Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2011:0557 - Bug Fix Advisory
Issued:
2011-05-18
Updated:
2011-05-18

RHBA-2011:0557 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

iptables bug fix and enhancement update

Type/Severity

Bug Fix Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated iptables packages that fix two bugs and add one enhancement are now
available for Red Hat Enterprise Linux 6.

Description

The iptables utility controls the network packet filtering code in the Linux
kernel.

This update fixes the following bugs:

  • Previously, ip6tables did not support Portable Transparent Proxy Solution

(TPROXY). Due to this lack, the IPv6 transparent proxy support was missing and
IPv6 transparency was not available. This update adds this option. (BZ#590186)

  • Previously, the command "service iptables save" did not restore the context

for the save file and the save backup file. It also used /tmp for the temporary
file. Due to the wrong context of the save and save backup file, there could be
an error the next time the save functionality is used. This update restores the
context and also saves the temporary files correctly. (BZ#644273)

This update adds also the following enhancement:

  • Previously, iptables did not support auditing. Due to this issue, information

for remote address/port, target address/port, protocol, and result
(success/fail) could not be recorded as an audit event. This update adds the
required audit support. This enhancement depends on the presence of auditing
support in the kernel. (BZ#642393)

All iptables users are advised to upgrade to these updated packages, which fix
these bugs and add this enhancement.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for IBM z Systems 6 s390x
  • Red Hat Enterprise Linux for Power, big endian 6 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x

Fixes

  • BZ - 590186 - Contrary to expectations IPv6 transparent proxy support is missing in RHEL 6 Beta.
  • BZ - 644273 - Restore context in "service iptables save" and use /etc/sysconfig for temporary file

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
iptables-1.4.7-4.el6.src.rpm SHA-256: c6a5152bb51f26fb74adf9c1cffe5a552718ceb1f78b3ac70899342aa974ca5d
x86_64
iptables-1.4.7-4.el6.i686.rpm SHA-256: d956084192234c0fef20558442060c15fd7a81e85953b895fe4e21b49f19e60f
iptables-1.4.7-4.el6.i686.rpm SHA-256: d956084192234c0fef20558442060c15fd7a81e85953b895fe4e21b49f19e60f
iptables-1.4.7-4.el6.x86_64.rpm SHA-256: 31ae93827631820aef3ff3b65c4fb27ef60ce136bbc05ff1b6e5d67c3e159bf8
iptables-1.4.7-4.el6.x86_64.rpm SHA-256: 31ae93827631820aef3ff3b65c4fb27ef60ce136bbc05ff1b6e5d67c3e159bf8
iptables-debuginfo-1.4.7-4.el6.i686.rpm SHA-256: 5ddebfaf83a58bd38f053304e359c0bdd31aad3350fd58fd8010f2c5e660265a
iptables-debuginfo-1.4.7-4.el6.i686.rpm SHA-256: 5ddebfaf83a58bd38f053304e359c0bdd31aad3350fd58fd8010f2c5e660265a
iptables-debuginfo-1.4.7-4.el6.x86_64.rpm SHA-256: 3d8179ed321c616450fa7eb46825c26c031ef0ec3247bb37df200c64b54eaff2
iptables-debuginfo-1.4.7-4.el6.x86_64.rpm SHA-256: 3d8179ed321c616450fa7eb46825c26c031ef0ec3247bb37df200c64b54eaff2
iptables-devel-1.4.7-4.el6.i686.rpm SHA-256: 074b27225c9f95f1f522f5c763f8e963aca00a46298473ac89e016c65065d5e3
iptables-devel-1.4.7-4.el6.i686.rpm SHA-256: 074b27225c9f95f1f522f5c763f8e963aca00a46298473ac89e016c65065d5e3
iptables-devel-1.4.7-4.el6.x86_64.rpm SHA-256: 5a8d00986db72efd992bfcd95ee440c5f597af5c9af99be3a17bc7546f3c7337
iptables-devel-1.4.7-4.el6.x86_64.rpm SHA-256: 5a8d00986db72efd992bfcd95ee440c5f597af5c9af99be3a17bc7546f3c7337
iptables-ipv6-1.4.7-4.el6.x86_64.rpm SHA-256: 2c502cd7064713b62a04931f1774172f4f892e6cd7227a3388d913d93cff995e
iptables-ipv6-1.4.7-4.el6.x86_64.rpm SHA-256: 2c502cd7064713b62a04931f1774172f4f892e6cd7227a3388d913d93cff995e
i386
iptables-1.4.7-4.el6.i686.rpm SHA-256: d956084192234c0fef20558442060c15fd7a81e85953b895fe4e21b49f19e60f
iptables-debuginfo-1.4.7-4.el6.i686.rpm SHA-256: 5ddebfaf83a58bd38f053304e359c0bdd31aad3350fd58fd8010f2c5e660265a
iptables-devel-1.4.7-4.el6.i686.rpm SHA-256: 074b27225c9f95f1f522f5c763f8e963aca00a46298473ac89e016c65065d5e3
iptables-ipv6-1.4.7-4.el6.i686.rpm SHA-256: eb3ea8d58cba7bab1720099403b4daae692b2b21d0be2e13a3a788dc6bedf91b

Red Hat Enterprise Linux Server - Extended Life Cycle Support 6

SRPM
iptables-1.4.7-4.el6.src.rpm SHA-256: c6a5152bb51f26fb74adf9c1cffe5a552718ceb1f78b3ac70899342aa974ca5d
x86_64
iptables-1.4.7-4.el6.i686.rpm SHA-256: d956084192234c0fef20558442060c15fd7a81e85953b895fe4e21b49f19e60f
iptables-1.4.7-4.el6.x86_64.rpm SHA-256: 31ae93827631820aef3ff3b65c4fb27ef60ce136bbc05ff1b6e5d67c3e159bf8
iptables-debuginfo-1.4.7-4.el6.i686.rpm SHA-256: 5ddebfaf83a58bd38f053304e359c0bdd31aad3350fd58fd8010f2c5e660265a
iptables-debuginfo-1.4.7-4.el6.x86_64.rpm SHA-256: 3d8179ed321c616450fa7eb46825c26c031ef0ec3247bb37df200c64b54eaff2
iptables-devel-1.4.7-4.el6.i686.rpm SHA-256: 074b27225c9f95f1f522f5c763f8e963aca00a46298473ac89e016c65065d5e3
iptables-devel-1.4.7-4.el6.x86_64.rpm SHA-256: 5a8d00986db72efd992bfcd95ee440c5f597af5c9af99be3a17bc7546f3c7337
iptables-ipv6-1.4.7-4.el6.x86_64.rpm SHA-256: 2c502cd7064713b62a04931f1774172f4f892e6cd7227a3388d913d93cff995e
i386
iptables-1.4.7-4.el6.i686.rpm SHA-256: d956084192234c0fef20558442060c15fd7a81e85953b895fe4e21b49f19e60f
iptables-debuginfo-1.4.7-4.el6.i686.rpm SHA-256: 5ddebfaf83a58bd38f053304e359c0bdd31aad3350fd58fd8010f2c5e660265a
iptables-devel-1.4.7-4.el6.i686.rpm SHA-256: 074b27225c9f95f1f522f5c763f8e963aca00a46298473ac89e016c65065d5e3
iptables-ipv6-1.4.7-4.el6.i686.rpm SHA-256: eb3ea8d58cba7bab1720099403b4daae692b2b21d0be2e13a3a788dc6bedf91b

Red Hat Enterprise Linux Workstation 6

SRPM
iptables-1.4.7-4.el6.src.rpm SHA-256: c6a5152bb51f26fb74adf9c1cffe5a552718ceb1f78b3ac70899342aa974ca5d
x86_64
iptables-1.4.7-4.el6.i686.rpm SHA-256: d956084192234c0fef20558442060c15fd7a81e85953b895fe4e21b49f19e60f
iptables-1.4.7-4.el6.x86_64.rpm SHA-256: 31ae93827631820aef3ff3b65c4fb27ef60ce136bbc05ff1b6e5d67c3e159bf8
iptables-debuginfo-1.4.7-4.el6.i686.rpm SHA-256: 5ddebfaf83a58bd38f053304e359c0bdd31aad3350fd58fd8010f2c5e660265a
iptables-debuginfo-1.4.7-4.el6.x86_64.rpm SHA-256: 3d8179ed321c616450fa7eb46825c26c031ef0ec3247bb37df200c64b54eaff2
iptables-devel-1.4.7-4.el6.i686.rpm SHA-256: 074b27225c9f95f1f522f5c763f8e963aca00a46298473ac89e016c65065d5e3
iptables-devel-1.4.7-4.el6.x86_64.rpm SHA-256: 5a8d00986db72efd992bfcd95ee440c5f597af5c9af99be3a17bc7546f3c7337
iptables-ipv6-1.4.7-4.el6.x86_64.rpm SHA-256: 2c502cd7064713b62a04931f1774172f4f892e6cd7227a3388d913d93cff995e
i386
iptables-1.4.7-4.el6.i686.rpm SHA-256: d956084192234c0fef20558442060c15fd7a81e85953b895fe4e21b49f19e60f
iptables-debuginfo-1.4.7-4.el6.i686.rpm SHA-256: 5ddebfaf83a58bd38f053304e359c0bdd31aad3350fd58fd8010f2c5e660265a
iptables-devel-1.4.7-4.el6.i686.rpm SHA-256: 074b27225c9f95f1f522f5c763f8e963aca00a46298473ac89e016c65065d5e3
iptables-ipv6-1.4.7-4.el6.i686.rpm SHA-256: eb3ea8d58cba7bab1720099403b4daae692b2b21d0be2e13a3a788dc6bedf91b

Red Hat Enterprise Linux Desktop 6

SRPM
iptables-1.4.7-4.el6.src.rpm SHA-256: c6a5152bb51f26fb74adf9c1cffe5a552718ceb1f78b3ac70899342aa974ca5d
i386
iptables-1.4.7-4.el6.i686.rpm SHA-256: d956084192234c0fef20558442060c15fd7a81e85953b895fe4e21b49f19e60f
iptables-debuginfo-1.4.7-4.el6.i686.rpm SHA-256: 5ddebfaf83a58bd38f053304e359c0bdd31aad3350fd58fd8010f2c5e660265a
iptables-debuginfo-1.4.7-4.el6.i686.rpm SHA-256: 5ddebfaf83a58bd38f053304e359c0bdd31aad3350fd58fd8010f2c5e660265a
iptables-devel-1.4.7-4.el6.i686.rpm SHA-256: 074b27225c9f95f1f522f5c763f8e963aca00a46298473ac89e016c65065d5e3
iptables-ipv6-1.4.7-4.el6.i686.rpm SHA-256: eb3ea8d58cba7bab1720099403b4daae692b2b21d0be2e13a3a788dc6bedf91b
x86_64
iptables-1.4.7-4.el6.i686.rpm SHA-256: d956084192234c0fef20558442060c15fd7a81e85953b895fe4e21b49f19e60f
iptables-1.4.7-4.el6.x86_64.rpm SHA-256: 31ae93827631820aef3ff3b65c4fb27ef60ce136bbc05ff1b6e5d67c3e159bf8
iptables-debuginfo-1.4.7-4.el6.i686.rpm SHA-256: 5ddebfaf83a58bd38f053304e359c0bdd31aad3350fd58fd8010f2c5e660265a
iptables-debuginfo-1.4.7-4.el6.i686.rpm SHA-256: 5ddebfaf83a58bd38f053304e359c0bdd31aad3350fd58fd8010f2c5e660265a
iptables-debuginfo-1.4.7-4.el6.x86_64.rpm SHA-256: 3d8179ed321c616450fa7eb46825c26c031ef0ec3247bb37df200c64b54eaff2
iptables-debuginfo-1.4.7-4.el6.x86_64.rpm SHA-256: 3d8179ed321c616450fa7eb46825c26c031ef0ec3247bb37df200c64b54eaff2
iptables-devel-1.4.7-4.el6.i686.rpm SHA-256: 074b27225c9f95f1f522f5c763f8e963aca00a46298473ac89e016c65065d5e3
iptables-devel-1.4.7-4.el6.x86_64.rpm SHA-256: 5a8d00986db72efd992bfcd95ee440c5f597af5c9af99be3a17bc7546f3c7337
iptables-ipv6-1.4.7-4.el6.x86_64.rpm SHA-256: 2c502cd7064713b62a04931f1774172f4f892e6cd7227a3388d913d93cff995e

Red Hat Enterprise Linux for IBM z Systems 6

SRPM
iptables-1.4.7-4.el6.src.rpm SHA-256: c6a5152bb51f26fb74adf9c1cffe5a552718ceb1f78b3ac70899342aa974ca5d
s390x
iptables-1.4.7-4.el6.s390.rpm SHA-256: f1b6a38ae4683d1c9b009c096531d689f8a437ca1bbe2b1bbf35fa1957a1e32c
iptables-1.4.7-4.el6.s390x.rpm SHA-256: 3cfacddd039f66ce238955c7e3fea9cff4d580ada84715a037868f9ec9a24c8c
iptables-debuginfo-1.4.7-4.el6.s390.rpm SHA-256: a66ca54f5b06231ff5f986013d7603ae2c40cdcede20cf08cbfc947c609c28db
iptables-debuginfo-1.4.7-4.el6.s390x.rpm SHA-256: cfddde36ecde4a6b080f8dab79afd30bd06e7340d9bd81c823e689366b12a337
iptables-devel-1.4.7-4.el6.s390.rpm SHA-256: a20db29e91ce895dface290bbf8ece6cff2e30af7c60c2fb928cd5fca71935fb
iptables-devel-1.4.7-4.el6.s390x.rpm SHA-256: 4f55ee0bd0489590e347126f8785a24d32f5363abd73c2ebc82ecc7fdca6873a
iptables-ipv6-1.4.7-4.el6.s390x.rpm SHA-256: a50abba131c8db91fac9595cf0228392f96842980daaf10be44f3dc368482a46

Red Hat Enterprise Linux for Power, big endian 6

SRPM
iptables-1.4.7-4.el6.src.rpm SHA-256: c6a5152bb51f26fb74adf9c1cffe5a552718ceb1f78b3ac70899342aa974ca5d
ppc64
iptables-1.4.7-4.el6.ppc.rpm SHA-256: 8f10868157666de59353db1cce6307be57fab0659bff8dc3e660e4b572390a48
iptables-1.4.7-4.el6.ppc64.rpm SHA-256: 8b0157dbd6a640365f17012849388e764827ad3a9db9c6f23182604c5cd822c7
iptables-debuginfo-1.4.7-4.el6.ppc.rpm SHA-256: c8a8885309724831098f2f78c0740e582a0dd382c9631fb702f9bbd22a9dc9fd
iptables-debuginfo-1.4.7-4.el6.ppc64.rpm SHA-256: ea3ed131a4be4eda7a34bab8ee242b3efa69d31000437fd0aedf8ee9860a2a99
iptables-devel-1.4.7-4.el6.ppc.rpm SHA-256: b19acf5bc257e3a41eba3050102c968e843b1868b6ceb49dd65839c8b299c09a
iptables-devel-1.4.7-4.el6.ppc64.rpm SHA-256: 465577cbb8e5ef51fec136996ca4d342352b4c1cbe966abecae70147f5075df8
iptables-ipv6-1.4.7-4.el6.ppc64.rpm SHA-256: f6b444c4eaf87536a8f0f59d5d1fd42ed56705d69709b88dc48663e7f3a5869b

Red Hat Enterprise Linux for Scientific Computing 6

SRPM
iptables-1.4.7-4.el6.src.rpm SHA-256: c6a5152bb51f26fb74adf9c1cffe5a552718ceb1f78b3ac70899342aa974ca5d
x86_64
iptables-1.4.7-4.el6.i686.rpm SHA-256: d956084192234c0fef20558442060c15fd7a81e85953b895fe4e21b49f19e60f
iptables-1.4.7-4.el6.x86_64.rpm SHA-256: 31ae93827631820aef3ff3b65c4fb27ef60ce136bbc05ff1b6e5d67c3e159bf8
iptables-debuginfo-1.4.7-4.el6.i686.rpm SHA-256: 5ddebfaf83a58bd38f053304e359c0bdd31aad3350fd58fd8010f2c5e660265a
iptables-debuginfo-1.4.7-4.el6.i686.rpm SHA-256: 5ddebfaf83a58bd38f053304e359c0bdd31aad3350fd58fd8010f2c5e660265a
iptables-debuginfo-1.4.7-4.el6.x86_64.rpm SHA-256: 3d8179ed321c616450fa7eb46825c26c031ef0ec3247bb37df200c64b54eaff2
iptables-debuginfo-1.4.7-4.el6.x86_64.rpm SHA-256: 3d8179ed321c616450fa7eb46825c26c031ef0ec3247bb37df200c64b54eaff2
iptables-devel-1.4.7-4.el6.i686.rpm SHA-256: 074b27225c9f95f1f522f5c763f8e963aca00a46298473ac89e016c65065d5e3
iptables-devel-1.4.7-4.el6.x86_64.rpm SHA-256: 5a8d00986db72efd992bfcd95ee440c5f597af5c9af99be3a17bc7546f3c7337
iptables-ipv6-1.4.7-4.el6.x86_64.rpm SHA-256: 2c502cd7064713b62a04931f1774172f4f892e6cd7227a3388d913d93cff995e

Red Hat Enterprise Linux Server from RHUI 6

SRPM
iptables-1.4.7-4.el6.src.rpm SHA-256: c6a5152bb51f26fb74adf9c1cffe5a552718ceb1f78b3ac70899342aa974ca5d
x86_64
iptables-1.4.7-4.el6.i686.rpm SHA-256: d956084192234c0fef20558442060c15fd7a81e85953b895fe4e21b49f19e60f
iptables-1.4.7-4.el6.x86_64.rpm SHA-256: 31ae93827631820aef3ff3b65c4fb27ef60ce136bbc05ff1b6e5d67c3e159bf8
iptables-debuginfo-1.4.7-4.el6.i686.rpm SHA-256: 5ddebfaf83a58bd38f053304e359c0bdd31aad3350fd58fd8010f2c5e660265a
iptables-debuginfo-1.4.7-4.el6.x86_64.rpm SHA-256: 3d8179ed321c616450fa7eb46825c26c031ef0ec3247bb37df200c64b54eaff2
iptables-devel-1.4.7-4.el6.i686.rpm SHA-256: 074b27225c9f95f1f522f5c763f8e963aca00a46298473ac89e016c65065d5e3
iptables-devel-1.4.7-4.el6.x86_64.rpm SHA-256: 5a8d00986db72efd992bfcd95ee440c5f597af5c9af99be3a17bc7546f3c7337
iptables-ipv6-1.4.7-4.el6.x86_64.rpm SHA-256: 2c502cd7064713b62a04931f1774172f4f892e6cd7227a3388d913d93cff995e
i386
iptables-1.4.7-4.el6.i686.rpm SHA-256: d956084192234c0fef20558442060c15fd7a81e85953b895fe4e21b49f19e60f
iptables-debuginfo-1.4.7-4.el6.i686.rpm SHA-256: 5ddebfaf83a58bd38f053304e359c0bdd31aad3350fd58fd8010f2c5e660265a
iptables-devel-1.4.7-4.el6.i686.rpm SHA-256: 074b27225c9f95f1f522f5c763f8e963aca00a46298473ac89e016c65065d5e3
iptables-ipv6-1.4.7-4.el6.i686.rpm SHA-256: eb3ea8d58cba7bab1720099403b4daae692b2b21d0be2e13a3a788dc6bedf91b

Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6

SRPM
iptables-1.4.7-4.el6.src.rpm SHA-256: c6a5152bb51f26fb74adf9c1cffe5a552718ceb1f78b3ac70899342aa974ca5d
s390x
iptables-1.4.7-4.el6.s390.rpm SHA-256: f1b6a38ae4683d1c9b009c096531d689f8a437ca1bbe2b1bbf35fa1957a1e32c
iptables-1.4.7-4.el6.s390x.rpm SHA-256: 3cfacddd039f66ce238955c7e3fea9cff4d580ada84715a037868f9ec9a24c8c
iptables-debuginfo-1.4.7-4.el6.s390.rpm SHA-256: a66ca54f5b06231ff5f986013d7603ae2c40cdcede20cf08cbfc947c609c28db
iptables-debuginfo-1.4.7-4.el6.s390x.rpm SHA-256: cfddde36ecde4a6b080f8dab79afd30bd06e7340d9bd81c823e689366b12a337
iptables-devel-1.4.7-4.el6.s390.rpm SHA-256: a20db29e91ce895dface290bbf8ece6cff2e30af7c60c2fb928cd5fca71935fb
iptables-devel-1.4.7-4.el6.s390x.rpm SHA-256: 4f55ee0bd0489590e347126f8785a24d32f5363abd73c2ebc82ecc7fdca6873a
iptables-ipv6-1.4.7-4.el6.s390x.rpm SHA-256: a50abba131c8db91fac9595cf0228392f96842980daaf10be44f3dc368482a46

Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6

SRPM
iptables-1.4.7-4.el6.src.rpm SHA-256: c6a5152bb51f26fb74adf9c1cffe5a552718ceb1f78b3ac70899342aa974ca5d
x86_64
iptables-1.4.7-4.el6.i686.rpm SHA-256: d956084192234c0fef20558442060c15fd7a81e85953b895fe4e21b49f19e60f
iptables-1.4.7-4.el6.x86_64.rpm SHA-256: 31ae93827631820aef3ff3b65c4fb27ef60ce136bbc05ff1b6e5d67c3e159bf8
iptables-debuginfo-1.4.7-4.el6.i686.rpm SHA-256: 5ddebfaf83a58bd38f053304e359c0bdd31aad3350fd58fd8010f2c5e660265a
iptables-debuginfo-1.4.7-4.el6.x86_64.rpm SHA-256: 3d8179ed321c616450fa7eb46825c26c031ef0ec3247bb37df200c64b54eaff2
iptables-devel-1.4.7-4.el6.i686.rpm SHA-256: 074b27225c9f95f1f522f5c763f8e963aca00a46298473ac89e016c65065d5e3
iptables-devel-1.4.7-4.el6.x86_64.rpm SHA-256: 5a8d00986db72efd992bfcd95ee440c5f597af5c9af99be3a17bc7546f3c7337
iptables-ipv6-1.4.7-4.el6.x86_64.rpm SHA-256: 2c502cd7064713b62a04931f1774172f4f892e6cd7227a3388d913d93cff995e
i386
iptables-1.4.7-4.el6.i686.rpm SHA-256: d956084192234c0fef20558442060c15fd7a81e85953b895fe4e21b49f19e60f
iptables-debuginfo-1.4.7-4.el6.i686.rpm SHA-256: 5ddebfaf83a58bd38f053304e359c0bdd31aad3350fd58fd8010f2c5e660265a
iptables-devel-1.4.7-4.el6.i686.rpm SHA-256: 074b27225c9f95f1f522f5c763f8e963aca00a46298473ac89e016c65065d5e3
iptables-ipv6-1.4.7-4.el6.i686.rpm SHA-256: eb3ea8d58cba7bab1720099403b4daae692b2b21d0be2e13a3a788dc6bedf91b

Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6

SRPM
iptables-1.4.7-4.el6.src.rpm SHA-256: c6a5152bb51f26fb74adf9c1cffe5a552718ceb1f78b3ac70899342aa974ca5d
s390x
iptables-1.4.7-4.el6.s390.rpm SHA-256: f1b6a38ae4683d1c9b009c096531d689f8a437ca1bbe2b1bbf35fa1957a1e32c
iptables-1.4.7-4.el6.s390x.rpm SHA-256: 3cfacddd039f66ce238955c7e3fea9cff4d580ada84715a037868f9ec9a24c8c
iptables-debuginfo-1.4.7-4.el6.s390.rpm SHA-256: a66ca54f5b06231ff5f986013d7603ae2c40cdcede20cf08cbfc947c609c28db
iptables-debuginfo-1.4.7-4.el6.s390x.rpm SHA-256: cfddde36ecde4a6b080f8dab79afd30bd06e7340d9bd81c823e689366b12a337
iptables-devel-1.4.7-4.el6.s390.rpm SHA-256: a20db29e91ce895dface290bbf8ece6cff2e30af7c60c2fb928cd5fca71935fb
iptables-devel-1.4.7-4.el6.s390x.rpm SHA-256: 4f55ee0bd0489590e347126f8785a24d32f5363abd73c2ebc82ecc7fdca6873a
iptables-ipv6-1.4.7-4.el6.s390x.rpm SHA-256: a50abba131c8db91fac9595cf0228392f96842980daaf10be44f3dc368482a46

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility