Displaying 20 results from an estimated 2000 matches similar to: "[Bug 1292] New: issue with -f fragment option"
2019 Jul 02
5
[Bug 1347] New: ebtables-nft: regression in -o option
https://bugzilla.netfilter.org/show_bug.cgi?id=1347
Bug ID: 1347
Summary: ebtables-nft: regression in -o option
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
Component: iptables over nftable
Assignee:
2018 Nov 16
2
[Bug 1298] New: Issue with REJECT in custom chains
https://bugzilla.netfilter.org/show_bug.cgi?id=1298
Bug ID: 1298
Summary: Issue with REJECT in custom chains
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
Component: iptables over nftable
Assignee: pablo
2019 Jan 21
1
[Bug 1318] New: Fragmented packet filtering is broken iptables compatibility tools
https://bugzilla.netfilter.org/show_bug.cgi?id=1318
Bug ID: 1318
Summary: Fragmented packet filtering is broken iptables
compatibility tools
Product: nftables
Version: unspecified
Hardware: x86_64
OS: other
Status: NEW
Severity: normal
Priority: P5
Component:
2018 Nov 02
3
[Bug 1286] New: -Z regression
https://bugzilla.netfilter.org/show_bug.cgi?id=1286
Bug ID: 1286
Summary: -Z regression
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
Component: iptables over nftable
Assignee: pablo at netfilter.org
2018 Nov 06
1
[Bug 1290] New: ptables: nftables layer breaks ipsec/policy keyword
https://bugzilla.netfilter.org/show_bug.cgi?id=1290
Bug ID: 1290
Summary: ptables: nftables layer breaks ipsec/policy keyword
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
Component: iptables over nftable
2016 Oct 04
13
[Bug 1087] New: Window Tracking not disabled
https://bugzilla.netfilter.org/show_bug.cgi?id=1087
Bug ID: 1087
Summary: Window Tracking not disabled
Product: conntrack-tools
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: conntrack-daemon
Assignee: netfilter-buglog
2018 Nov 02
1
[Bug 1287] New: rule for 0.0.0.0/8 is added as 0.0.0.0/0
https://bugzilla.netfilter.org/show_bug.cgi?id=1287
Bug ID: 1287
Summary: rule for 0.0.0.0/8 is added as 0.0.0.0/0
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
Component: iptables over nftable
Assignee:
2016 Jun 07
5
[Bug 1073] New: inet-service vs icmp conflict
https://bugzilla.netfilter.org/show_bug.cgi?id=1073
Bug ID: 1073
Summary: inet-service vs icmp conflict
Product: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
Reporter:
2020 Jan 06
2
[Bug 1394] New: "Bad argument `ACCEPT'" when iptables-restore (nft) parses stdin
https://bugzilla.netfilter.org/show_bug.cgi?id=1394
Bug ID: 1394
Summary: "Bad argument `ACCEPT'" when iptables-restore (nft)
parses stdin
Product: iptables
Version: unspecified
Hardware: x86_64
URL: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=9462
89
2017 Jul 12
1
[Bug 1162] New: oops in nft_rbtree_insert
https://bugzilla.netfilter.org/show_bug.cgi?id=1162
Bug ID: 1162
Summary: oops in nft_rbtree_insert
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
Component: kernel
Assignee: pablo at netfilter.org
2017 Oct 21
5
[Bug 1196] New: nft does not allow comments within sets: Error: syntax error, unexpected newline
https://bugzilla.netfilter.org/show_bug.cgi?id=1196
Bug ID: 1196
Summary: nft does not allow comments within sets: Error: syntax
error, unexpected newline
Product: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
Priority: P5
2019 Jul 21
5
[Bug 1354] New: cat foo.nft | nft -f - produces syntax error not seen with nft -f foo.nft
https://bugzilla.netfilter.org/show_bug.cgi?id=1354
Bug ID: 1354
Summary: cat foo.nft | nft -f - produces syntax error not seen
with nft -f foo.nft
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
2014 Jul 10
2
[Bug 965] New: Deleting rules using "position" keyword deletes all rules for chain
https://bugzilla.netfilter.org/show_bug.cgi?id=965
Summary: Deleting rules using "position" keyword deletes all
rules for chain
Product: nftables
Version: unspecified
Platform: x86_64
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
2019 Nov 20
3
[Bug 1383] New: When using include, nft shows the wrong file name in errors
https://bugzilla.netfilter.org/show_bug.cgi?id=1383
Bug ID: 1383
Summary: When using include, nft shows the wrong file name in
errors
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
Component: nft
2020 Apr 27
2
[Bug 1424] New: v0.9.0: segfault when using nft -f <file> and issuing "ruleset flush" twice
https://bugzilla.netfilter.org/show_bug.cgi?id=1424
Bug ID: 1424
Summary: v0.9.0: segfault when using nft -f <file> and issuing
"ruleset flush" twice
Product: nftables
Version: unspecified
Hardware: All
OS: Debian GNU/Linux
Status: NEW
Severity: normal
2018 Oct 04
1
[Bug 1281] New: Using kernel 4.18.10, nft commandline tool or nft -f can't parse negative priority values over -200.
https://bugzilla.netfilter.org/show_bug.cgi?id=1281
Bug ID: 1281
Summary: Using kernel 4.18.10, nft commandline tool or nft -f
can't parse negative priority values over -200.
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Ubuntu
Status: NEW
Severity: critical
2020 Jul 24
1
[Bug 1445] New: conntrackd: segfaults when not disabling internal cache
https://bugzilla.netfilter.org/show_bug.cgi?id=1445
Bug ID: 1445
Summary: conntrackd: segfaults when not disabling internal
cache
Product: conntrack-tools
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: critical
Priority: P5
2013 Sep 27
0
CESA-2013:1292 Moderate CentOS 5 kernel Update
CentOS Errata and Security Advisory 2013:1292 Moderate
Upstream details at : https://rhn.redhat.com/errata/RHSA-2013-1292.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
a7e10caacf1fdd1e08e144495e71fe0e94f2310999603a90b89468e95bc84378 kernel-2.6.18-348.18.1.el5.i686.rpm
2014 Sep 24
0
CESA-2014:1292 Moderate CentOS 7 haproxy Security Update
CentOS Errata and Security Advisory 2014:1292 Moderate
Upstream details at : https://rhn.redhat.com/errata/RHSA-2014-1292.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
b5a830332d0a677758c3c1e8fef496c3aa9383dbe01ac9674ea58b0499fd3035 haproxy-1.5.2-3.el7_0.x86_64.rpm
Source:
2016 Jun 23
0
CESA-2016:1292 Important CentOS 6 libxml2 Security Update
CentOS Errata and Security Advisory 2016:1292 Important
Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-1292.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
56558f0128bbf150cf6d7a1c1ef3ce09564150a1e7cbc9680e4d6e3684b5888d libxml2-2.7.6-21.el6_8.1.i686.rpm