Your message dated Tue, 4 Jun 2013 17:19:57 +0200
with message-id <[email protected]>
and subject line Closing
has caused the Debian Bug report #540074,
regarding netfilter leaking traffic when long chains defined
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
540074: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=540074
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: linux-image-2.6-486
Version: 2.6.26+17+lenny1
Severity: normal
File: linux
There appears to be traffic leaking across the netfilter when a long chain of
valid ip addresses are used.
I am getting connections being established from outside of the valid address
list. For example:
netstat -a --numeric-users
tcp 0 0 10.0.0.8:9999 118.168.141.172:3388 ESTABLISHED
This problem incorrectly reported on #534963 against iptables. This
reopens against kernel, as advised by Laurence Lane.
For details of configuration scripts and test data, refer to bug #534963.
Mark.
-- System Information:
Debian Release: 5.0.2
APT prefers stable
APT policy: (990, 'stable'), (50, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.26-2-486
Locale: LANG=en_GB, LC_CTYPE=en_GB (charmap=ISO-8859-1)
Shell: /bin/sh linked to /bin/dash
Versions of packages linux-image-2.6-486 depends on:
ii linux-image-2.6.26-2-486 2.6.26-17 Linux 2.6.26 image on x86
linux-image-2.6-486 recommends no packages.
linux-image-2.6-486 suggests no packages.
-- no debconf information
--- End Message ---
--- Begin Message ---
Hi,
your bug has been filed against the "linux-2.6" source package and was filed for
a kernel older than the recently released Debian 7.0 / Wheezy with a severity
less than important.
We don't have the ressources to reproduce the complete backlog of all older
kernel
bugs, so we're closing this bug for now. If you can reproduce the bug with
Debian Wheezy
or a more recent kernel from testing or unstable, please reopen the bug by
sending
a mail to [email protected] with the following three commands included in
the
mail:
reopen BUGNUMBER
reassign BUGNUMBER src:linux
thanks
Cheers,
Moritz
--- End Message ---