Updated nc packages that add two enhancements are now available for Red HatEnterprise Linux 6.

The nc packages contain the nc (or netcat) utility for reading and writing dataacross network connections, by using the TCP and UDP protocols. Also, netcat canbe used as a feature-rich network debugging and exploration tool, as netcat cancreate many different connections and has numerous built-in capabilities.This update adds the following enhancements:* With this update, the netcat utility can handle HTTP/1.1 proxy responses,which certain proxies send in response to HTTP/1.0 requests. (BZ#1000773)* This update improves the phrasing of comments that contained profanities incertain sections in scripts provided by the netcat utility. (BZ#1064755)Users of nc are advised to upgrade to these updated packages, which add theseenhancements.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available athttps://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop FasTrack (v. 6)

SRPMS:
nc-1.84-24.el6.src.rpm
    MD5: 028badc6608a84a50f53ee3df548d247SHA-256: af48882f92e74203e8a9e43afbd3ae70de4885269862ff82b101d567c83a1b84
 
IA-32:
nc-1.84-24.el6.i686.rpm
    MD5: 1e77cdfcf933c6f4a1cfed6a4a77da28SHA-256: 22cfba17f31e430b3047728680e071bea52fc0057ff31f8488f4be1808ee860c
nc-debuginfo-1.84-24.el6.i686.rpm
    MD5: d7db05f5cac70840301f4ed98cd53a7aSHA-256: acec3adf9cc749cfde61555583a61a8a1d11935a383f758fd143e8586936fbba
 
x86_64:
nc-1.84-24.el6.x86_64.rpm
    MD5: 13ac287f0a5f68036f99af0c1c817d48SHA-256: 145ed572bb7dc74c7100e2a53c18f2e163602b78387c29d94e987973d8545f0e
nc-debuginfo-1.84-24.el6.x86_64.rpm
    MD5: 1b59a3befdbc3c1cb7dcc7175d78319cSHA-256: 85607ecfe224ee0406611705429c6cf6420b2e3530c789b7a75df1ecd2dfdc0e
 
Red Hat Enterprise Linux HPC Node FasTrack (v. 6)

SRPMS:
nc-1.84-24.el6.src.rpm
    MD5: 028badc6608a84a50f53ee3df548d247SHA-256: af48882f92e74203e8a9e43afbd3ae70de4885269862ff82b101d567c83a1b84
 
x86_64:
nc-1.84-24.el6.x86_64.rpm
    MD5: 13ac287f0a5f68036f99af0c1c817d48SHA-256: 145ed572bb7dc74c7100e2a53c18f2e163602b78387c29d94e987973d8545f0e
nc-debuginfo-1.84-24.el6.x86_64.rpm
    MD5: 1b59a3befdbc3c1cb7dcc7175d78319cSHA-256: 85607ecfe224ee0406611705429c6cf6420b2e3530c789b7a75df1ecd2dfdc0e
 
Red Hat Enterprise Linux Server FasTrack (v. 6)

SRPMS:
nc-1.84-24.el6.src.rpm
    MD5: 028badc6608a84a50f53ee3df548d247SHA-256: af48882f92e74203e8a9e43afbd3ae70de4885269862ff82b101d567c83a1b84
 
IA-32:
nc-1.84-24.el6.i686.rpm
    MD5: 1e77cdfcf933c6f4a1cfed6a4a77da28SHA-256: 22cfba17f31e430b3047728680e071bea52fc0057ff31f8488f4be1808ee860c
nc-debuginfo-1.84-24.el6.i686.rpm
    MD5: d7db05f5cac70840301f4ed98cd53a7aSHA-256: acec3adf9cc749cfde61555583a61a8a1d11935a383f758fd143e8586936fbba
 
PPC:
nc-1.84-24.el6.ppc64.rpm
    MD5: 49873b429e8cbb2c4b16be001d0b8906SHA-256: fbca073ca705a68fe8c3c164c23d49406bbc39bf169d8163995012e9909b0c63
nc-debuginfo-1.84-24.el6.ppc64.rpm
    MD5: 04d52084e03749a850856e83b35011d9SHA-256: 9da890530b74909b09ac05d65fc395faaf8c251917a04f1f2119811945fac3a4
 
s390x:
nc-1.84-24.el6.s390x.rpm
    MD5: 02581bf83a493018cd46c292ccc1d2ceSHA-256: d7be9562c4261862fe14e7a39afa3f64cbdd85898d11f9b865fddddeb57dfbc6
nc-debuginfo-1.84-24.el6.s390x.rpm
    MD5: a092ab647fdbf81af9082f6f10638aa9SHA-256: 9337ef778061d81cedf3b48fe6bb732afbde0b5b410c7656e8cb39384924ac80
 
x86_64:
nc-1.84-24.el6.x86_64.rpm
    MD5: 13ac287f0a5f68036f99af0c1c817d48SHA-256: 145ed572bb7dc74c7100e2a53c18f2e163602b78387c29d94e987973d8545f0e
nc-debuginfo-1.84-24.el6.x86_64.rpm
    MD5: 1b59a3befdbc3c1cb7dcc7175d78319cSHA-256: 85607ecfe224ee0406611705429c6cf6420b2e3530c789b7a75df1ecd2dfdc0e
 
Red Hat Enterprise Linux Workstation FasTrack (v. 6)

SRPMS:
nc-1.84-24.el6.src.rpm
    MD5: 028badc6608a84a50f53ee3df548d247SHA-256: af48882f92e74203e8a9e43afbd3ae70de4885269862ff82b101d567c83a1b84
 
IA-32:
nc-1.84-24.el6.i686.rpm
    MD5: 1e77cdfcf933c6f4a1cfed6a4a77da28SHA-256: 22cfba17f31e430b3047728680e071bea52fc0057ff31f8488f4be1808ee860c
nc-debuginfo-1.84-24.el6.i686.rpm
    MD5: d7db05f5cac70840301f4ed98cd53a7aSHA-256: acec3adf9cc749cfde61555583a61a8a1d11935a383f758fd143e8586936fbba
 
x86_64:
nc-1.84-24.el6.x86_64.rpm
    MD5: 13ac287f0a5f68036f99af0c1c817d48SHA-256: 145ed572bb7dc74c7100e2a53c18f2e163602b78387c29d94e987973d8545f0e
nc-debuginfo-1.84-24.el6.x86_64.rpm
    MD5: 1b59a3befdbc3c1cb7dcc7175d78319cSHA-256: 85607ecfe224ee0406611705429c6cf6420b2e3530c789b7a75df1ecd2dfdc0e
 
(The unlinked packages above are only available from the Red Hat Network)
1000773 – nc breaks on HTTP/1.1 proxy servers

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply