Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2009:1539 - Bug Fix Advisory
Issued:
2009-11-02
Updated:
2009-11-02

RHBA-2009:1539 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

iptables bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated iptables packages that fix a bug are now available.

Description

The iptables utility controls the network packet filtering code in the
Linux kernel.

These updated packages fix the following bug:

  • the memory alignment of ipt_connlimit_data was incorrect on x86-based

systems. This update adds an explicit aligned attribute to the
ipt_connlimit_data struct to correct this. (BZ#529687)

Users are advised to upgrade to these updated iptables packages, which
resolve this issue.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.4 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.4 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 529687 - ip_tables: connlimit match: invalid size 24 != 16

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
iptables-1.3.5-5.3.el5_4.1.src.rpm SHA-256: 602c84986a3fe2c7395558651b08b86479c258b2ed52a16f08fa105e8225d16e
x86_64
iptables-1.3.5-5.3.el5_4.1.x86_64.rpm SHA-256: 2a1ae30343bbc41325b82642a22bb621d03552663de07129a476d9630d9c0365
iptables-devel-1.3.5-5.3.el5_4.1.i386.rpm SHA-256: 669ba90052ae2bf0f35f43a88ad2773f68fdbcdb8d26f1a2d1fdd0889d015a56
iptables-devel-1.3.5-5.3.el5_4.1.x86_64.rpm SHA-256: 4d0661cda50aa3e46784b77b385a044eed73fb8f70a7a18c2bfc04d568ac5850
iptables-ipv6-1.3.5-5.3.el5_4.1.x86_64.rpm SHA-256: df248b90c8162edbb5e4a35e48822ff922c54ad991ac2b2573df6152e5d8bdf7
ia64
iptables-1.3.5-5.3.el5_4.1.ia64.rpm SHA-256: 09562958da4bdd1a4d2b79ac85ce505516f03191e01ef66cffd7c3a59fb2804a
iptables-devel-1.3.5-5.3.el5_4.1.ia64.rpm SHA-256: ef073f2df4acc3588087775d64f4368460f8e5b3308c92bd25273d48e07eed06
iptables-ipv6-1.3.5-5.3.el5_4.1.ia64.rpm SHA-256: 12c9964935b0354c64c4492b330ede63e8239c1de04413b3f42bad6ddb128997
i386
iptables-1.3.5-5.3.el5_4.1.i386.rpm SHA-256: 93b1564b72e5678f0c139e0d1787e7286b02420afc887eb46f1ed11d463f1a33
iptables-devel-1.3.5-5.3.el5_4.1.i386.rpm SHA-256: 669ba90052ae2bf0f35f43a88ad2773f68fdbcdb8d26f1a2d1fdd0889d015a56
iptables-ipv6-1.3.5-5.3.el5_4.1.i386.rpm SHA-256: 360031d41d471a36496deb0aeba1fcb4f4d7aab8424bcbf055c5d07742767e5e

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Workstation 5

SRPM
iptables-1.3.5-5.3.el5_4.1.src.rpm SHA-256: 602c84986a3fe2c7395558651b08b86479c258b2ed52a16f08fa105e8225d16e
x86_64
iptables-1.3.5-5.3.el5_4.1.x86_64.rpm SHA-256: 2a1ae30343bbc41325b82642a22bb621d03552663de07129a476d9630d9c0365
iptables-devel-1.3.5-5.3.el5_4.1.i386.rpm SHA-256: 669ba90052ae2bf0f35f43a88ad2773f68fdbcdb8d26f1a2d1fdd0889d015a56
iptables-devel-1.3.5-5.3.el5_4.1.x86_64.rpm SHA-256: 4d0661cda50aa3e46784b77b385a044eed73fb8f70a7a18c2bfc04d568ac5850
iptables-ipv6-1.3.5-5.3.el5_4.1.x86_64.rpm SHA-256: df248b90c8162edbb5e4a35e48822ff922c54ad991ac2b2573df6152e5d8bdf7
i386
iptables-1.3.5-5.3.el5_4.1.i386.rpm SHA-256: 93b1564b72e5678f0c139e0d1787e7286b02420afc887eb46f1ed11d463f1a33
iptables-devel-1.3.5-5.3.el5_4.1.i386.rpm SHA-256: 669ba90052ae2bf0f35f43a88ad2773f68fdbcdb8d26f1a2d1fdd0889d015a56
iptables-ipv6-1.3.5-5.3.el5_4.1.i386.rpm SHA-256: 360031d41d471a36496deb0aeba1fcb4f4d7aab8424bcbf055c5d07742767e5e

Red Hat Enterprise Linux Desktop 5

SRPM
iptables-1.3.5-5.3.el5_4.1.src.rpm SHA-256: 602c84986a3fe2c7395558651b08b86479c258b2ed52a16f08fa105e8225d16e
x86_64
iptables-1.3.5-5.3.el5_4.1.x86_64.rpm SHA-256: 2a1ae30343bbc41325b82642a22bb621d03552663de07129a476d9630d9c0365
iptables-ipv6-1.3.5-5.3.el5_4.1.x86_64.rpm SHA-256: df248b90c8162edbb5e4a35e48822ff922c54ad991ac2b2573df6152e5d8bdf7
i386
iptables-1.3.5-5.3.el5_4.1.i386.rpm SHA-256: 93b1564b72e5678f0c139e0d1787e7286b02420afc887eb46f1ed11d463f1a33
iptables-ipv6-1.3.5-5.3.el5_4.1.i386.rpm SHA-256: 360031d41d471a36496deb0aeba1fcb4f4d7aab8424bcbf055c5d07742767e5e

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
iptables-1.3.5-5.3.el5_4.1.src.rpm SHA-256: 602c84986a3fe2c7395558651b08b86479c258b2ed52a16f08fa105e8225d16e
s390x
iptables-1.3.5-5.3.el5_4.1.s390x.rpm SHA-256: 1c06556fff8d312d79e7a9c7bd17393dcc6e83b94c0fd9974bd5de5e6318cd0c
iptables-devel-1.3.5-5.3.el5_4.1.s390.rpm SHA-256: f2effe3e2cee3c191dabe89022193ecbd631913b9f84f5c708e429da39ef6539
iptables-devel-1.3.5-5.3.el5_4.1.s390x.rpm SHA-256: fce329a6a253a9cc6a688530e495d83ac69a16b71c2c45cd5292a8e6919b0ca8
iptables-ipv6-1.3.5-5.3.el5_4.1.s390x.rpm SHA-256: cb52a2b3f0f4c2dfc994e4ddaa47974f02d1dda636b95ceb25a0b4caec2f8d1a

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.4

SRPM
s390x

Red Hat Enterprise Linux for Power, big endian 5

SRPM
iptables-1.3.5-5.3.el5_4.1.src.rpm SHA-256: 602c84986a3fe2c7395558651b08b86479c258b2ed52a16f08fa105e8225d16e
ppc
iptables-1.3.5-5.3.el5_4.1.ppc.rpm SHA-256: 3d8e97b5b59efb193867ff06007feb0bdf5ca83ca315db47329b59a14b9ef339
iptables-1.3.5-5.3.el5_4.1.ppc64.rpm SHA-256: c7c4f6a9cd496e0ed30fd3e9a4a983e6364523ae07b3a0c475957f0d0ff296bc
iptables-devel-1.3.5-5.3.el5_4.1.ppc.rpm SHA-256: 64d30857d52bb950210060ff9e8b704afac7dc25ce79b6b65f162bd4f747f4fa
iptables-devel-1.3.5-5.3.el5_4.1.ppc64.rpm SHA-256: 751303cdc0a29caa02a00d5aa74945dd755139c489c7642128159751e1362b4f
iptables-ipv6-1.3.5-5.3.el5_4.1.ppc.rpm SHA-256: 3ab995302f5ed5196a0c5242e1391ba6fceb159bb43da00a5548e44d72bb8256
iptables-ipv6-1.3.5-5.3.el5_4.1.ppc64.rpm SHA-256: 2c81090d9db4df336b07d7a8bf7e9420be3254f0fc68d279d01d7572fbe066f4

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.4

SRPM
ppc

Red Hat Enterprise Linux Server from RHUI 5

SRPM
iptables-1.3.5-5.3.el5_4.1.src.rpm SHA-256: 602c84986a3fe2c7395558651b08b86479c258b2ed52a16f08fa105e8225d16e
x86_64
iptables-1.3.5-5.3.el5_4.1.x86_64.rpm SHA-256: 2a1ae30343bbc41325b82642a22bb621d03552663de07129a476d9630d9c0365
iptables-devel-1.3.5-5.3.el5_4.1.i386.rpm SHA-256: 669ba90052ae2bf0f35f43a88ad2773f68fdbcdb8d26f1a2d1fdd0889d015a56
iptables-devel-1.3.5-5.3.el5_4.1.x86_64.rpm SHA-256: 4d0661cda50aa3e46784b77b385a044eed73fb8f70a7a18c2bfc04d568ac5850
iptables-ipv6-1.3.5-5.3.el5_4.1.x86_64.rpm SHA-256: df248b90c8162edbb5e4a35e48822ff922c54ad991ac2b2573df6152e5d8bdf7
i386
iptables-1.3.5-5.3.el5_4.1.i386.rpm SHA-256: 93b1564b72e5678f0c139e0d1787e7286b02420afc887eb46f1ed11d463f1a33
iptables-devel-1.3.5-5.3.el5_4.1.i386.rpm SHA-256: 669ba90052ae2bf0f35f43a88ad2773f68fdbcdb8d26f1a2d1fdd0889d015a56
iptables-ipv6-1.3.5-5.3.el5_4.1.i386.rpm SHA-256: 360031d41d471a36496deb0aeba1fcb4f4d7aab8424bcbf055c5d07742767e5e

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility