similar to: [Bug 1260] New: If set with "localhost", a new rule is duplicated

Displaying 20 results from an estimated 40000 matches similar to: "[Bug 1260] New: If set with "localhost", a new rule is duplicated"

2017 Aug 07
3
[Bug 1166] New: negated rule and rule with mistyped interface name looks identical in non-verbose iptables output
https://bugzilla.netfilter.org/show_bug.cgi?id=1166 Bug ID: 1166 Summary: negated rule and rule with mistyped interface name looks identical in non-verbose iptables output Product: iptables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: enhancement
2017 Apr 21
8
[Bug 1147] New: iptables rule to match a 'set' shows [unsupported revision]
https://bugzilla.netfilter.org/show_bug.cgi?id=1147 Bug ID: 1147 Summary: iptables rule to match a 'set' shows [unsupported revision] Product: iptables Version: unspecified Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: normal Priority: P5
2019 Nov 07
3
[Bug 1379] New: Rule to accept INPUT address range does not block address that are not in range specified
https://bugzilla.netfilter.org/show_bug.cgi?id=1379 Bug ID: 1379 Summary: Rule to accept INPUT address range does not block address that are not in range specified Product: iptables Version: 1.4.x Hardware: All OS: All Status: NEW Severity: critical Priority: P5
2014 Oct 29
1
[Bug 985] New: iptables-save cannot display devgroup rule the right way?
https://bugzilla.netfilter.org/show_bug.cgi?id=985 Bug ID: 985 Summary: iptables-save cannot display devgroup rule the right way? Product: iptables Version: 1.4.x Hardware: x86_64 OS: other Status: NEW Severity: enhancement Priority: P5 Component: iptables
2020 Nov 09
1
[Bug 1480] New: SLES15 Default Iptable rule causing issue
https://bugzilla.netfilter.org/show_bug.cgi?id=1480 Bug ID: 1480 Summary: SLES15 Default Iptable rule causing issue Product: iptables Version: 1.6.x Hardware: x86_64 OS: SuSE Linux Status: NEW Severity: enhancement Priority: P5 Component: iptables Assignee: netfilter-buglog at
2017 Aug 17
0
[Bug 1170] New: limit-burst is not fully consumed and rule stops matching
https://bugzilla.netfilter.org/show_bug.cgi?id=1170 Bug ID: 1170 Summary: limit-burst is not fully consumed and rule stops matching Product: netfilter/iptables Version: unspecified Hardware: x86_64 OS: Ubuntu Status: NEW Severity: major Priority: P5 Component:
2019 Apr 22
1
[Bug 1335] New: iptables-restore will crash if -6 rules are present
https://bugzilla.netfilter.org/show_bug.cgi?id=1335 Bug ID: 1335 Summary: iptables-restore will crash if -6 rules are present Product: iptables Version: unspecified Hardware: All OS: Debian GNU/Linux Status: NEW Severity: normal Priority: P5 Component: iptables-restore
2013 Jan 04
0
[Bug 804] New: localhost port forwarding to a different host with DNAT
http://bugzilla.netfilter.org/show_bug.cgi?id=804 Summary: localhost port forwarding to a different host with DNAT Product: netfilter/iptables Version: unspecified Platform: All OS/Version: All Status: NEW Severity: enhancement Priority: P5 Component: NAT AssignedTo:
2017 Dec 27
0
[Bug 1207] New: connlimit rule fires too often
https://bugzilla.netfilter.org/show_bug.cgi?id=1207 Bug ID: 1207 Summary: connlimit rule fires too often Product: netfilter/iptables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: enhancement Priority: P5 Component: ip_tables (kernel) Assignee:
2014 Jan 09
3
[Bug 884] New: the rule of TEE target with '--oif' option cannot be deleted.
https://bugzilla.netfilter.org/show_bug.cgi?id=884 Summary: the rule of TEE target with '--oif' option cannot be deleted. Product: iptables Version: 1.4.x Platform: i386 OS/Version: Fedora Status: NEW Severity: minor Priority: P5 Component: iptables AssignedTo:
2019 May 20
1
[Bug 1338] New: Can't add IPv6 concatenation rule
https://bugzilla.netfilter.org/show_bug.cgi?id=1338 Bug ID: 1338 Summary: Can't add IPv6 concatenation rule Product: netfilter/iptables Version: unspecified Hardware: All OS: All Status: NEW Severity: major Priority: P5 Component: nfnetlink_queue Assignee: netfilter-buglog
2018 Mar 14
0
[Bug 1233] New: Problem with import of small iptables rule sets with multiport match
https://bugzilla.netfilter.org/show_bug.cgi?id=1233 Bug ID: 1233 Summary: Problem with import of small iptables rule sets with multiport match Product: nftables Version: unspecified Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: normal Priority: P5
2018 Nov 02
1
[Bug 1287] New: rule for 0.0.0.0/8 is added as 0.0.0.0/0
https://bugzilla.netfilter.org/show_bug.cgi?id=1287 Bug ID: 1287 Summary: rule for 0.0.0.0/8 is added as 0.0.0.0/0 Product: nftables Version: unspecified Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: normal Priority: P5 Component: iptables over nftable Assignee:
2014 Feb 11
1
[Bug 903] New: Second rule is not getting executed when we give different timeouts for the same ip address.
https://bugzilla.netfilter.org/show_bug.cgi?id=903 Summary: Second rule is not getting executed when we give different timeouts for the same ip address. Product: iptables Version: unspecified Platform: i386 OS/Version: Ubuntu Status: NEW Severity: normal Priority: P5 Component: iptables
2003 Feb 02
0
[Bug 36] New: Possible SMP-race in rule handling (or other memorycorrupting thing)
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=36 Summary: Possible SMP-race in rule handling (or other memorycorrupting thing) Product: netfilter/iptables Version: linux-2.4.x Platform: other OS/Version: other Status: NEW Severity: minor Priority: P2 Component:
2012 Jan 03
1
[Bug 766] New: Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule
http://bugzilla.netfilter.org/show_bug.cgi?id=766 Summary: Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule Product: iptables Version: unspecified Platform: x86_64 OS/Version: Debian GNU/Linux Status: NEW Severity: major Priority: P5 Component: ip6tables
2011 Jun 15
2
[Bug 724] New: Iptables doesn't delete rules matching if target is RATEEST - patch attached
http://bugzilla.netfilter.org/show_bug.cgi?id=724 Summary: Iptables doesn't delete rules matching if target is RATEEST - patch attached Product: iptables Version: unspecified Platform: All OS/Version: All Status: NEW Severity: normal Priority: P3 Component: iptables
2016 Dec 09
4
[Bug 1101] New: SET target unreliable in iptables - add does not work as expected
https://bugzilla.netfilter.org/show_bug.cgi?id=1101 Bug ID: 1101 Summary: SET target unreliable in iptables - add does not work as expected Product: netfilter/iptables Version: unspecified Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: major Priority: P5
2017 May 21
3
[Bug 1150] New: Iptables fails to match rules with malloc perturberation activated
https://bugzilla.netfilter.org/show_bug.cgi?id=1150 Bug ID: 1150 Summary: Iptables fails to match rules with malloc perturberation activated Product: iptables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: enhancement Priority: P5 Component:
2017 Jul 08
3
[Bug 1161] New: The lock problem causes the iptables return with exit code 0 without adding my rules to kernel.
https://bugzilla.netfilter.org/show_bug.cgi?id=1161 Bug ID: 1161 Summary: The lock problem causes the iptables return with exit code 0 without adding my rules to kernel. Product: iptables Version: unspecified Hardware: x86_64 OS: Ubuntu Status: NEW Severity: enhancement