Displaying 20 results from an estimated 2000 matches similar to: "[Bug 1108] New: Need a new release to build nftables --with-xtables"
2016 Dec 31
4
[Bug 1109] New: printf format warnings on 32-bit build (git 20161230) (patch)
https://bugzilla.netfilter.org/show_bug.cgi?id=1109
Bug ID: 1109
Summary: printf format warnings on 32-bit build (git 20161230)
(patch)
Product: nftables
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
2016 Dec 30
3
[Bug 1107] New: printf format warnings on 32-bit build (git 20161230) (patch)
https://bugzilla.netfilter.org/show_bug.cgi?id=1107
Bug ID: 1107
Summary: printf format warnings on 32-bit build (git 20161230)
(patch)
Product: iptables
Version: CVS (please indicate timestamp)
Hardware: i386
OS: All
Status: NEW
Severity: normal
Priority: P5
2014 May 19
1
[Bug 943] New: Memory corruption in libxtables/xtables.c + fix
https://bugzilla.netfilter.org/show_bug.cgi?id=943
Summary: Memory corruption in libxtables/xtables.c + fix
Product: iptables
Version: 1.4.x
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P5
Component: ip6tables
AssignedTo: netfilter-buglog at lists.netfilter.org
2019 Apr 07
1
[Bug 1333] New: 1.8.2: build fails with gcc 9
https://bugzilla.netfilter.org/show_bug.cgi?id=1333
Bug ID: 1333
Summary: 1.8.2: build fails with gcc 9
Product: iptables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: iptables
Assignee: netfilter-buglog at
2014 Dec 03
2
[Bug 989] New: Deprecated function gethostbyaddr used in xtables
https://bugzilla.netfilter.org/show_bug.cgi?id=989
Bug ID: 989
Summary: Deprecated function gethostbyaddr used in xtables
Product: iptables
Version: 1.4.x
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: iptables
Assignee: netfilter-buglog at
2014 Apr 22
9
[Bug 916] New: Build failure on Slackware 14.1 (./configure rejects libreadline.so)
https://bugzilla.netfilter.org/show_bug.cgi?id=916
Summary: Build failure on Slackware 14.1 (./configure rejects
libreadline.so)
Product: nftables
Version: unspecified
Platform: i386
OS/Version: other
Status: NEW
Severity: major
Priority: P5
Component: nft
AssignedTo: pablo at
2018 Nov 06
1
[Bug 1290] New: ptables: nftables layer breaks ipsec/policy keyword
https://bugzilla.netfilter.org/show_bug.cgi?id=1290
Bug ID: 1290
Summary: ptables: nftables layer breaks ipsec/policy keyword
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
Component: iptables over nftable
2015 Dec 18
0
[ANNOUNCE] iptables 1.6.0 release
Hi!
The Netfilter project proudly presents:
iptables 1.6.0
This release includes accumulated fixes and enhancements for the
following matches:
* ah
* connlabel
* cgroup
* devgroup
* dst
* icmp6
* ipcomp
* ipv6header
* quota
* set
* socket
* string
and targets:
* CT
* REJECT
* SET
* SNAT
* SNPT,DNPT
* SYNPROXY
* TEE
We also got rid of the very very old MIRROR and SAME targets and the
2017 Jan 27
0
[ANNOUNCE] iptables 1.6.1 release
Hi!
The Netfilter project proudly presents:
iptables 1.6.1
iptables is the userspace command line program used to configure the
Linux 2.4.x and later packet filtering ruleset. It is targeted towards
system administrators.
This update contains accumulated bugfixes, several new extensions and
lots of translations via iptables-translate to ease migration to
nftables.
See ChangeLog that comes
2018 Feb 02
0
[ANNOUNCE] iptables 1.6.2 release
Hi!
The Netfilter project proudly presents:
iptables 1.6.2
iptables is the userspace command line program used to configure the
Linux 2.4.x and later packet filtering ruleset. It is targeted towards
system administrators.
This update contains accumulated bugfixes, a few new extensions and
lots of translations via iptables-translate to ease migration to
nftables.
See ChangeLog that comes
2023 Jul 26
0
[Bug 1501] issue with DNAT port range
https://bugzilla.netfilter.org/show_bug.cgi?id=1501
Phil Sutter <phil at nwl.cc> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |phil at nwl.cc
--- Comment #7 from Phil Sutter <phil at nwl.cc> ---
Hi,
(In reply to marco.drummer from comment
2009 Jan 13
1
[Bug 569] New: in6addr_any undeclared
http://bugzilla.netfilter.org/show_bug.cgi?id=569
Summary: in6addr_any undeclared
Product: iptables
Version: CVS (please indicate timestamp)
Platform: All
OS/Version: All
Status: NEW
Severity: blocker
Priority: P1
Component: unknown
AssignedTo: laforge at netfilter.org
ReportedBy:
2017 May 19
4
[Bug 1149] New: xtables-eb.c:533: bad test ?
https://bugzilla.netfilter.org/show_bug.cgi?id=1149
Bug ID: 1149
Summary: xtables-eb.c:533: bad test ?
Product: netfilter/iptables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: ip_tables (kernel)
Assignee:
2018 Feb 22
0
[Bug 1231] New: libxt_bpf.c:69:6: error: 'union bpf_attr' has no member named 'pathname'
https://bugzilla.netfilter.org/show_bug.cgi?id=1231
Bug ID: 1231
Summary: libxt_bpf.c:69:6: error: 'union bpf_attr' has no
member named 'pathname'
Product: netfilter/iptables
Version: unspecified
Hardware: All
OS: Ubuntu
Status: NEW
Severity: enhancement
2016 Dec 20
0
[ANNOUNCE] nftables 0.7 release
Hi!
The Netfilter project proudly presents:
nftables 0.7
This release contains many accumulated bug fixes and new features
available up to the (upcoming) Linux 4.10-rc1 kernel release.
* Facilitate migration from iptables to nftables:
At compilation time, you have to pass this option.
# ./configure --with-xtables
And libxtables needs to be installed in your system. This allows
2020 Apr 01
0
[ANNOUNCE] nftables 0.9.4 release
Hi!
The Netfilter project proudly presents:
nftables 0.9.4
This release contains fixes and new features available up to the Linux
kernel 5.6 release.
* Support for ranges in concatenations (requires Linux kernel >= 5.6),
e.g.
table ip foo {
set whitelist {
type ipv4_addr . ipv4_addr . inet_service
flags interval
2014 Oct 24
3
[Bug 982] New: vfork() in xtables.c can corrupt stack
https://bugzilla.netfilter.org/show_bug.cgi?id=982
Bug ID: 982
Summary: vfork() in xtables.c can corrupt stack
Product: iptables
Version: 1.4.x
Hardware: x86_64
OS: other
Status: NEW
Severity: normal
Priority: P5
Component: iptables-restore
Assignee: netfilter-buglog at
2016 Dec 20
0
[Bug 1104] New: Use close on exec flags instead of fcntl
https://bugzilla.netfilter.org/show_bug.cgi?id=1104
Bug ID: 1104
Summary: Use close on exec flags instead of fcntl
Product: iptables
Version: CVS (please indicate timestamp)
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: iptables
Assignee:
2017 Jan 03
3
[Bug 1110] New: Build failure if --with-xtables
https://bugzilla.netfilter.org/show_bug.cgi?id=1110
Bug ID: 1110
Summary: Build failure if --with-xtables
Product: nftables
Version: unspecified
Hardware: x86_64
OS: other
Status: NEW
Severity: normal
Priority: P5
Component: iptables over nftable
Assignee: pablo at
2017 Oct 12
0
[ANNOUNCE] nftables 0.8 release
Hi!
The Netfilter project proudly presents:
nftables 0.8
This release contains new features available up to the (upcoming)
Linux 4.14 kernel release:
* Support for stateful objects, these objects are uniquely identified by
a user-defined name, you can refer to them from rules, and there is a
well established interface to operate with them, eg.
# nft add counter filter test