Skip to navigation

Bug Fix Advisory nmap bug fix update

Advisory: RHBA-2011:1357-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-02-20
Last updated on: 2012-02-20
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)

Details

An updated nmap package that fixes one bug is now available for Red Hat
Enterprise Linux 5.

The nmap package provides a network exploration utility and a security scanner.

This update fixes the following bug:

* Prior to this update, debug information in the nmap-debuginfo sub-package was
missing. As a result, it was not possible to debug problems with nmap. With this
update, debug information has been added to the nmap-debuginfo sub-package.
(BZ#500612)

All users of nmap are advised to upgrade to this updated package, which fixes
this bug.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
nmap-4.11-2.src.rpm     MD5: 55828b4a72095faa301899ea8029d8af
SHA-256: ae246b203f9f8023062156c9441e9a76ceed1b4b8f25150eac6525f085655498
 
IA-32:
nmap-4.11-2.i386.rpm     MD5: 0256fbd68f1811f9f8ddc740be631d16
SHA-256: 8fb59db05012677eadc69555b31b1e1eccb21c00b77350ef56ff0dcf07d90196
nmap-frontend-4.11-2.i386.rpm     MD5: 8bee7a468022bc7c10b0e6b05bd539fd
SHA-256: a4f63ebd58d1abd46ea69cf1455b1b32d9994d757b1eb9553fdd4b29f98d3775
 
x86_64:
nmap-4.11-2.x86_64.rpm     MD5: aa6df1680fe28a4c33974b56e10cec1e
SHA-256: aa7cacb8d7b60cf77c817d629d1cd459471933efb3fe17f54dc987c7e02966ad
nmap-frontend-4.11-2.x86_64.rpm     MD5: 13e108c63302e922ae798d7db7be3299
SHA-256: d095a43b990924eff16797e5b1a11643f04b52dac8874ad7a1cfe41841a5997c
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
nmap-4.11-2.src.rpm     MD5: 55828b4a72095faa301899ea8029d8af
SHA-256: ae246b203f9f8023062156c9441e9a76ceed1b4b8f25150eac6525f085655498
 
IA-32:
nmap-4.11-2.i386.rpm     MD5: 0256fbd68f1811f9f8ddc740be631d16
SHA-256: 8fb59db05012677eadc69555b31b1e1eccb21c00b77350ef56ff0dcf07d90196
nmap-frontend-4.11-2.i386.rpm     MD5: 8bee7a468022bc7c10b0e6b05bd539fd
SHA-256: a4f63ebd58d1abd46ea69cf1455b1b32d9994d757b1eb9553fdd4b29f98d3775
 
IA-64:
nmap-4.11-2.ia64.rpm     MD5: df6ec23e1dda657b2c1bc055d5cfbe4f
SHA-256: f65e5e009cd51b7e14813b1e130cc6d2416085b14e1a84dac30daa9ea3a7b2a7
nmap-frontend-4.11-2.ia64.rpm     MD5: e3354619cf8525c758feff99a6a9e289
SHA-256: 1d6213a5e86b8277d01a035c23824b27a77b3e9a3a2a1ccf0ce84bf7fcc00c12
 
PPC:
nmap-4.11-2.ppc.rpm     MD5: f2b167b67cc2f52a9c2bfd314b470343
SHA-256: f3dbd2fca3c934b25a33ca8bf0a5776388ab4ba63c2d32c3e55f41136f93ba7d
nmap-frontend-4.11-2.ppc.rpm     MD5: b315bb0fae83918d2eae2e8e1f43dbb7
SHA-256: c242ccaf213480501016c2f5ece31910a946346a57760761f1c7fae199fc4f1f
 
s390x:
nmap-4.11-2.s390x.rpm     MD5: 8495dd35163ed71b79f682e11ee0926e
SHA-256: 1bc637d6245b8a363449cf7026c216ebb25862f3f07b30764e4256c7d8e64c2e
nmap-frontend-4.11-2.s390x.rpm     MD5: 13d14af5dae35ccb247196c066f36406
SHA-256: d8eb9ff64ff3e8c934f7356cb9354311567a6b24df53f9334742e49836bf694c
 
x86_64:
nmap-4.11-2.x86_64.rpm     MD5: aa6df1680fe28a4c33974b56e10cec1e
SHA-256: aa7cacb8d7b60cf77c817d629d1cd459471933efb3fe17f54dc987c7e02966ad
nmap-frontend-4.11-2.x86_64.rpm     MD5: 13e108c63302e922ae798d7db7be3299
SHA-256: d095a43b990924eff16797e5b1a11643f04b52dac8874ad7a1cfe41841a5997c
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

500612 - nmap-debuginfo is empty


Keywords

nmap


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/