similar to: [ANNOUNCE]: Release of iptables-1.4.3

Displaying 20 results from an estimated 2000 matches similar to: "[ANNOUNCE]: Release of iptables-1.4.3"

2009 Jun 16
2
[ANNOUNCE]: Release of iptables-1.4.4
The netfilter coreteam presents: iptables version 1.4.4 the iptables release for the 2.6.30 kernel. Changes include: - support for the new features in the 2.6.30 kernel, namely the cluster match and persistent multi-range NAT mappings - support for the ipset set match and target - various minor fixes and cleanups - documentation updates Version 1.4.4 can be obtained from:
2006 Dec 06
1
[ANNOUNCE] Release of iptables-1.3.7
Hi! The netfilter coreteam proudly presents: iptables version 1.3.7 The 1.3.7 version contains accumulated bugfixes to the last 1.3.6 version. This comes a bit earlier after the last release than usual because the endian annotations in 2.6.19 broke iptables compilation, which is fixed with this version. The ChangeLog is attached to this mail. Version 1.3.7 can be obtained from:
2010 Aug 03
3
[ANNOUNCE]: Release of iptables-1.4.9
The netfilter coreteam presents: iptables version 1.4.9 the iptables release for the 2.6.35 kernel. Changes include: - support for the LED target, which hadn't been merged so far because the kernel module had some bugs - a new version of the set extension for the upcoming release supporting IPv6 - negation support for the quota match - support for the SACK-IMMEDIATELY SCTP
2011 Apr 03
6
[Bug 713] New: CPPFLAGS are mishandled which breaks non-shared targets
http://bugzilla.netfilter.org/show_bug.cgi?id=713 Summary: CPPFLAGS are mishandled which breaks non-shared targets Product: iptables Version: unspecified Platform: All OS/Version: All Status: NEW Severity: enhancement Priority: P5 Component: unknown AssignedTo: netfilter-buglog at
2011 May 26
1
[ANNOUNCE]: Release of iptables-1.4.11
The netfilter coreteam presents: iptables version 1.4.10 the iptables release for the 2.6.39 kernels. Due to some mistakes on my side we didn't have a release for longer than expected, so this contains a rather large number of changes. Changes include: - various bugfixes, cleanups and documentation updates - a new "guided option parser" from Jan, replacing a lot of the
2011 Aug 21
6
[Bug 738] New: reading beyond buffer limits in nf_conntrack_proto_tcp.c::tcp_options()
http://bugzilla.netfilter.org/show_bug.cgi?id=738 Summary: reading beyond buffer limits in nf_conntrack_proto_tcp.c::tcp_options() Product: netfilter/iptables Version: unspecified Platform: All OS/Version: All Status: NEW Severity: minor Priority: P2 Component: nf_conntrack
2006 Dec 11
21
iptables 1.3.7, kernel 2.6.19, ROUTE and Layer7 issues
Hi, I''m having problems with this configuration: iptables 1.3.7 (vanilla or repackaged for fc5) kernel 2.6.19 (vanilla) ROUTE 1.11 (last pom-ng) layer7-filter 2.6 (last in sf.net) connlimit (last pom-ng) When I try to use -j ROUTE in any chain in mangle table I have this error: [root@myhost ~]# iptables -v -t mangle -A POSTROUTING -p tcp --dport msnp -j ROUTE --gw
2011 Jun 28
10
[Bug 726] New: Oops in nf_conntrack.
http://bugzilla.netfilter.org/show_bug.cgi?id=726 Summary: Oops in nf_conntrack. Product: netfilter/iptables Version: linux-2.6.x Platform: x86_64 OS/Version: Ubuntu Status: NEW Severity: critical Priority: P5 Component: ip_conntrack AssignedTo: netfilter-buglog at lists.netfilter.org
2002 Jun 19
2
Wine -- port problem
Hello! I use this version of wine: ftp://ftp.codeweavers.com/pub/cw-wine/codeweavers-wine-20020411-6.i386.rpm I can't use serial and paralel ports. How can I make them work? Romek Krisztian
2011 Aug 03
18
[Bug 734] New: Iptables on Arm Processor with Vanilla Kernel
http://bugzilla.netfilter.org/show_bug.cgi?id=734 Summary: Iptables on Arm Processor with Vanilla Kernel Product: netfilter/iptables Version: linux-2.6.x Platform: arm OS/Version: Debian GNU/Linux Status: NEW Severity: critical Priority: P5 Component: unknown AssignedTo: netfilter-buglog at
2003 Apr 25
4
IMQ page
The IMQ page (http://luxik.cdi.cz/~patrick/imq/) has some rather obvios problems in the examples used. I wrote Patrick McHardy without getting an answer (yet) so I tought this was a good place to ask. Does anybody know how to contact him about this? _______________________________________________ LARTC mailing list / LARTC@mailman.ds9a.nl http://mailman.ds9a.nl/mailman/listinfo/lartc HOWTO:
2002 Oct 30
2
Building and installing packages with functions with names starting with (PR#2229)
Dear Coreteam, I am getting closer to have some R-packages with interface to CoCo. I use something like package.skeleton("CoCo", list = ls(all.names = TRUE)) to also get my functions beginning with "." into the package. Functions with names starting with "." are put OK into the package during "R CMD build ...", but when R at "R INSTALL - d
2006 Jun 23
4
English translation of article on HFSC
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Greetings all, Working in concert with the original authors, Klaus Rechert and Patrick McHardy, I have translated their article "HFSC Scheduling mit Linux" [0] on Hierarchical Fair Service Curve (HFSC) into English [1]. http://linux-ip.net/tc/hfsc.en/ Although the original content is not available directly from their website,
2009 Apr 02
7
[Lguest] [PATCH 4/5] lguest: use KVM hypercalls
fre, 27 03 2009 kl. 10:22 +1030, skrev Rusty Russell: > From: Matias Zabaljauregui <zabaljauregui at gmail.com> > > Impact: cleanup > > This patch allow us to use KVM hypercalls Something has broken in relation to this change. I'm not sure it is this change itself or one following, but I get the following error when using lguest: lguest: unhandled trap 6 at 0x418726
2009 Apr 02
7
[Lguest] [PATCH 4/5] lguest: use KVM hypercalls
fre, 27 03 2009 kl. 10:22 +1030, skrev Rusty Russell: > From: Matias Zabaljauregui <zabaljauregui at gmail.com> > > Impact: cleanup > > This patch allow us to use KVM hypercalls Something has broken in relation to this change. I'm not sure it is this change itself or one following, but I get the following error when using lguest: lguest: unhandled trap 6 at 0x418726
2007 Apr 18
2
[Bridge] Re: Policy match with a bridge
Tom Eastep wrote: > | Have you applied the ipsec+netfilter patches ? Without them, packets > are > | only seen encrypted in the OUTPUT chain. > | > Yes -- the ipsec+netfilter patches are applied. Here is the same test > with the bridge removed and the local ip address transfered to one of > the network cards: The problem is ipv4_sabotage_out in the briding code. It
2011 Jul 29
2
[Bug 732] New: Iptables 1.4.11 or 1.4.12 does not compile on CentOS 5.6
http://bugzilla.netfilter.org/show_bug.cgi?id=732 Summary: Iptables 1.4.11 or 1.4.12 does not compile on CentOS 5.6 Product: netfilter/iptables Version: linux-2.6.x Platform: x86_64 OS/Version: RedHat Linux Status: NEW Severity: critical Priority: P1 Component: ip_tables (kernel) AssignedTo:
2011 Jun 07
4
[Bug 720] New: iptables no longer compiles for Linux 2.4 because it uses linux/magic.h
http://bugzilla.netfilter.org/show_bug.cgi?id=720 Summary: iptables no longer compiles for Linux 2.4 because it uses linux/magic.h Product: iptables Version: unspecified Platform: All OS/Version: All Status: NEW Severity: major Priority: P3 Component: iptables AssignedTo:
2011 Jul 02
4
[Bug 727] New: Open your firewall by a simple typo
http://bugzilla.netfilter.org/show_bug.cgi?id=727 Summary: Open your firewall by a simple typo Product: iptables Version: unspecified Platform: All OS/Version: All Status: NEW Severity: major Priority: P2 Component: iptables AssignedTo: netfilter-buglog at lists.netfilter.org ReportedBy:
2003 Aug 02
1
[SECURITY] Netfilter Security Advisory: NAT Remote DOS (SACK mangle)
--7ZAtKRhVyVSsbBD2 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Netfilter Core Team Security Advisory =20 CVE: CAN-2003-0467 Subject: Netfilter / NAT Remote DoS Released: 01 Aug 2003 Effects: Under limited circumstances, a remote user may be able to crash