- Issued:
- 2013-12-09
- Updated:
- 2013-12-09
RHBA-2013:1800 - Bug Fix Advisory
Synopsis
ntp bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated ntp packages that fix one bug are now available for Red Hat Enterprise
Linux 5.
Description
The Network Time Protocol (NTP) is used to synchronize a computer's time with
another referenced time source. This package includes the ntpd daemon which
continuously adjusts system time and utilities used to query and configure the
ntpd daemon.
This update fixes the following bug:
- Previously, with a complex Name Service Switch (NSS) configured and large NTP
request rate, the ntpd daemon needed more memory than was allowed by the memory
locking limit. As a consequence, the ntpd process could terminate unexpectedly.
To fix this bug, the memory locking limit has been doubled. As a result, ntpd no
longer crashes. (BZ#1037272)
Users of ntp are advised to upgrade to these updated packages, which fix this
bug.
Solution
Before applying this update, make sure all previously released errata relevant
to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
ntp-4.2.2p1-17.el5_10.src.rpm | SHA-256: cb8493add042eff36484fc647fd25e6e49af2698be1e7a979afa97f98d087ec1 |
x86_64 | |
ntp-4.2.2p1-17.el5_10.x86_64.rpm | SHA-256: 15b65f9ccda91b34ddee1c596ace73567e216afc34412dfff6536ab273c58843 |
ntp-debuginfo-4.2.2p1-17.el5_10.x86_64.rpm | SHA-256: 65c3c25d4c976efec52b8b488ada1dcffc917a38e524154a37b88df6cd7d07eb |
ia64 | |
ntp-4.2.2p1-17.el5_10.ia64.rpm | SHA-256: be5762e74dcb2c2bfff6eacb75760d043721e1f1f39f28c456dc750f3c3f80db |
ntp-debuginfo-4.2.2p1-17.el5_10.ia64.rpm | SHA-256: c40e54987d28510370f8f4a1d849720141daa2bc39639171a65754ad5933d51c |
i386 | |
ntp-4.2.2p1-17.el5_10.i386.rpm | SHA-256: 67bde651de9834791f8b0cfc1286352f31d6bfda5a41e551f2589d4c021248b7 |
ntp-debuginfo-4.2.2p1-17.el5_10.i386.rpm | SHA-256: 73636c759537bdb1269fa7e1afa19eb209a55cc49c927a917f9ff1bdc9d96413 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
ntp-4.2.2p1-17.el5_10.src.rpm | SHA-256: cb8493add042eff36484fc647fd25e6e49af2698be1e7a979afa97f98d087ec1 |
x86_64 | |
ntp-4.2.2p1-17.el5_10.x86_64.rpm | SHA-256: 15b65f9ccda91b34ddee1c596ace73567e216afc34412dfff6536ab273c58843 |
ntp-debuginfo-4.2.2p1-17.el5_10.x86_64.rpm | SHA-256: 65c3c25d4c976efec52b8b488ada1dcffc917a38e524154a37b88df6cd7d07eb |
i386 | |
ntp-4.2.2p1-17.el5_10.i386.rpm | SHA-256: 67bde651de9834791f8b0cfc1286352f31d6bfda5a41e551f2589d4c021248b7 |
ntp-debuginfo-4.2.2p1-17.el5_10.i386.rpm | SHA-256: 73636c759537bdb1269fa7e1afa19eb209a55cc49c927a917f9ff1bdc9d96413 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
ntp-4.2.2p1-17.el5_10.src.rpm | SHA-256: cb8493add042eff36484fc647fd25e6e49af2698be1e7a979afa97f98d087ec1 |
x86_64 | |
ntp-4.2.2p1-17.el5_10.x86_64.rpm | SHA-256: 15b65f9ccda91b34ddee1c596ace73567e216afc34412dfff6536ab273c58843 |
ntp-debuginfo-4.2.2p1-17.el5_10.x86_64.rpm | SHA-256: 65c3c25d4c976efec52b8b488ada1dcffc917a38e524154a37b88df6cd7d07eb |
i386 | |
ntp-4.2.2p1-17.el5_10.i386.rpm | SHA-256: 67bde651de9834791f8b0cfc1286352f31d6bfda5a41e551f2589d4c021248b7 |
ntp-debuginfo-4.2.2p1-17.el5_10.i386.rpm | SHA-256: 73636c759537bdb1269fa7e1afa19eb209a55cc49c927a917f9ff1bdc9d96413 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
ntp-4.2.2p1-17.el5_10.src.rpm | SHA-256: cb8493add042eff36484fc647fd25e6e49af2698be1e7a979afa97f98d087ec1 |
s390x | |
ntp-4.2.2p1-17.el5_10.s390x.rpm | SHA-256: bc4b07f6cdfa2bf9df80badc1f8e6668b51e796e9906f5be72c274ddb0552811 |
ntp-debuginfo-4.2.2p1-17.el5_10.s390x.rpm | SHA-256: 8a012e8fc7de50b9d99eee5a45aedb46ae5c6ecb9a5df6f20124facbd8f03ea8 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
ntp-4.2.2p1-17.el5_10.src.rpm | SHA-256: cb8493add042eff36484fc647fd25e6e49af2698be1e7a979afa97f98d087ec1 |
ppc | |
ntp-4.2.2p1-17.el5_10.ppc.rpm | SHA-256: b8a3535a220fd806886dd6535a69bff3444776d4007f112c2cebd45dea771e8c |
ntp-debuginfo-4.2.2p1-17.el5_10.ppc.rpm | SHA-256: 8f987c3ca0a6fb8736a36bbcd9fb69e677532f0de24f446c8bb5b28bc47e2f26 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
ntp-4.2.2p1-17.el5_10.src.rpm | SHA-256: cb8493add042eff36484fc647fd25e6e49af2698be1e7a979afa97f98d087ec1 |
x86_64 | |
ntp-4.2.2p1-17.el5_10.x86_64.rpm | SHA-256: 15b65f9ccda91b34ddee1c596ace73567e216afc34412dfff6536ab273c58843 |
ntp-debuginfo-4.2.2p1-17.el5_10.x86_64.rpm | SHA-256: 65c3c25d4c976efec52b8b488ada1dcffc917a38e524154a37b88df6cd7d07eb |
i386 | |
ntp-4.2.2p1-17.el5_10.i386.rpm | SHA-256: 67bde651de9834791f8b0cfc1286352f31d6bfda5a41e551f2589d4c021248b7 |
ntp-debuginfo-4.2.2p1-17.el5_10.i386.rpm | SHA-256: 73636c759537bdb1269fa7e1afa19eb209a55cc49c927a917f9ff1bdc9d96413 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.