Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2011:0980 - Bug Fix Advisory
Issued:
2011-07-21
Updated:
2011-07-21

RHBA-2011:0980 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

ntp bug fix and enhancement update

Type/Severity

Bug Fix Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An updated ntp package that fixes various bugs and provides an enhancement is
now available for Red Hat Enterprise Linux 5.

Description

The Network Time Protocol (NTP) is used to synchronize a computer's time with a
referenced time source.

This updated ntp package includes fixes for the following bugs:

  • The ntpd man pages suggested that the "-L" command option could be issued

without an argument. However, the user needs to define the virtual interfaces as
arguments of the option. This update corrects the ntp help page. (BZ#460434)

  • Prior to this update, if the /usr directory was mounted on an NFS file system,

the ntpd service could not be started before the netfs service. This update
moves the NTP applications to the /sbin directory so the user may change the
ntpd startup priority to start prior to the netfs service. Note that if you wish
to mount NFS version 4 with Kerberos authentication, you should consider
changing the ntpd startup priority to start prior to the netfs service.
Otherwise authentication may fail due to the non-synchronized date. (BZ#470945)

  • Prior to this update, verifying the ntp package with the "rpm -V" command

failed on the package configuration file if the configuration file had changed.
However, changes to the configuration file should not impact the verification
test. This update adapts the spec file and the package verify test passes
successfully. (BZ#481151)

  • The ntpd daemon could terminate unexpectedly due to a low memory lock limit.

With this update, the memory lock limit has been doubled. (BZ#575874)

  • The "-q" command line option causes the ntpd service to exit immediately after

the clock is set. Prior to this update, the man page ntpd(8) did not document
that this only occurs if there are servers configured for ntpd to set the clock
against. The user could conclude that ntpd was misbehaving when it did not quit
if run with the "-q" switch but with no configured servers. With this update,
the ntpd(8) man page notes that "ntpd -q" only exits if used to set the clock
with configured servers. (BZ#591838)

  • Prior to this update, the ntpd daemon could terminate unexpectedly with a

segmentation fault on a machine with more than 512 local IP addresses. This
happened because of a limit set for scanning. With this update, the limit scan
has been changed to scan to the maximum number of interfaces and the ntpd daemon
no longer crashes in such circumstances. (BZ#661934)

  • Prior to this update, the ntp-keygen(8) patch man page contained multiple

typos. This update fixes the typos. (BZ#664524, BZ#664525)

  • The "ntpstat" command printed an incorrect maximum error estimate. This

occurred because the "time correct to within" value did not include the root
delay. With this update, the value includes the root delay and the displayed
"time correct to within" value is correct. (BZ#679034)

In addition, this updated ntp package provides the following enhancement:

  • Prior to this update, the ntpd daemon did not allow the specification of

multiple interfaces which it should be listening on. With this update, the user
can define multiple interfaces the daemon should be listening on. (BZ#528799)

All ntp users are advised to upgrade to this updated package, which resolves
these issues and provides this enhancement.

Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red Hat
Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 460434 - ntpd -L does not work as advertised
  • BZ - 470945 - NFS4 with kerberos authetication fails because date has yet to be synced
  • BZ - 481151 - ntp rpm verification fails on /etc/ntp.conf
  • BZ - 575874 - ntpd can die due to ulimit on 64bit arch
  • BZ - 591838 - ntpd -q does not exit when no servers are defined in /etc/ntpd.conf
  • BZ - 661934 - ntpd crashes if a machine has more than 512 IPs
  • BZ - 664524 - ntp-keygen 8 manpage fixes
  • BZ - 664525 - ntpq(8) manpage fixes
  • BZ - 679034 - ntpstat doesn't include root delay in maximum error estimate

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
ntp-4.2.2p1-15.el5.src.rpm SHA-256: 145541024b2009d39f9c01b5ce02317bcc04edda6d184aefc43b5b0d56e8a509
x86_64
ntp-4.2.2p1-15.el5.x86_64.rpm SHA-256: 4e3319ef23cec2a74ab5d3794e564b16ff566580fed85c81ac3ccde59dc2dbbc
ia64
ntp-4.2.2p1-15.el5.ia64.rpm SHA-256: 77613bf56ce1c2dec0097edd2ccdb841eb10167701dedb2773c60ef02545047c
i386
ntp-4.2.2p1-15.el5.i386.rpm SHA-256: 17ffd81a7738a8ccc2996b1da922029ee3b4e1773bc10949b0ba2c0bf196161c

Red Hat Enterprise Linux Workstation 5

SRPM
ntp-4.2.2p1-15.el5.src.rpm SHA-256: 145541024b2009d39f9c01b5ce02317bcc04edda6d184aefc43b5b0d56e8a509
x86_64
ntp-4.2.2p1-15.el5.x86_64.rpm SHA-256: 4e3319ef23cec2a74ab5d3794e564b16ff566580fed85c81ac3ccde59dc2dbbc
i386
ntp-4.2.2p1-15.el5.i386.rpm SHA-256: 17ffd81a7738a8ccc2996b1da922029ee3b4e1773bc10949b0ba2c0bf196161c

Red Hat Enterprise Linux Desktop 5

SRPM
ntp-4.2.2p1-15.el5.src.rpm SHA-256: 145541024b2009d39f9c01b5ce02317bcc04edda6d184aefc43b5b0d56e8a509
x86_64
ntp-4.2.2p1-15.el5.x86_64.rpm SHA-256: 4e3319ef23cec2a74ab5d3794e564b16ff566580fed85c81ac3ccde59dc2dbbc
i386
ntp-4.2.2p1-15.el5.i386.rpm SHA-256: 17ffd81a7738a8ccc2996b1da922029ee3b4e1773bc10949b0ba2c0bf196161c

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
ntp-4.2.2p1-15.el5.src.rpm SHA-256: 145541024b2009d39f9c01b5ce02317bcc04edda6d184aefc43b5b0d56e8a509
s390x
ntp-4.2.2p1-15.el5.s390x.rpm SHA-256: 15b9c5fd580e638e5fca8af0d1e6c8bc067edea35f5c9dbf6e45fbab495adfab

Red Hat Enterprise Linux for Power, big endian 5

SRPM
ntp-4.2.2p1-15.el5.src.rpm SHA-256: 145541024b2009d39f9c01b5ce02317bcc04edda6d184aefc43b5b0d56e8a509
ppc
ntp-4.2.2p1-15.el5.ppc.rpm SHA-256: fe2100e2e2bb15f6e2236f19e7c690d43bc05a29a05d3eaf994f8cb1b940ebc8

Red Hat Enterprise Linux Server from RHUI 5

SRPM
ntp-4.2.2p1-15.el5.src.rpm SHA-256: 145541024b2009d39f9c01b5ce02317bcc04edda6d184aefc43b5b0d56e8a509
x86_64
ntp-4.2.2p1-15.el5.x86_64.rpm SHA-256: 4e3319ef23cec2a74ab5d3794e564b16ff566580fed85c81ac3ccde59dc2dbbc
i386
ntp-4.2.2p1-15.el5.i386.rpm SHA-256: 17ffd81a7738a8ccc2996b1da922029ee3b4e1773bc10949b0ba2c0bf196161c

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility