-
-
Notifications
You must be signed in to change notification settings - Fork 427
passing null values to upsc results in kernel segmentation fault #2052
Copy link
Copy link
Closed
Labels
bugimpacts-release-2.7.4Issues reported against NUT release 2.7.4 (maybe vanilla or with minor packaging tweaks)Issues reported against NUT release 2.7.4 (maybe vanilla or with minor packaging tweaks)impacts-release-2.8.0Issues reported against NUT release 2.8.0 (maybe vanilla or with minor packaging tweaks)Issues reported against NUT release 2.8.0 (maybe vanilla or with minor packaging tweaks)portabilityWe want NUT to build and run everywhere possibleWe want NUT to build and run everywhere possible
Milestone
Metadata
Metadata
Assignees
Labels
bugimpacts-release-2.7.4Issues reported against NUT release 2.7.4 (maybe vanilla or with minor packaging tweaks)Issues reported against NUT release 2.7.4 (maybe vanilla or with minor packaging tweaks)impacts-release-2.8.0Issues reported against NUT release 2.8.0 (maybe vanilla or with minor packaging tweaks)Issues reported against NUT release 2.8.0 (maybe vanilla or with minor packaging tweaks)portabilityWe want NUT to build and run everywhere possibleWe want NUT to build and run everywhere possible
when bash scripting with
upscit could happen that null variables are passed toupscby mistake, reproducible with the terminal commandupsc $UPS@$HOSTfor example - which would result in:upsc @when those variables are in fact not set and/or null.upsc @currently results in a kernel segmentation fault on latest master, see:is there a way to recover from such an (easy to happen) mistake better than with a segmentation fault - perhaps such a malformation in the arguments could be caught before it would throw the kernel in distress?
OS: Slackware 15.0, NUT compiled from master