Your Bugzilla bug list needs attention.

bugzilla-daemon at bugzilla.netfilter.org bugzilla-daemon at bugzilla.netfilter.org
Mon Feb 4 01:46:28 CET 2013


[This e-mail has been automatically generated.]

You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require
attention.

All of these bugs are in the NEW or REOPENED state, and have not been
touched in 7 days or more.
You need to take a look at them, and decide on an initial action.

Generally, this means one of three things:

(1) You decide this bug is really quick to deal with (like, it's INVALID),
    and so you get rid of it immediately.
(2) You decide the bug doesn't belong to you, and you reassign it to
    someone else. (Hint: if you don't know who to reassign it to, make
    sure that the Component field seems reasonable, and then use the
    "Reset Assignee to default" option.)
(3) You decide the bug belongs to you, but you can't solve it this moment.
    Accept the bug by setting the status to ASSIGNED.

To get a list of all NEW/REOPENED bugs, you can use this URL (bookmark
it if you like!):
http://bugzilla.netfilter.org/buglist.cgi?bug_status=NEW&bug_status=REOPENED&assigned_to=netfilter-buglog@lists.netfilter.org

Or, you can use the general query page, at 
http://bugzilla.netfilter.org/query.cgi

Appended below are the individual URLs to get to all of your NEW bugs
that haven't been touched for 7 days or more.

You will get this message once a day until you've dealt with these bugs!

 Enhancement:  Allow rules to specify ICMP type ranges.
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=630
 netfilters clamp-mss-to-pmtu sets bad MSS when none was set before
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=662
 Postrouting + IPsec + IPv6
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=663
 connlimit doesn't work properly
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=676
 add PID and UID to netfilter-queue
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=678
 iptables-xml missing <match> in first <conditions> node
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=679
 Ruleset counter on -m recent match when recent table OVERFLOWED.
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=689
 Files with the same name in case-insensitive file systems
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=694
 Extra tcp options for REJECT --reject-with tcp-reset-both / tcp-reset-destination
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=696
 please add new options to iptables-restore to continue on error and suppress error output
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=699
 PPPoE masqeuraded connection reset when talking to Amazon S3
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=701
 A way to convert an iptables command to its iptables-save equivalent output
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=705
 Some accepted packets get lost
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=708
 nfq_nfnlh() and  nfq_fd()  should have const arguments
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=715
 Errors in compiling nfqnl_test.c
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=743
 Range check for ulog-cprange is wrong
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=748
 IPv6 bridging bug
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=751
 ipq_read() will return an error (rc = -1) and the error message says "Received truncated message"
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=752
 change bugzilla account e-mail
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=755
 iptables: Memory allocation problem.
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=756
 Retry iptables command on transient failure
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=758
 "iptables -m recent" crashes a LXC host on lxc-stop
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=759
 nf_ct_sip dropping SIP messages larger then MTU
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=760
 dnat and snat not changing port numbers on sctp packets
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=763
 Doing -Z twice in parallel breaks counters
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=764
 Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=766
 Fix a compiler warning [-Wunused-variable]
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=767
 Returns the position the entry was inserted
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=768
 iptables SNAT does not handle argument --persistent
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=769
 ipt_REJECT: multi-directional tcp-reset
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=770
 nf_conntrack_proto_tcp BUG??
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=771
 Rate Limiting
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=772
 -m owner ! --uid-owner False positive logging
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=775
 Suspect bug in __do_replace()
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=777
 NFQUEUE --queue-bypass accepts all packets when no userspace application is available
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=778
 Netfilter on bridge interface containing a defective NIC
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=779
 Memory utilization continuously increasing day by day
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=784
 Normalize iptables rules
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=790
 ulogd -d does not close all fds
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=793
 -f option used with iptables
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=794
 RELATED doesn't accommodate multicast UDP solicitation resulting in unicast reply
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=795
 sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=800
 Bridge dropping Ipsec fragmented packets
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=801
 Lack of error feedback on SELinux denial
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=802
 localhost port forwarding to a different host with DNAT
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=804
 osf iptables[-save] errors
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=805
 test11
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=806



More information about the netfilter-buglog mailing list