similar to: Your Bugzilla bug list needs attention.

Displaying 20 results from an estimated 9000 matches similar to: "Your Bugzilla bug list needs attention."

2012 Nov 17
29
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.] You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require attention. All of these bugs are in the NEW or REOPENED state, and have not been touched in 7 days or more. You need to take a look at them, and decide on an initial action. Generally, this means one of three things: (1) You
2013 Jan 18
30
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.] You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require attention. All of these bugs are in the NEW or REOPENED state, and have not been touched in 7 days or more. You need to take a look at them, and decide on an initial action. Generally, this means one of three things: (1) You
2011 Apr 22
2
[Bug 715] New: nfq_nfnlh() and nfq_fd() should have const arguments
http://bugzilla.netfilter.org/show_bug.cgi?id=715 Summary: nfq_nfnlh() and nfq_fd() should have const arguments Product: libnetfilter_queue Version: unspecified Platform: All OS/Version: All Status: NEW Severity: enhancement Priority: P5 Component: libnetfilter_queue AssignedTo: netfilter-buglog
2011 Sep 13
1
[Bug 748] New: Range check for ulog-cprange is wrong
http://bugzilla.netfilter.org/show_bug.cgi?id=748 Summary: Range check for ulog-cprange is wrong Product: iptables Version: unspecified Platform: All OS/Version: All Status: NEW Severity: normal Priority: P5 Component: iptables AssignedTo: netfilter-buglog at lists.netfilter.org ReportedBy:
2012 Aug 21
3
[Bug 800] New: sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook
http://bugzilla.netfilter.org/show_bug.cgi?id=800 Summary: sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook Product: netfilter/iptables Version: linux-2.6.x Platform: x86_64 OS/Version: Ubuntu Status: NEW Severity: normal Priority: P5 Component: netfilter hooks
2011 Sep 30
1
[Bug 752] New: ipq_read() will return an error (rc = -1) and the error message says "Received truncated message"
http://bugzilla.netfilter.org/show_bug.cgi?id=752 Summary: ipq_read() will return an error (rc = -1) and the error message says "Received truncated message" Product: iptables Version: 1.3.5 Platform: i386 OS/Version: RedHat Linux Status: NEW Severity: critical Priority: P1
2013 May 23
1
[Bug 701] PPPoE masqeuraded connection reset when talking to Amazon S3
https://bugzilla.netfilter.org/show_bug.cgi?id=701 Phil Oester <netfilter at linuxace.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED CC| |netfilter at linuxace.com Resolution|
2011 Oct 26
1
[Bug 760] New: nf_ct_sip dropping SIP messages larger then MTU
http://bugzilla.netfilter.org/show_bug.cgi?id=760 Summary: nf_ct_sip dropping SIP messages larger then MTU Product: netfilter/iptables Version: linux-2.6.x Platform: i386 OS/Version: Ubuntu Status: NEW Severity: normal Priority: P5 Component: ip_conntrack AssignedTo: netfilter-buglog at
2011 Aug 21
6
[Bug 738] New: reading beyond buffer limits in nf_conntrack_proto_tcp.c::tcp_options()
http://bugzilla.netfilter.org/show_bug.cgi?id=738 Summary: reading beyond buffer limits in nf_conntrack_proto_tcp.c::tcp_options() Product: netfilter/iptables Version: unspecified Platform: All OS/Version: All Status: NEW Severity: minor Priority: P2 Component: nf_conntrack
2016 Oct 04
13
[Bug 1087] New: Window Tracking not disabled
https://bugzilla.netfilter.org/show_bug.cgi?id=1087 Bug ID: 1087 Summary: Window Tracking not disabled Product: conntrack-tools Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: enhancement Priority: P5 Component: conntrack-daemon Assignee: netfilter-buglog
2014 Jun 20
3
[Bug 963] New: nfq_udp_get_payload and nfq_udp_get_payload_len return wrong results
https://bugzilla.netfilter.org/show_bug.cgi?id=963 Summary: nfq_udp_get_payload and nfq_udp_get_payload_len return wrong results Product: libnetfilter_queue Version: unspecified Platform: All OS/Version: All Status: NEW Severity: normal Priority: P5 Component: libnetfilter_queue
2006 Feb 14
14
[Bug 448] IPv6 conntrack does not work on a tunnel interface
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=448 laforge@netfilter.org changed: What |Removed |Added ---------------------------------------------------------------------------- Component|ip_conntrack |nf_conntrack ------- Additional Comments From laforge@netfilter.org 2006-02-14 09:05 MET ------- ipv6 conntrack is
2011 Aug 31
1
[Bug 743] New: Errors in compiling nfqnl_test.c
http://bugzilla.netfilter.org/show_bug.cgi?id=743 Summary: Errors in compiling nfqnl_test.c Product: netfilter/iptables Version: linux-2.6.x Platform: All OS/Version: Ubuntu Status: NEW Severity: enhancement Priority: P5 Component: netfilter hooks AssignedTo: netfilter-buglog at lists.netfilter.org
2014 May 07
1
[Bug 921] New: log, ulog and nflog: command-line parameters are not supported
https://bugzilla.netfilter.org/show_bug.cgi?id=921 Summary: log, ulog and nflog: command-line parameters are not supported Product: nftables Version: unspecified Platform: x86_64 OS/Version: All Status: NEW Severity: normal Priority: P5 Component: nft AssignedTo: pablo at
2012 Apr 25
1
forwarding packets to service in same host without using loopback network
This question is not about linux usage. But still i think user list is a good crowd for linux programmer. So here it goes. I have this libnetfilter_queue application which receives packets from kernel based on some iptables rule. Before going straight to my problem, i'm giving a sample workable code and other tools to set up a test environment so that We problem definition and possible
2013 May 31
0
[Bug 752] ipq_read() will return an error (rc = -1) and the error message says "Received truncated message"
https://bugzilla.netfilter.org/show_bug.cgi?id=752 Phil Oester <netfilter at linuxace.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Priority|P1 |P2 CC| |netfilter at linuxace.com Severity|critical
2013 Jun 10
0
[Bug 752] ipq_read() will return an error (rc = -1) and the error message says "Received truncated message"
https://bugzilla.netfilter.org/show_bug.cgi?id=752 Phil Oester <netfilter at linuxace.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution| |WORKSFORME --- Comment #2 from Phil Oester
2012 Mar 13
1
[Bug 777] New: Suspect bug in __do_replace()
http://bugzilla.netfilter.org/show_bug.cgi?id=777 Summary: Suspect bug in __do_replace() Product: netfilter/iptables Version: linux-2.6.x Platform: All OS/Version: All Status: NEW Severity: minor Priority: P5 Component: ip_tables (kernel) AssignedTo: netfilter-buglog at lists.netfilter.org
2012 May 26
0
[ANNOUNCE] iptables 1.4.14 release
Hi! The Netfilter project proudly presents: iptables 1.4.14 This release several bugfixes and support for the new cttimeout infrastructure. This allows you to attach specific timeout policies to flow via iptables CT target. The following example shows the usage of this new infrastructure in a couple of steps: 1) Create a timeout policy with name `custom-tcp-policy1': nfct
2006 May 31
20
[Bug 481] tun + pptp nat helper
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=481 ------- Additional Comments From joseba.beltran@gmail.com 2006-05-31 19:09 MET ------- Many pptp nat helper users are suffering this problem: http://www.chillispot.org/forum/viewtopic.php?p=4118&highlight=pptp http://www.chillispot.org/forum/viewtopic.php?t=958&highlight=pptp