Displaying 20 results from an estimated 40000 matches similar to: "[Bug 1260] New: If set with "localhost", a new rule is duplicated"
2017 Aug 07
3
[Bug 1166] New: negated rule and rule with mistyped interface name looks identical in non-verbose iptables output
https://bugzilla.netfilter.org/show_bug.cgi?id=1166
Bug ID: 1166
Summary: negated rule and rule with mistyped interface name
looks identical in non-verbose iptables output
Product: iptables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
2017 Apr 21
8
[Bug 1147] New: iptables rule to match a 'set' shows [unsupported revision]
https://bugzilla.netfilter.org/show_bug.cgi?id=1147
Bug ID: 1147
Summary: iptables rule to match a 'set' shows [unsupported
revision]
Product: iptables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
2019 Nov 07
3
[Bug 1379] New: Rule to accept INPUT address range does not block address that are not in range specified
https://bugzilla.netfilter.org/show_bug.cgi?id=1379
Bug ID: 1379
Summary: Rule to accept INPUT address range does not block
address that are not in range specified
Product: iptables
Version: 1.4.x
Hardware: All
OS: All
Status: NEW
Severity: critical
Priority: P5
2014 Oct 29
1
[Bug 985] New: iptables-save cannot display devgroup rule the right way?
https://bugzilla.netfilter.org/show_bug.cgi?id=985
Bug ID: 985
Summary: iptables-save cannot display devgroup rule the right
way?
Product: iptables
Version: 1.4.x
Hardware: x86_64
OS: other
Status: NEW
Severity: enhancement
Priority: P5
Component: iptables
2020 Nov 09
1
[Bug 1480] New: SLES15 Default Iptable rule causing issue
https://bugzilla.netfilter.org/show_bug.cgi?id=1480
Bug ID: 1480
Summary: SLES15 Default Iptable rule causing issue
Product: iptables
Version: 1.6.x
Hardware: x86_64
OS: SuSE Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: iptables
Assignee: netfilter-buglog at
2017 Aug 17
0
[Bug 1170] New: limit-burst is not fully consumed and rule stops matching
https://bugzilla.netfilter.org/show_bug.cgi?id=1170
Bug ID: 1170
Summary: limit-burst is not fully consumed and rule stops
matching
Product: netfilter/iptables
Version: unspecified
Hardware: x86_64
OS: Ubuntu
Status: NEW
Severity: major
Priority: P5
Component:
2019 Apr 22
1
[Bug 1335] New: iptables-restore will crash if -6 rules are present
https://bugzilla.netfilter.org/show_bug.cgi?id=1335
Bug ID: 1335
Summary: iptables-restore will crash if -6 rules are present
Product: iptables
Version: unspecified
Hardware: All
OS: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
Component: iptables-restore
2013 Jan 04
0
[Bug 804] New: localhost port forwarding to a different host with DNAT
http://bugzilla.netfilter.org/show_bug.cgi?id=804
Summary: localhost port forwarding to a different host with
DNAT
Product: netfilter/iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P5
Component: NAT
AssignedTo:
2017 Dec 27
0
[Bug 1207] New: connlimit rule fires too often
https://bugzilla.netfilter.org/show_bug.cgi?id=1207
Bug ID: 1207
Summary: connlimit rule fires too often
Product: netfilter/iptables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: ip_tables (kernel)
Assignee:
2014 Jan 09
3
[Bug 884] New: the rule of TEE target with '--oif' option cannot be deleted.
https://bugzilla.netfilter.org/show_bug.cgi?id=884
Summary: the rule of TEE target with '--oif' option cannot be
deleted.
Product: iptables
Version: 1.4.x
Platform: i386
OS/Version: Fedora
Status: NEW
Severity: minor
Priority: P5
Component: iptables
AssignedTo:
2019 May 20
1
[Bug 1338] New: Can't add IPv6 concatenation rule
https://bugzilla.netfilter.org/show_bug.cgi?id=1338
Bug ID: 1338
Summary: Can't add IPv6 concatenation rule
Product: netfilter/iptables
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: major
Priority: P5
Component: nfnetlink_queue
Assignee: netfilter-buglog
2018 Mar 14
0
[Bug 1233] New: Problem with import of small iptables rule sets with multiport match
https://bugzilla.netfilter.org/show_bug.cgi?id=1233
Bug ID: 1233
Summary: Problem with import of small iptables rule sets with
multiport match
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
2018 Nov 02
1
[Bug 1287] New: rule for 0.0.0.0/8 is added as 0.0.0.0/0
https://bugzilla.netfilter.org/show_bug.cgi?id=1287
Bug ID: 1287
Summary: rule for 0.0.0.0/8 is added as 0.0.0.0/0
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
Component: iptables over nftable
Assignee:
2014 Feb 11
1
[Bug 903] New: Second rule is not getting executed when we give different timeouts for the same ip address.
https://bugzilla.netfilter.org/show_bug.cgi?id=903
Summary: Second rule is not getting executed when we give
different timeouts for the same ip address.
Product: iptables
Version: unspecified
Platform: i386
OS/Version: Ubuntu
Status: NEW
Severity: normal
Priority: P5
Component: iptables
2003 Feb 02
0
[Bug 36] New: Possible SMP-race in rule handling (or other memorycorrupting thing)
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=36
Summary: Possible SMP-race in rule handling (or other
memorycorrupting thing)
Product: netfilter/iptables
Version: linux-2.4.x
Platform: other
OS/Version: other
Status: NEW
Severity: minor
Priority: P2
Component:
2012 Jan 03
1
[Bug 766] New: Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule
http://bugzilla.netfilter.org/show_bug.cgi?id=766
Summary: Segmentation Fault using Hop Limit and ICMPV6-TYPE in
same rule
Product: iptables
Version: unspecified
Platform: x86_64
OS/Version: Debian GNU/Linux
Status: NEW
Severity: major
Priority: P5
Component: ip6tables
2011 Jun 15
2
[Bug 724] New: Iptables doesn't delete rules matching if target is RATEEST - patch attached
http://bugzilla.netfilter.org/show_bug.cgi?id=724
Summary: Iptables doesn't delete rules matching if target is
RATEEST - patch attached
Product: iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P3
Component: iptables
2016 Dec 09
4
[Bug 1101] New: SET target unreliable in iptables - add does not work as expected
https://bugzilla.netfilter.org/show_bug.cgi?id=1101
Bug ID: 1101
Summary: SET target unreliable in iptables - add does not work
as expected
Product: netfilter/iptables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: major
Priority: P5
2017 May 21
3
[Bug 1150] New: Iptables fails to match rules with malloc perturberation activated
https://bugzilla.netfilter.org/show_bug.cgi?id=1150
Bug ID: 1150
Summary: Iptables fails to match rules with malloc
perturberation activated
Product: iptables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component:
2017 Jul 08
3
[Bug 1161] New: The lock problem causes the iptables return with exit code 0 without adding my rules to kernel.
https://bugzilla.netfilter.org/show_bug.cgi?id=1161
Bug ID: 1161
Summary: The lock problem causes the iptables return with exit
code 0 without adding my rules to kernel.
Product: iptables
Version: unspecified
Hardware: x86_64
OS: Ubuntu
Status: NEW
Severity: enhancement