Skip to navigation

Enhancement Advisory iptables enhancement update

Advisory: RHEA-2012:1415-1
Type: Product Enhancement Advisory
Severity: N/A
Issued on: 2012-10-30
Last updated on: 2012-10-30
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated iptables packages that add an enhancement are now available for Red Hat
Enterprise Linux 5.

The iptables utility controls the network packet filtering code in the Linux
kernel.

This update adds the following enhancement:

* A new iptables module has been added that allows to configure the
Differentiated Services Code Point (DSCP) match extension for the IPv6 protocol.
(BZ#847729)

Users are advised to upgrade to these updated iptables packages, which add this
enhancement.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
iptables-1.3.5-9.2.el5_8.src.rpm     MD5: ce9db777527de6a73466b7716c5b4dcc
SHA-256: 0eefbfc8f44f3f958898e80ec1ab6133919d617424595682e9e69015ab4a5568
 
IA-32:
iptables-debuginfo-1.3.5-9.2.el5_8.i386.rpm     MD5: 066eb9e4eeaa6851b34d63acde7a1dd3
SHA-256: 925a9935e358a9798377ae7d779a7edf7a0f4bf202f54563d61e861f8a4f99bc
iptables-devel-1.3.5-9.2.el5_8.i386.rpm     MD5: e692a9d37162f5080ef5cb4823fa32bf
SHA-256: 7b69e813efc2736bce5eb115d5532ebc1664b653461e2af692d42293ee40b5bb
 
x86_64:
iptables-debuginfo-1.3.5-9.2.el5_8.i386.rpm     MD5: 066eb9e4eeaa6851b34d63acde7a1dd3
SHA-256: 925a9935e358a9798377ae7d779a7edf7a0f4bf202f54563d61e861f8a4f99bc
iptables-debuginfo-1.3.5-9.2.el5_8.x86_64.rpm     MD5: fef72ec3ecfbd678f50220854d724b7a
SHA-256: d7a6d6b177201233b5c48f10544e100dd955a242aebee2fcb9f4dae8b0591dc7
iptables-devel-1.3.5-9.2.el5_8.i386.rpm     MD5: e692a9d37162f5080ef5cb4823fa32bf
SHA-256: 7b69e813efc2736bce5eb115d5532ebc1664b653461e2af692d42293ee40b5bb
iptables-devel-1.3.5-9.2.el5_8.x86_64.rpm     MD5: 68f03eaf3890e7e7fe2515efbdd035b7
SHA-256: fe637bbd4fd3073b42b4b13b171ec5b2f389dae2126c675a174610b4362744d0
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
iptables-1.3.5-9.2.el5_8.src.rpm     MD5: ce9db777527de6a73466b7716c5b4dcc
SHA-256: 0eefbfc8f44f3f958898e80ec1ab6133919d617424595682e9e69015ab4a5568
 
IA-32:
iptables-1.3.5-9.2.el5_8.i386.rpm     MD5: e10fcbc6f7f1c799f582b238425211fa
SHA-256: 281f3571ccca9e786907c279898ba823de274893a9c30fa7860ef7e3942b221a
iptables-debuginfo-1.3.5-9.2.el5_8.i386.rpm     MD5: 066eb9e4eeaa6851b34d63acde7a1dd3
SHA-256: 925a9935e358a9798377ae7d779a7edf7a0f4bf202f54563d61e861f8a4f99bc
iptables-devel-1.3.5-9.2.el5_8.i386.rpm     MD5: e692a9d37162f5080ef5cb4823fa32bf
SHA-256: 7b69e813efc2736bce5eb115d5532ebc1664b653461e2af692d42293ee40b5bb
iptables-ipv6-1.3.5-9.2.el5_8.i386.rpm     MD5: 74b5a1e236b850de6f785a65b2c47175
SHA-256: cbd4f0b570cd3c61fe13e56d451b8092c5a65e5ad9f8e68e4f5d25adc413a2d9
 
IA-64:
iptables-1.3.5-9.2.el5_8.ia64.rpm     MD5: 89984ee40f885c7b481bc8c372afd9b2
SHA-256: d13efaf2c327e3f7bae397f7737a8d0c3fa1c2412610a5db46e5c6fb89679c24
iptables-debuginfo-1.3.5-9.2.el5_8.ia64.rpm     MD5: b60f5777a0647777b750cfd180b904cb
SHA-256: ef2b24679b6ac6811d4facb86b261dc55e2ea691bed413d99b8dabbf7a87ca67
iptables-devel-1.3.5-9.2.el5_8.ia64.rpm     MD5: adab7acbf8fadb2873094b2c8fe2fad5
SHA-256: 8557f00d17b5ef9cea34749e82bc673d20d5656aa12df5ef9c5b640713cf2442
iptables-ipv6-1.3.5-9.2.el5_8.ia64.rpm     MD5: d3c0e90d76d9a252ca3c8b7a1a072baf
SHA-256: 8af6c666faf7d3dbceb8b88567b7693e7adcf99671427afe1452b923d4a624d6
 
PPC:
iptables-1.3.5-9.2.el5_8.ppc.rpm     MD5: 65b753f6a7a05508022a5d86bb88b40b
SHA-256: eef4332f278a0262dfecf4584f37ef244e2f1b4162e3e6f60677eee71d346e79
iptables-1.3.5-9.2.el5_8.ppc64.rpm     MD5: bb641df0fca11b012008f5f23a720246
SHA-256: 55bd7080d3c29f1438c5218bd549436887922fad11ae94a7eaf961950a8a6edb
iptables-debuginfo-1.3.5-9.2.el5_8.ppc.rpm     MD5: 90baef7babff117b085af2466df0d706
SHA-256: c3d32cd772364745ffb5c302f6b1b91d48be3de692998e695275167542572bb8
iptables-debuginfo-1.3.5-9.2.el5_8.ppc64.rpm     MD5: 4c856b6cb7d5f0fad6ba86cd596bdbff
SHA-256: 228daeea8d72b9be987f16bed5e370b40fd68b92fc269b5392190213ca9cb0f5
iptables-devel-1.3.5-9.2.el5_8.ppc.rpm     MD5: 1d31259418f9002ce2f7b4c07649ab54
SHA-256: 3b03161a3432ac1e9e3306fcb2a7f6ab5346bbe8f9f7a3479e18b563bf174969
iptables-devel-1.3.5-9.2.el5_8.ppc64.rpm     MD5: 94f1116e26c078a607fb43ef44f6c91c
SHA-256: 074a0e3b01463bda3c6e2d297eb16f22beae756706b7116a388102294ad800be
iptables-ipv6-1.3.5-9.2.el5_8.ppc.rpm     MD5: 6b32ae7d36b0a21f9432daf82b094f6a
SHA-256: e3363de50cc576a41c77777899275c6074378e8f91456db00b1534daee685aa6
iptables-ipv6-1.3.5-9.2.el5_8.ppc64.rpm     MD5: eccaa79996edc24d79a4f095da8c825c
SHA-256: 59c9f168144afc2211b4c0f33b38823772718d1546f800023186e686a5a21db1
 
s390x:
iptables-1.3.5-9.2.el5_8.s390x.rpm     MD5: e5c61424ff72ac810e939015eec2a69b
SHA-256: 3cd14b6c1290d0d68a57eb4f26d6228268d3dcce1a6633aed2a023df13abcf77
iptables-debuginfo-1.3.5-9.2.el5_8.s390.rpm     MD5: 547363c779b5e0b8cefe47535e37739c
SHA-256: 5f9b40e258586446b03b3a36371ec0da74ecd34a69b4f2e30b58dc92788262bf
iptables-debuginfo-1.3.5-9.2.el5_8.s390x.rpm     MD5: 9ecb7147a14e13d891cfd381bb7ebb15
SHA-256: 49d4eb7cf1b172a7bf76753f896be32e0e00ba339b75c69f64598d0c5099253d
iptables-devel-1.3.5-9.2.el5_8.s390.rpm     MD5: 002277ffe20ff1061505fb51987c0b28
SHA-256: 4924ba78a4d7318669aedb8ec144670fa7caba3d1ef15194dc75f7cf9d9cac39
iptables-devel-1.3.5-9.2.el5_8.s390x.rpm     MD5: 09473a74294f1966f1513617681ed172
SHA-256: c98d4a22d48bd09d436a2e4419bda2c320b4d76bb07cb831e987228472eeade9
iptables-ipv6-1.3.5-9.2.el5_8.s390x.rpm     MD5: ae769a0d98186b0ddcc449de4be13cf6
SHA-256: 40e5f06324f4aa1330c90d138ad3897ec5662d9f115e58c093d92e60aa436986
 
x86_64:
iptables-1.3.5-9.2.el5_8.x86_64.rpm     MD5: ebed0b811d8bec2ea2d320d41ded2d07
SHA-256: 5d1a3e36b49c08921afd1bb4285bae52a52b06f35f24779089e9d10413355c0c
iptables-debuginfo-1.3.5-9.2.el5_8.i386.rpm     MD5: 066eb9e4eeaa6851b34d63acde7a1dd3
SHA-256: 925a9935e358a9798377ae7d779a7edf7a0f4bf202f54563d61e861f8a4f99bc
iptables-debuginfo-1.3.5-9.2.el5_8.x86_64.rpm     MD5: fef72ec3ecfbd678f50220854d724b7a
SHA-256: d7a6d6b177201233b5c48f10544e100dd955a242aebee2fcb9f4dae8b0591dc7
iptables-devel-1.3.5-9.2.el5_8.i386.rpm     MD5: e692a9d37162f5080ef5cb4823fa32bf
SHA-256: 7b69e813efc2736bce5eb115d5532ebc1664b653461e2af692d42293ee40b5bb
iptables-devel-1.3.5-9.2.el5_8.x86_64.rpm     MD5: 68f03eaf3890e7e7fe2515efbdd035b7
SHA-256: fe637bbd4fd3073b42b4b13b171ec5b2f389dae2126c675a174610b4362744d0
iptables-ipv6-1.3.5-9.2.el5_8.x86_64.rpm     MD5: f5e8bd3be4af19b6cdf945050d919e1d
SHA-256: fd380a1b1ac8d5398945205a3c42e4f47a8df930d38361a1b9003c2324688dc6
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
iptables-1.3.5-9.2.el5_8.src.rpm     MD5: ce9db777527de6a73466b7716c5b4dcc
SHA-256: 0eefbfc8f44f3f958898e80ec1ab6133919d617424595682e9e69015ab4a5568
 
IA-32:
iptables-1.3.5-9.2.el5_8.i386.rpm     MD5: e10fcbc6f7f1c799f582b238425211fa
SHA-256: 281f3571ccca9e786907c279898ba823de274893a9c30fa7860ef7e3942b221a
iptables-debuginfo-1.3.5-9.2.el5_8.i386.rpm     MD5: 066eb9e4eeaa6851b34d63acde7a1dd3
SHA-256: 925a9935e358a9798377ae7d779a7edf7a0f4bf202f54563d61e861f8a4f99bc
iptables-ipv6-1.3.5-9.2.el5_8.i386.rpm     MD5: 74b5a1e236b850de6f785a65b2c47175
SHA-256: cbd4f0b570cd3c61fe13e56d451b8092c5a65e5ad9f8e68e4f5d25adc413a2d9
 
x86_64:
iptables-1.3.5-9.2.el5_8.x86_64.rpm     MD5: ebed0b811d8bec2ea2d320d41ded2d07
SHA-256: 5d1a3e36b49c08921afd1bb4285bae52a52b06f35f24779089e9d10413355c0c
iptables-debuginfo-1.3.5-9.2.el5_8.x86_64.rpm     MD5: fef72ec3ecfbd678f50220854d724b7a
SHA-256: d7a6d6b177201233b5c48f10544e100dd955a242aebee2fcb9f4dae8b0591dc7
iptables-ipv6-1.3.5-9.2.el5_8.x86_64.rpm     MD5: f5e8bd3be4af19b6cdf945050d919e1d
SHA-256: fd380a1b1ac8d5398945205a3c42e4f47a8df930d38361a1b9003c2324688dc6
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/