- Issued:
- 2020-12-15
- Updated:
- 2020-12-15
RHBA-2020:5419 - Bug Fix Advisory
Synopsis
iptables bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for iptables is now available for Red Hat Enterprise Linux 8.2
Extended Update Support.
Description
The iptables utility controls the network packet filtering code in the
Linux kernel.
Bug Fix(es) and Enhancement(s):
- openshift-sdn reports failure with iptables-restore: CHAIN_USER_DEL
failed (Device or resource busy) (BZ#1891881)
- Improve IP address match performance. (BZ#1894620)
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64
- Red Hat Enterprise Linux Server - AUS 8.2 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.2 x86_64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2 x86_64
Fixes
- BZ - 1891881 - openshift-sdn reports failure with iptables-restore: CHAIN_USER_DEL failed (Device or resource busy) [rhel-8.2.0.z]
- BZ - 1894620 - Improve IP address match performance [rhel-8.2.0.z]
CVEs
(none)
References
(none)
Note:
More recent versions of these packages may be available.
Click a package name for more details.
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2
SRPM | |
---|---|
iptables-1.8.4-10.el8_2.4.src.rpm | SHA-256: 1b79fccacd259a51eef17d1c4551da3013cfbce0bea72d5428312a8df57cc0ed |
x86_64 | |
iptables-1.8.4-10.el8_2.4.i686.rpm | SHA-256: bbda101b53f0d7400342c37a70333cf87ab8ed71b1075b2ab32be778f9581a03 |
iptables-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: 36e933f188fc4f6c511055435b596fd6e94058155de0b58abe13fe577eb77df6 |
iptables-arptables-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: f156e640edf7c4f7181524ee5fd8987d71e9e6c7be6316474d39d70237f93702 |
iptables-debuginfo-1.8.4-10.el8_2.4.i686.rpm | SHA-256: 912e8b7071c07f535fcb1d42c89b47123741b1b36722907291c8cd704b788a81 |
iptables-debuginfo-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: 249c5e66aab69c8618b136e7383947374995954a06ba50162d021216c8885b7d |
iptables-debugsource-1.8.4-10.el8_2.4.i686.rpm | SHA-256: cc9d4a6537fee328d7218c8978c37bdf9ec85b815d63b612b6f14777f2841514 |
iptables-debugsource-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: cb492d8e89316ff557eb14abf06612f46568b8ce09f3357803efbc9e532ba6ee |
iptables-devel-1.8.4-10.el8_2.4.i686.rpm | SHA-256: ee7221aea64e8ade2bf3f666d409d9f7f4525089558ab7769bcdd0a0c168b605 |
iptables-devel-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: 1e6e7a3d20e2a0a6904f96650b9cf7ee40c262d10205543059be5f67e93b52da |
iptables-ebtables-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: 7a73dca51a42b89093fb1ab3dd623794ca818bb3cb13c893aed539983a29925e |
iptables-libs-1.8.4-10.el8_2.4.i686.rpm | SHA-256: 83f61ef003af6b0afadfeb683d8f055688be092b2528a60703af75a63fe382bd |
iptables-libs-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: f0e3cb19d6f3bdf4b46bec67a0e5cf6b566bd53676ce8fe0c014db2a5d7076b9 |
iptables-libs-debuginfo-1.8.4-10.el8_2.4.i686.rpm | SHA-256: 964a8e348468c6bf1cabc59cc98559aec2c7da4615b0698105161bb5c7398961 |
iptables-libs-debuginfo-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: a23888b7ab715feecbb8be20a6caa1fb02d3e1fcf9fba29a51b685317fc60330 |
iptables-services-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: 56817b88389f8ffd80f5192b991fe8c79d0a3257e87568930ac8c7b57a75ac6a |
iptables-utils-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: 70b4164b9a92a9621725b484f5310ca0c7b09c0d7df7ef16d97763e05f4423f6 |
iptables-utils-debuginfo-1.8.4-10.el8_2.4.i686.rpm | SHA-256: 21ca2f89684a61d407279fdeda4aacd7b6e93f7a40829c1bc7cbcb777bd27cd1 |
iptables-utils-debuginfo-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: eeaf80039697803c8bd31efcfb9e08b185651ef538597685adb43aea09ffe805 |
Red Hat Enterprise Linux Server - AUS 8.2
SRPM | |
---|---|
iptables-1.8.4-10.el8_2.4.src.rpm | SHA-256: 1b79fccacd259a51eef17d1c4551da3013cfbce0bea72d5428312a8df57cc0ed |
x86_64 | |
iptables-1.8.4-10.el8_2.4.i686.rpm | SHA-256: bbda101b53f0d7400342c37a70333cf87ab8ed71b1075b2ab32be778f9581a03 |
iptables-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: 36e933f188fc4f6c511055435b596fd6e94058155de0b58abe13fe577eb77df6 |
iptables-arptables-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: f156e640edf7c4f7181524ee5fd8987d71e9e6c7be6316474d39d70237f93702 |
iptables-debuginfo-1.8.4-10.el8_2.4.i686.rpm | SHA-256: 912e8b7071c07f535fcb1d42c89b47123741b1b36722907291c8cd704b788a81 |
iptables-debuginfo-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: 249c5e66aab69c8618b136e7383947374995954a06ba50162d021216c8885b7d |
iptables-debugsource-1.8.4-10.el8_2.4.i686.rpm | SHA-256: cc9d4a6537fee328d7218c8978c37bdf9ec85b815d63b612b6f14777f2841514 |
iptables-debugsource-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: cb492d8e89316ff557eb14abf06612f46568b8ce09f3357803efbc9e532ba6ee |
iptables-devel-1.8.4-10.el8_2.4.i686.rpm | SHA-256: ee7221aea64e8ade2bf3f666d409d9f7f4525089558ab7769bcdd0a0c168b605 |
iptables-devel-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: 1e6e7a3d20e2a0a6904f96650b9cf7ee40c262d10205543059be5f67e93b52da |
iptables-ebtables-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: 7a73dca51a42b89093fb1ab3dd623794ca818bb3cb13c893aed539983a29925e |
iptables-libs-1.8.4-10.el8_2.4.i686.rpm | SHA-256: 83f61ef003af6b0afadfeb683d8f055688be092b2528a60703af75a63fe382bd |
iptables-libs-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: f0e3cb19d6f3bdf4b46bec67a0e5cf6b566bd53676ce8fe0c014db2a5d7076b9 |
iptables-libs-debuginfo-1.8.4-10.el8_2.4.i686.rpm | SHA-256: 964a8e348468c6bf1cabc59cc98559aec2c7da4615b0698105161bb5c7398961 |
iptables-libs-debuginfo-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: a23888b7ab715feecbb8be20a6caa1fb02d3e1fcf9fba29a51b685317fc60330 |
iptables-services-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: 56817b88389f8ffd80f5192b991fe8c79d0a3257e87568930ac8c7b57a75ac6a |
iptables-utils-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: 70b4164b9a92a9621725b484f5310ca0c7b09c0d7df7ef16d97763e05f4423f6 |
iptables-utils-debuginfo-1.8.4-10.el8_2.4.i686.rpm | SHA-256: 21ca2f89684a61d407279fdeda4aacd7b6e93f7a40829c1bc7cbcb777bd27cd1 |
iptables-utils-debuginfo-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: eeaf80039697803c8bd31efcfb9e08b185651ef538597685adb43aea09ffe805 |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2
SRPM | |
---|---|
iptables-1.8.4-10.el8_2.4.src.rpm | SHA-256: 1b79fccacd259a51eef17d1c4551da3013cfbce0bea72d5428312a8df57cc0ed |
s390x | |
iptables-1.8.4-10.el8_2.4.s390x.rpm | SHA-256: 0299f108321532e8bbb905da812001635e22fceda7ca9fdc15ea6c8f0d390754 |
iptables-arptables-1.8.4-10.el8_2.4.s390x.rpm | SHA-256: 46763bdf985e4966a96869707e88cd4b1e473eb3e9c36f2e9d5418b76a41d33a |
iptables-debuginfo-1.8.4-10.el8_2.4.s390x.rpm | SHA-256: f038f402e264144c1aae6a39377c8a117bf4729e9e952aa78563ca4d74ba2784 |
iptables-debugsource-1.8.4-10.el8_2.4.s390x.rpm | SHA-256: 54628ecc3fde56454edab6df3bf95bd7751f7b3f1751153b993eeafcefeacff9 |
iptables-devel-1.8.4-10.el8_2.4.s390x.rpm | SHA-256: 96eaa44378eb66804b0eec9c21f0bfd544e0c4357e4a72b11f7147fdfb2fa04d |
iptables-ebtables-1.8.4-10.el8_2.4.s390x.rpm | SHA-256: 40a6e8fccb1e2bfbf3d77a7958f11d96e7062d36ef65b752e72738664e2f4fd0 |
iptables-libs-1.8.4-10.el8_2.4.s390x.rpm | SHA-256: 499da51a687b0390ca48bfd24c4787f349b6346a8abb21f27b13feaf35727e7e |
iptables-libs-debuginfo-1.8.4-10.el8_2.4.s390x.rpm | SHA-256: 3abdd17af7dab104ac06bf2743a74f7735892a9f555c6ddddc8975011cbc9778 |
iptables-services-1.8.4-10.el8_2.4.s390x.rpm | SHA-256: 19a59b0fbbcbdf8f306011808ab866327ac74f3871e5066ecb6d788cf4b4678d |
iptables-utils-1.8.4-10.el8_2.4.s390x.rpm | SHA-256: aa31dfd5071d129852ef6c524ff693fa62128036eb1d19623c583ec4a0d2bb2a |
iptables-utils-debuginfo-1.8.4-10.el8_2.4.s390x.rpm | SHA-256: d96829e18f7f7244d7f5f51402795f6af3c4790221362ac58acf706795d92fc7 |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2
SRPM | |
---|---|
iptables-1.8.4-10.el8_2.4.src.rpm | SHA-256: 1b79fccacd259a51eef17d1c4551da3013cfbce0bea72d5428312a8df57cc0ed |
ppc64le | |
iptables-1.8.4-10.el8_2.4.ppc64le.rpm | SHA-256: f722e8a0c249f351156bd7f476687dbb784ff56972324ca91593949941642b95 |
iptables-arptables-1.8.4-10.el8_2.4.ppc64le.rpm | SHA-256: b1a477693e579664052b6316dacec6319a336618d81aa151c66649f976113a2d |
iptables-debuginfo-1.8.4-10.el8_2.4.ppc64le.rpm | SHA-256: fb8352da656cea3b4a95083c3b6ddcd2cd90125ab94a6ad287f3f608bd9993b7 |
iptables-debugsource-1.8.4-10.el8_2.4.ppc64le.rpm | SHA-256: 91fc4ec0487b7536f9d5c6219e7e0d98772526a1f229e6de8e2165a5907e1df4 |
iptables-devel-1.8.4-10.el8_2.4.ppc64le.rpm | SHA-256: 3871a2080a549b7e0038531a812b04c9d27315f87323307f17625bb09140df83 |
iptables-ebtables-1.8.4-10.el8_2.4.ppc64le.rpm | SHA-256: fee267dcfc1ef56997c33561e561965c4511ba111d5da11023be9aa1c0408bd7 |
iptables-libs-1.8.4-10.el8_2.4.ppc64le.rpm | SHA-256: 8908cb246547294fed287c6c67690ce8f8963941dcf048abeacc5dfb2d0e27fb |
iptables-libs-debuginfo-1.8.4-10.el8_2.4.ppc64le.rpm | SHA-256: bde94d7bedded5d084b21f5065fd5e796a5aab3ca0e1c9b5cd0d83aa03f1bf61 |
iptables-services-1.8.4-10.el8_2.4.ppc64le.rpm | SHA-256: d9a1ccd95657f776315e70adb3e3a7342a9a26dbf3da57bdb3d3b7a43a858d5d |
iptables-utils-1.8.4-10.el8_2.4.ppc64le.rpm | SHA-256: 70a6a27be40c706f8e2bbf18966f262c1f38a5896dadaa1da29fb497eddcb337 |
iptables-utils-debuginfo-1.8.4-10.el8_2.4.ppc64le.rpm | SHA-256: 09d1e4f86eac16135cdc827f53df8e7714a0f69f7e638a048f07132a258a379e |
Red Hat Enterprise Linux Server - TUS 8.2
SRPM | |
---|---|
iptables-1.8.4-10.el8_2.4.src.rpm | SHA-256: 1b79fccacd259a51eef17d1c4551da3013cfbce0bea72d5428312a8df57cc0ed |
x86_64 | |
iptables-1.8.4-10.el8_2.4.i686.rpm | SHA-256: bbda101b53f0d7400342c37a70333cf87ab8ed71b1075b2ab32be778f9581a03 |
iptables-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: 36e933f188fc4f6c511055435b596fd6e94058155de0b58abe13fe577eb77df6 |
iptables-arptables-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: f156e640edf7c4f7181524ee5fd8987d71e9e6c7be6316474d39d70237f93702 |
iptables-debuginfo-1.8.4-10.el8_2.4.i686.rpm | SHA-256: 912e8b7071c07f535fcb1d42c89b47123741b1b36722907291c8cd704b788a81 |
iptables-debuginfo-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: 249c5e66aab69c8618b136e7383947374995954a06ba50162d021216c8885b7d |
iptables-debugsource-1.8.4-10.el8_2.4.i686.rpm | SHA-256: cc9d4a6537fee328d7218c8978c37bdf9ec85b815d63b612b6f14777f2841514 |
iptables-debugsource-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: cb492d8e89316ff557eb14abf06612f46568b8ce09f3357803efbc9e532ba6ee |
iptables-devel-1.8.4-10.el8_2.4.i686.rpm | SHA-256: ee7221aea64e8ade2bf3f666d409d9f7f4525089558ab7769bcdd0a0c168b605 |
iptables-devel-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: 1e6e7a3d20e2a0a6904f96650b9cf7ee40c262d10205543059be5f67e93b52da |
iptables-ebtables-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: 7a73dca51a42b89093fb1ab3dd623794ca818bb3cb13c893aed539983a29925e |
iptables-libs-1.8.4-10.el8_2.4.i686.rpm | SHA-256: 83f61ef003af6b0afadfeb683d8f055688be092b2528a60703af75a63fe382bd |
iptables-libs-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: f0e3cb19d6f3bdf4b46bec67a0e5cf6b566bd53676ce8fe0c014db2a5d7076b9 |
iptables-libs-debuginfo-1.8.4-10.el8_2.4.i686.rpm | SHA-256: 964a8e348468c6bf1cabc59cc98559aec2c7da4615b0698105161bb5c7398961 |
iptables-libs-debuginfo-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: a23888b7ab715feecbb8be20a6caa1fb02d3e1fcf9fba29a51b685317fc60330 |
iptables-services-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: 56817b88389f8ffd80f5192b991fe8c79d0a3257e87568930ac8c7b57a75ac6a |
iptables-utils-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: 70b4164b9a92a9621725b484f5310ca0c7b09c0d7df7ef16d97763e05f4423f6 |
iptables-utils-debuginfo-1.8.4-10.el8_2.4.i686.rpm | SHA-256: 21ca2f89684a61d407279fdeda4aacd7b6e93f7a40829c1bc7cbcb777bd27cd1 |
iptables-utils-debuginfo-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: eeaf80039697803c8bd31efcfb9e08b185651ef538597685adb43aea09ffe805 |
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2
SRPM | |
---|---|
iptables-1.8.4-10.el8_2.4.src.rpm | SHA-256: 1b79fccacd259a51eef17d1c4551da3013cfbce0bea72d5428312a8df57cc0ed |
aarch64 | |
iptables-1.8.4-10.el8_2.4.aarch64.rpm | SHA-256: 802df60cac7afd12e9a99540afcd4571b47aeb872153c1356454cab0c72dbc93 |
iptables-arptables-1.8.4-10.el8_2.4.aarch64.rpm | SHA-256: 2e84d4c38c457f6ff19139e9c6b5306b953cb7fcc7a15097f09f061e47a705d4 |
iptables-debuginfo-1.8.4-10.el8_2.4.aarch64.rpm | SHA-256: c1a7aaf4e10bf66e5792091a6708bac5057aefd84ec4062013b2ff79fa83fdc9 |
iptables-debugsource-1.8.4-10.el8_2.4.aarch64.rpm | SHA-256: db7ec4e8efa0c8b984d2eb2ac49c27d46686c92cf68bcfd100425beb353d7e32 |
iptables-devel-1.8.4-10.el8_2.4.aarch64.rpm | SHA-256: afb26aaa5421716e9567934ee5ff93326787825f0fe58f80a497128eece236a6 |
iptables-ebtables-1.8.4-10.el8_2.4.aarch64.rpm | SHA-256: 821360de448065a0056da6894a4fdbd43351f0c462d7a3b6a3179997d0914b12 |
iptables-libs-1.8.4-10.el8_2.4.aarch64.rpm | SHA-256: 9c66af369ab43bc744c29afc5f205809edf58ddf782d0590848b857306e4aaa5 |
iptables-libs-debuginfo-1.8.4-10.el8_2.4.aarch64.rpm | SHA-256: 29bdc71dbc417014ef5a228982fcd50b97525e1b24c600cf034e19d9cc7dfa49 |
iptables-services-1.8.4-10.el8_2.4.aarch64.rpm | SHA-256: a601c0638621a8ce2dd86baccca4f7d81a8cbe49086856e61993b2aafdaa13c1 |
iptables-utils-1.8.4-10.el8_2.4.aarch64.rpm | SHA-256: d4692a014b21d77ded30d0adffadc5bda4bfcd9491bae000ed445b1f5cc322da |
iptables-utils-debuginfo-1.8.4-10.el8_2.4.aarch64.rpm | SHA-256: 15f5717d1918d6700ec49ecc94522aee1deca1e9dc07f6807c9f1b70ecd21c6b |
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2
SRPM | |
---|---|
iptables-1.8.4-10.el8_2.4.src.rpm | SHA-256: 1b79fccacd259a51eef17d1c4551da3013cfbce0bea72d5428312a8df57cc0ed |
ppc64le | |
iptables-1.8.4-10.el8_2.4.ppc64le.rpm | SHA-256: f722e8a0c249f351156bd7f476687dbb784ff56972324ca91593949941642b95 |
iptables-arptables-1.8.4-10.el8_2.4.ppc64le.rpm | SHA-256: b1a477693e579664052b6316dacec6319a336618d81aa151c66649f976113a2d |
iptables-debuginfo-1.8.4-10.el8_2.4.ppc64le.rpm | SHA-256: fb8352da656cea3b4a95083c3b6ddcd2cd90125ab94a6ad287f3f608bd9993b7 |
iptables-debugsource-1.8.4-10.el8_2.4.ppc64le.rpm | SHA-256: 91fc4ec0487b7536f9d5c6219e7e0d98772526a1f229e6de8e2165a5907e1df4 |
iptables-devel-1.8.4-10.el8_2.4.ppc64le.rpm | SHA-256: 3871a2080a549b7e0038531a812b04c9d27315f87323307f17625bb09140df83 |
iptables-ebtables-1.8.4-10.el8_2.4.ppc64le.rpm | SHA-256: fee267dcfc1ef56997c33561e561965c4511ba111d5da11023be9aa1c0408bd7 |
iptables-libs-1.8.4-10.el8_2.4.ppc64le.rpm | SHA-256: 8908cb246547294fed287c6c67690ce8f8963941dcf048abeacc5dfb2d0e27fb |
iptables-libs-debuginfo-1.8.4-10.el8_2.4.ppc64le.rpm | SHA-256: bde94d7bedded5d084b21f5065fd5e796a5aab3ca0e1c9b5cd0d83aa03f1bf61 |
iptables-services-1.8.4-10.el8_2.4.ppc64le.rpm | SHA-256: d9a1ccd95657f776315e70adb3e3a7342a9a26dbf3da57bdb3d3b7a43a858d5d |
iptables-utils-1.8.4-10.el8_2.4.ppc64le.rpm | SHA-256: 70a6a27be40c706f8e2bbf18966f262c1f38a5896dadaa1da29fb497eddcb337 |
iptables-utils-debuginfo-1.8.4-10.el8_2.4.ppc64le.rpm | SHA-256: 09d1e4f86eac16135cdc827f53df8e7714a0f69f7e638a048f07132a258a379e |
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2
SRPM | |
---|---|
iptables-1.8.4-10.el8_2.4.src.rpm | SHA-256: 1b79fccacd259a51eef17d1c4551da3013cfbce0bea72d5428312a8df57cc0ed |
x86_64 | |
iptables-1.8.4-10.el8_2.4.i686.rpm | SHA-256: bbda101b53f0d7400342c37a70333cf87ab8ed71b1075b2ab32be778f9581a03 |
iptables-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: 36e933f188fc4f6c511055435b596fd6e94058155de0b58abe13fe577eb77df6 |
iptables-arptables-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: f156e640edf7c4f7181524ee5fd8987d71e9e6c7be6316474d39d70237f93702 |
iptables-debuginfo-1.8.4-10.el8_2.4.i686.rpm | SHA-256: 912e8b7071c07f535fcb1d42c89b47123741b1b36722907291c8cd704b788a81 |
iptables-debuginfo-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: 249c5e66aab69c8618b136e7383947374995954a06ba50162d021216c8885b7d |
iptables-debugsource-1.8.4-10.el8_2.4.i686.rpm | SHA-256: cc9d4a6537fee328d7218c8978c37bdf9ec85b815d63b612b6f14777f2841514 |
iptables-debugsource-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: cb492d8e89316ff557eb14abf06612f46568b8ce09f3357803efbc9e532ba6ee |
iptables-devel-1.8.4-10.el8_2.4.i686.rpm | SHA-256: ee7221aea64e8ade2bf3f666d409d9f7f4525089558ab7769bcdd0a0c168b605 |
iptables-devel-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: 1e6e7a3d20e2a0a6904f96650b9cf7ee40c262d10205543059be5f67e93b52da |
iptables-ebtables-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: 7a73dca51a42b89093fb1ab3dd623794ca818bb3cb13c893aed539983a29925e |
iptables-libs-1.8.4-10.el8_2.4.i686.rpm | SHA-256: 83f61ef003af6b0afadfeb683d8f055688be092b2528a60703af75a63fe382bd |
iptables-libs-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: f0e3cb19d6f3bdf4b46bec67a0e5cf6b566bd53676ce8fe0c014db2a5d7076b9 |
iptables-libs-debuginfo-1.8.4-10.el8_2.4.i686.rpm | SHA-256: 964a8e348468c6bf1cabc59cc98559aec2c7da4615b0698105161bb5c7398961 |
iptables-libs-debuginfo-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: a23888b7ab715feecbb8be20a6caa1fb02d3e1fcf9fba29a51b685317fc60330 |
iptables-services-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: 56817b88389f8ffd80f5192b991fe8c79d0a3257e87568930ac8c7b57a75ac6a |
iptables-utils-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: 70b4164b9a92a9621725b484f5310ca0c7b09c0d7df7ef16d97763e05f4423f6 |
iptables-utils-debuginfo-1.8.4-10.el8_2.4.i686.rpm | SHA-256: 21ca2f89684a61d407279fdeda4aacd7b6e93f7a40829c1bc7cbcb777bd27cd1 |
iptables-utils-debuginfo-1.8.4-10.el8_2.4.x86_64.rpm | SHA-256: eeaf80039697803c8bd31efcfb9e08b185651ef538597685adb43aea09ffe805 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.