Skip to navigation

Bug Fix Advisory iptables bug fix update

Advisory: RHBA-2012:0336-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-02-24
Last updated on: 2012-02-24
Affected Products: Red Hat Enterprise Linux Server EUS (v. 6.1.z)

Details

Updated iptables packages that fix one bug are now available for Red Hat
Enterprise Linux 6 Extended Update Support.

The iptables utility controls the network packet filtering code in the Linux
kernel.

This update fixes the following bug:

* The option parser of the iptables utility did not correctly handle the "-m
mark" and "-m conmark" options in the same rule. Therefore, the iptables command
failed when issued with both options. This update modifies behavior of the
option parser so that iptables now works as expected with the "-m mark" and "-m
conmark" options specified. (BZ#786871)

All users of iptables are advised to upgrade to these updated packages, which
fix this bug.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Server EUS (v. 6.1.z)

SRPMS:
iptables-1.4.7-5.1.el6_1.src.rpm     MD5: e16d790079b9584cde86c4683de0a592
SHA-256: 0dac0a672ef542d24dfa0d8f4e0c6d90a34de0175f1ef296b6c97664d6895613
 
IA-32:
iptables-1.4.7-5.1.el6_1.i686.rpm     MD5: cec3c92662aa5dfd433f0dec11724537
SHA-256: 9d44b5d3db3ae24ff77fba29411e991a8417abfb85392d84f61bdb83a8883f14
iptables-debuginfo-1.4.7-5.1.el6_1.i686.rpm     MD5: 202fff0d912144635a91661d63f71900
SHA-256: b962bf260e785db015e95f209a84243d962a5c2fad044b228f93b8a3b84639d2
iptables-devel-1.4.7-5.1.el6_1.i686.rpm     MD5: 610f81f7ae74a032fb38fd28183595a2
SHA-256: b5b19c9238fd281807ca7d8fc48dc1d8cc6fb8d385b010ddc01c5f60f9d1607f
iptables-ipv6-1.4.7-5.1.el6_1.i686.rpm     MD5: 113d369fc6f39ef8b9f897e4ddd399f0
SHA-256: dd3151922df41207752856b28ea3dd117c524ab5573df99dc869d8b8fec35810
 
PPC:
iptables-1.4.7-5.1.el6_1.ppc.rpm     MD5: 1ee8d119d64d371a807966b9b7c65188
SHA-256: a73f37511a1fc6e19d1c97dd2dcc55675545c697041d14bd7b57108ccd76782d
iptables-1.4.7-5.1.el6_1.ppc64.rpm     MD5: 794af1358d1aa63a09f89d1150952f73
SHA-256: be77d720452b261d1fb82d4f0d1901952d9951423b243c78a61d38ec3ee9ea27
iptables-debuginfo-1.4.7-5.1.el6_1.ppc.rpm     MD5: 3763785577abdf436dd4a62cd2f94c11
SHA-256: fc63c8a8afda8932f0ca8ee8b3d3c07792131dfaee5dce28ee0a2b8f089df747
iptables-debuginfo-1.4.7-5.1.el6_1.ppc64.rpm     MD5: 6958427d040ea9bd298073c5e1dec500
SHA-256: 997183e187a995359888dcb8246b9c115ec34e38fe85f1479ae873058e83d29b
iptables-devel-1.4.7-5.1.el6_1.ppc.rpm     MD5: 524c6ea44bc2b362cca36474586fda5e
SHA-256: 578524173b1a115e4d8611a88373829c22116ca25837db9c2f6556f57ce16310
iptables-devel-1.4.7-5.1.el6_1.ppc64.rpm     MD5: e2cee31128591d3be423957ebc180349
SHA-256: 928ff88813563f3bee32dcda91fd8b416b74f545849e17dac6a8f4133a6822a2
iptables-ipv6-1.4.7-5.1.el6_1.ppc64.rpm     MD5: f69cce02959e8e83bf3441cbad1893c6
SHA-256: e44e8f63e7a50e1f6328fda7bd002771d6f2f525fa0333cc64236d76115c033a
 
s390x:
iptables-1.4.7-5.1.el6_1.s390.rpm     MD5: 8edce297a21788fb7c5c59e37c594ae6
SHA-256: c49fe053ae44fbe4285af68064ef3720df67cfdb9e6b3ff8ddea11f5bed3d84f
iptables-1.4.7-5.1.el6_1.s390x.rpm     MD5: 50619b916b38355375849c6de20178bd
SHA-256: 39dff73e45e06909477ce134d0d144f57ff23f89b23c2c8ca2a3558d09dead04
iptables-debuginfo-1.4.7-5.1.el6_1.s390.rpm     MD5: 9053d8a4d065cc31aeb1dd840dd71679
SHA-256: e7fbd576bf69c75e23698efbd9f7997e3d64b2ef23f2b92f355824c8f8669831
iptables-debuginfo-1.4.7-5.1.el6_1.s390x.rpm     MD5: fc78e565251a9d1275985031073b1e08
SHA-256: bd26f2e8a4f610a3d297c93c1362e6fe6e9d74d879b1df1bf98b7e347ca00967
iptables-devel-1.4.7-5.1.el6_1.s390.rpm     MD5: f7d49451d048bed7c51c95f0ebbe1753
SHA-256: d7056d452b6647ef3b1ffe5e645602fa65faf0e2361ed4dd7470e4ebc5557a04
iptables-devel-1.4.7-5.1.el6_1.s390x.rpm     MD5: 48f377324f79ade64b64cb03614f9cd1
SHA-256: 8abe085d859805a5f6d1262bdf6ceb444fa8459629026a2ba71830e460a2da11
iptables-ipv6-1.4.7-5.1.el6_1.s390x.rpm     MD5: f7df88c6d11801dc088a18bfe78b14af
SHA-256: 5fa61a0b73a157473fd6047a9d673338316ce6af52de1a4340278781611776cf
 
x86_64:
iptables-1.4.7-5.1.el6_1.i686.rpm     MD5: cec3c92662aa5dfd433f0dec11724537
SHA-256: 9d44b5d3db3ae24ff77fba29411e991a8417abfb85392d84f61bdb83a8883f14
iptables-1.4.7-5.1.el6_1.x86_64.rpm     MD5: 352ee58d17c3f9d94b9a94e63c8d9134
SHA-256: eb40c696a889088f2efe292b5fff6c32b72f96ae5513909905871e85af70683d
iptables-debuginfo-1.4.7-5.1.el6_1.i686.rpm     MD5: 202fff0d912144635a91661d63f71900
SHA-256: b962bf260e785db015e95f209a84243d962a5c2fad044b228f93b8a3b84639d2
iptables-debuginfo-1.4.7-5.1.el6_1.x86_64.rpm     MD5: cd609a37fd2f440748a270d7da4c6634
SHA-256: cdae9597416d829d4272614ae50045bdced98f29af7f061571a902686d82b751
iptables-devel-1.4.7-5.1.el6_1.i686.rpm     MD5: 610f81f7ae74a032fb38fd28183595a2
SHA-256: b5b19c9238fd281807ca7d8fc48dc1d8cc6fb8d385b010ddc01c5f60f9d1607f
iptables-devel-1.4.7-5.1.el6_1.x86_64.rpm     MD5: 4caf0bdde55623e9d0db059b6fa8be00
SHA-256: 55dd53af73e40b0ded35394fae705ae44af408f066dd7e3a1d08ca762e7d7d93
iptables-ipv6-1.4.7-5.1.el6_1.x86_64.rpm     MD5: 455d81bc04ee2b6d1c5db4e60eb46e90
SHA-256: 2a8138ad1b4f23b8224ceaace338d6fecec95248489fc841d402f7d44795f3d9
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/