similar to: [Bug 1045] iptables TEE kernel panic after upgrading to 4.3.3.1

Displaying 20 results from an estimated 20000 matches similar to: "[Bug 1045] iptables TEE kernel panic after upgrading to 4.3.3.1"

2016 Feb 17
0
[Bug 1045] iptables TEE kernel panic after upgrading to 4.3.3.1
https://bugzilla.netfilter.org/show_bug.cgi?id=1045 --- Comment #2 from belette <benoitne at gmail.com> --- cool thanks Pablo :) don't hesitate to let me know in which kernel version it will be included then I can test and validate everything is ok -- You are receiving this mail because: You are watching all bug changes. -------------- next part -------------- An HTML attachment was
2016 Apr 01
0
[Bug 1045] iptables TEE kernel panic after upgrading to 4.3.3.1
https://bugzilla.netfilter.org/show_bug.cgi?id=1045 --- Comment #4 from belette <benoitne at gmail.com> --- Hi Pablo, Do you know if your patch has been applied in 4.4 or 4.5? many thanks -- You are receiving this mail because: You are watching all bug changes. -------------- next part -------------- An HTML attachment was scrubbed... URL:
2016 Apr 01
0
[Bug 1045] iptables TEE kernel panic after upgrading to 4.3.3.1
https://bugzilla.netfilter.org/show_bug.cgi?id=1045 --- Comment #6 from belette <benoitne at gmail.com> --- Didn't try yet as I wasn't sure, let me try and will post the result here :) -- You are receiving this mail because: You are watching all bug changes. -------------- next part -------------- An HTML attachment was scrubbed... URL:
2016 Feb 16
0
[Bug 1045] iptables TEE kernel panic after upgrading to 4.3.3.1
https://bugzilla.netfilter.org/show_bug.cgi?id=1045 Pablo Neira Ayuso <pablo at netfilter.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED CC| |pablo at netfilter.org Resolution|---
2016 Feb 17
0
[Bug 1045] iptables TEE kernel panic after upgrading to 4.3.3.1
https://bugzilla.netfilter.org/show_bug.cgi?id=1045 --- Comment #3 from Pablo Neira Ayuso <pablo at netfilter.org> --- I have requested inclusion for 4.3, see my patch for -stable: http://patchwork.ozlabs.org/patch/583663/ -- You are receiving this mail because: You are watching all bug changes. -------------- next part -------------- An HTML attachment was scrubbed... URL:
2016 Apr 01
0
[Bug 1045] iptables TEE kernel panic after upgrading to 4.3.3.1
https://bugzilla.netfilter.org/show_bug.cgi?id=1045 --- Comment #5 from Pablo Neira Ayuso <pablo at netfilter.org> --- Yes, it's there. Still crashing? -- You are receiving this mail because: You are watching all bug changes. -------------- next part -------------- An HTML attachment was scrubbed... URL:
2014 Jan 09
3
[Bug 884] New: the rule of TEE target with '--oif' option cannot be deleted.
https://bugzilla.netfilter.org/show_bug.cgi?id=884 Summary: the rule of TEE target with '--oif' option cannot be deleted. Product: iptables Version: 1.4.x Platform: i386 OS/Version: Fedora Status: NEW Severity: minor Priority: P5 Component: iptables AssignedTo:
2017 Oct 17
3
[Bug 1191] New: Empty parameters generate errors on iptables-restore, even when saved by iptables-save
https://bugzilla.netfilter.org/show_bug.cgi?id=1191 Bug ID: 1191 Summary: Empty parameters generate errors on iptables-restore, even when saved by iptables-save Product: iptables Version: unspecified Hardware: All OS: All Status: NEW Severity: normal Priority: P5
2018 Dec 13
3
[Bug 1308] New: iptables -i + is broken in v1.8.0
https://bugzilla.netfilter.org/show_bug.cgi?id=1308 Bug ID: 1308 Summary: iptables -i + is broken in v1.8.0 Product: iptables Version: unspecified Hardware: x86_64 OS: RedHat Linux Status: NEW Severity: normal Priority: P5 Component: iptables Assignee: netfilter-buglog at
2013 Sep 14
7
[Bug 852] New: IPv6 TEE target sends packets to original IP address on wrong network device
https://bugzilla.netfilter.org/show_bug.cgi?id=852 Summary: IPv6 TEE target sends packets to original IP address on wrong network device Product: netfilter/iptables Version: unspecified Platform: x86_64 OS/Version: All Status: NEW Severity: enhancement Priority: P5 Component: unknown
2019 Feb 05
3
[Bug 1320] New: iptables hashlimit - problem with traffic limitation
https://bugzilla.netfilter.org/show_bug.cgi?id=1320 Bug ID: 1320 Summary: iptables hashlimit - problem with traffic limitation Product: iptables Version: 1.6.x Hardware: All OS: Debian GNU/Linux Status: NEW Severity: major Priority: P5 Component: iptables Assignee:
2020 Aug 20
2
[Bug 1452] New: Incorrect information in the iptables-extensions(8) man page
https://bugzilla.netfilter.org/show_bug.cgi?id=1452 Bug ID: 1452 Summary: Incorrect information in the iptables-extensions(8) man page Product: iptables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: minor Priority: P5 Component: iptables
2018 Mar 16
2
[Bug 1234] New: iptables match-set with multiple ipsets doesn't work
https://bugzilla.netfilter.org/show_bug.cgi?id=1234 Bug ID: 1234 Summary: iptables match-set with multiple ipsets doesn't work Product: iptables Version: 1.4.x Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: normal Priority: P5 Component: iptables Assignee:
2018 Jan 05
0
[Bug 1211] New: When showing firewall status (iptables -vnL or iptables -L), some output is not as expected
https://bugzilla.netfilter.org/show_bug.cgi?id=1211 Bug ID: 1211 Summary: When showing firewall status (iptables -vnL or iptables -L), some output is not as expected Product: iptables Version: unspecified Hardware: All OS: All Status: NEW Severity: minor Priority: P5
2019 Apr 22
1
[Bug 1335] New: iptables-restore will crash if -6 rules are present
https://bugzilla.netfilter.org/show_bug.cgi?id=1335 Bug ID: 1335 Summary: iptables-restore will crash if -6 rules are present Product: iptables Version: unspecified Hardware: All OS: Debian GNU/Linux Status: NEW Severity: normal Priority: P5 Component: iptables-restore
2024 Feb 28
3
[Bug 1738] New: iptables unit test suite fails extensions/libip6t_mh.txlate
https://bugzilla.netfilter.org/show_bug.cgi?id=1738 Bug ID: 1738 Summary: iptables unit test suite fails extensions/libip6t_mh.txlate Product: iptables Version: 1.8.x Hardware: All OS: Gentoo Status: NEW Severity: normal Priority: P5 Component: ip6tables
2017 Mar 17
2
[Bug 1131] New: iptables-restore crashes on some fuzzed input
https://bugzilla.netfilter.org/show_bug.cgi?id=1131 Bug ID: 1131 Summary: iptables-restore crashes on some fuzzed input Product: iptables Version: unspecified Hardware: All OS: All Status: NEW Severity: enhancement Priority: P5 Component: iptables-restore Assignee:
2020 Jan 06
2
[Bug 1394] New: "Bad argument `ACCEPT'" when iptables-restore (nft) parses stdin
https://bugzilla.netfilter.org/show_bug.cgi?id=1394 Bug ID: 1394 Summary: "Bad argument `ACCEPT'" when iptables-restore (nft) parses stdin Product: iptables Version: unspecified Hardware: x86_64 URL: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=9462 89
2017 May 21
3
[Bug 1150] New: Iptables fails to match rules with malloc perturberation activated
https://bugzilla.netfilter.org/show_bug.cgi?id=1150 Bug ID: 1150 Summary: Iptables fails to match rules with malloc perturberation activated Product: iptables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: enhancement Priority: P5 Component:
2017 Jul 08
3
[Bug 1161] New: The lock problem causes the iptables return with exit code 0 without adding my rules to kernel.
https://bugzilla.netfilter.org/show_bug.cgi?id=1161 Bug ID: 1161 Summary: The lock problem causes the iptables return with exit code 0 without adding my rules to kernel. Product: iptables Version: unspecified Hardware: x86_64 OS: Ubuntu Status: NEW Severity: enhancement