Updated nmap packages that fix one bug are now available for Red Hat EnterpriseLinux 6.

The nmap packages provide a network exploration utility and a security scanner.This update fixes the following bug:* Previously, the ncat utility printed debug messages even in verbose mode. As aconsequence, after connecting through an HTTP proxy, a debug message wasdisplayed together with the received data, which could interfere with theautomated processing of standard output. With this update, ncat prints debugmessages only in verbose mode as expected. (BZ#1000770)Users of nmap are advised to upgrade to these updated packages, which fix thisbug.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258Red Hat Enterprise Linux Desktop FasTrack (v. 6)

SRPMS:
nmap-5.51-4.el6.src.rpm
    MD5: 1797d80788b9119ac73a64c109f8f5cdSHA-256: f1e8d8f84eb13d22f0588e2f6888b186d5c9bf7e73184213926b74a21e1202be
 
IA-32:
nmap-5.51-4.el6.i686.rpm
    MD5: 4145f95b13bb9a176708d9a2fc4807eaSHA-256: e2f499b926d8e6edb10e58c97ad858c0128739b430519bd86eff777826df0f0c
nmap-debuginfo-5.51-4.el6.i686.rpm
    MD5: 5f84062ee4d54b907a3be13a866fafd5SHA-256: 445e2ef6e61b62937e5519d3949198a0c1a83b31a986168a50cade3fe10a8e1f
nmap-frontend-5.51-4.el6.noarch.rpm
    MD5: 936266a2d19f77b1a211826470c737dfSHA-256: 05838878dbdbad31ea9f924b93e1493761dfddd0d3cfdf6020e11698dcdea4ca
 
x86_64:
nmap-5.51-4.el6.x86_64.rpm
    MD5: 3fe86428880bdef24fb3f0e20d0436a7SHA-256: 635bf098b64d93b9b6d6d0d47bc320c5cb2d72cca44b78632289ba3161d3b08f
nmap-debuginfo-5.51-4.el6.x86_64.rpm
    MD5: 664b1f091f905448fe8824e600fee743SHA-256: 4acf4d7de3f7e96e1ac3ec321880b3c477a1d20db75eb9e0dc2250adb0586bff
nmap-frontend-5.51-4.el6.noarch.rpm
    MD5: 936266a2d19f77b1a211826470c737dfSHA-256: 05838878dbdbad31ea9f924b93e1493761dfddd0d3cfdf6020e11698dcdea4ca
 
Red Hat Enterprise Linux Server FasTrack (v. 6)

SRPMS:
nmap-5.51-4.el6.src.rpm
    MD5: 1797d80788b9119ac73a64c109f8f5cdSHA-256: f1e8d8f84eb13d22f0588e2f6888b186d5c9bf7e73184213926b74a21e1202be
 
IA-32:
nmap-5.51-4.el6.i686.rpm
    MD5: 4145f95b13bb9a176708d9a2fc4807eaSHA-256: e2f499b926d8e6edb10e58c97ad858c0128739b430519bd86eff777826df0f0c
nmap-debuginfo-5.51-4.el6.i686.rpm
    MD5: 5f84062ee4d54b907a3be13a866fafd5SHA-256: 445e2ef6e61b62937e5519d3949198a0c1a83b31a986168a50cade3fe10a8e1f
nmap-frontend-5.51-4.el6.noarch.rpm
    MD5: 936266a2d19f77b1a211826470c737dfSHA-256: 05838878dbdbad31ea9f924b93e1493761dfddd0d3cfdf6020e11698dcdea4ca
 
PPC:
nmap-5.51-4.el6.ppc64.rpm
    MD5: 125c86507a010ae6f004450275ce3709SHA-256: 31c3faca487de4a129921b6243cb8e4ae520f94cd1ee3d5def295b4b17466075
nmap-debuginfo-5.51-4.el6.ppc64.rpm
    MD5: cbab88e75302b1bc5319a6ae075be3f1SHA-256: a99003571f2da344d6a716d53bc07685d69c451333b9b3e4d0683b0780cfb791
nmap-frontend-5.51-4.el6.noarch.rpm
    MD5: 936266a2d19f77b1a211826470c737dfSHA-256: 05838878dbdbad31ea9f924b93e1493761dfddd0d3cfdf6020e11698dcdea4ca
 
s390x:
nmap-5.51-4.el6.s390x.rpm
    MD5: c64fcb275171f80b864a8bc2310d79b9SHA-256: 6c6ade89ce535f99dd5cb8d36c8627964c8c48e028a34c15b2cd7c3eddd3b839
nmap-debuginfo-5.51-4.el6.s390x.rpm
    MD5: b322b1159363c12992220187d2e4a490SHA-256: 3d341942d2284888edfe5cde3b525337817a59189ef7c21df069cff9a292ba73
nmap-frontend-5.51-4.el6.noarch.rpm
    MD5: 936266a2d19f77b1a211826470c737dfSHA-256: 05838878dbdbad31ea9f924b93e1493761dfddd0d3cfdf6020e11698dcdea4ca
 
x86_64:
nmap-5.51-4.el6.x86_64.rpm
    MD5: 3fe86428880bdef24fb3f0e20d0436a7SHA-256: 635bf098b64d93b9b6d6d0d47bc320c5cb2d72cca44b78632289ba3161d3b08f
nmap-debuginfo-5.51-4.el6.x86_64.rpm
    MD5: 664b1f091f905448fe8824e600fee743SHA-256: 4acf4d7de3f7e96e1ac3ec321880b3c477a1d20db75eb9e0dc2250adb0586bff
nmap-frontend-5.51-4.el6.noarch.rpm
    MD5: 936266a2d19f77b1a211826470c737dfSHA-256: 05838878dbdbad31ea9f924b93e1493761dfddd0d3cfdf6020e11698dcdea4ca
 
Red Hat Enterprise Linux Workstation FasTrack (v. 6)

SRPMS:
nmap-5.51-4.el6.src.rpm
    MD5: 1797d80788b9119ac73a64c109f8f5cdSHA-256: f1e8d8f84eb13d22f0588e2f6888b186d5c9bf7e73184213926b74a21e1202be
 
IA-32:
nmap-5.51-4.el6.i686.rpm
    MD5: 4145f95b13bb9a176708d9a2fc4807eaSHA-256: e2f499b926d8e6edb10e58c97ad858c0128739b430519bd86eff777826df0f0c
nmap-debuginfo-5.51-4.el6.i686.rpm
    MD5: 5f84062ee4d54b907a3be13a866fafd5SHA-256: 445e2ef6e61b62937e5519d3949198a0c1a83b31a986168a50cade3fe10a8e1f
nmap-frontend-5.51-4.el6.noarch.rpm
    MD5: 936266a2d19f77b1a211826470c737dfSHA-256: 05838878dbdbad31ea9f924b93e1493761dfddd0d3cfdf6020e11698dcdea4ca
 
x86_64:
nmap-5.51-4.el6.x86_64.rpm
    MD5: 3fe86428880bdef24fb3f0e20d0436a7SHA-256: 635bf098b64d93b9b6d6d0d47bc320c5cb2d72cca44b78632289ba3161d3b08f
nmap-debuginfo-5.51-4.el6.x86_64.rpm
    MD5: 664b1f091f905448fe8824e600fee743SHA-256: 4acf4d7de3f7e96e1ac3ec321880b3c477a1d20db75eb9e0dc2250adb0586bff
nmap-frontend-5.51-4.el6.noarch.rpm
    MD5: 936266a2d19f77b1a211826470c737dfSHA-256: 05838878dbdbad31ea9f924b93e1493761dfddd0d3cfdf6020e11698dcdea4ca
 
(The unlinked packages above are only available from the Red Hat Network)
1000770 – ncat displays debug message during normal use

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply