Skip to navigation

Bug Fix Advisory iptables bug fix update

Advisory: RHBA-2009:1539-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2009-11-02
Last updated on: 2009-11-02
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux EUS (v. 5.4.z server)

Details

Updated iptables packages that fix a bug are now available.

The iptables utility controls the network packet filtering code in the
Linux kernel.

These updated packages fix the following bug:

* the memory alignment of ipt_connlimit_data was incorrect on x86-based
systems. This update adds an explicit aligned attribute to the
ipt_connlimit_data struct to correct this. (BZ#529687)

Users are advised to upgrade to these updated iptables packages, which
resolve this issue.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
iptables-1.3.5-5.3.el5_4.1.src.rpm
File outdated by:  RHEA-2012:1415
    MD5: 4f04b0c74d022c535b03af7a08dfbb31
 
IA-32:
iptables-devel-1.3.5-5.3.el5_4.1.i386.rpm
File outdated by:  RHEA-2012:1415
    MD5: 9a1ad31711c853d0b781e863f9e3310f
 
x86_64:
iptables-devel-1.3.5-5.3.el5_4.1.i386.rpm
File outdated by:  RHEA-2012:1415
    MD5: 9a1ad31711c853d0b781e863f9e3310f
iptables-devel-1.3.5-5.3.el5_4.1.x86_64.rpm
File outdated by:  RHEA-2012:1415
    MD5: a5bf72254fb08df62cf631c3e4b05a01
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
iptables-1.3.5-5.3.el5_4.1.src.rpm
File outdated by:  RHEA-2012:1415
    MD5: 4f04b0c74d022c535b03af7a08dfbb31
 
IA-32:
iptables-1.3.5-5.3.el5_4.1.i386.rpm
File outdated by:  RHEA-2012:1415
    MD5: bdbadf216b3209cb2e9536621ffdf5a3
iptables-devel-1.3.5-5.3.el5_4.1.i386.rpm
File outdated by:  RHEA-2012:1415
    MD5: 9a1ad31711c853d0b781e863f9e3310f
iptables-ipv6-1.3.5-5.3.el5_4.1.i386.rpm
File outdated by:  RHEA-2012:1415
    MD5: 493ba6273a5796a9a1898934afd6ee73
 
IA-64:
iptables-1.3.5-5.3.el5_4.1.ia64.rpm
File outdated by:  RHEA-2012:1415
    MD5: 5562ea44d2724b5a3003433ff25754d3
iptables-devel-1.3.5-5.3.el5_4.1.ia64.rpm
File outdated by:  RHEA-2012:1415
    MD5: d89aeac5c32a4ef767134cf1e540f20a
iptables-ipv6-1.3.5-5.3.el5_4.1.ia64.rpm
File outdated by:  RHEA-2012:1415
    MD5: dc20b87f238d3df6adbd696e54ed4a6c
 
PPC:
iptables-1.3.5-5.3.el5_4.1.ppc.rpm
File outdated by:  RHEA-2012:1415
    MD5: fddebc7b598c5e22c9be6225f436bf68
iptables-1.3.5-5.3.el5_4.1.ppc64.rpm
File outdated by:  RHEA-2012:1415
    MD5: 13ab89ff34a56cd1ba3a5577f825c1d8
iptables-devel-1.3.5-5.3.el5_4.1.ppc.rpm
File outdated by:  RHEA-2012:1415
    MD5: 35b6adaa91d2b6e339398b9adc9608fc
iptables-devel-1.3.5-5.3.el5_4.1.ppc64.rpm
File outdated by:  RHEA-2012:1415
    MD5: b15d2021fe025fad692f3fac43032a30
iptables-ipv6-1.3.5-5.3.el5_4.1.ppc.rpm
File outdated by:  RHEA-2012:1415
    MD5: 74476658991efbcff8c577947d65c18f
iptables-ipv6-1.3.5-5.3.el5_4.1.ppc64.rpm
File outdated by:  RHEA-2012:1415
    MD5: 9d0b3f5ba366b5c1b88fec1f621d14cb
 
s390x:
iptables-1.3.5-5.3.el5_4.1.s390x.rpm
File outdated by:  RHEA-2012:1415
    MD5: b31c158cc59cb78b8c7f3d02b24d41e5
iptables-devel-1.3.5-5.3.el5_4.1.s390.rpm
File outdated by:  RHEA-2012:1415
    MD5: c45c1de7663817280befe32d03023cf0
iptables-devel-1.3.5-5.3.el5_4.1.s390x.rpm
File outdated by:  RHEA-2012:1415
    MD5: 53aaec04851f6ccf4c655b50baa82190
iptables-ipv6-1.3.5-5.3.el5_4.1.s390x.rpm
File outdated by:  RHEA-2012:1415
    MD5: 5b99a0dba05b70c83f2f5b83f6bda86c
 
x86_64:
iptables-1.3.5-5.3.el5_4.1.x86_64.rpm
File outdated by:  RHEA-2012:1415
    MD5: 0a156d03da541920da8581b8187a9033
iptables-devel-1.3.5-5.3.el5_4.1.i386.rpm
File outdated by:  RHEA-2012:1415
    MD5: 9a1ad31711c853d0b781e863f9e3310f
iptables-devel-1.3.5-5.3.el5_4.1.x86_64.rpm
File outdated by:  RHEA-2012:1415
    MD5: a5bf72254fb08df62cf631c3e4b05a01
iptables-ipv6-1.3.5-5.3.el5_4.1.x86_64.rpm
File outdated by:  RHEA-2012:1415
    MD5: 9cec0416385eea669ba40b1aeca35e7b
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
iptables-1.3.5-5.3.el5_4.1.src.rpm
File outdated by:  RHEA-2012:1415
    MD5: 4f04b0c74d022c535b03af7a08dfbb31
 
IA-32:
iptables-1.3.5-5.3.el5_4.1.i386.rpm
File outdated by:  RHEA-2012:1415
    MD5: bdbadf216b3209cb2e9536621ffdf5a3
iptables-ipv6-1.3.5-5.3.el5_4.1.i386.rpm
File outdated by:  RHEA-2012:1415
    MD5: 493ba6273a5796a9a1898934afd6ee73
 
x86_64:
iptables-1.3.5-5.3.el5_4.1.x86_64.rpm
File outdated by:  RHEA-2012:1415
    MD5: 0a156d03da541920da8581b8187a9033
iptables-ipv6-1.3.5-5.3.el5_4.1.x86_64.rpm
File outdated by:  RHEA-2012:1415
    MD5: 9cec0416385eea669ba40b1aeca35e7b
 
Red Hat Enterprise Linux EUS (v. 5.4.z server)

SRPMS:
iptables-1.3.5-5.3.el5_4.1.src.rpm
File outdated by:  RHEA-2012:1415
    MD5: 4f04b0c74d022c535b03af7a08dfbb31
 
IA-32:
iptables-1.3.5-5.3.el5_4.1.i386.rpm     MD5: bdbadf216b3209cb2e9536621ffdf5a3
iptables-devel-1.3.5-5.3.el5_4.1.i386.rpm     MD5: 9a1ad31711c853d0b781e863f9e3310f
iptables-ipv6-1.3.5-5.3.el5_4.1.i386.rpm     MD5: 493ba6273a5796a9a1898934afd6ee73
 
IA-64:
iptables-1.3.5-5.3.el5_4.1.ia64.rpm     MD5: 5562ea44d2724b5a3003433ff25754d3
iptables-devel-1.3.5-5.3.el5_4.1.ia64.rpm     MD5: d89aeac5c32a4ef767134cf1e540f20a
iptables-ipv6-1.3.5-5.3.el5_4.1.ia64.rpm     MD5: dc20b87f238d3df6adbd696e54ed4a6c
 
PPC:
iptables-1.3.5-5.3.el5_4.1.ppc.rpm     MD5: fddebc7b598c5e22c9be6225f436bf68
iptables-1.3.5-5.3.el5_4.1.ppc64.rpm     MD5: 13ab89ff34a56cd1ba3a5577f825c1d8
iptables-devel-1.3.5-5.3.el5_4.1.ppc.rpm     MD5: 35b6adaa91d2b6e339398b9adc9608fc
iptables-devel-1.3.5-5.3.el5_4.1.ppc64.rpm     MD5: b15d2021fe025fad692f3fac43032a30
iptables-ipv6-1.3.5-5.3.el5_4.1.ppc.rpm     MD5: 74476658991efbcff8c577947d65c18f
iptables-ipv6-1.3.5-5.3.el5_4.1.ppc64.rpm     MD5: 9d0b3f5ba366b5c1b88fec1f621d14cb
 
s390x:
iptables-1.3.5-5.3.el5_4.1.s390x.rpm     MD5: b31c158cc59cb78b8c7f3d02b24d41e5
iptables-devel-1.3.5-5.3.el5_4.1.s390.rpm     MD5: c45c1de7663817280befe32d03023cf0
iptables-devel-1.3.5-5.3.el5_4.1.s390x.rpm     MD5: 53aaec04851f6ccf4c655b50baa82190
iptables-ipv6-1.3.5-5.3.el5_4.1.s390x.rpm     MD5: 5b99a0dba05b70c83f2f5b83f6bda86c
 
x86_64:
iptables-1.3.5-5.3.el5_4.1.x86_64.rpm     MD5: 0a156d03da541920da8581b8187a9033
iptables-devel-1.3.5-5.3.el5_4.1.i386.rpm     MD5: 9a1ad31711c853d0b781e863f9e3310f
iptables-devel-1.3.5-5.3.el5_4.1.x86_64.rpm     MD5: a5bf72254fb08df62cf631c3e4b05a01
iptables-ipv6-1.3.5-5.3.el5_4.1.x86_64.rpm     MD5: 9cec0416385eea669ba40b1aeca35e7b
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

529687 - ip_tables: connlimit match: invalid size 24 != 16



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/