Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2020:1174 - Bug Fix Advisory
Issued:
2020-03-31
Updated:
2020-03-31

RHBA-2020:1174 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

iptables bug fix and enhancement update

Type/Severity

Bug Fix Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for iptables is now available for Red Hat Enterprise Linux 7.

Description

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 7.8 Release Notes linked from the References section.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 7 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 7 x86_64
  • Red Hat Enterprise Linux Workstation 7 x86_64
  • Red Hat Enterprise Linux Desktop 7 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 7 s390x
  • Red Hat Enterprise Linux for Power, big endian 7 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 7 x86_64
  • Red Hat Enterprise Linux for Power, little endian 7 ppc64le
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 7 s390x
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, big endian 7 ppc64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, little endian 7 ppc64le

Fixes

  • BZ - 1736765 - iptables.service lacks dependencies on network-pre.target
  • BZ - 1749700 - iptables-restore fails if comment contains '-' and 't'

CVEs

(none)

References

  • https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.8_release_notes/index
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 7

SRPM
iptables-1.4.21-34.el7.src.rpm SHA-256: 5800b5245433a52b3bc376fffc36f5e75c30c34237532c41f742f8d967ba79cf
x86_64
iptables-1.4.21-34.el7.i686.rpm SHA-256: 6abfcb9b21cfd64562ff39fab82e18842121bddb95df67873b7eddbe39034259
iptables-1.4.21-34.el7.x86_64.rpm SHA-256: 5d863cc8d0611120d683c0107a8d1292a4016d54342949a5f2cd228bf2c8b8b2
iptables-debuginfo-1.4.21-34.el7.i686.rpm SHA-256: 7f09b960bf1e608a07643694d6283cab3b8149b8db854f04a9ce0d4208890b75
iptables-debuginfo-1.4.21-34.el7.x86_64.rpm SHA-256: 712c0dd50c0889dffaacdd17d3f91a5b8d8a2808483b57531f6e53b0a2b6e0f2
iptables-debuginfo-1.4.21-34.el7.x86_64.rpm SHA-256: 712c0dd50c0889dffaacdd17d3f91a5b8d8a2808483b57531f6e53b0a2b6e0f2
iptables-devel-1.4.21-34.el7.i686.rpm SHA-256: 6c8e298d9d513bee8794d3f16f69c24da05288352db58894cea1737324af9599
iptables-devel-1.4.21-34.el7.x86_64.rpm SHA-256: d27f34b0e6a36d4f4153cb6f9fdf07a35eeee1f983cffcb2d410a5f74f67a11c
iptables-services-1.4.21-34.el7.x86_64.rpm SHA-256: 3d444466230f49eb213fa4374aa56e679806fba2ded5e6b6fb0d9913dc0c9723
iptables-utils-1.4.21-34.el7.x86_64.rpm SHA-256: fad0733ac5102edd8a63e4939ee6e44026a948a0650b88381b1be006e7557caf

Red Hat Enterprise Linux Server - Extended Life Cycle Support 7

SRPM
iptables-1.4.21-34.el7.src.rpm SHA-256: 5800b5245433a52b3bc376fffc36f5e75c30c34237532c41f742f8d967ba79cf
x86_64
iptables-1.4.21-34.el7.i686.rpm SHA-256: 6abfcb9b21cfd64562ff39fab82e18842121bddb95df67873b7eddbe39034259
iptables-1.4.21-34.el7.x86_64.rpm SHA-256: 5d863cc8d0611120d683c0107a8d1292a4016d54342949a5f2cd228bf2c8b8b2
iptables-debuginfo-1.4.21-34.el7.i686.rpm SHA-256: 7f09b960bf1e608a07643694d6283cab3b8149b8db854f04a9ce0d4208890b75
iptables-debuginfo-1.4.21-34.el7.x86_64.rpm SHA-256: 712c0dd50c0889dffaacdd17d3f91a5b8d8a2808483b57531f6e53b0a2b6e0f2
iptables-debuginfo-1.4.21-34.el7.x86_64.rpm SHA-256: 712c0dd50c0889dffaacdd17d3f91a5b8d8a2808483b57531f6e53b0a2b6e0f2
iptables-devel-1.4.21-34.el7.i686.rpm SHA-256: 6c8e298d9d513bee8794d3f16f69c24da05288352db58894cea1737324af9599
iptables-devel-1.4.21-34.el7.x86_64.rpm SHA-256: d27f34b0e6a36d4f4153cb6f9fdf07a35eeee1f983cffcb2d410a5f74f67a11c
iptables-services-1.4.21-34.el7.x86_64.rpm SHA-256: 3d444466230f49eb213fa4374aa56e679806fba2ded5e6b6fb0d9913dc0c9723
iptables-utils-1.4.21-34.el7.x86_64.rpm SHA-256: fad0733ac5102edd8a63e4939ee6e44026a948a0650b88381b1be006e7557caf

Red Hat Enterprise Linux Workstation 7

SRPM
iptables-1.4.21-34.el7.src.rpm SHA-256: 5800b5245433a52b3bc376fffc36f5e75c30c34237532c41f742f8d967ba79cf
x86_64
iptables-1.4.21-34.el7.i686.rpm SHA-256: 6abfcb9b21cfd64562ff39fab82e18842121bddb95df67873b7eddbe39034259
iptables-1.4.21-34.el7.x86_64.rpm SHA-256: 5d863cc8d0611120d683c0107a8d1292a4016d54342949a5f2cd228bf2c8b8b2
iptables-debuginfo-1.4.21-34.el7.i686.rpm SHA-256: 7f09b960bf1e608a07643694d6283cab3b8149b8db854f04a9ce0d4208890b75
iptables-debuginfo-1.4.21-34.el7.x86_64.rpm SHA-256: 712c0dd50c0889dffaacdd17d3f91a5b8d8a2808483b57531f6e53b0a2b6e0f2
iptables-debuginfo-1.4.21-34.el7.x86_64.rpm SHA-256: 712c0dd50c0889dffaacdd17d3f91a5b8d8a2808483b57531f6e53b0a2b6e0f2
iptables-devel-1.4.21-34.el7.i686.rpm SHA-256: 6c8e298d9d513bee8794d3f16f69c24da05288352db58894cea1737324af9599
iptables-devel-1.4.21-34.el7.x86_64.rpm SHA-256: d27f34b0e6a36d4f4153cb6f9fdf07a35eeee1f983cffcb2d410a5f74f67a11c
iptables-services-1.4.21-34.el7.x86_64.rpm SHA-256: 3d444466230f49eb213fa4374aa56e679806fba2ded5e6b6fb0d9913dc0c9723
iptables-utils-1.4.21-34.el7.x86_64.rpm SHA-256: fad0733ac5102edd8a63e4939ee6e44026a948a0650b88381b1be006e7557caf

Red Hat Enterprise Linux Desktop 7

SRPM
iptables-1.4.21-34.el7.src.rpm SHA-256: 5800b5245433a52b3bc376fffc36f5e75c30c34237532c41f742f8d967ba79cf
x86_64
iptables-1.4.21-34.el7.i686.rpm SHA-256: 6abfcb9b21cfd64562ff39fab82e18842121bddb95df67873b7eddbe39034259
iptables-1.4.21-34.el7.x86_64.rpm SHA-256: 5d863cc8d0611120d683c0107a8d1292a4016d54342949a5f2cd228bf2c8b8b2
iptables-debuginfo-1.4.21-34.el7.i686.rpm SHA-256: 7f09b960bf1e608a07643694d6283cab3b8149b8db854f04a9ce0d4208890b75
iptables-debuginfo-1.4.21-34.el7.i686.rpm SHA-256: 7f09b960bf1e608a07643694d6283cab3b8149b8db854f04a9ce0d4208890b75
iptables-debuginfo-1.4.21-34.el7.x86_64.rpm SHA-256: 712c0dd50c0889dffaacdd17d3f91a5b8d8a2808483b57531f6e53b0a2b6e0f2
iptables-debuginfo-1.4.21-34.el7.x86_64.rpm SHA-256: 712c0dd50c0889dffaacdd17d3f91a5b8d8a2808483b57531f6e53b0a2b6e0f2
iptables-devel-1.4.21-34.el7.i686.rpm SHA-256: 6c8e298d9d513bee8794d3f16f69c24da05288352db58894cea1737324af9599
iptables-devel-1.4.21-34.el7.x86_64.rpm SHA-256: d27f34b0e6a36d4f4153cb6f9fdf07a35eeee1f983cffcb2d410a5f74f67a11c
iptables-services-1.4.21-34.el7.x86_64.rpm SHA-256: 3d444466230f49eb213fa4374aa56e679806fba2ded5e6b6fb0d9913dc0c9723
iptables-utils-1.4.21-34.el7.x86_64.rpm SHA-256: fad0733ac5102edd8a63e4939ee6e44026a948a0650b88381b1be006e7557caf

Red Hat Enterprise Linux for IBM z Systems 7

SRPM
iptables-1.4.21-34.el7.src.rpm SHA-256: 5800b5245433a52b3bc376fffc36f5e75c30c34237532c41f742f8d967ba79cf
s390x
iptables-1.4.21-34.el7.s390.rpm SHA-256: 73e5b5199cd5430a7c58310b01d9a5222a7077eac82d10791eeb4ff2f291d003
iptables-1.4.21-34.el7.s390x.rpm SHA-256: 6aed8b0b2cfdb01d6205fca1e097dc35d76aa6f86e37f64bbd5aa97281b1423b
iptables-debuginfo-1.4.21-34.el7.s390.rpm SHA-256: 7ee600a2cc031b058481b7779f34a2c1851ef71b066c5444f234711605f658f4
iptables-debuginfo-1.4.21-34.el7.s390x.rpm SHA-256: 3d2e5cc5b903ffa760da5403f197e11e8b6a95b20fcfa666bb90864493826bc3
iptables-debuginfo-1.4.21-34.el7.s390x.rpm SHA-256: 3d2e5cc5b903ffa760da5403f197e11e8b6a95b20fcfa666bb90864493826bc3
iptables-devel-1.4.21-34.el7.s390.rpm SHA-256: e75d29d0fc2bd485ae9ab5aa20644d7b6aac7e3ba50192edb18052fb157e09ba
iptables-devel-1.4.21-34.el7.s390x.rpm SHA-256: edec8fbc55348d485a08d5e79a979dc9077285088a054ae095837087d26f9bb9
iptables-services-1.4.21-34.el7.s390x.rpm SHA-256: da6928e11ac076fbe2d97b677d024c376e21e3dea1f274cb3efd6dfe8e9f186b
iptables-utils-1.4.21-34.el7.s390x.rpm SHA-256: 33fb1fbb7920199a31ff2674c9d8213b6e31bb3cb6dfd0202da9ee95e6689fe8

Red Hat Enterprise Linux for Power, big endian 7

SRPM
iptables-1.4.21-34.el7.src.rpm SHA-256: 5800b5245433a52b3bc376fffc36f5e75c30c34237532c41f742f8d967ba79cf
ppc64
iptables-1.4.21-34.el7.ppc.rpm SHA-256: 94aa6c4d271da622d127b091f24b4a494074794565489ba880b6407745975b0c
iptables-1.4.21-34.el7.ppc64.rpm SHA-256: c2c373edbe9a9219582884053b53ccf29e496b2380d617cd66a0a94603692df7
iptables-debuginfo-1.4.21-34.el7.ppc.rpm SHA-256: 00943888393c2f647df3d446c74f36311ed4b66819180e2d26253cad19357834
iptables-debuginfo-1.4.21-34.el7.ppc64.rpm SHA-256: aeb3619412daf832869c74aa83c16d7c5399f30057dc4d1946f474d74062e3b6
iptables-debuginfo-1.4.21-34.el7.ppc64.rpm SHA-256: aeb3619412daf832869c74aa83c16d7c5399f30057dc4d1946f474d74062e3b6
iptables-devel-1.4.21-34.el7.ppc.rpm SHA-256: d0a371db61951e563230938dd3034fc1d27efebaca8c72ba6cf8550ca68ff988
iptables-devel-1.4.21-34.el7.ppc64.rpm SHA-256: e6b19a9fc64cc49e799f72054abd471248b283e36f9d134fcefec9a040ea68a0
iptables-services-1.4.21-34.el7.ppc64.rpm SHA-256: 26ecc6f6d2ae24ee3cdb0afa752d6e2f621d15e8f8c27f3013b93eefb24b729e
iptables-utils-1.4.21-34.el7.ppc64.rpm SHA-256: 4108ca238e79dd5906f5dc35c06ba09b529ec07e5590ec1acb7d44fc82f2680a

Red Hat Enterprise Linux for Scientific Computing 7

SRPM
iptables-1.4.21-34.el7.src.rpm SHA-256: 5800b5245433a52b3bc376fffc36f5e75c30c34237532c41f742f8d967ba79cf
x86_64
iptables-1.4.21-34.el7.i686.rpm SHA-256: 6abfcb9b21cfd64562ff39fab82e18842121bddb95df67873b7eddbe39034259
iptables-1.4.21-34.el7.x86_64.rpm SHA-256: 5d863cc8d0611120d683c0107a8d1292a4016d54342949a5f2cd228bf2c8b8b2
iptables-debuginfo-1.4.21-34.el7.i686.rpm SHA-256: 7f09b960bf1e608a07643694d6283cab3b8149b8db854f04a9ce0d4208890b75
iptables-debuginfo-1.4.21-34.el7.i686.rpm SHA-256: 7f09b960bf1e608a07643694d6283cab3b8149b8db854f04a9ce0d4208890b75
iptables-debuginfo-1.4.21-34.el7.x86_64.rpm SHA-256: 712c0dd50c0889dffaacdd17d3f91a5b8d8a2808483b57531f6e53b0a2b6e0f2
iptables-debuginfo-1.4.21-34.el7.x86_64.rpm SHA-256: 712c0dd50c0889dffaacdd17d3f91a5b8d8a2808483b57531f6e53b0a2b6e0f2
iptables-devel-1.4.21-34.el7.i686.rpm SHA-256: 6c8e298d9d513bee8794d3f16f69c24da05288352db58894cea1737324af9599
iptables-devel-1.4.21-34.el7.x86_64.rpm SHA-256: d27f34b0e6a36d4f4153cb6f9fdf07a35eeee1f983cffcb2d410a5f74f67a11c
iptables-services-1.4.21-34.el7.x86_64.rpm SHA-256: 3d444466230f49eb213fa4374aa56e679806fba2ded5e6b6fb0d9913dc0c9723
iptables-utils-1.4.21-34.el7.x86_64.rpm SHA-256: fad0733ac5102edd8a63e4939ee6e44026a948a0650b88381b1be006e7557caf

Red Hat Enterprise Linux for Power, little endian 7

SRPM
iptables-1.4.21-34.el7.src.rpm SHA-256: 5800b5245433a52b3bc376fffc36f5e75c30c34237532c41f742f8d967ba79cf
ppc64le
iptables-1.4.21-34.el7.ppc64le.rpm SHA-256: ac5a00a7872e850f39ea162d4a908f84902fbc9670304448f9b65b8d8a98f1f1
iptables-debuginfo-1.4.21-34.el7.ppc64le.rpm SHA-256: 51171b097a02afdc5e08c48211df951fa532a4cda71435fe58d5da31d2d2781c
iptables-debuginfo-1.4.21-34.el7.ppc64le.rpm SHA-256: 51171b097a02afdc5e08c48211df951fa532a4cda71435fe58d5da31d2d2781c
iptables-devel-1.4.21-34.el7.ppc64le.rpm SHA-256: 746ecc818039c333b02408bfc6a107ee431e7fee7bcc7652eec92c44c18b43e3
iptables-services-1.4.21-34.el7.ppc64le.rpm SHA-256: f620dcffe14baf8edb02166e6998d553d0e838f23d185e009f6e74c6fc113412
iptables-utils-1.4.21-34.el7.ppc64le.rpm SHA-256: df9647d54e606affdcfe0482ef8dcd8cf18b44e901b30c84e8d4c993ab7558c3

Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 7

SRPM
iptables-1.4.21-34.el7.src.rpm SHA-256: 5800b5245433a52b3bc376fffc36f5e75c30c34237532c41f742f8d967ba79cf
s390x
iptables-1.4.21-34.el7.s390.rpm SHA-256: 73e5b5199cd5430a7c58310b01d9a5222a7077eac82d10791eeb4ff2f291d003
iptables-1.4.21-34.el7.s390x.rpm SHA-256: 6aed8b0b2cfdb01d6205fca1e097dc35d76aa6f86e37f64bbd5aa97281b1423b
iptables-debuginfo-1.4.21-34.el7.s390.rpm SHA-256: 7ee600a2cc031b058481b7779f34a2c1851ef71b066c5444f234711605f658f4
iptables-debuginfo-1.4.21-34.el7.s390x.rpm SHA-256: 3d2e5cc5b903ffa760da5403f197e11e8b6a95b20fcfa666bb90864493826bc3
iptables-debuginfo-1.4.21-34.el7.s390x.rpm SHA-256: 3d2e5cc5b903ffa760da5403f197e11e8b6a95b20fcfa666bb90864493826bc3
iptables-devel-1.4.21-34.el7.s390.rpm SHA-256: e75d29d0fc2bd485ae9ab5aa20644d7b6aac7e3ba50192edb18052fb157e09ba
iptables-devel-1.4.21-34.el7.s390x.rpm SHA-256: edec8fbc55348d485a08d5e79a979dc9077285088a054ae095837087d26f9bb9
iptables-services-1.4.21-34.el7.s390x.rpm SHA-256: da6928e11ac076fbe2d97b677d024c376e21e3dea1f274cb3efd6dfe8e9f186b
iptables-utils-1.4.21-34.el7.s390x.rpm SHA-256: 33fb1fbb7920199a31ff2674c9d8213b6e31bb3cb6dfd0202da9ee95e6689fe8

Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, big endian 7

SRPM
iptables-1.4.21-34.el7.src.rpm SHA-256: 5800b5245433a52b3bc376fffc36f5e75c30c34237532c41f742f8d967ba79cf
ppc64
iptables-1.4.21-34.el7.ppc.rpm SHA-256: 94aa6c4d271da622d127b091f24b4a494074794565489ba880b6407745975b0c
iptables-1.4.21-34.el7.ppc64.rpm SHA-256: c2c373edbe9a9219582884053b53ccf29e496b2380d617cd66a0a94603692df7
iptables-debuginfo-1.4.21-34.el7.ppc.rpm SHA-256: 00943888393c2f647df3d446c74f36311ed4b66819180e2d26253cad19357834
iptables-debuginfo-1.4.21-34.el7.ppc64.rpm SHA-256: aeb3619412daf832869c74aa83c16d7c5399f30057dc4d1946f474d74062e3b6
iptables-debuginfo-1.4.21-34.el7.ppc64.rpm SHA-256: aeb3619412daf832869c74aa83c16d7c5399f30057dc4d1946f474d74062e3b6
iptables-devel-1.4.21-34.el7.ppc.rpm SHA-256: d0a371db61951e563230938dd3034fc1d27efebaca8c72ba6cf8550ca68ff988
iptables-devel-1.4.21-34.el7.ppc64.rpm SHA-256: e6b19a9fc64cc49e799f72054abd471248b283e36f9d134fcefec9a040ea68a0
iptables-services-1.4.21-34.el7.ppc64.rpm SHA-256: 26ecc6f6d2ae24ee3cdb0afa752d6e2f621d15e8f8c27f3013b93eefb24b729e
iptables-utils-1.4.21-34.el7.ppc64.rpm SHA-256: 4108ca238e79dd5906f5dc35c06ba09b529ec07e5590ec1acb7d44fc82f2680a

Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, little endian 7

SRPM
iptables-1.4.21-34.el7.src.rpm SHA-256: 5800b5245433a52b3bc376fffc36f5e75c30c34237532c41f742f8d967ba79cf
ppc64le
iptables-1.4.21-34.el7.ppc64le.rpm SHA-256: ac5a00a7872e850f39ea162d4a908f84902fbc9670304448f9b65b8d8a98f1f1
iptables-debuginfo-1.4.21-34.el7.ppc64le.rpm SHA-256: 51171b097a02afdc5e08c48211df951fa532a4cda71435fe58d5da31d2d2781c
iptables-debuginfo-1.4.21-34.el7.ppc64le.rpm SHA-256: 51171b097a02afdc5e08c48211df951fa532a4cda71435fe58d5da31d2d2781c
iptables-devel-1.4.21-34.el7.ppc64le.rpm SHA-256: 746ecc818039c333b02408bfc6a107ee431e7fee7bcc7652eec92c44c18b43e3
iptables-services-1.4.21-34.el7.ppc64le.rpm SHA-256: f620dcffe14baf8edb02166e6998d553d0e838f23d185e009f6e74c6fc113412
iptables-utils-1.4.21-34.el7.ppc64le.rpm SHA-256: df9647d54e606affdcfe0482ef8dcd8cf18b44e901b30c84e8d4c993ab7558c3

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility