Created attachment 363198 [details] Proposed patch (based on code from system-config-securitylevel-1.7.0) +++ This bug was initially created as a clone of Bug #195786 +++ This bug also affects system-config-securitylevel in Red hat Enterprise Linux 5. Description of problem: Disabling the firewall in system-config-securitylevel does not flushes ip6tables. How reproducible: 100% reproducible Steps to reproduce: 1. Make sure ip6tables is configured and rules are set up for ipv6 2. Use "setup" to turn off the firewall 3. Run ip6tables -L Actual results: ip6tables -L lists rules Expected results: No rules after for ipv6 after disabling the firewall in the tui. Additional info: lokkit does run iptables -F but not ip6tables -F Patch based on code from system-config-securitylevel-1.7.0 attached.
Event posted on 09-30-2009 06:13pm EDT by Glen Johnson ------- Comment From markver.com 2009-09-30 18:07 EDT------- Works for me. The following packages were installed on our RHEL5.4 system: system-config-securitylevel system-config-securitylevel-tui Updated them with the patched versions. After the update, when I used "setup" to disable the firewall, it flushed both the ipv4 and ipv6 firewall rules. Internal Status set to 'Waiting on Support' Status set to: Waiting on Tech Ticket type changed from 'Problem' to '' This event sent from IssueTracker by jkachuck issue 340279
This request was evaluated by Red Hat Product Management for inclusion, but this component is not scheduled to be updated in the current Red Hat Enterprise Linux release. If you would like this request to be reviewed for the next minor release, ask your support representative to set the next rhel-x.y flag to "?".
Fixed in system-config-securitylevel-1.6.29.1-6.el5. Here is the build: https://brewweb.devel.redhat.com/buildinfo?buildID=141147
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on therefore solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHBA-2010-0686.html
*** Bug 636505 has been marked as a duplicate of this bug. ***