similar to: [Bug 1292] New: issue with -f fragment option

Displaying 20 results from an estimated 2000 matches similar to: "[Bug 1292] New: issue with -f fragment option"

2019 Jul 02
5
[Bug 1347] New: ebtables-nft: regression in -o option
https://bugzilla.netfilter.org/show_bug.cgi?id=1347 Bug ID: 1347 Summary: ebtables-nft: regression in -o option Product: nftables Version: unspecified Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: normal Priority: P5 Component: iptables over nftable Assignee:
2018 Nov 16
2
[Bug 1298] New: Issue with REJECT in custom chains
https://bugzilla.netfilter.org/show_bug.cgi?id=1298 Bug ID: 1298 Summary: Issue with REJECT in custom chains Product: nftables Version: unspecified Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: normal Priority: P5 Component: iptables over nftable Assignee: pablo
2019 Jan 21
1
[Bug 1318] New: Fragmented packet filtering is broken iptables compatibility tools
https://bugzilla.netfilter.org/show_bug.cgi?id=1318 Bug ID: 1318 Summary: Fragmented packet filtering is broken iptables compatibility tools Product: nftables Version: unspecified Hardware: x86_64 OS: other Status: NEW Severity: normal Priority: P5 Component:
2018 Nov 02
3
[Bug 1286] New: -Z regression
https://bugzilla.netfilter.org/show_bug.cgi?id=1286 Bug ID: 1286 Summary: -Z regression Product: nftables Version: unspecified Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: normal Priority: P5 Component: iptables over nftable Assignee: pablo at netfilter.org
2018 Nov 06
1
[Bug 1290] New: ptables: nftables layer breaks ipsec/policy keyword
https://bugzilla.netfilter.org/show_bug.cgi?id=1290 Bug ID: 1290 Summary: ptables: nftables layer breaks ipsec/policy keyword Product: nftables Version: unspecified Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: normal Priority: P5 Component: iptables over nftable
2016 Oct 04
13
[Bug 1087] New: Window Tracking not disabled
https://bugzilla.netfilter.org/show_bug.cgi?id=1087 Bug ID: 1087 Summary: Window Tracking not disabled Product: conntrack-tools Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: enhancement Priority: P5 Component: conntrack-daemon Assignee: netfilter-buglog
2018 Nov 02
1
[Bug 1287] New: rule for 0.0.0.0/8 is added as 0.0.0.0/0
https://bugzilla.netfilter.org/show_bug.cgi?id=1287 Bug ID: 1287 Summary: rule for 0.0.0.0/8 is added as 0.0.0.0/0 Product: nftables Version: unspecified Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: normal Priority: P5 Component: iptables over nftable Assignee:
2016 Jun 07
5
[Bug 1073] New: inet-service vs icmp conflict
https://bugzilla.netfilter.org/show_bug.cgi?id=1073 Bug ID: 1073 Summary: inet-service vs icmp conflict Product: nftables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: normal Priority: P5 Component: nft Assignee: pablo at netfilter.org Reporter:
2020 Jan 06
2
[Bug 1394] New: "Bad argument `ACCEPT'" when iptables-restore (nft) parses stdin
https://bugzilla.netfilter.org/show_bug.cgi?id=1394 Bug ID: 1394 Summary: "Bad argument `ACCEPT'" when iptables-restore (nft) parses stdin Product: iptables Version: unspecified Hardware: x86_64 URL: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=9462 89
2017 Jul 12
1
[Bug 1162] New: oops in nft_rbtree_insert
https://bugzilla.netfilter.org/show_bug.cgi?id=1162 Bug ID: 1162 Summary: oops in nft_rbtree_insert Product: nftables Version: unspecified Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: normal Priority: P5 Component: kernel Assignee: pablo at netfilter.org
2017 Oct 21
5
[Bug 1196] New: nft does not allow comments within sets: Error: syntax error, unexpected newline
https://bugzilla.netfilter.org/show_bug.cgi?id=1196 Bug ID: 1196 Summary: nft does not allow comments within sets: Error: syntax error, unexpected newline Product: nftables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: enhancement Priority: P5
2019 Jul 21
5
[Bug 1354] New: cat foo.nft | nft -f - produces syntax error not seen with nft -f foo.nft
https://bugzilla.netfilter.org/show_bug.cgi?id=1354 Bug ID: 1354 Summary: cat foo.nft | nft -f - produces syntax error not seen with nft -f foo.nft Product: nftables Version: unspecified Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: normal Priority: P5
2014 Jul 10
2
[Bug 965] New: Deleting rules using "position" keyword deletes all rules for chain
https://bugzilla.netfilter.org/show_bug.cgi?id=965 Summary: Deleting rules using "position" keyword deletes all rules for chain Product: nftables Version: unspecified Platform: x86_64 OS/Version: All Status: NEW Severity: enhancement Priority: P5 Component: nft
2019 Nov 20
3
[Bug 1383] New: When using include, nft shows the wrong file name in errors
https://bugzilla.netfilter.org/show_bug.cgi?id=1383 Bug ID: 1383 Summary: When using include, nft shows the wrong file name in errors Product: nftables Version: unspecified Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: normal Priority: P5 Component: nft
2020 Apr 27
2
[Bug 1424] New: v0.9.0: segfault when using nft -f <file> and issuing "ruleset flush" twice
https://bugzilla.netfilter.org/show_bug.cgi?id=1424 Bug ID: 1424 Summary: v0.9.0: segfault when using nft -f <file> and issuing "ruleset flush" twice Product: nftables Version: unspecified Hardware: All OS: Debian GNU/Linux Status: NEW Severity: normal
2018 Oct 04
1
[Bug 1281] New: Using kernel 4.18.10, nft commandline tool or nft -f can't parse negative priority values over -200.
https://bugzilla.netfilter.org/show_bug.cgi?id=1281 Bug ID: 1281 Summary: Using kernel 4.18.10, nft commandline tool or nft -f can't parse negative priority values over -200. Product: nftables Version: unspecified Hardware: x86_64 OS: Ubuntu Status: NEW Severity: critical
2020 Jul 24
1
[Bug 1445] New: conntrackd: segfaults when not disabling internal cache
https://bugzilla.netfilter.org/show_bug.cgi?id=1445 Bug ID: 1445 Summary: conntrackd: segfaults when not disabling internal cache Product: conntrack-tools Version: unspecified Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: critical Priority: P5
2013 Sep 27
0
CESA-2013:1292 Moderate CentOS 5 kernel Update
CentOS Errata and Security Advisory 2013:1292 Moderate Upstream details at : https://rhn.redhat.com/errata/RHSA-2013-1292.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: a7e10caacf1fdd1e08e144495e71fe0e94f2310999603a90b89468e95bc84378 kernel-2.6.18-348.18.1.el5.i686.rpm
2014 Sep 24
0
CESA-2014:1292 Moderate CentOS 7 haproxy Security Update
CentOS Errata and Security Advisory 2014:1292 Moderate Upstream details at : https://rhn.redhat.com/errata/RHSA-2014-1292.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: b5a830332d0a677758c3c1e8fef496c3aa9383dbe01ac9674ea58b0499fd3035 haproxy-1.5.2-3.el7_0.x86_64.rpm Source:
2016 Jun 23
0
CESA-2016:1292 Important CentOS 6 libxml2 Security Update
CentOS Errata and Security Advisory 2016:1292 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-1292.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 56558f0128bbf150cf6d7a1c1ef3ce09564150a1e7cbc9680e4d6e3684b5888d libxml2-2.7.6-21.el6_8.1.i686.rpm