Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2023:7184 - Bug Fix Advisory
Issued:
2023-11-14
Updated:
2023-11-14

RHBA-2023:7184 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

iptables bug fix and enhancement update

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for iptables is now available for Red Hat Enterprise Linux 8.

Description

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.9 Release Notes linked from the References section.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 8 s390x
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
  • Red Hat Enterprise Linux for ARM 64 8 aarch64

Fixes

  • BZ - 2145144 - libxtables: Revert change to struct xtables_pprot
  • BZ - 2211063 - Rebase package to upstream version 1.8.5
  • BZ - 2236501 - Cannot run iptables-restore with iptables 1.8.5-8

CVEs

(none)

References

  • https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.9_release_notes/index
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 8

SRPM
iptables-1.8.5-10.el8_9.src.rpm SHA-256: 910422b3ebe1990445e7e23be7258fa7f10ce5838544b8a94b422cd4f23a155d
x86_64
iptables-1.8.5-10.el8_9.i686.rpm SHA-256: b7e4f53420d71fb41e61140ca817bcb92fe247aa1ddb291b49abc258397cc43f
iptables-1.8.5-10.el8_9.x86_64.rpm SHA-256: 1fb8941e11702906043ebe3e39f21ad9108239a69c7d23630cfcf82cdd1714b9
iptables-arptables-1.8.5-10.el8_9.x86_64.rpm SHA-256: 46297404d73802eff1136498a7c7eeb61ceaa7c17e56d8fa1034801cf089317d
iptables-debuginfo-1.8.5-10.el8_9.i686.rpm SHA-256: 353a5fa0ef05b1c5455d5ceee444ae83bf9c112aca46345a0ea73cdbed61d8c1
iptables-debuginfo-1.8.5-10.el8_9.x86_64.rpm SHA-256: 17a5bff25f300e63ea12bdb63183f41672155797946c7b164435093bf8ce4a16
iptables-debugsource-1.8.5-10.el8_9.i686.rpm SHA-256: 95b4988636a5d04f84c8b39b5040412a6b4dbfbbfdcf4a4102e8bd2ff4d02bca
iptables-debugsource-1.8.5-10.el8_9.x86_64.rpm SHA-256: 3f111ec65231fdae26398cfea093b6cae2763e86bdae14c4617d6218092872e9
iptables-devel-1.8.5-10.el8_9.i686.rpm SHA-256: c678efd58c4451d9ec20c80f34e220a94ecafe3bf55fc623e9b64878ba91e8c5
iptables-devel-1.8.5-10.el8_9.x86_64.rpm SHA-256: 1ac68bfc87c60fcea10605317b6d1a5c7ba2044bb1a294b9acc6cb89738b63df
iptables-ebtables-1.8.5-10.el8_9.x86_64.rpm SHA-256: bba0069c369c3f750242c16705e320caaf76bcebfb2b7468a57d07d4e3497a8c
iptables-libs-1.8.5-10.el8_9.i686.rpm SHA-256: 02bc0c29112ecda43097328bd6203b9bf48a470ddfc19ea9327e7429342e792d
iptables-libs-1.8.5-10.el8_9.x86_64.rpm SHA-256: f26e92988739c3c7d6904a4cfc7ecb42ebe9f6b1ad1136c89bd7a51a9fa5cdff
iptables-libs-debuginfo-1.8.5-10.el8_9.i686.rpm SHA-256: d23e1d18ad22dba4a2cd0a453dca07c58d89d495a7f03f322b0ec50920c253a8
iptables-libs-debuginfo-1.8.5-10.el8_9.x86_64.rpm SHA-256: 6b7224ea4ad328650d2b224998f7d7b910fbaf5f1d454887a10fe13a65c00b8b
iptables-services-1.8.5-10.el8_9.x86_64.rpm SHA-256: f44005ae5330e50785a987e44eaedf840e6f2e6fc81c4d045d69aa261c0e3cec
iptables-utils-1.8.5-10.el8_9.x86_64.rpm SHA-256: d32ab026b8cb9493c0cf4fb3758f1c304dc21237d99959bfa53530adb105defd
iptables-utils-debuginfo-1.8.5-10.el8_9.i686.rpm SHA-256: 2278bf040f936c95045c0b72d7f8ac2a798a8441a7bf9225aaea69396d908355
iptables-utils-debuginfo-1.8.5-10.el8_9.x86_64.rpm SHA-256: dc731f492cc289e28bd9aba611a091f413f9592055f6d95901dfd16ab2f7948b

Red Hat Enterprise Linux for IBM z Systems 8

SRPM
iptables-1.8.5-10.el8_9.src.rpm SHA-256: 910422b3ebe1990445e7e23be7258fa7f10ce5838544b8a94b422cd4f23a155d
s390x
iptables-1.8.5-10.el8_9.s390x.rpm SHA-256: 9e2935d6768f6095e7236f5de50f4599a70b00604ba5452600eb3167ceaaeb7e
iptables-arptables-1.8.5-10.el8_9.s390x.rpm SHA-256: b11ea0f682d691b26f278023812a35049fd0dc21aec346f8d343fa0f5bdbcbe6
iptables-debuginfo-1.8.5-10.el8_9.s390x.rpm SHA-256: 9c07a755e56ebfa39b8da0ebafe0434bfab3e737e9902a8386ddd1f75bf9de8b
iptables-debugsource-1.8.5-10.el8_9.s390x.rpm SHA-256: 5e890d021f8289e12701b82aa983878fdc0b3f1f9154dbf862cbc01bd0dfcafc
iptables-devel-1.8.5-10.el8_9.s390x.rpm SHA-256: 9e1579707605d0871bf9071e6f41a87c5fa46d9b539b4a865171ef861003790a
iptables-ebtables-1.8.5-10.el8_9.s390x.rpm SHA-256: 207a2cf89014e8f1948f0a8c0c8da63d647d13e6fac23abdb4ce5dc1e7236c2a
iptables-libs-1.8.5-10.el8_9.s390x.rpm SHA-256: 9809664f93a52cff2658e2ac4b793d5bb07ba4f8f4b139920700cae763da626a
iptables-libs-debuginfo-1.8.5-10.el8_9.s390x.rpm SHA-256: 46ec50d0254240e5e24fe9e3cbe1ae5a517d14dea0a99e88c982b802df42288b
iptables-services-1.8.5-10.el8_9.s390x.rpm SHA-256: 4f4a4f8dac190ede65104372290183e3d469a41532faf2c1acd493e1140b12f5
iptables-utils-1.8.5-10.el8_9.s390x.rpm SHA-256: 9cc89a3fb44c66dca97ba7751a8ce3553d255492981ab974404c8cb6993a100c
iptables-utils-debuginfo-1.8.5-10.el8_9.s390x.rpm SHA-256: c1d2bf90db0af7783fab364180463e12f7fb2be65c141cd7824bcce0ec3985d6

Red Hat Enterprise Linux for Power, little endian 8

SRPM
iptables-1.8.5-10.el8_9.src.rpm SHA-256: 910422b3ebe1990445e7e23be7258fa7f10ce5838544b8a94b422cd4f23a155d
ppc64le
iptables-1.8.5-10.el8_9.ppc64le.rpm SHA-256: d4f3951d888bf364ee4aa86e8ac32e3e8040c18f1863647b594d41b9192e0356
iptables-arptables-1.8.5-10.el8_9.ppc64le.rpm SHA-256: e32ab94c2fcc828188ba5dfad2fbadfea1a52a77a4a31b0a19928f5214ebd9b7
iptables-debuginfo-1.8.5-10.el8_9.ppc64le.rpm SHA-256: 553d3c9d2bcc98a11189c009a67ed1a6966d5adbdef2cf5e97723343222141d9
iptables-debugsource-1.8.5-10.el8_9.ppc64le.rpm SHA-256: 256e55f25956b9c0d19917904f4323492c0abc57d7d323c01a304f8d6f6955ac
iptables-devel-1.8.5-10.el8_9.ppc64le.rpm SHA-256: 146bf7b951ce4e8d43f7955a987fc4c5e6efa44f56e54840f01fc44cd16ea625
iptables-ebtables-1.8.5-10.el8_9.ppc64le.rpm SHA-256: c446fd24c89a6e50e543fabba8c47774538f92c645969eaf526ceae8af5e1708
iptables-libs-1.8.5-10.el8_9.ppc64le.rpm SHA-256: b09bfeb77007c7ba52af089307d1d35ca7e11a64215632063c87933a0ffe2470
iptables-libs-debuginfo-1.8.5-10.el8_9.ppc64le.rpm SHA-256: 1c459a7771fcfc9cef37aab2728a453a3a1167f713a2140424430757c0920c90
iptables-services-1.8.5-10.el8_9.ppc64le.rpm SHA-256: dcf4fcbe6aabf3c72fa34c4073f3d05b09e394632762fd71447f6b70840159b4
iptables-utils-1.8.5-10.el8_9.ppc64le.rpm SHA-256: 5e369bacfd412355f5997aab4f47ef664a8f437717700996d32e9ff6bbfa9b90
iptables-utils-debuginfo-1.8.5-10.el8_9.ppc64le.rpm SHA-256: ab3c97a897f95b1c0cf7c335358c35682d0c902c749a69b279abbed2211e4a7b

Red Hat Enterprise Linux for ARM 64 8

SRPM
iptables-1.8.5-10.el8_9.src.rpm SHA-256: 910422b3ebe1990445e7e23be7258fa7f10ce5838544b8a94b422cd4f23a155d
aarch64
iptables-1.8.5-10.el8_9.aarch64.rpm SHA-256: 502f7746b9fd215c7d75eba38ff5dfa162f114f0f32ed78481477af6775b8af0
iptables-arptables-1.8.5-10.el8_9.aarch64.rpm SHA-256: bffbafc7ec744a0160a84eea141c355afe6dca4b4545e6165f1c92e63ffb2304
iptables-debuginfo-1.8.5-10.el8_9.aarch64.rpm SHA-256: 03f6e756fe51af2de22d2ebb6362e85d114b406a5c68c2bd80fd58916000765a
iptables-debugsource-1.8.5-10.el8_9.aarch64.rpm SHA-256: 5b9395654e335904d72f4783a6ddd59ee1339cd191737a5d79e4c8d482ecfe91
iptables-devel-1.8.5-10.el8_9.aarch64.rpm SHA-256: 861e855115c7fb454a05c91b3b2563f782ff530875aa62198015feb147b72910
iptables-ebtables-1.8.5-10.el8_9.aarch64.rpm SHA-256: b450ff27e955b26b4bea9bf7609fa102246842099aea781069bf24baa8f8b5cf
iptables-libs-1.8.5-10.el8_9.aarch64.rpm SHA-256: e911a2d31a2f69bc18ed38d7d54936d3a6a4972d30975f121fd534e81f45ec2f
iptables-libs-debuginfo-1.8.5-10.el8_9.aarch64.rpm SHA-256: 46817ac246f8d8d43cda72cdaf49b164d1ceac0bcd9b729a7b35f8751112df4b
iptables-services-1.8.5-10.el8_9.aarch64.rpm SHA-256: 112460414c717613b02d1ad1892b395efc85d73dfdcb005e6af80e22923163cc
iptables-utils-1.8.5-10.el8_9.aarch64.rpm SHA-256: 92f1a80bfa6f12ef5a93fe01ba3d0f23461d0ec084550f5020496a546100c479
iptables-utils-debuginfo-1.8.5-10.el8_9.aarch64.rpm SHA-256: 10a15f9472c15507d54f7d506cd8d812735d1025c538bf61b255619ea77154e9

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility