mrash / psad

psad: Intrusion Detection and Log Analysis with iptables
http://www.cipherdyne.org/psad/
GNU General Public License v2.0
388 stars 77 forks source link

Use of uninitialized value in subroutine entry at /usr/lib/perl5/vendor_perl/NetAddr/IP/Lite.pm line 1355 #36

Closed itoffshore closed 8 years ago

itoffshore commented 8 years ago

psad blocking & emails are fine - I see this trying to run a summary with psad -A:

Host = Alpine Linux
perl 5, version 22, subversion 2 (v5.22.2) built for x86_64-linux-thread-multi
perl-bit-vector = 7.4
perl-date-calc = 6.4
perl-iptables-chainmgr = 1.5
perl-iptables-parse = 1.6.1
perl-net-ipv4addr = 0.10
perl-unix-syslog = 1.1
root@WEB1 [~]# psad -A
[+] Removing old /var/log/psad/ipt_analysis directory.
[+] Entering analysis mode.  Parsing /var/log/messages
[+] Found 672 iptables log messages out of 932 total lines.
[+] Processed 61 packets...
[+] Processed 122 packets...
[+] Processed 183 packets...
[+] Processed 244 packets...
[+] Processed 305 packets...
[+] Processed 366 packets...
[+] Processed 427 packets...
[+] Processed 488 packets...
[+] Processed 549 packets...
[+] Processed 610 packets...
[+] Processed 671 packets...
[+] Assigning scan danger levels...
    Level 1: 0 IP addresses
    Level 2: 6 IP addresses
    Level 3: 0 IP addresses
    Level 4: 0 IP addresses
    Level 5: 0 IP addresses

    Tracking 6 total IP addresses
Use of uninitialized value in subroutine entry at /usr/lib/perl5/vendor_perl/NetAddr/IP/Lite.pm line 1355.
Bad arg length for NetAddr::IP::Util::hasbits, length is 0, should be 128 at /usr/lib/perl5/vendor_perl/NetAddr/IP/Lite.pm line 1355.
itoffshore commented 8 years ago

This problem has disappeared with perl v5.22.2