Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2012:0336 - Bug Fix Advisory
Issued:
2012-02-24
Updated:
2012-02-24

RHBA-2012:0336 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

iptables bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated iptables packages that fix one bug are now available for Red Hat
Enterprise Linux 6 Extended Update Support.

Description

The iptables utility controls the network packet filtering code in the Linux
kernel.

This update fixes the following bug:

  • The option parser of the iptables utility did not correctly handle the "-m

mark" and "-m conmark" options in the same rule. Therefore, the iptables command
failed when issued with both options. This update modifies behavior of the
option parser so that iptables now works as expected with the "-m mark" and "-m
conmark" options specified. (BZ#786871)

All users of iptables are advised to upgrade to these updated packages, which
fix this bug.

Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.1 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.1 i386
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.1 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.1 ppc64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1 i386
  • Red Hat Virtual Storage Appliance (from RHUI) 6.1 x86_64

Fixes

(none)

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.1

SRPM
iptables-1.4.7-5.1.el6_1.src.rpm SHA-256: 0dac0a672ef542d24dfa0d8f4e0c6d90a34de0175f1ef296b6c97664d6895613
x86_64
iptables-1.4.7-5.1.el6_1.i686.rpm SHA-256: 9d44b5d3db3ae24ff77fba29411e991a8417abfb85392d84f61bdb83a8883f14
iptables-1.4.7-5.1.el6_1.x86_64.rpm SHA-256: eb40c696a889088f2efe292b5fff6c32b72f96ae5513909905871e85af70683d
iptables-debuginfo-1.4.7-5.1.el6_1.i686.rpm SHA-256: b962bf260e785db015e95f209a84243d962a5c2fad044b228f93b8a3b84639d2
iptables-debuginfo-1.4.7-5.1.el6_1.x86_64.rpm SHA-256: cdae9597416d829d4272614ae50045bdced98f29af7f061571a902686d82b751
iptables-devel-1.4.7-5.1.el6_1.i686.rpm SHA-256: b5b19c9238fd281807ca7d8fc48dc1d8cc6fb8d385b010ddc01c5f60f9d1607f
iptables-devel-1.4.7-5.1.el6_1.x86_64.rpm SHA-256: 55dd53af73e40b0ded35394fae705ae44af408f066dd7e3a1d08ca762e7d7d93
iptables-ipv6-1.4.7-5.1.el6_1.x86_64.rpm SHA-256: 2a8138ad1b4f23b8224ceaace338d6fecec95248489fc841d402f7d44795f3d9
i386
iptables-1.4.7-5.1.el6_1.i686.rpm SHA-256: 9d44b5d3db3ae24ff77fba29411e991a8417abfb85392d84f61bdb83a8883f14
iptables-debuginfo-1.4.7-5.1.el6_1.i686.rpm SHA-256: b962bf260e785db015e95f209a84243d962a5c2fad044b228f93b8a3b84639d2
iptables-devel-1.4.7-5.1.el6_1.i686.rpm SHA-256: b5b19c9238fd281807ca7d8fc48dc1d8cc6fb8d385b010ddc01c5f60f9d1607f
iptables-ipv6-1.4.7-5.1.el6_1.i686.rpm SHA-256: dd3151922df41207752856b28ea3dd117c524ab5573df99dc869d8b8fec35810

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.1

SRPM
iptables-1.4.7-5.1.el6_1.src.rpm SHA-256: 0dac0a672ef542d24dfa0d8f4e0c6d90a34de0175f1ef296b6c97664d6895613
s390x
iptables-1.4.7-5.1.el6_1.s390.rpm SHA-256: c49fe053ae44fbe4285af68064ef3720df67cfdb9e6b3ff8ddea11f5bed3d84f
iptables-1.4.7-5.1.el6_1.s390x.rpm SHA-256: 39dff73e45e06909477ce134d0d144f57ff23f89b23c2c8ca2a3558d09dead04
iptables-debuginfo-1.4.7-5.1.el6_1.s390.rpm SHA-256: e7fbd576bf69c75e23698efbd9f7997e3d64b2ef23f2b92f355824c8f8669831
iptables-debuginfo-1.4.7-5.1.el6_1.s390x.rpm SHA-256: bd26f2e8a4f610a3d297c93c1362e6fe6e9d74d879b1df1bf98b7e347ca00967
iptables-devel-1.4.7-5.1.el6_1.s390.rpm SHA-256: d7056d452b6647ef3b1ffe5e645602fa65faf0e2361ed4dd7470e4ebc5557a04
iptables-devel-1.4.7-5.1.el6_1.s390x.rpm SHA-256: 8abe085d859805a5f6d1262bdf6ceb444fa8459629026a2ba71830e460a2da11
iptables-ipv6-1.4.7-5.1.el6_1.s390x.rpm SHA-256: 5fa61a0b73a157473fd6047a9d673338316ce6af52de1a4340278781611776cf

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.1

SRPM
iptables-1.4.7-5.1.el6_1.src.rpm SHA-256: 0dac0a672ef542d24dfa0d8f4e0c6d90a34de0175f1ef296b6c97664d6895613
ppc64
iptables-1.4.7-5.1.el6_1.ppc.rpm SHA-256: a73f37511a1fc6e19d1c97dd2dcc55675545c697041d14bd7b57108ccd76782d
iptables-1.4.7-5.1.el6_1.ppc64.rpm SHA-256: be77d720452b261d1fb82d4f0d1901952d9951423b243c78a61d38ec3ee9ea27
iptables-debuginfo-1.4.7-5.1.el6_1.ppc.rpm SHA-256: fc63c8a8afda8932f0ca8ee8b3d3c07792131dfaee5dce28ee0a2b8f089df747
iptables-debuginfo-1.4.7-5.1.el6_1.ppc64.rpm SHA-256: 997183e187a995359888dcb8246b9c115ec34e38fe85f1479ae873058e83d29b
iptables-devel-1.4.7-5.1.el6_1.ppc.rpm SHA-256: 578524173b1a115e4d8611a88373829c22116ca25837db9c2f6556f57ce16310
iptables-devel-1.4.7-5.1.el6_1.ppc64.rpm SHA-256: 928ff88813563f3bee32dcda91fd8b416b74f545849e17dac6a8f4133a6822a2
iptables-ipv6-1.4.7-5.1.el6_1.ppc64.rpm SHA-256: e44e8f63e7a50e1f6328fda7bd002771d6f2f525fa0333cc64236d76115c033a

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1

SRPM
iptables-1.4.7-5.1.el6_1.src.rpm SHA-256: 0dac0a672ef542d24dfa0d8f4e0c6d90a34de0175f1ef296b6c97664d6895613
x86_64
iptables-1.4.7-5.1.el6_1.i686.rpm SHA-256: 9d44b5d3db3ae24ff77fba29411e991a8417abfb85392d84f61bdb83a8883f14
iptables-1.4.7-5.1.el6_1.x86_64.rpm SHA-256: eb40c696a889088f2efe292b5fff6c32b72f96ae5513909905871e85af70683d
iptables-debuginfo-1.4.7-5.1.el6_1.i686.rpm SHA-256: b962bf260e785db015e95f209a84243d962a5c2fad044b228f93b8a3b84639d2
iptables-debuginfo-1.4.7-5.1.el6_1.x86_64.rpm SHA-256: cdae9597416d829d4272614ae50045bdced98f29af7f061571a902686d82b751
iptables-devel-1.4.7-5.1.el6_1.i686.rpm SHA-256: b5b19c9238fd281807ca7d8fc48dc1d8cc6fb8d385b010ddc01c5f60f9d1607f
iptables-devel-1.4.7-5.1.el6_1.x86_64.rpm SHA-256: 55dd53af73e40b0ded35394fae705ae44af408f066dd7e3a1d08ca762e7d7d93
iptables-ipv6-1.4.7-5.1.el6_1.x86_64.rpm SHA-256: 2a8138ad1b4f23b8224ceaace338d6fecec95248489fc841d402f7d44795f3d9
i386
iptables-1.4.7-5.1.el6_1.i686.rpm SHA-256: 9d44b5d3db3ae24ff77fba29411e991a8417abfb85392d84f61bdb83a8883f14
iptables-debuginfo-1.4.7-5.1.el6_1.i686.rpm SHA-256: b962bf260e785db015e95f209a84243d962a5c2fad044b228f93b8a3b84639d2
iptables-devel-1.4.7-5.1.el6_1.i686.rpm SHA-256: b5b19c9238fd281807ca7d8fc48dc1d8cc6fb8d385b010ddc01c5f60f9d1607f
iptables-ipv6-1.4.7-5.1.el6_1.i686.rpm SHA-256: dd3151922df41207752856b28ea3dd117c524ab5573df99dc869d8b8fec35810

Red Hat Virtual Storage Appliance (from RHUI) 6.1

SRPM
iptables-1.4.7-5.1.el6_1.src.rpm SHA-256: 0dac0a672ef542d24dfa0d8f4e0c6d90a34de0175f1ef296b6c97664d6895613
x86_64
iptables-1.4.7-5.1.el6_1.i686.rpm SHA-256: 9d44b5d3db3ae24ff77fba29411e991a8417abfb85392d84f61bdb83a8883f14
iptables-1.4.7-5.1.el6_1.x86_64.rpm SHA-256: eb40c696a889088f2efe292b5fff6c32b72f96ae5513909905871e85af70683d
iptables-debuginfo-1.4.7-5.1.el6_1.i686.rpm SHA-256: b962bf260e785db015e95f209a84243d962a5c2fad044b228f93b8a3b84639d2
iptables-debuginfo-1.4.7-5.1.el6_1.x86_64.rpm SHA-256: cdae9597416d829d4272614ae50045bdced98f29af7f061571a902686d82b751
iptables-devel-1.4.7-5.1.el6_1.i686.rpm SHA-256: b5b19c9238fd281807ca7d8fc48dc1d8cc6fb8d385b010ddc01c5f60f9d1607f
iptables-devel-1.4.7-5.1.el6_1.x86_64.rpm SHA-256: 55dd53af73e40b0ded35394fae705ae44af408f066dd7e3a1d08ca762e7d7d93
iptables-ipv6-1.4.7-5.1.el6_1.x86_64.rpm SHA-256: 2a8138ad1b4f23b8224ceaace338d6fecec95248489fc841d402f7d44795f3d9

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility