similar to: [Bug 1479] New: seqnum_to_json() is slow

Displaying 20 results from an estimated 300 matches similar to: "[Bug 1479] New: seqnum_to_json() is slow"

2017 Apr 02
6
[Bug 1142] New: invalid binop operation 6nft
https://bugzilla.netfilter.org/show_bug.cgi?id=1142 Bug ID: 1142 Summary: invalid binop operation 6nft Product: nftables Version: unspecified Hardware: x86_64 OS: other Status: NEW Severity: major Priority: P5 Component: nft Assignee: pablo at netfilter.org Reporter:
2024 Jan 29
2
[Bug 1734] New: nft set with auto-merge json import/export
https://bugzilla.netfilter.org/show_bug.cgi?id=1734 Bug ID: 1734 Summary: nft set with auto-merge json import/export Product: nftables Version: 1.0.x Hardware: All OS: All Status: NEW Severity: minor Priority: P5 Component: nft Assignee: pablo at netfilter.org
2023 Jun 09
7
[Bug 1689] New: Resetting the timeout counter for a named set element
https://bugzilla.netfilter.org/show_bug.cgi?id=1689 Bug ID: 1689 Summary: Resetting the timeout counter for a named set element Product: nftables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: enhancement Priority: P5 Component: nft Assignee: pablo at
2023 Dec 18
4
[Bug 1728] New: Regression: iptables lock is now waited for without --wait
https://bugzilla.netfilter.org/show_bug.cgi?id=1728 Bug ID: 1728 Summary: Regression: iptables lock is now waited for without --wait Product: iptables Version: 1.8.x Hardware: x86_64 OS: All Status: NEW Severity: normal Priority: P5 Component: unknown
2023 May 31
11
[Bug 1685] New: Calling the nftnl_set_free function may trigger the "double free" problem.
https://bugzilla.netfilter.org/show_bug.cgi?id=1685 Bug ID: 1685 Summary: Calling the nftnl_set_free function may trigger the "double free" problem. Product: libnftnl Version: unspecified Hardware: All OS: All Status: NEW Severity: critical Priority: P5
2020 Jan 06
9
[Bug 1395] New: Add element fails with Error: Could not process rule: Invalid argument
https://bugzilla.netfilter.org/show_bug.cgi?id=1395 Bug ID: 1395 Summary: Add element fails with Error: Could not process rule: Invalid argument Product: nftables Version: unspecified Hardware: All OS: All Status: NEW Severity: critical Priority: P5 Component: nft
2016 Mar 21
3
[Bug 1059] New: Using wildcard interface names in an anonymous set fails on big endian
https://bugzilla.netfilter.org/show_bug.cgi?id=1059 Bug ID: 1059 Summary: Using wildcard interface names in an anonymous set fails on big endian Product: nftables Version: unspecified Hardware: ppc OS: other Status: NEW Severity: major Priority: P5 Component: nft
2014 Apr 13
4
[Bug 914] New: nft configure does not use --prefix as include/lib search path
https://bugzilla.netfilter.org/show_bug.cgi?id=914 Summary: nft configure does not use --prefix as include/lib search path Product: nftables Version: unspecified Platform: x86_64 OS/Version: All Status: NEW Severity: enhancement Priority: P5 Component: nft AssignedTo: pablo at
2014 Feb 05
3
[Bug 895] New: Add a 'ipv6_address' set into a ipv4 table and vice versa
https://bugzilla.netfilter.org/show_bug.cgi?id=895 Summary: Add a 'ipv6_address' set into a ipv4 table and vice versa Product: nftables Version: unspecified Platform: x86_64 OS/Version: Debian GNU/Linux Status: NEW Severity: enhancement Priority: P5 Component: nft
2003 Jan 03
19
VPN hardware?
I have a NetGear FV318 living in my DMZ, with one of its LAN-ports living in my LOC zone. What rules are needed in shorewall to allow a certain subnet to make connections to this device from the net zone? Do I define it as a tunnel in shorewall/tunnels, or do I just allow some selected traffic to the DMZ IP? I am not sure which of the docs are right for me in this case?
2003 Jun 03
4
Do i (this time) need hosts?
Two legged 1.4.2 firewall zone nwl is eth0 (192.168.221.0/24 ($FW on .205)) zone jvc is eth1 (10.200.47.0/24 ($FW on .253)) Lets suppose i need to allow traffic from nwl to "jvn" which is 10.200.0.0/16 (yes, i do realize that they overlap) and route that traffic to 10.200.47.254? The router upstream from this one routes 10.200.0.0/16 -> 192.168.221.205 and i do see
2016 Nov 22
1
[Bug 1099] New: Minor typo in wiki.nftables.org
https://bugzilla.netfilter.org/show_bug.cgi?id=1099 Bug ID: 1099 Summary: Minor typo in wiki.nftables.org Product: nftables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: trivial Priority: P5 Component: nft Assignee: pablo at netfilter.org
2020 Nov 13
5
[Bug 1481] New: [ebtables-nft] ebtables -E gives error
https://bugzilla.netfilter.org/show_bug.cgi?id=1481 Bug ID: 1481 Summary: [ebtables-nft] ebtables -E gives error Product: iptables Version: unspecified Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: normal Priority: P5 Component: iptables Assignee:
2019 Dec 22
2
[Bug 1391] New: iptables-nft-restore --test can segfault
https://bugzilla.netfilter.org/show_bug.cgi?id=1391 Bug ID: 1391 Summary: iptables-nft-restore --test can segfault Product: nftables Version: unspecified Hardware: x86_64 OS: Gentoo Status: NEW Severity: normal Priority: P5 Component: iptables over nftable Assignee: pablo at
2020 Aug 20
2
[Bug 1452] New: Incorrect information in the iptables-extensions(8) man page
https://bugzilla.netfilter.org/show_bug.cgi?id=1452 Bug ID: 1452 Summary: Incorrect information in the iptables-extensions(8) man page Product: iptables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: minor Priority: P5 Component: iptables
2024 Jul 13
1
[Bug 1759] New: flush and delete nft commands need an option to ignore non-existant objects
https://bugzilla.netfilter.org/show_bug.cgi?id=1759 Bug ID: 1759 Summary: flush and delete nft commands need an option to ignore non-existant objects Product: nftables Version: unspecified Hardware: x86_64 OS: Ubuntu Status: NEW Severity: enhancement Priority: P5
2024 Sep 03
1
[Bug 1772] New: Double free corruption in libnftables
https://bugzilla.netfilter.org/show_bug.cgi?id=1772 Bug ID: 1772 Summary: Double free corruption in libnftables Product: nftables Version: 1.0.x Hardware: x86_64 OS: Ubuntu Status: NEW Severity: normal Priority: P5 Component: nft Assignee: pablo at netfilter.org
2024 Sep 26
1
[Bug 1775] New: RAW PAYLOAD EXPRESSION offset is limited to 2048
https://bugzilla.netfilter.org/show_bug.cgi?id=1775 Bug ID: 1775 Summary: RAW PAYLOAD EXPRESSION offset is limited to 2048 Product: nftables Version: 1.0.x Hardware: All OS: All Status: NEW Severity: critical Priority: P5 Component: nft Assignee: pablo at netfilter.org
2016 Aug 22
1
[Bug 1083] New: Cannot parse negative priorities from command line
https://bugzilla.netfilter.org/show_bug.cgi?id=1083 Bug ID: 1083 Summary: Cannot parse negative priorities from command line Product: nftables Version: unspecified Hardware: x86_64 OS: RedHat Linux Status: NEW Severity: major Priority: P5 Component: nft Assignee: pablo at
2018 Jan 04
9
[Bug 1210] New: nftables gets confused by user namespaces when meta skuid is used
https://bugzilla.netfilter.org/show_bug.cgi?id=1210 Bug ID: 1210 Summary: nftables gets confused by user namespaces when meta skuid is used Product: nftables Version: unspecified Hardware: All OS: All Status: NEW Severity: critical Priority: P5 Component: nft