Displaying 20 results from an estimated 300 matches similar to: "[Bug 1479] New: seqnum_to_json() is slow"
2017 Apr 02
6
[Bug 1142] New: invalid binop operation 6nft
https://bugzilla.netfilter.org/show_bug.cgi?id=1142
Bug ID: 1142
Summary: invalid binop operation 6nft
Product: nftables
Version: unspecified
Hardware: x86_64
OS: other
Status: NEW
Severity: major
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
Reporter:
2024 Jan 29
2
[Bug 1734] New: nft set with auto-merge json import/export
https://bugzilla.netfilter.org/show_bug.cgi?id=1734
Bug ID: 1734
Summary: nft set with auto-merge json import/export
Product: nftables
Version: 1.0.x
Hardware: All
OS: All
Status: NEW
Severity: minor
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
2023 Jun 09
7
[Bug 1689] New: Resetting the timeout counter for a named set element
https://bugzilla.netfilter.org/show_bug.cgi?id=1689
Bug ID: 1689
Summary: Resetting the timeout counter for a named set element
Product: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
Assignee: pablo at
2023 Dec 18
4
[Bug 1728] New: Regression: iptables lock is now waited for without --wait
https://bugzilla.netfilter.org/show_bug.cgi?id=1728
Bug ID: 1728
Summary: Regression: iptables lock is now waited for without
--wait
Product: iptables
Version: 1.8.x
Hardware: x86_64
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: unknown
2023 May 31
11
[Bug 1685] New: Calling the nftnl_set_free function may trigger the "double free" problem.
https://bugzilla.netfilter.org/show_bug.cgi?id=1685
Bug ID: 1685
Summary: Calling the nftnl_set_free function may trigger the
"double free" problem.
Product: libnftnl
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: critical
Priority: P5
2020 Jan 06
9
[Bug 1395] New: Add element fails with Error: Could not process rule: Invalid argument
https://bugzilla.netfilter.org/show_bug.cgi?id=1395
Bug ID: 1395
Summary: Add element fails with Error: Could not process rule:
Invalid argument
Product: nftables
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: critical
Priority: P5
Component: nft
2016 Mar 21
3
[Bug 1059] New: Using wildcard interface names in an anonymous set fails on big endian
https://bugzilla.netfilter.org/show_bug.cgi?id=1059
Bug ID: 1059
Summary: Using wildcard interface names in an anonymous set
fails on big endian
Product: nftables
Version: unspecified
Hardware: ppc
OS: other
Status: NEW
Severity: major
Priority: P5
Component: nft
2014 Apr 13
4
[Bug 914] New: nft configure does not use --prefix as include/lib search path
https://bugzilla.netfilter.org/show_bug.cgi?id=914
Summary: nft configure does not use --prefix as include/lib
search path
Product: nftables
Version: unspecified
Platform: x86_64
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
AssignedTo: pablo at
2014 Feb 05
3
[Bug 895] New: Add a 'ipv6_address' set into a ipv4 table and vice versa
https://bugzilla.netfilter.org/show_bug.cgi?id=895
Summary: Add a 'ipv6_address' set into a ipv4 table and vice
versa
Product: nftables
Version: unspecified
Platform: x86_64
OS/Version: Debian GNU/Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
2003 Jan 03
19
VPN hardware?
I have a NetGear FV318 living in my DMZ, with one of its LAN-ports
living in my LOC zone. What rules are needed in shorewall to allow a
certain subnet to make connections to this device from the net zone?
Do I define it as a tunnel in shorewall/tunnels, or do I just allow some
selected traffic to the DMZ IP? I am not sure which of the docs are
right for me in this case?
2003 Jun 03
4
Do i (this time) need hosts?
Two legged 1.4.2 firewall
zone nwl is eth0 (192.168.221.0/24 ($FW on .205))
zone jvc is eth1 (10.200.47.0/24 ($FW on .253))
Lets suppose i need to allow traffic from nwl to "jvn" which is 10.200.0.0/16
(yes, i do realize that they overlap) and route that traffic to 10.200.47.254?
The router upstream from this one routes 10.200.0.0/16 -> 192.168.221.205 and
i do see
2016 Nov 22
1
[Bug 1099] New: Minor typo in wiki.nftables.org
https://bugzilla.netfilter.org/show_bug.cgi?id=1099
Bug ID: 1099
Summary: Minor typo in wiki.nftables.org
Product: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: trivial
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
2020 Nov 13
5
[Bug 1481] New: [ebtables-nft] ebtables -E gives error
https://bugzilla.netfilter.org/show_bug.cgi?id=1481
Bug ID: 1481
Summary: [ebtables-nft] ebtables -E gives error
Product: iptables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
Component: iptables
Assignee:
2019 Dec 22
2
[Bug 1391] New: iptables-nft-restore --test can segfault
https://bugzilla.netfilter.org/show_bug.cgi?id=1391
Bug ID: 1391
Summary: iptables-nft-restore --test can segfault
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Gentoo
Status: NEW
Severity: normal
Priority: P5
Component: iptables over nftable
Assignee: pablo at
2020 Aug 20
2
[Bug 1452] New: Incorrect information in the iptables-extensions(8) man page
https://bugzilla.netfilter.org/show_bug.cgi?id=1452
Bug ID: 1452
Summary: Incorrect information in the iptables-extensions(8)
man page
Product: iptables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: minor
Priority: P5
Component: iptables
2024 Jul 13
1
[Bug 1759] New: flush and delete nft commands need an option to ignore non-existant objects
https://bugzilla.netfilter.org/show_bug.cgi?id=1759
Bug ID: 1759
Summary: flush and delete nft commands need an option to ignore
non-existant objects
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Ubuntu
Status: NEW
Severity: enhancement
Priority: P5
2024 Sep 03
1
[Bug 1772] New: Double free corruption in libnftables
https://bugzilla.netfilter.org/show_bug.cgi?id=1772
Bug ID: 1772
Summary: Double free corruption in libnftables
Product: nftables
Version: 1.0.x
Hardware: x86_64
OS: Ubuntu
Status: NEW
Severity: normal
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
2024 Sep 26
1
[Bug 1775] New: RAW PAYLOAD EXPRESSION offset is limited to 2048
https://bugzilla.netfilter.org/show_bug.cgi?id=1775
Bug ID: 1775
Summary: RAW PAYLOAD EXPRESSION offset is limited to 2048
Product: nftables
Version: 1.0.x
Hardware: All
OS: All
Status: NEW
Severity: critical
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
2016 Aug 22
1
[Bug 1083] New: Cannot parse negative priorities from command line
https://bugzilla.netfilter.org/show_bug.cgi?id=1083
Bug ID: 1083
Summary: Cannot parse negative priorities from command line
Product: nftables
Version: unspecified
Hardware: x86_64
OS: RedHat Linux
Status: NEW
Severity: major
Priority: P5
Component: nft
Assignee: pablo at
2018 Jan 04
9
[Bug 1210] New: nftables gets confused by user namespaces when meta skuid is used
https://bugzilla.netfilter.org/show_bug.cgi?id=1210
Bug ID: 1210
Summary: nftables gets confused by user namespaces when meta
skuid is used
Product: nftables
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: critical
Priority: P5
Component: nft