similar to: [Bug 1045] iptables TEE kernel panic after upgrading to 4.3.3.1

Displaying 20 results from an estimated 20000 matches similar to: "[Bug 1045] iptables TEE kernel panic after upgrading to 4.3.3.1"

2016 Apr 02
0
[Bug 1045] iptables TEE kernel panic after upgrading to 4.3.3.1
https://bugzilla.netfilter.org/show_bug.cgi?id=1045 belette <benoitne at gmail.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|RESOLVED |CLOSED --- Comment #7 from belette <benoitne at gmail.com> --- Many thanks I checked and everything is working
2016 Apr 01
0
[Bug 1045] iptables TEE kernel panic after upgrading to 4.3.3.1
https://bugzilla.netfilter.org/show_bug.cgi?id=1045 --- Comment #4 from belette <benoitne at gmail.com> --- Hi Pablo, Do you know if your patch has been applied in 4.4 or 4.5? many thanks -- You are receiving this mail because: You are watching all bug changes. -------------- next part -------------- An HTML attachment was scrubbed... URL:
2016 Apr 01
0
[Bug 1045] iptables TEE kernel panic after upgrading to 4.3.3.1
https://bugzilla.netfilter.org/show_bug.cgi?id=1045 --- Comment #6 from belette <benoitne at gmail.com> --- Didn't try yet as I wasn't sure, let me try and will post the result here :) -- You are receiving this mail because: You are watching all bug changes. -------------- next part -------------- An HTML attachment was scrubbed... URL:
2016 Feb 17
0
[Bug 1045] iptables TEE kernel panic after upgrading to 4.3.3.1
https://bugzilla.netfilter.org/show_bug.cgi?id=1045 --- Comment #3 from Pablo Neira Ayuso <pablo at netfilter.org> --- I have requested inclusion for 4.3, see my patch for -stable: http://patchwork.ozlabs.org/patch/583663/ -- You are receiving this mail because: You are watching all bug changes. -------------- next part -------------- An HTML attachment was scrubbed... URL:
2016 Feb 16
0
[Bug 1045] iptables TEE kernel panic after upgrading to 4.3.3.1
https://bugzilla.netfilter.org/show_bug.cgi?id=1045 Pablo Neira Ayuso <pablo at netfilter.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED CC| |pablo at netfilter.org Resolution|---
2016 Apr 01
0
[Bug 1045] iptables TEE kernel panic after upgrading to 4.3.3.1
https://bugzilla.netfilter.org/show_bug.cgi?id=1045 --- Comment #5 from Pablo Neira Ayuso <pablo at netfilter.org> --- Yes, it's there. Still crashing? -- You are receiving this mail because: You are watching all bug changes. -------------- next part -------------- An HTML attachment was scrubbed... URL:
2014 Jan 09
3
[Bug 884] New: the rule of TEE target with '--oif' option cannot be deleted.
https://bugzilla.netfilter.org/show_bug.cgi?id=884 Summary: the rule of TEE target with '--oif' option cannot be deleted. Product: iptables Version: 1.4.x Platform: i386 OS/Version: Fedora Status: NEW Severity: minor Priority: P5 Component: iptables AssignedTo:
2016 Feb 16
0
[Bug 1043] Linux 4.3.1: "iptables: Protocol wrong type for socket"
https://bugzilla.netfilter.org/show_bug.cgi?id=1043 Pablo Neira Ayuso <pablo at netfilter.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |ASSIGNED CC| |pablo at netfilter.org --- Comment #1 from Pablo
2016 Feb 16
0
[Bug 1021] iptables -j CT --timeout policy
https://bugzilla.netfilter.org/show_bug.cgi?id=1021 Pablo Neira Ayuso <pablo at netfilter.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |ASSIGNED CC| |pablo at netfilter.org --- Comment #1 from Pablo
2016 Feb 17
0
[Bug 980] BUG!!! nf_queue: full at 1024 entries, dropping packets(s). Dropped: 998887
https://bugzilla.netfilter.org/show_bug.cgi?id=980 Pablo Neira Ayuso <pablo at netfilter.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED CC| |pablo at netfilter.org Resolution|---
2019 Dec 22
2
[Bug 1391] New: iptables-nft-restore --test can segfault
https://bugzilla.netfilter.org/show_bug.cgi?id=1391 Bug ID: 1391 Summary: iptables-nft-restore --test can segfault Product: nftables Version: unspecified Hardware: x86_64 OS: Gentoo Status: NEW Severity: normal Priority: P5 Component: iptables over nftable Assignee: pablo at
2016 Feb 17
0
[Bug 999] conntrackd fails to start with error message regarding the netlink handler
https://bugzilla.netfilter.org/show_bug.cgi?id=999 Pablo Neira Ayuso <pablo at netfilter.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|ASSIGNED |RESOLVED Resolution|--- |FIXED --- Comment #3 from Pablo Neira Ayuso
2020 Apr 18
4
[Bug 1423] New: iptables-translate silently discards --ctstate DNAT
https://bugzilla.netfilter.org/show_bug.cgi?id=1423 Bug ID: 1423 Summary: iptables-translate silently discards --ctstate DNAT Product: nftables Version: unspecified Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: normal Priority: P5 Component: iptables over nftable
2020 Feb 16
3
[Bug 1407] New: Segfault with iptables-nft-restore when flush rules included
https://bugzilla.netfilter.org/show_bug.cgi?id=1407 Bug ID: 1407 Summary: Segfault with iptables-nft-restore when flush rules included Product: nftables Version: unspecified Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: normal Priority: P5 Component:
2020 Feb 22
1
[Bug 1408] New: The Check option of iptables does not work as expected
https://bugzilla.netfilter.org/show_bug.cgi?id=1408 Bug ID: 1408 Summary: The Check option of iptables does not work as expected Product: nftables Version: unspecified Hardware: arm OS: Ubuntu Status: NEW Severity: minor Priority: P5 Component: iptables over nftable Assignee:
2020 Jun 22
3
[Bug 1435] New: segfault when using iptables-nft and iptables-legacy inside a container
https://bugzilla.netfilter.org/show_bug.cgi?id=1435 Bug ID: 1435 Summary: segfault when using iptables-nft and iptables-legacy inside a container Product: libnftnl Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: enhancement Priority: P5 Component:
2013 Sep 14
7
[Bug 852] New: IPv6 TEE target sends packets to original IP address on wrong network device
https://bugzilla.netfilter.org/show_bug.cgi?id=852 Summary: IPv6 TEE target sends packets to original IP address on wrong network device Product: netfilter/iptables Version: unspecified Platform: x86_64 OS/Version: All Status: NEW Severity: enhancement Priority: P5 Component: unknown
2019 Dec 31
2
[Bug 1393] New: iptables-nft -S hangs if not run as root
https://bugzilla.netfilter.org/show_bug.cgi?id=1393 Bug ID: 1393 Summary: iptables-nft -S hangs if not run as root Product: nftables Version: unspecified Hardware: x86_64 OS: other Status: NEW Severity: normal Priority: P5 Component: iptables over nftable Assignee: pablo at
2019 Jan 21
1
[Bug 1318] New: Fragmented packet filtering is broken iptables compatibility tools
https://bugzilla.netfilter.org/show_bug.cgi?id=1318 Bug ID: 1318 Summary: Fragmented packet filtering is broken iptables compatibility tools Product: nftables Version: unspecified Hardware: x86_64 OS: other Status: NEW Severity: normal Priority: P5 Component:
2020 Aug 28
1
[Bug 1457] New: Consider implementing functionality equivalent to iptables-apply
https://bugzilla.netfilter.org/show_bug.cgi?id=1457 Bug ID: 1457 Summary: Consider implementing functionality equivalent to iptables-apply Product: nftables Version: unspecified Hardware: All OS: All Status: NEW Severity: enhancement Priority: P5 Component: nft