Displaying 16 results from an estimated 16 matches similar to: "[Bug 1148] New: Getting a segmentation fault for some reason"
2016 Jul 10
2
[Bug 1079] New: nft-0.6: segfault on add rule ip filter INPUT ip protocol igmp counter accept
https://bugzilla.netfilter.org/show_bug.cgi?id=1079
Bug ID: 1079
Summary: nft-0.6: segfault on add rule ip filter INPUT ip
protocol igmp counter accept
Product: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
Priority: P5
2013 Jul 20
1
[Bug 834] New: nft crash when invalid meta proto is used
https://bugzilla.netfilter.org/show_bug.cgi?id=834
Summary: nft crash when invalid meta proto is used
Product: nftables
Version: unspecified
Platform: x86_64
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
AssignedTo: pablo at netfilter.org
ReportedBy: eric at
2014 May 28
1
[Bug 946] New: Cannot invert a protocol: ip protocol != tcp
https://bugzilla.netfilter.org/show_bug.cgi?id=946
Summary: Cannot invert a protocol: ip protocol != tcp
Product: nftables
Version: unspecified
Platform: x86_64
OS/Version: Debian GNU/Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
AssignedTo: pablo at netfilter.org
2014 Apr 13
1
[Bug 915] New: segfault in error case : expr_evaluate_payload not checking payload->payload.desc being null
https://bugzilla.netfilter.org/show_bug.cgi?id=915
Summary: segfault in error case : expr_evaluate_payload not
checking payload->payload.desc being null
Product: nftables
Version: unspecified
Platform: x86_64
OS/Version: All
Status: NEW
Severity: normal
Priority: P5
Component: nft
2014 May 28
0
[Bug 947] New: meta protocol doesn't work with sets
https://bugzilla.netfilter.org/show_bug.cgi?id=947
Summary: meta protocol doesn't work with sets
Product: nftables
Version: unspecified
Platform: x86_64
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
AssignedTo: pablo at netfilter.org
ReportedBy: anarey at
2014 Dec 16
0
[ANNOUNCE] nftables 0.4 release
Hi!
The Netfilter project proudly presents:
nftables 0.4
This release contains a lot of bug fixes and new features contained up
to the recent 3.18 kernel release (and some features coming up in the
yet unreleased 3.19-rc).
New features
============
* Add support for global ruleset operations (available since 3.18).
Get rid of all tables, chains, and rules in one go:
# nft
2016 Jun 06
4
[Bug 1072] New: coredump when parsing ip protocol with number > 6
https://bugzilla.netfilter.org/show_bug.cgi?id=1072
Bug ID: 1072
Summary: coredump when parsing ip protocol with number > 6
Product: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: major
Priority: P5
Component: nft
Assignee: pablo at
2006 Feb 02
1
[Bug 1148] configure's crippled AES test fails on Sun CC
http://bugzilla.mindrot.org/show_bug.cgi?id=1148
Summary: configure's crippled AES test fails on Sun CC
Product: Portable OpenSSH
Version: 4.3p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: Build system
AssignedTo: bitbucket at mindrot.org
2006 Oct 07
0
[Bug 1148] configure's crippled AES test fails on Sun CC
http://bugzilla.mindrot.org/show_bug.cgi?id=1148
dtucker at zip.com.au changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|RESOLVED |CLOSED
------- Comment #2 from dtucker at zip.com.au 2006-10-07 11:44 -------
Change all RESOLVED bug to CLOSED with the exception
2009 Jul 14
0
CESA-2009:1148 Important CentOS 5 i386 httpd Update
CentOS Errata and Security Advisory 2009:1148 Important
Upstream details at : https://rhn.redhat.com/errata/RHSA-2009-1148.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( md5sum Filename )
i386:
20c7291a0b1ba5b1823d05d45b67095f httpd-2.2.3-22.el5.centos.2.i386.rpm
4c9b12469c6f246d04069920f8dc748d httpd-devel-2.2.3-22.el5.centos.2.i386.rpm
2009 Jul 14
0
CESA-2009:1148 Important CentOS 5 x86_64 httpd Update
CentOS Errata and Security Advisory 2009:1148 Important
Upstream details at : https://rhn.redhat.com/errata/RHSA-2009-1148.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( md5sum Filename )
x86_64:
83cce6942f7e2f7ef2b32f07f590622c httpd-2.2.3-22.el5.centos.2.x86_64.rpm
aafb6f56e8b91972700b4de9f8dc62a9 httpd-devel-2.2.3-22.el5.centos.2.i386.rpm
2013 Aug 09
0
CEBA-2013:1148 CentOS 6 talk FASTTRACK Update
CentOS Errata and Bugfix Advisory 2013:1148
Upstream details at : https://rhn.redhat.com/errata/RHBA-2013-1148.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
1c2d22271c9e88b0dd59bebaa9aff60be9da50e5742cd6304e13396be003d828 talk-0.17-36.el6.i686.rpm
39e50f422f835911c2bda7b5b5e9bf8adc11cb4f18139360adadb9578bcd8f1d
2014 Sep 03
0
CESA-2014:1148 Important CentOS 6 squid Security Update
CentOS Errata and Security Advisory 2014:1148 Important
Upstream details at : https://rhn.redhat.com/errata/RHSA-2014-1148.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
374c7533d5e557d4b0535159db992e8ff4779d7e52bd1ed53d78f084e4b08004 squid-3.1.10-22.el6_5.i686.rpm
x86_64:
2014 Sep 04
0
CESA-2014:1148 Important CentOS 5 squid Security Update
CentOS Errata and Security Advisory 2014:1148 Important
Upstream details at : https://rhn.redhat.com/errata/RHSA-2014-1148.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
5bd61c9fe1a00370bb5c37996a9858afb78489d1da4aee8ecb047b84594744b7 squid-2.6.STABLE21-7.el5_10.i386.rpm
x86_64:
2015 Jun 24
0
CEBA-2015:1148 CentOS 7 lvm2 BugFix Update
CentOS Errata and Bugfix Advisory 2015:1148
Upstream details at : https://rhn.redhat.com/errata/RHBA-2015-1148.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
e92067009e622a8f323e02521502dc899489773075098d4623956f405aefd479 cmirror-2.02.115-3.el7_1.1.x86_64.rpm
2001 Oct 26
3
warnings --- wish/bug (PR#1148)
When R prints warnings, they often go "out of the line", it would be
better if they where wrapped with
writeLines(strwrap ...
I tried to do that , changing the function warnings, but it has only
effect when called explicitely, not when R prints the warnings unasked.
Anyhow, here is the changed warnings:
warnings <-
function (...)
{
if (!(n <- length(last.warning)))