzzdeee"
- mimetype: "text/plain"
- title changed to:
ip::version and ip::mask accepts invalid netmask and other input after /