Your Bugzilla bug list needs attention.
bugzilla-daemon at bugzilla.netfilter.org
bugzilla-daemon at bugzilla.netfilter.org
Mon Jan 7 01:46:15 CET 2013
[This e-mail has been automatically generated.]
You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require
attention.
All of these bugs are in the NEW or REOPENED state, and have not been
touched in 7 days or more.
You need to take a look at them, and decide on an initial action.
Generally, this means one of three things:
(1) You decide this bug is really quick to deal with (like, it's INVALID),
and so you get rid of it immediately.
(2) You decide the bug doesn't belong to you, and you reassign it to
someone else. (Hint: if you don't know who to reassign it to, make
sure that the Component field seems reasonable, and then use the
"Reset Assignee to default" option.)
(3) You decide the bug belongs to you, but you can't solve it this moment.
Accept the bug by setting the status to ASSIGNED.
To get a list of all NEW/REOPENED bugs, you can use this URL (bookmark
it if you like!):
http://bugzilla.netfilter.org/buglist.cgi?bug_status=NEW&bug_status=REOPENED&assigned_to=netfilter-buglog@lists.netfilter.org
Or, you can use the general query page, at
http://bugzilla.netfilter.org/query.cgi
Appended below are the individual URLs to get to all of your NEW bugs
that haven't been touched for 7 days or more.
You will get this message once a day until you've dealt with these bugs!
Enhancement: Allow rules to specify ICMP type ranges.
-> http://bugzilla.netfilter.org/show_bug.cgi?id=630
netfilters clamp-mss-to-pmtu sets bad MSS when none was set before
-> http://bugzilla.netfilter.org/show_bug.cgi?id=662
Postrouting + IPsec + IPv6
-> http://bugzilla.netfilter.org/show_bug.cgi?id=663
connlimit doesn't work properly
-> http://bugzilla.netfilter.org/show_bug.cgi?id=676
add PID and UID to netfilter-queue
-> http://bugzilla.netfilter.org/show_bug.cgi?id=678
iptables-xml missing <match> in first <conditions> node
-> http://bugzilla.netfilter.org/show_bug.cgi?id=679
Ruleset counter on -m recent match when recent table OVERFLOWED.
-> http://bugzilla.netfilter.org/show_bug.cgi?id=689
Files with the same name in case-insensitive file systems
-> http://bugzilla.netfilter.org/show_bug.cgi?id=694
Extra tcp options for REJECT --reject-with tcp-reset-both / tcp-reset-destination
-> http://bugzilla.netfilter.org/show_bug.cgi?id=696
please add new options to iptables-restore to continue on error and suppress error output
-> http://bugzilla.netfilter.org/show_bug.cgi?id=699
PPPoE masqeuraded connection reset when talking to Amazon S3
-> http://bugzilla.netfilter.org/show_bug.cgi?id=701
A way to convert an iptables command to its iptables-save equivalent output
-> http://bugzilla.netfilter.org/show_bug.cgi?id=705
Some accepted packets get lost
-> http://bugzilla.netfilter.org/show_bug.cgi?id=708
nfq_nfnlh() and nfq_fd() should have const arguments
-> http://bugzilla.netfilter.org/show_bug.cgi?id=715
Errors in compiling nfqnl_test.c
-> http://bugzilla.netfilter.org/show_bug.cgi?id=743
Range check for ulog-cprange is wrong
-> http://bugzilla.netfilter.org/show_bug.cgi?id=748
IPv6 bridging bug
-> http://bugzilla.netfilter.org/show_bug.cgi?id=751
ipq_read() will return an error (rc = -1) and the error message says "Received truncated message"
-> http://bugzilla.netfilter.org/show_bug.cgi?id=752
change bugzilla account e-mail
-> http://bugzilla.netfilter.org/show_bug.cgi?id=755
iptables: Memory allocation problem.
-> http://bugzilla.netfilter.org/show_bug.cgi?id=756
Retry iptables command on transient failure
-> http://bugzilla.netfilter.org/show_bug.cgi?id=758
"iptables -m recent" crashes a LXC host on lxc-stop
-> http://bugzilla.netfilter.org/show_bug.cgi?id=759
nf_ct_sip dropping SIP messages larger then MTU
-> http://bugzilla.netfilter.org/show_bug.cgi?id=760
dnat and snat not changing port numbers on sctp packets
-> http://bugzilla.netfilter.org/show_bug.cgi?id=763
Doing -Z twice in parallel breaks counters
-> http://bugzilla.netfilter.org/show_bug.cgi?id=764
Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule
-> http://bugzilla.netfilter.org/show_bug.cgi?id=766
Fix a compiler warning [-Wunused-variable]
-> http://bugzilla.netfilter.org/show_bug.cgi?id=767
Returns the position the entry was inserted
-> http://bugzilla.netfilter.org/show_bug.cgi?id=768
iptables SNAT does not handle argument --persistent
-> http://bugzilla.netfilter.org/show_bug.cgi?id=769
ipt_REJECT: multi-directional tcp-reset
-> http://bugzilla.netfilter.org/show_bug.cgi?id=770
nf_conntrack_proto_tcp BUG??
-> http://bugzilla.netfilter.org/show_bug.cgi?id=771
Rate Limiting
-> http://bugzilla.netfilter.org/show_bug.cgi?id=772
-m owner ! --uid-owner False positive logging
-> http://bugzilla.netfilter.org/show_bug.cgi?id=775
Suspect bug in __do_replace()
-> http://bugzilla.netfilter.org/show_bug.cgi?id=777
NFQUEUE --queue-bypass accepts all packets when no userspace application is available
-> http://bugzilla.netfilter.org/show_bug.cgi?id=778
Netfilter on bridge interface containing a defective NIC
-> http://bugzilla.netfilter.org/show_bug.cgi?id=779
Memory utilization continuously increasing day by day
-> http://bugzilla.netfilter.org/show_bug.cgi?id=784
Normalize iptables rules
-> http://bugzilla.netfilter.org/show_bug.cgi?id=790
ulogd -d does not close all fds
-> http://bugzilla.netfilter.org/show_bug.cgi?id=793
-f option used with iptables
-> http://bugzilla.netfilter.org/show_bug.cgi?id=794
RELATED doesn't accommodate multicast UDP solicitation resulting in unicast reply
-> http://bugzilla.netfilter.org/show_bug.cgi?id=795
sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook
-> http://bugzilla.netfilter.org/show_bug.cgi?id=800
Bridge dropping Ipsec fragmented packets
-> http://bugzilla.netfilter.org/show_bug.cgi?id=801
Lack of error feedback on SELinux denial
-> http://bugzilla.netfilter.org/show_bug.cgi?id=802
More information about the netfilter-buglog
mailing list