Displaying 20 results from an estimated 2000 matches similar to: "[ANNOUNCE]: Release of iptables-1.4.3"
2009 Jun 16
2
[ANNOUNCE]: Release of iptables-1.4.4
The netfilter coreteam presents:
iptables version 1.4.4
the iptables release for the 2.6.30 kernel. Changes include:
- support for the new features in the 2.6.30 kernel, namely the
cluster match and persistent multi-range NAT mappings
- support for the ipset set match and target
- various minor fixes and cleanups
- documentation updates
Version 1.4.4 can be obtained from:
2006 Dec 06
1
[ANNOUNCE] Release of iptables-1.3.7
Hi!
The netfilter coreteam proudly presents:
iptables version 1.3.7
The 1.3.7 version contains accumulated bugfixes to the last 1.3.6
version. This comes a bit earlier after the last release than
usual because the endian annotations in 2.6.19 broke iptables
compilation, which is fixed with this version.
The ChangeLog is attached to this mail.
Version 1.3.7 can be obtained from:
2010 Aug 03
3
[ANNOUNCE]: Release of iptables-1.4.9
The netfilter coreteam presents:
iptables version 1.4.9
the iptables release for the 2.6.35 kernel. Changes include:
- support for the LED target, which hadn't been merged so far because
the kernel module had some bugs
- a new version of the set extension for the upcoming release supporting
IPv6
- negation support for the quota match
- support for the SACK-IMMEDIATELY SCTP
2011 Apr 03
6
[Bug 713] New: CPPFLAGS are mishandled which breaks non-shared targets
http://bugzilla.netfilter.org/show_bug.cgi?id=713
Summary: CPPFLAGS are mishandled which breaks non-shared targets
Product: iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P5
Component: unknown
AssignedTo: netfilter-buglog at
2011 May 26
1
[ANNOUNCE]: Release of iptables-1.4.11
The netfilter coreteam presents:
iptables version 1.4.10
the iptables release for the 2.6.39 kernels. Due to some mistakes
on my side we didn't have a release for longer than expected, so
this contains a rather large number of changes.
Changes include:
- various bugfixes, cleanups and documentation updates
- a new "guided option parser" from Jan, replacing a lot of the
2011 Aug 21
6
[Bug 738] New: reading beyond buffer limits in nf_conntrack_proto_tcp.c::tcp_options()
http://bugzilla.netfilter.org/show_bug.cgi?id=738
Summary: reading beyond buffer limits in
nf_conntrack_proto_tcp.c::tcp_options()
Product: netfilter/iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: minor
Priority: P2
Component: nf_conntrack
2006 Dec 11
21
iptables 1.3.7, kernel 2.6.19, ROUTE and Layer7 issues
Hi, I''m having problems with this configuration:
iptables 1.3.7 (vanilla or repackaged for fc5)
kernel 2.6.19 (vanilla)
ROUTE 1.11 (last pom-ng)
layer7-filter 2.6 (last in sf.net)
connlimit (last pom-ng)
When I try to use -j ROUTE in any chain in mangle table I have this error:
[root@myhost ~]# iptables -v -t mangle -A POSTROUTING -p tcp --dport msnp
-j ROUTE --gw
2011 Jun 28
10
[Bug 726] New: Oops in nf_conntrack.
http://bugzilla.netfilter.org/show_bug.cgi?id=726
Summary: Oops in nf_conntrack.
Product: netfilter/iptables
Version: linux-2.6.x
Platform: x86_64
OS/Version: Ubuntu
Status: NEW
Severity: critical
Priority: P5
Component: ip_conntrack
AssignedTo: netfilter-buglog at lists.netfilter.org
2002 Jun 19
2
Wine -- port problem
Hello!
I use this version of wine:
ftp://ftp.codeweavers.com/pub/cw-wine/codeweavers-wine-20020411-6.i386.rpm
I can't use serial and paralel ports. How can I make them work?
Romek Krisztian
2011 Aug 03
18
[Bug 734] New: Iptables on Arm Processor with Vanilla Kernel
http://bugzilla.netfilter.org/show_bug.cgi?id=734
Summary: Iptables on Arm Processor with Vanilla Kernel
Product: netfilter/iptables
Version: linux-2.6.x
Platform: arm
OS/Version: Debian GNU/Linux
Status: NEW
Severity: critical
Priority: P5
Component: unknown
AssignedTo: netfilter-buglog at
2003 Apr 25
4
IMQ page
The IMQ page (http://luxik.cdi.cz/~patrick/imq/) has some rather obvios
problems in the examples used. I wrote Patrick McHardy without getting
an answer (yet) so I tought this was a good place to ask. Does anybody
know how to contact him about this?
_______________________________________________
LARTC mailing list / LARTC@mailman.ds9a.nl
http://mailman.ds9a.nl/mailman/listinfo/lartc HOWTO:
2002 Oct 30
2
Building and installing packages with functions with names starting with (PR#2229)
Dear Coreteam,
I am getting closer to have some R-packages with interface to CoCo.
I use something like package.skeleton("CoCo", list = ls(all.names
= TRUE)) to also get my functions beginning with "." into the package.
Functions with names starting with "." are put OK into the package
during "R CMD build ...", but when R at "R INSTALL - d
2006 Jun 23
4
English translation of article on HFSC
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Greetings all,
Working in concert with the original authors, Klaus Rechert and
Patrick McHardy, I have translated their article "HFSC Scheduling
mit Linux" [0] on Hierarchical Fair Service Curve (HFSC) into
English [1].
http://linux-ip.net/tc/hfsc.en/
Although the original content is not available directly from their
website,
2009 Apr 02
7
[Lguest] [PATCH 4/5] lguest: use KVM hypercalls
fre, 27 03 2009 kl. 10:22 +1030, skrev Rusty Russell:
> From: Matias Zabaljauregui <zabaljauregui at gmail.com>
>
> Impact: cleanup
>
> This patch allow us to use KVM hypercalls
Something has broken in relation to this change. I'm not sure it is this
change itself or one following, but I get the following error when using
lguest:
lguest: unhandled trap 6 at 0x418726
2009 Apr 02
7
[Lguest] [PATCH 4/5] lguest: use KVM hypercalls
fre, 27 03 2009 kl. 10:22 +1030, skrev Rusty Russell:
> From: Matias Zabaljauregui <zabaljauregui at gmail.com>
>
> Impact: cleanup
>
> This patch allow us to use KVM hypercalls
Something has broken in relation to this change. I'm not sure it is this
change itself or one following, but I get the following error when using
lguest:
lguest: unhandled trap 6 at 0x418726
2007 Apr 18
2
[Bridge] Re: Policy match with a bridge
Tom Eastep wrote:
> | Have you applied the ipsec+netfilter patches ? Without them, packets
> are
> | only seen encrypted in the OUTPUT chain.
> |
> Yes -- the ipsec+netfilter patches are applied. Here is the same test
> with the bridge removed and the local ip address transfered to one of
> the network cards:
The problem is ipv4_sabotage_out in the briding code. It
2011 Jul 29
2
[Bug 732] New: Iptables 1.4.11 or 1.4.12 does not compile on CentOS 5.6
http://bugzilla.netfilter.org/show_bug.cgi?id=732
Summary: Iptables 1.4.11 or 1.4.12 does not compile on CentOS 5.6
Product: netfilter/iptables
Version: linux-2.6.x
Platform: x86_64
OS/Version: RedHat Linux
Status: NEW
Severity: critical
Priority: P1
Component: ip_tables (kernel)
AssignedTo:
2011 Jun 07
4
[Bug 720] New: iptables no longer compiles for Linux 2.4 because it uses linux/magic.h
http://bugzilla.netfilter.org/show_bug.cgi?id=720
Summary: iptables no longer compiles for Linux 2.4 because it
uses linux/magic.h
Product: iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: major
Priority: P3
Component: iptables
AssignedTo:
2011 Jul 02
4
[Bug 727] New: Open your firewall by a simple typo
http://bugzilla.netfilter.org/show_bug.cgi?id=727
Summary: Open your firewall by a simple typo
Product: iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: major
Priority: P2
Component: iptables
AssignedTo: netfilter-buglog at lists.netfilter.org
ReportedBy:
2003 Aug 02
1
[SECURITY] Netfilter Security Advisory: NAT Remote DOS (SACK mangle)
--7ZAtKRhVyVSsbBD2
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Netfilter Core Team Security Advisory
=20
CVE: CAN-2003-0467
Subject:
Netfilter / NAT Remote DoS
Released:
01 Aug 2003
Effects:
Under limited circumstances, a remote user may be able to crash