- Issued:
- 2012-10-30
- Updated:
- 2012-10-30
RHEA-2012:1415 - Product Enhancement Advisory
Synopsis
iptables enhancement update
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated iptables packages that add an enhancement are now available for Red Hat
Enterprise Linux 5.
Description
The iptables utility controls the network packet filtering code in the Linux
kernel.
This update adds the following enhancement:
- A new iptables module has been added that allows to configure the
Differentiated Services Code Point (DSCP) match extension for the IPv6 protocol.
(BZ#847729)
Users are advised to upgrade to these updated iptables packages, which add this
enhancement.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
iptables-1.3.5-9.2.el5_8.src.rpm | SHA-256: 0eefbfc8f44f3f958898e80ec1ab6133919d617424595682e9e69015ab4a5568 |
x86_64 | |
iptables-1.3.5-9.2.el5_8.x86_64.rpm | SHA-256: 5d1a3e36b49c08921afd1bb4285bae52a52b06f35f24779089e9d10413355c0c |
iptables-debuginfo-1.3.5-9.2.el5_8.i386.rpm | SHA-256: 925a9935e358a9798377ae7d779a7edf7a0f4bf202f54563d61e861f8a4f99bc |
iptables-debuginfo-1.3.5-9.2.el5_8.x86_64.rpm | SHA-256: d7a6d6b177201233b5c48f10544e100dd955a242aebee2fcb9f4dae8b0591dc7 |
iptables-devel-1.3.5-9.2.el5_8.i386.rpm | SHA-256: 7b69e813efc2736bce5eb115d5532ebc1664b653461e2af692d42293ee40b5bb |
iptables-devel-1.3.5-9.2.el5_8.x86_64.rpm | SHA-256: fe637bbd4fd3073b42b4b13b171ec5b2f389dae2126c675a174610b4362744d0 |
iptables-ipv6-1.3.5-9.2.el5_8.x86_64.rpm | SHA-256: fd380a1b1ac8d5398945205a3c42e4f47a8df930d38361a1b9003c2324688dc6 |
ia64 | |
iptables-1.3.5-9.2.el5_8.ia64.rpm | SHA-256: d13efaf2c327e3f7bae397f7737a8d0c3fa1c2412610a5db46e5c6fb89679c24 |
iptables-debuginfo-1.3.5-9.2.el5_8.ia64.rpm | SHA-256: ef2b24679b6ac6811d4facb86b261dc55e2ea691bed413d99b8dabbf7a87ca67 |
iptables-devel-1.3.5-9.2.el5_8.ia64.rpm | SHA-256: 8557f00d17b5ef9cea34749e82bc673d20d5656aa12df5ef9c5b640713cf2442 |
iptables-ipv6-1.3.5-9.2.el5_8.ia64.rpm | SHA-256: 8af6c666faf7d3dbceb8b88567b7693e7adcf99671427afe1452b923d4a624d6 |
i386 | |
iptables-1.3.5-9.2.el5_8.i386.rpm | SHA-256: 281f3571ccca9e786907c279898ba823de274893a9c30fa7860ef7e3942b221a |
iptables-debuginfo-1.3.5-9.2.el5_8.i386.rpm | SHA-256: 925a9935e358a9798377ae7d779a7edf7a0f4bf202f54563d61e861f8a4f99bc |
iptables-devel-1.3.5-9.2.el5_8.i386.rpm | SHA-256: 7b69e813efc2736bce5eb115d5532ebc1664b653461e2af692d42293ee40b5bb |
iptables-ipv6-1.3.5-9.2.el5_8.i386.rpm | SHA-256: cbd4f0b570cd3c61fe13e56d451b8092c5a65e5ad9f8e68e4f5d25adc413a2d9 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
iptables-1.3.5-9.2.el5_8.src.rpm | SHA-256: 0eefbfc8f44f3f958898e80ec1ab6133919d617424595682e9e69015ab4a5568 |
x86_64 | |
iptables-1.3.5-9.2.el5_8.x86_64.rpm | SHA-256: 5d1a3e36b49c08921afd1bb4285bae52a52b06f35f24779089e9d10413355c0c |
iptables-debuginfo-1.3.5-9.2.el5_8.i386.rpm | SHA-256: 925a9935e358a9798377ae7d779a7edf7a0f4bf202f54563d61e861f8a4f99bc |
iptables-debuginfo-1.3.5-9.2.el5_8.x86_64.rpm | SHA-256: d7a6d6b177201233b5c48f10544e100dd955a242aebee2fcb9f4dae8b0591dc7 |
iptables-debuginfo-1.3.5-9.2.el5_8.x86_64.rpm | SHA-256: d7a6d6b177201233b5c48f10544e100dd955a242aebee2fcb9f4dae8b0591dc7 |
iptables-devel-1.3.5-9.2.el5_8.i386.rpm | SHA-256: 7b69e813efc2736bce5eb115d5532ebc1664b653461e2af692d42293ee40b5bb |
iptables-devel-1.3.5-9.2.el5_8.x86_64.rpm | SHA-256: fe637bbd4fd3073b42b4b13b171ec5b2f389dae2126c675a174610b4362744d0 |
iptables-ipv6-1.3.5-9.2.el5_8.x86_64.rpm | SHA-256: fd380a1b1ac8d5398945205a3c42e4f47a8df930d38361a1b9003c2324688dc6 |
i386 | |
iptables-1.3.5-9.2.el5_8.i386.rpm | SHA-256: 281f3571ccca9e786907c279898ba823de274893a9c30fa7860ef7e3942b221a |
iptables-debuginfo-1.3.5-9.2.el5_8.i386.rpm | SHA-256: 925a9935e358a9798377ae7d779a7edf7a0f4bf202f54563d61e861f8a4f99bc |
iptables-debuginfo-1.3.5-9.2.el5_8.i386.rpm | SHA-256: 925a9935e358a9798377ae7d779a7edf7a0f4bf202f54563d61e861f8a4f99bc |
iptables-devel-1.3.5-9.2.el5_8.i386.rpm | SHA-256: 7b69e813efc2736bce5eb115d5532ebc1664b653461e2af692d42293ee40b5bb |
iptables-ipv6-1.3.5-9.2.el5_8.i386.rpm | SHA-256: cbd4f0b570cd3c61fe13e56d451b8092c5a65e5ad9f8e68e4f5d25adc413a2d9 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
iptables-1.3.5-9.2.el5_8.src.rpm | SHA-256: 0eefbfc8f44f3f958898e80ec1ab6133919d617424595682e9e69015ab4a5568 |
x86_64 | |
iptables-1.3.5-9.2.el5_8.x86_64.rpm | SHA-256: 5d1a3e36b49c08921afd1bb4285bae52a52b06f35f24779089e9d10413355c0c |
iptables-debuginfo-1.3.5-9.2.el5_8.x86_64.rpm | SHA-256: d7a6d6b177201233b5c48f10544e100dd955a242aebee2fcb9f4dae8b0591dc7 |
iptables-ipv6-1.3.5-9.2.el5_8.x86_64.rpm | SHA-256: fd380a1b1ac8d5398945205a3c42e4f47a8df930d38361a1b9003c2324688dc6 |
i386 | |
iptables-1.3.5-9.2.el5_8.i386.rpm | SHA-256: 281f3571ccca9e786907c279898ba823de274893a9c30fa7860ef7e3942b221a |
iptables-debuginfo-1.3.5-9.2.el5_8.i386.rpm | SHA-256: 925a9935e358a9798377ae7d779a7edf7a0f4bf202f54563d61e861f8a4f99bc |
iptables-ipv6-1.3.5-9.2.el5_8.i386.rpm | SHA-256: cbd4f0b570cd3c61fe13e56d451b8092c5a65e5ad9f8e68e4f5d25adc413a2d9 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
iptables-1.3.5-9.2.el5_8.src.rpm | SHA-256: 0eefbfc8f44f3f958898e80ec1ab6133919d617424595682e9e69015ab4a5568 |
s390x | |
iptables-1.3.5-9.2.el5_8.s390x.rpm | SHA-256: 3cd14b6c1290d0d68a57eb4f26d6228268d3dcce1a6633aed2a023df13abcf77 |
iptables-debuginfo-1.3.5-9.2.el5_8.s390.rpm | SHA-256: 5f9b40e258586446b03b3a36371ec0da74ecd34a69b4f2e30b58dc92788262bf |
iptables-debuginfo-1.3.5-9.2.el5_8.s390x.rpm | SHA-256: 49d4eb7cf1b172a7bf76753f896be32e0e00ba339b75c69f64598d0c5099253d |
iptables-devel-1.3.5-9.2.el5_8.s390.rpm | SHA-256: 4924ba78a4d7318669aedb8ec144670fa7caba3d1ef15194dc75f7cf9d9cac39 |
iptables-devel-1.3.5-9.2.el5_8.s390x.rpm | SHA-256: c98d4a22d48bd09d436a2e4419bda2c320b4d76bb07cb831e987228472eeade9 |
iptables-ipv6-1.3.5-9.2.el5_8.s390x.rpm | SHA-256: 40e5f06324f4aa1330c90d138ad3897ec5662d9f115e58c093d92e60aa436986 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
iptables-1.3.5-9.2.el5_8.src.rpm | SHA-256: 0eefbfc8f44f3f958898e80ec1ab6133919d617424595682e9e69015ab4a5568 |
ppc | |
iptables-1.3.5-9.2.el5_8.ppc.rpm | SHA-256: eef4332f278a0262dfecf4584f37ef244e2f1b4162e3e6f60677eee71d346e79 |
iptables-1.3.5-9.2.el5_8.ppc64.rpm | SHA-256: 55bd7080d3c29f1438c5218bd549436887922fad11ae94a7eaf961950a8a6edb |
iptables-debuginfo-1.3.5-9.2.el5_8.ppc.rpm | SHA-256: c3d32cd772364745ffb5c302f6b1b91d48be3de692998e695275167542572bb8 |
iptables-debuginfo-1.3.5-9.2.el5_8.ppc64.rpm | SHA-256: 228daeea8d72b9be987f16bed5e370b40fd68b92fc269b5392190213ca9cb0f5 |
iptables-devel-1.3.5-9.2.el5_8.ppc.rpm | SHA-256: 3b03161a3432ac1e9e3306fcb2a7f6ab5346bbe8f9f7a3479e18b563bf174969 |
iptables-devel-1.3.5-9.2.el5_8.ppc64.rpm | SHA-256: 074a0e3b01463bda3c6e2d297eb16f22beae756706b7116a388102294ad800be |
iptables-ipv6-1.3.5-9.2.el5_8.ppc.rpm | SHA-256: e3363de50cc576a41c77777899275c6074378e8f91456db00b1534daee685aa6 |
iptables-ipv6-1.3.5-9.2.el5_8.ppc64.rpm | SHA-256: 59c9f168144afc2211b4c0f33b38823772718d1546f800023186e686a5a21db1 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
iptables-1.3.5-9.2.el5_8.src.rpm | SHA-256: 0eefbfc8f44f3f958898e80ec1ab6133919d617424595682e9e69015ab4a5568 |
x86_64 | |
iptables-1.3.5-9.2.el5_8.x86_64.rpm | SHA-256: 5d1a3e36b49c08921afd1bb4285bae52a52b06f35f24779089e9d10413355c0c |
iptables-debuginfo-1.3.5-9.2.el5_8.i386.rpm | SHA-256: 925a9935e358a9798377ae7d779a7edf7a0f4bf202f54563d61e861f8a4f99bc |
iptables-debuginfo-1.3.5-9.2.el5_8.x86_64.rpm | SHA-256: d7a6d6b177201233b5c48f10544e100dd955a242aebee2fcb9f4dae8b0591dc7 |
iptables-devel-1.3.5-9.2.el5_8.i386.rpm | SHA-256: 7b69e813efc2736bce5eb115d5532ebc1664b653461e2af692d42293ee40b5bb |
iptables-devel-1.3.5-9.2.el5_8.x86_64.rpm | SHA-256: fe637bbd4fd3073b42b4b13b171ec5b2f389dae2126c675a174610b4362744d0 |
iptables-ipv6-1.3.5-9.2.el5_8.x86_64.rpm | SHA-256: fd380a1b1ac8d5398945205a3c42e4f47a8df930d38361a1b9003c2324688dc6 |
i386 | |
iptables-1.3.5-9.2.el5_8.i386.rpm | SHA-256: 281f3571ccca9e786907c279898ba823de274893a9c30fa7860ef7e3942b221a |
iptables-debuginfo-1.3.5-9.2.el5_8.i386.rpm | SHA-256: 925a9935e358a9798377ae7d779a7edf7a0f4bf202f54563d61e861f8a4f99bc |
iptables-devel-1.3.5-9.2.el5_8.i386.rpm | SHA-256: 7b69e813efc2736bce5eb115d5532ebc1664b653461e2af692d42293ee40b5bb |
iptables-ipv6-1.3.5-9.2.el5_8.i386.rpm | SHA-256: cbd4f0b570cd3c61fe13e56d451b8092c5a65e5ad9f8e68e4f5d25adc413a2d9 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.