Displaying 20 results from an estimated 9000 matches similar to: "Your Bugzilla bug list needs attention."
2012 Nov 17
29
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.]
You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require
attention.
All of these bugs are in the NEW or REOPENED state, and have not been
touched in 7 days or more.
You need to take a look at them, and decide on an initial action.
Generally, this means one of three things:
(1) You
2013 Jan 18
30
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.]
You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require
attention.
All of these bugs are in the NEW or REOPENED state, and have not been
touched in 7 days or more.
You need to take a look at them, and decide on an initial action.
Generally, this means one of three things:
(1) You
2011 Apr 22
2
[Bug 715] New: nfq_nfnlh() and nfq_fd() should have const arguments
http://bugzilla.netfilter.org/show_bug.cgi?id=715
Summary: nfq_nfnlh() and nfq_fd() should have const arguments
Product: libnetfilter_queue
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P5
Component: libnetfilter_queue
AssignedTo: netfilter-buglog
2011 Sep 13
1
[Bug 748] New: Range check for ulog-cprange is wrong
http://bugzilla.netfilter.org/show_bug.cgi?id=748
Summary: Range check for ulog-cprange is wrong
Product: iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P5
Component: iptables
AssignedTo: netfilter-buglog at lists.netfilter.org
ReportedBy:
2012 Aug 21
3
[Bug 800] New: sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook
http://bugzilla.netfilter.org/show_bug.cgi?id=800
Summary: sk_buff.transport_header set incorrectly for
NF_IP_PRE_ROUTING hook
Product: netfilter/iptables
Version: linux-2.6.x
Platform: x86_64
OS/Version: Ubuntu
Status: NEW
Severity: normal
Priority: P5
Component: netfilter hooks
2011 Sep 30
1
[Bug 752] New: ipq_read() will return an error (rc = -1) and the error message says "Received truncated message"
http://bugzilla.netfilter.org/show_bug.cgi?id=752
Summary: ipq_read() will return an error (rc = -1) and the error
message says "Received truncated message"
Product: iptables
Version: 1.3.5
Platform: i386
OS/Version: RedHat Linux
Status: NEW
Severity: critical
Priority: P1
2013 May 23
1
[Bug 701] PPPoE masqeuraded connection reset when talking to Amazon S3
https://bugzilla.netfilter.org/show_bug.cgi?id=701
Phil Oester <netfilter at linuxace.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
CC| |netfilter at linuxace.com
Resolution|
2011 Oct 26
1
[Bug 760] New: nf_ct_sip dropping SIP messages larger then MTU
http://bugzilla.netfilter.org/show_bug.cgi?id=760
Summary: nf_ct_sip dropping SIP messages larger then MTU
Product: netfilter/iptables
Version: linux-2.6.x
Platform: i386
OS/Version: Ubuntu
Status: NEW
Severity: normal
Priority: P5
Component: ip_conntrack
AssignedTo: netfilter-buglog at
2011 Aug 21
6
[Bug 738] New: reading beyond buffer limits in nf_conntrack_proto_tcp.c::tcp_options()
http://bugzilla.netfilter.org/show_bug.cgi?id=738
Summary: reading beyond buffer limits in
nf_conntrack_proto_tcp.c::tcp_options()
Product: netfilter/iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: minor
Priority: P2
Component: nf_conntrack
2016 Oct 04
13
[Bug 1087] New: Window Tracking not disabled
https://bugzilla.netfilter.org/show_bug.cgi?id=1087
Bug ID: 1087
Summary: Window Tracking not disabled
Product: conntrack-tools
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: conntrack-daemon
Assignee: netfilter-buglog
2014 Jun 20
3
[Bug 963] New: nfq_udp_get_payload and nfq_udp_get_payload_len return wrong results
https://bugzilla.netfilter.org/show_bug.cgi?id=963
Summary: nfq_udp_get_payload and nfq_udp_get_payload_len return
wrong results
Product: libnetfilter_queue
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P5
Component: libnetfilter_queue
2006 Feb 14
14
[Bug 448] IPv6 conntrack does not work on a tunnel interface
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=448
laforge@netfilter.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Component|ip_conntrack |nf_conntrack
------- Additional Comments From laforge@netfilter.org 2006-02-14 09:05 MET -------
ipv6 conntrack is
2011 Aug 31
1
[Bug 743] New: Errors in compiling nfqnl_test.c
http://bugzilla.netfilter.org/show_bug.cgi?id=743
Summary: Errors in compiling nfqnl_test.c
Product: netfilter/iptables
Version: linux-2.6.x
Platform: All
OS/Version: Ubuntu
Status: NEW
Severity: enhancement
Priority: P5
Component: netfilter hooks
AssignedTo: netfilter-buglog at lists.netfilter.org
2014 May 07
1
[Bug 921] New: log, ulog and nflog: command-line parameters are not supported
https://bugzilla.netfilter.org/show_bug.cgi?id=921
Summary: log, ulog and nflog: command-line parameters are not
supported
Product: nftables
Version: unspecified
Platform: x86_64
OS/Version: All
Status: NEW
Severity: normal
Priority: P5
Component: nft
AssignedTo: pablo at
2012 Apr 25
1
forwarding packets to service in same host without using loopback network
This question is not about linux usage. But still i think user list
is a good crowd for linux programmer. So here it goes.
I have this libnetfilter_queue application which receives packets from
kernel based on some iptables rule. Before going straight to my
problem, i'm giving a sample workable code and other tools to set up a
test environment so that We problem definition and possible
2013 May 31
0
[Bug 752] ipq_read() will return an error (rc = -1) and the error message says "Received truncated message"
https://bugzilla.netfilter.org/show_bug.cgi?id=752
Phil Oester <netfilter at linuxace.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Priority|P1 |P2
CC| |netfilter at linuxace.com
Severity|critical
2013 Jun 10
0
[Bug 752] ipq_read() will return an error (rc = -1) and the error message says "Received truncated message"
https://bugzilla.netfilter.org/show_bug.cgi?id=752
Phil Oester <netfilter at linuxace.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |WORKSFORME
--- Comment #2 from Phil Oester
2012 Mar 13
1
[Bug 777] New: Suspect bug in __do_replace()
http://bugzilla.netfilter.org/show_bug.cgi?id=777
Summary: Suspect bug in __do_replace()
Product: netfilter/iptables
Version: linux-2.6.x
Platform: All
OS/Version: All
Status: NEW
Severity: minor
Priority: P5
Component: ip_tables (kernel)
AssignedTo: netfilter-buglog at lists.netfilter.org
2012 May 26
0
[ANNOUNCE] iptables 1.4.14 release
Hi!
The Netfilter project proudly presents:
iptables 1.4.14
This release several bugfixes and support for the new cttimeout
infrastructure. This allows you to attach specific timeout policies to
flow via iptables CT target.
The following example shows the usage of this new infrastructure in a
couple of steps:
1) Create a timeout policy with name `custom-tcp-policy1':
nfct
2006 May 31
20
[Bug 481] tun + pptp nat helper
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=481
------- Additional Comments From joseba.beltran@gmail.com 2006-05-31 19:09 MET -------
Many pptp nat helper users are suffering this problem:
http://www.chillispot.org/forum/viewtopic.php?p=4118&highlight=pptp
http://www.chillispot.org/forum/viewtopic.php?t=958&highlight=pptp