Displaying 20 results from an estimated 20000 matches similar to: "[Bug 1045] iptables TEE kernel panic after upgrading to 4.3.3.1"
2016 Apr 02
0
[Bug 1045] iptables TEE kernel panic after upgrading to 4.3.3.1
https://bugzilla.netfilter.org/show_bug.cgi?id=1045
belette <benoitne at gmail.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|RESOLVED |CLOSED
--- Comment #7 from belette <benoitne at gmail.com> ---
Many thanks I checked and everything is working
2016 Apr 01
0
[Bug 1045] iptables TEE kernel panic after upgrading to 4.3.3.1
https://bugzilla.netfilter.org/show_bug.cgi?id=1045
--- Comment #4 from belette <benoitne at gmail.com> ---
Hi Pablo,
Do you know if your patch has been applied in 4.4 or 4.5?
many thanks
--
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
2016 Feb 17
0
[Bug 1045] iptables TEE kernel panic after upgrading to 4.3.3.1
https://bugzilla.netfilter.org/show_bug.cgi?id=1045
--- Comment #2 from belette <benoitne at gmail.com> ---
cool thanks Pablo :)
don't hesitate to let me know in which kernel version it will be included then
I can test and validate everything is ok
--
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was
2016 Apr 01
0
[Bug 1045] iptables TEE kernel panic after upgrading to 4.3.3.1
https://bugzilla.netfilter.org/show_bug.cgi?id=1045
--- Comment #5 from Pablo Neira Ayuso <pablo at netfilter.org> ---
Yes, it's there. Still crashing?
--
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
2016 Feb 16
0
[Bug 1045] iptables TEE kernel panic after upgrading to 4.3.3.1
https://bugzilla.netfilter.org/show_bug.cgi?id=1045
Pablo Neira Ayuso <pablo at netfilter.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
CC| |pablo at netfilter.org
Resolution|---
2016 Feb 17
0
[Bug 1045] iptables TEE kernel panic after upgrading to 4.3.3.1
https://bugzilla.netfilter.org/show_bug.cgi?id=1045
--- Comment #3 from Pablo Neira Ayuso <pablo at netfilter.org> ---
I have requested inclusion for 4.3, see my patch for -stable:
http://patchwork.ozlabs.org/patch/583663/
--
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
2014 Jan 09
3
[Bug 884] New: the rule of TEE target with '--oif' option cannot be deleted.
https://bugzilla.netfilter.org/show_bug.cgi?id=884
Summary: the rule of TEE target with '--oif' option cannot be
deleted.
Product: iptables
Version: 1.4.x
Platform: i386
OS/Version: Fedora
Status: NEW
Severity: minor
Priority: P5
Component: iptables
AssignedTo:
2017 Oct 17
3
[Bug 1191] New: Empty parameters generate errors on iptables-restore, even when saved by iptables-save
https://bugzilla.netfilter.org/show_bug.cgi?id=1191
Bug ID: 1191
Summary: Empty parameters generate errors on iptables-restore,
even when saved by iptables-save
Product: iptables
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
2013 Sep 14
7
[Bug 852] New: IPv6 TEE target sends packets to original IP address on wrong network device
https://bugzilla.netfilter.org/show_bug.cgi?id=852
Summary: IPv6 TEE target sends packets to original IP address
on wrong network device
Product: netfilter/iptables
Version: unspecified
Platform: x86_64
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P5
Component: unknown
2018 Dec 13
3
[Bug 1308] New: iptables -i + is broken in v1.8.0
https://bugzilla.netfilter.org/show_bug.cgi?id=1308
Bug ID: 1308
Summary: iptables -i + is broken in v1.8.0
Product: iptables
Version: unspecified
Hardware: x86_64
OS: RedHat Linux
Status: NEW
Severity: normal
Priority: P5
Component: iptables
Assignee: netfilter-buglog at
2019 Feb 05
3
[Bug 1320] New: iptables hashlimit - problem with traffic limitation
https://bugzilla.netfilter.org/show_bug.cgi?id=1320
Bug ID: 1320
Summary: iptables hashlimit - problem with traffic limitation
Product: iptables
Version: 1.6.x
Hardware: All
OS: Debian GNU/Linux
Status: NEW
Severity: major
Priority: P5
Component: iptables
Assignee:
2020 Aug 20
2
[Bug 1452] New: Incorrect information in the iptables-extensions(8) man page
https://bugzilla.netfilter.org/show_bug.cgi?id=1452
Bug ID: 1452
Summary: Incorrect information in the iptables-extensions(8)
man page
Product: iptables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: minor
Priority: P5
Component: iptables
2018 Mar 16
2
[Bug 1234] New: iptables match-set with multiple ipsets doesn't work
https://bugzilla.netfilter.org/show_bug.cgi?id=1234
Bug ID: 1234
Summary: iptables match-set with multiple ipsets doesn't work
Product: iptables
Version: 1.4.x
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
Component: iptables
Assignee:
2018 Jan 05
0
[Bug 1211] New: When showing firewall status (iptables -vnL or iptables -L), some output is not as expected
https://bugzilla.netfilter.org/show_bug.cgi?id=1211
Bug ID: 1211
Summary: When showing firewall status (iptables -vnL or
iptables -L), some output is not as expected
Product: iptables
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: minor
Priority: P5
2019 Apr 22
1
[Bug 1335] New: iptables-restore will crash if -6 rules are present
https://bugzilla.netfilter.org/show_bug.cgi?id=1335
Bug ID: 1335
Summary: iptables-restore will crash if -6 rules are present
Product: iptables
Version: unspecified
Hardware: All
OS: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
Component: iptables-restore
2024 Feb 28
3
[Bug 1738] New: iptables unit test suite fails extensions/libip6t_mh.txlate
https://bugzilla.netfilter.org/show_bug.cgi?id=1738
Bug ID: 1738
Summary: iptables unit test suite fails
extensions/libip6t_mh.txlate
Product: iptables
Version: 1.8.x
Hardware: All
OS: Gentoo
Status: NEW
Severity: normal
Priority: P5
Component: ip6tables
2017 Mar 17
2
[Bug 1131] New: iptables-restore crashes on some fuzzed input
https://bugzilla.netfilter.org/show_bug.cgi?id=1131
Bug ID: 1131
Summary: iptables-restore crashes on some fuzzed input
Product: iptables
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: iptables-restore
Assignee:
2017 May 21
3
[Bug 1150] New: Iptables fails to match rules with malloc perturberation activated
https://bugzilla.netfilter.org/show_bug.cgi?id=1150
Bug ID: 1150
Summary: Iptables fails to match rules with malloc
perturberation activated
Product: iptables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component:
2018 Nov 20
1
[Bug 1302] New: iptables v1.8.0 (nf_tables) has a problem inverting in-interface and maybe out
https://bugzilla.netfilter.org/show_bug.cgi?id=1302
Bug ID: 1302
Summary: iptables v1.8.0 (nf_tables) has a problem inverting
in-interface and maybe out
Product: iptables
Version: CVS (please indicate timestamp)
Hardware: x86_64
OS: All
Status: NEW
Severity: major
Priority:
2020 Jan 06
2
[Bug 1394] New: "Bad argument `ACCEPT'" when iptables-restore (nft) parses stdin
https://bugzilla.netfilter.org/show_bug.cgi?id=1394
Bug ID: 1394
Summary: "Bad argument `ACCEPT'" when iptables-restore (nft)
parses stdin
Product: iptables
Version: unspecified
Hardware: x86_64
URL: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=9462
89