- Issued:
- 2009-05-18
- Updated:
- 2009-05-18
RHEA-2009:1030 - Product Enhancement Advisory
Synopsis
iptables enhancement update
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Enhanced iptables packages which add support for fragmented IPv6 packets
are now available.
Description
The iptables utility controls the network packet filtering code in the
Linux kernel.
These updated iptables packages add support to iptables for fragmented IPv6
packets. Previous to this update, there was no way to filter fragmented
IPv6 packets.
Users of iptables are advised to upgrade to these updated packages, which
add this enhancement.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
iptables-1.2.11-3.2.RHEL4.src.rpm | SHA-256: 25804bb5c7ed2e73ed4904dfe1136cc5958d43d6eada3597790c183283cec398 |
x86_64 | |
iptables-1.2.11-3.2.RHEL4.x86_64.rpm | SHA-256: c50789b20cf1fdd32ab2a2bff98f271ba287c47c299092468e284f8a67c912c7 |
iptables-1.2.11-3.2.RHEL4.x86_64.rpm | SHA-256: c50789b20cf1fdd32ab2a2bff98f271ba287c47c299092468e284f8a67c912c7 |
iptables-devel-1.2.11-3.2.RHEL4.x86_64.rpm | SHA-256: 7fa5f93fea7ae6e588d0ed5b7778ea0eee19a303a56116d7512038f3d5bdef7f |
iptables-devel-1.2.11-3.2.RHEL4.x86_64.rpm | SHA-256: 7fa5f93fea7ae6e588d0ed5b7778ea0eee19a303a56116d7512038f3d5bdef7f |
iptables-ipv6-1.2.11-3.2.RHEL4.x86_64.rpm | SHA-256: 374008879b20da8e1ca762510a63ec38fe8737994b42c4af1dc723967261cf46 |
iptables-ipv6-1.2.11-3.2.RHEL4.x86_64.rpm | SHA-256: 374008879b20da8e1ca762510a63ec38fe8737994b42c4af1dc723967261cf46 |
ia64 | |
iptables-1.2.11-3.2.RHEL4.ia64.rpm | SHA-256: b036b28e0d86b34a264c840a4a3f88366791d619cb554c14a855d120d2b7f234 |
iptables-1.2.11-3.2.RHEL4.ia64.rpm | SHA-256: b036b28e0d86b34a264c840a4a3f88366791d619cb554c14a855d120d2b7f234 |
iptables-devel-1.2.11-3.2.RHEL4.ia64.rpm | SHA-256: 7d723e17df9677bb756f4bcab70d77736c280c73db15962df809402e7199682e |
iptables-devel-1.2.11-3.2.RHEL4.ia64.rpm | SHA-256: 7d723e17df9677bb756f4bcab70d77736c280c73db15962df809402e7199682e |
iptables-ipv6-1.2.11-3.2.RHEL4.ia64.rpm | SHA-256: 3d8c95c3767ab82059802024bc0bfce988057f48ac8e7c6b74e7ba5a0c7de5e5 |
iptables-ipv6-1.2.11-3.2.RHEL4.ia64.rpm | SHA-256: 3d8c95c3767ab82059802024bc0bfce988057f48ac8e7c6b74e7ba5a0c7de5e5 |
i386 | |
iptables-1.2.11-3.2.RHEL4.i386.rpm | SHA-256: fcce013c9ef50e2f9584c8841e029b74ff002b7ab50e35a43f26cd18635890e1 |
iptables-1.2.11-3.2.RHEL4.i386.rpm | SHA-256: fcce013c9ef50e2f9584c8841e029b74ff002b7ab50e35a43f26cd18635890e1 |
iptables-devel-1.2.11-3.2.RHEL4.i386.rpm | SHA-256: a38c6e2195ce7aa3ad1334213eff44e3ecea3423244f64ff37e0840f674a681d |
iptables-devel-1.2.11-3.2.RHEL4.i386.rpm | SHA-256: a38c6e2195ce7aa3ad1334213eff44e3ecea3423244f64ff37e0840f674a681d |
iptables-ipv6-1.2.11-3.2.RHEL4.i386.rpm | SHA-256: 0ff54114fc71a58332ad3e276c48463ad75be6c79f9e7891c8d0b3928f805f5c |
iptables-ipv6-1.2.11-3.2.RHEL4.i386.rpm | SHA-256: 0ff54114fc71a58332ad3e276c48463ad75be6c79f9e7891c8d0b3928f805f5c |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
iptables-1.2.11-3.2.RHEL4.src.rpm | SHA-256: 25804bb5c7ed2e73ed4904dfe1136cc5958d43d6eada3597790c183283cec398 |
x86_64 | |
iptables-1.2.11-3.2.RHEL4.x86_64.rpm | SHA-256: c50789b20cf1fdd32ab2a2bff98f271ba287c47c299092468e284f8a67c912c7 |
iptables-devel-1.2.11-3.2.RHEL4.x86_64.rpm | SHA-256: 7fa5f93fea7ae6e588d0ed5b7778ea0eee19a303a56116d7512038f3d5bdef7f |
iptables-ipv6-1.2.11-3.2.RHEL4.x86_64.rpm | SHA-256: 374008879b20da8e1ca762510a63ec38fe8737994b42c4af1dc723967261cf46 |
ia64 | |
iptables-1.2.11-3.2.RHEL4.ia64.rpm | SHA-256: b036b28e0d86b34a264c840a4a3f88366791d619cb554c14a855d120d2b7f234 |
iptables-devel-1.2.11-3.2.RHEL4.ia64.rpm | SHA-256: 7d723e17df9677bb756f4bcab70d77736c280c73db15962df809402e7199682e |
iptables-ipv6-1.2.11-3.2.RHEL4.ia64.rpm | SHA-256: 3d8c95c3767ab82059802024bc0bfce988057f48ac8e7c6b74e7ba5a0c7de5e5 |
i386 | |
iptables-1.2.11-3.2.RHEL4.i386.rpm | SHA-256: fcce013c9ef50e2f9584c8841e029b74ff002b7ab50e35a43f26cd18635890e1 |
iptables-devel-1.2.11-3.2.RHEL4.i386.rpm | SHA-256: a38c6e2195ce7aa3ad1334213eff44e3ecea3423244f64ff37e0840f674a681d |
iptables-ipv6-1.2.11-3.2.RHEL4.i386.rpm | SHA-256: 0ff54114fc71a58332ad3e276c48463ad75be6c79f9e7891c8d0b3928f805f5c |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
iptables-1.2.11-3.2.RHEL4.src.rpm | SHA-256: 25804bb5c7ed2e73ed4904dfe1136cc5958d43d6eada3597790c183283cec398 |
x86_64 | |
iptables-1.2.11-3.2.RHEL4.x86_64.rpm | SHA-256: c50789b20cf1fdd32ab2a2bff98f271ba287c47c299092468e284f8a67c912c7 |
iptables-devel-1.2.11-3.2.RHEL4.x86_64.rpm | SHA-256: 7fa5f93fea7ae6e588d0ed5b7778ea0eee19a303a56116d7512038f3d5bdef7f |
iptables-ipv6-1.2.11-3.2.RHEL4.x86_64.rpm | SHA-256: 374008879b20da8e1ca762510a63ec38fe8737994b42c4af1dc723967261cf46 |
i386 | |
iptables-1.2.11-3.2.RHEL4.i386.rpm | SHA-256: fcce013c9ef50e2f9584c8841e029b74ff002b7ab50e35a43f26cd18635890e1 |
iptables-devel-1.2.11-3.2.RHEL4.i386.rpm | SHA-256: a38c6e2195ce7aa3ad1334213eff44e3ecea3423244f64ff37e0840f674a681d |
iptables-ipv6-1.2.11-3.2.RHEL4.i386.rpm | SHA-256: 0ff54114fc71a58332ad3e276c48463ad75be6c79f9e7891c8d0b3928f805f5c |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
iptables-1.2.11-3.2.RHEL4.src.rpm | SHA-256: 25804bb5c7ed2e73ed4904dfe1136cc5958d43d6eada3597790c183283cec398 |
s390x | |
iptables-1.2.11-3.2.RHEL4.s390x.rpm | SHA-256: 13cb11fb201e236dcad388fb0c7bd8ce64ace540dc27f1262592b4b2ee3ab62d |
iptables-devel-1.2.11-3.2.RHEL4.s390x.rpm | SHA-256: a06ee22fc22a8b5d744707209a5bb5ec171e99096b8ffa1290f9243873e69c41 |
iptables-ipv6-1.2.11-3.2.RHEL4.s390x.rpm | SHA-256: eb4dff8b93419f5638d760fb099cddd6b33974984d4adf58aa7abb26da7ea953 |
s390 | |
iptables-1.2.11-3.2.RHEL4.s390.rpm | SHA-256: 15e3032f2441c1c23c806449edc8db1c844f45e5e8997cf2702b1299bfc798dc |
iptables-devel-1.2.11-3.2.RHEL4.s390.rpm | SHA-256: 2b0edc63cfffbc4cad81c9d72ef4019856e32cc5b1ae7c684d3082385599748d |
iptables-ipv6-1.2.11-3.2.RHEL4.s390.rpm | SHA-256: 0b55ba21911a3eab5cefaf41ea1682a71dc9ccf4ae0d904257f71762400ceca8 |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
iptables-1.2.11-3.2.RHEL4.src.rpm | SHA-256: 25804bb5c7ed2e73ed4904dfe1136cc5958d43d6eada3597790c183283cec398 |
ppc | |
iptables-1.2.11-3.2.RHEL4.ppc64.rpm | SHA-256: 2fab3b248fee9180a52d6a8073876b4b206d2296b668e3e4dcc19cfc04a85a57 |
iptables-devel-1.2.11-3.2.RHEL4.ppc64.rpm | SHA-256: 7e7b8fef215e51c0aa46eb6ef830306a2f506832092a42f99bfa80603888522b |
iptables-ipv6-1.2.11-3.2.RHEL4.ppc64.rpm | SHA-256: 6c6f71b1cd3e3e0b31dc94afc6df5683ae08fb90e3da910ff600c614c8f64ed9 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.