Hi,
* Arturo Borrero Gonzalez <
art...@debian.org> [2019-06-26 14:14:50 CEST]:
> The last upstream release of iptables won't make it into Debian Buster at this
> point.
>
> Once buster is released I will:
>
> * provide uptodate package backports of newer upstream releases in
> buster-backports (for both iptables and nftables)
Please don't abuse backports for bugfixes that belong in stable. This
won't solve the issues for users of stable. Backports is for newer
features in software, not for offering bugfixes for stable.
> * for important bugs, I would try backporting concrete patches to the version in
> buster-stable.
The regression pointed out here through the switch of the default from
iptables-legacy to iptables-nft is kinda important, in my opinion.
Custom chains aren't really something exotic like you try to imply.
Most tools that offer a bit more of a complex possibility to maintain
your firewall settings are using them. And if a simple iptables-restore
can trigger this segfault for a setup that is far from exotic then it's
a regression that appears through the change of the tool that should
rather ring alarm clocks instead of trying to downplay the issue, in my
opinion. :/
I know that the release is happening next week, and I understand that
it is considered too late to do anything right now - but please think
about the impact of this for the first point release.
Thanks,
Rhonda
--
Fühlst du dich mutlos, fass endlich Mut, los |
Fühlst du dich hilflos, geh raus und hilf, los | Wir sind Helden
Fühlst du dich machtlos, geh raus und mach, los | 23.55: Alles auf Anfang
Fühlst du dich haltlos, such Halt und lass los |