Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2016:0780 - Security Advisory
Issued:
2016-05-10
Updated:
2016-05-10

RHSA-2016:0780 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: ntp security and bug fix update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for ntp is now available for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The Network Time Protocol (NTP) is used to synchronize a computer's time with another referenced time source. These packages include the ntpd service which continuously adjusts system time and utilities used to query and configure the ntpd service.

Security Fix(es):

  • It was found that the fix for CVE-2014-9750 was incomplete: three issues were found in the value length checks in NTP's ntp_crypto.c, where a packet with particular autokey operations that contained malicious data was not always being completely validated. A remote attacker could use a specially crafted NTP packet to crash ntpd. (CVE-2015-7691, CVE-2015-7692, CVE-2015-7702)
  • A memory leak flaw was found in ntpd's CRYPTO_ASSOC. If ntpd was configured to use autokey authentication, an attacker could send packets to ntpd that would, after several days of ongoing attack, cause it to run out of memory. (CVE-2015-7701)
  • An off-by-one flaw, leading to a buffer overflow, was found in cookedprint functionality of ntpq. A specially crafted NTP packet could potentially cause ntpq to crash. (CVE-2015-7852)
  • A NULL pointer dereference flaw was found in the way ntpd processed 'ntpdc reslist' commands that queried restriction lists with a large amount of entries. A remote attacker could potentially use this flaw to crash ntpd. (CVE-2015-7977)
  • A stack-based buffer overflow flaw was found in the way ntpd processed 'ntpdc reslist' commands that queried restriction lists with a large amount of entries. A remote attacker could use this flaw to crash ntpd. (CVE-2015-7978)
  • It was found that ntpd could crash due to an uninitialized variable when processing malformed logconfig configuration commands. (CVE-2015-5194)
  • It was found that ntpd would exit with a segmentation fault when a statistics type that was not enabled during compilation (e.g. timingstats) was referenced by the statistics or filegen configuration command. (CVE-2015-5195)
  • It was discovered that the sntp utility could become unresponsive due to being caught in an infinite loop when processing a crafted NTP packet. (CVE-2015-5219)
  • It was found that NTP's :config command could be used to set the pidfile and driftfile paths without any restrictions. A remote attacker could use this flaw to overwrite a file on the file system with a file containing the pid of the ntpd process (immediately) or the current estimated drift of the system clock (in hourly intervals). (CVE-2015-7703)

The CVE-2015-5219 and CVE-2015-7703 issues were discovered by Miroslav Lichvár (Red Hat).

For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.8 Release Notes and Red Hat Enterprise Linux 6.8 Technical Notes linked from the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux for IBM z Systems 6 s390x
  • Red Hat Enterprise Linux for Power, big endian 6 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x

Fixes

  • BZ - 1254542 - CVE-2015-5194 ntp: crash with crafted logconfig configuration command
  • BZ - 1254544 - CVE-2015-5195 ntp: ntpd crash when processing config commands with statistics type
  • BZ - 1254547 - CVE-2015-7703 ntp: config command can be used to set the pidfile and drift file paths
  • BZ - 1255118 - CVE-2015-5219 ntp: infinite loop in sntp processing crafted packet
  • BZ - 1274254 - CVE-2015-7691 CVE-2015-7692 CVE-2015-7702 ntp: incomplete checks in ntp_crypto.c
  • BZ - 1274255 - CVE-2015-7701 ntp: slow memory leak in CRYPTO_ASSOC
  • BZ - 1274261 - CVE-2015-7852 ntp: ntpq atoascii memory corruption vulnerability
  • BZ - 1286969 - ntpstat reports synchronized even when the local ntpd doesn't synchronize with any time server.
  • BZ - 1300269 - CVE-2015-7977 ntp: restriction list NULL pointer dereference
  • BZ - 1300270 - CVE-2015-7978 ntp: stack exhaustion in recursive traversal of restriction list

CVEs

  • CVE-2015-5194
  • CVE-2015-5195
  • CVE-2015-5219
  • CVE-2015-7691
  • CVE-2015-7692
  • CVE-2015-7701
  • CVE-2015-7702
  • CVE-2015-7703
  • CVE-2015-7852
  • CVE-2015-7977
  • CVE-2015-7978

References

  • http://www.redhat.com/security/updates/classification/#normal
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
ntp-4.2.6p5-10.el6.src.rpm SHA-256: 1d0c0a6aded87b0d90aabeb685299598819ec126e89396ee2213eb9ca162f6af
x86_64
ntp-4.2.6p5-10.el6.x86_64.rpm SHA-256: 34cf6ef41b9e8ae9831d5569aa699977cc632d90be2f608c90591995bc0b410b
ntp-4.2.6p5-10.el6.x86_64.rpm SHA-256: 34cf6ef41b9e8ae9831d5569aa699977cc632d90be2f608c90591995bc0b410b
ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
ntp-perl-4.2.6p5-10.el6.x86_64.rpm SHA-256: c1994b2b2fed186dec7289de5edc7d44e7cb502d2c22e8d53ae93533a233e15d
ntp-perl-4.2.6p5-10.el6.x86_64.rpm SHA-256: c1994b2b2fed186dec7289de5edc7d44e7cb502d2c22e8d53ae93533a233e15d
ntpdate-4.2.6p5-10.el6.x86_64.rpm SHA-256: e84925b42932edd61b2c3ca02b930a35b8e219b108c149b1d55f8ecb862b7bcf
ntpdate-4.2.6p5-10.el6.x86_64.rpm SHA-256: e84925b42932edd61b2c3ca02b930a35b8e219b108c149b1d55f8ecb862b7bcf
i386
ntp-4.2.6p5-10.el6.i686.rpm SHA-256: 6acb51dbaf5d42f4f9e7bffb9e9c434d6ff4128d959f482a81a98c9f160b6efb
ntp-debuginfo-4.2.6p5-10.el6.i686.rpm SHA-256: 7a5fbade8dc26c8c34c67f7e8392a57d76f8cdbe50251f805d69e7fd948aa035
ntp-debuginfo-4.2.6p5-10.el6.i686.rpm SHA-256: 7a5fbade8dc26c8c34c67f7e8392a57d76f8cdbe50251f805d69e7fd948aa035
ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
ntp-perl-4.2.6p5-10.el6.i686.rpm SHA-256: 5858a35de910dc7ca9d0c7f3bd2cc05328b3396594a008194c932ce9bc80ea73
ntpdate-4.2.6p5-10.el6.i686.rpm SHA-256: d02bf0b71ded5337181f2e69d0c8ecf374273915a1048517b7d0d7e41be235aa

Red Hat Enterprise Linux Workstation 6

SRPM
ntp-4.2.6p5-10.el6.src.rpm SHA-256: 1d0c0a6aded87b0d90aabeb685299598819ec126e89396ee2213eb9ca162f6af
x86_64
ntp-4.2.6p5-10.el6.x86_64.rpm SHA-256: 34cf6ef41b9e8ae9831d5569aa699977cc632d90be2f608c90591995bc0b410b
ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
ntp-perl-4.2.6p5-10.el6.x86_64.rpm SHA-256: c1994b2b2fed186dec7289de5edc7d44e7cb502d2c22e8d53ae93533a233e15d
ntpdate-4.2.6p5-10.el6.x86_64.rpm SHA-256: e84925b42932edd61b2c3ca02b930a35b8e219b108c149b1d55f8ecb862b7bcf
i386
ntp-4.2.6p5-10.el6.i686.rpm SHA-256: 6acb51dbaf5d42f4f9e7bffb9e9c434d6ff4128d959f482a81a98c9f160b6efb
ntp-debuginfo-4.2.6p5-10.el6.i686.rpm SHA-256: 7a5fbade8dc26c8c34c67f7e8392a57d76f8cdbe50251f805d69e7fd948aa035
ntp-debuginfo-4.2.6p5-10.el6.i686.rpm SHA-256: 7a5fbade8dc26c8c34c67f7e8392a57d76f8cdbe50251f805d69e7fd948aa035
ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
ntp-perl-4.2.6p5-10.el6.i686.rpm SHA-256: 5858a35de910dc7ca9d0c7f3bd2cc05328b3396594a008194c932ce9bc80ea73
ntpdate-4.2.6p5-10.el6.i686.rpm SHA-256: d02bf0b71ded5337181f2e69d0c8ecf374273915a1048517b7d0d7e41be235aa

Red Hat Enterprise Linux Desktop 6

SRPM
ntp-4.2.6p5-10.el6.src.rpm SHA-256: 1d0c0a6aded87b0d90aabeb685299598819ec126e89396ee2213eb9ca162f6af
i386
ntp-4.2.6p5-10.el6.i686.rpm SHA-256: 6acb51dbaf5d42f4f9e7bffb9e9c434d6ff4128d959f482a81a98c9f160b6efb
ntp-debuginfo-4.2.6p5-10.el6.i686.rpm SHA-256: 7a5fbade8dc26c8c34c67f7e8392a57d76f8cdbe50251f805d69e7fd948aa035
ntp-debuginfo-4.2.6p5-10.el6.i686.rpm SHA-256: 7a5fbade8dc26c8c34c67f7e8392a57d76f8cdbe50251f805d69e7fd948aa035
ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
ntp-perl-4.2.6p5-10.el6.i686.rpm SHA-256: 5858a35de910dc7ca9d0c7f3bd2cc05328b3396594a008194c932ce9bc80ea73
ntpdate-4.2.6p5-10.el6.i686.rpm SHA-256: d02bf0b71ded5337181f2e69d0c8ecf374273915a1048517b7d0d7e41be235aa
x86_64
ntp-4.2.6p5-10.el6.x86_64.rpm SHA-256: 34cf6ef41b9e8ae9831d5569aa699977cc632d90be2f608c90591995bc0b410b
ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
ntp-perl-4.2.6p5-10.el6.x86_64.rpm SHA-256: c1994b2b2fed186dec7289de5edc7d44e7cb502d2c22e8d53ae93533a233e15d
ntpdate-4.2.6p5-10.el6.x86_64.rpm SHA-256: e84925b42932edd61b2c3ca02b930a35b8e219b108c149b1d55f8ecb862b7bcf

Red Hat Enterprise Linux for Power, big endian 6

SRPM
ntp-4.2.6p5-10.el6.src.rpm SHA-256: 1d0c0a6aded87b0d90aabeb685299598819ec126e89396ee2213eb9ca162f6af
ppc64
ntp-4.2.6p5-10.el6.ppc64.rpm SHA-256: 98259a9d2845021f17f158b2d78ba444f64cd56b9b6ec3c08599587383c68eeb
ntp-debuginfo-4.2.6p5-10.el6.ppc64.rpm SHA-256: 8984cd2a77f02f801708b67a6aee92179efebcd11a224f08ff2f6d0ddb8a183b
ntp-debuginfo-4.2.6p5-10.el6.ppc64.rpm SHA-256: 8984cd2a77f02f801708b67a6aee92179efebcd11a224f08ff2f6d0ddb8a183b
ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
ntp-perl-4.2.6p5-10.el6.ppc64.rpm SHA-256: 6d64e0f69cd119b856f27b0a26521f1feb0b1b4ab928a8ec02632f9795068a50
ntpdate-4.2.6p5-10.el6.ppc64.rpm SHA-256: 2cce35eafcafa9031458021e7d1eff7272941c1ca33d3f4872ea47a2fbf61cad

Red Hat Enterprise Linux for Scientific Computing 6

SRPM
ntp-4.2.6p5-10.el6.src.rpm SHA-256: 1d0c0a6aded87b0d90aabeb685299598819ec126e89396ee2213eb9ca162f6af
x86_64
ntp-4.2.6p5-10.el6.x86_64.rpm SHA-256: 34cf6ef41b9e8ae9831d5569aa699977cc632d90be2f608c90591995bc0b410b
ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
ntp-perl-4.2.6p5-10.el6.x86_64.rpm SHA-256: c1994b2b2fed186dec7289de5edc7d44e7cb502d2c22e8d53ae93533a233e15d
ntpdate-4.2.6p5-10.el6.x86_64.rpm SHA-256: e84925b42932edd61b2c3ca02b930a35b8e219b108c149b1d55f8ecb862b7bcf

Red Hat Enterprise Linux Server from RHUI 6

SRPM
ntp-4.2.6p5-10.el6.src.rpm SHA-256: 1d0c0a6aded87b0d90aabeb685299598819ec126e89396ee2213eb9ca162f6af
x86_64
ntp-4.2.6p5-10.el6.x86_64.rpm SHA-256: 34cf6ef41b9e8ae9831d5569aa699977cc632d90be2f608c90591995bc0b410b
ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
ntp-perl-4.2.6p5-10.el6.x86_64.rpm SHA-256: c1994b2b2fed186dec7289de5edc7d44e7cb502d2c22e8d53ae93533a233e15d
ntpdate-4.2.6p5-10.el6.x86_64.rpm SHA-256: e84925b42932edd61b2c3ca02b930a35b8e219b108c149b1d55f8ecb862b7bcf
i386
ntp-4.2.6p5-10.el6.i686.rpm SHA-256: 6acb51dbaf5d42f4f9e7bffb9e9c434d6ff4128d959f482a81a98c9f160b6efb
ntp-debuginfo-4.2.6p5-10.el6.i686.rpm SHA-256: 7a5fbade8dc26c8c34c67f7e8392a57d76f8cdbe50251f805d69e7fd948aa035
ntp-debuginfo-4.2.6p5-10.el6.i686.rpm SHA-256: 7a5fbade8dc26c8c34c67f7e8392a57d76f8cdbe50251f805d69e7fd948aa035
ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
ntp-perl-4.2.6p5-10.el6.i686.rpm SHA-256: 5858a35de910dc7ca9d0c7f3bd2cc05328b3396594a008194c932ce9bc80ea73
ntpdate-4.2.6p5-10.el6.i686.rpm SHA-256: d02bf0b71ded5337181f2e69d0c8ecf374273915a1048517b7d0d7e41be235aa

Red Hat Enterprise Linux Server - Extended Life Cycle Support 6

SRPM
ntp-4.2.6p5-10.el6.src.rpm SHA-256: 1d0c0a6aded87b0d90aabeb685299598819ec126e89396ee2213eb9ca162f6af
x86_64
ntp-4.2.6p5-10.el6.x86_64.rpm SHA-256: 34cf6ef41b9e8ae9831d5569aa699977cc632d90be2f608c90591995bc0b410b
ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
ntp-perl-4.2.6p5-10.el6.x86_64.rpm SHA-256: c1994b2b2fed186dec7289de5edc7d44e7cb502d2c22e8d53ae93533a233e15d
ntpdate-4.2.6p5-10.el6.x86_64.rpm SHA-256: e84925b42932edd61b2c3ca02b930a35b8e219b108c149b1d55f8ecb862b7bcf
i386
ntp-4.2.6p5-10.el6.i686.rpm SHA-256: 6acb51dbaf5d42f4f9e7bffb9e9c434d6ff4128d959f482a81a98c9f160b6efb
ntp-debuginfo-4.2.6p5-10.el6.i686.rpm SHA-256: 7a5fbade8dc26c8c34c67f7e8392a57d76f8cdbe50251f805d69e7fd948aa035
ntp-debuginfo-4.2.6p5-10.el6.i686.rpm SHA-256: 7a5fbade8dc26c8c34c67f7e8392a57d76f8cdbe50251f805d69e7fd948aa035
ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
ntp-perl-4.2.6p5-10.el6.i686.rpm SHA-256: 5858a35de910dc7ca9d0c7f3bd2cc05328b3396594a008194c932ce9bc80ea73
ntpdate-4.2.6p5-10.el6.i686.rpm SHA-256: d02bf0b71ded5337181f2e69d0c8ecf374273915a1048517b7d0d7e41be235aa

Red Hat Enterprise Linux for IBM z Systems 6

SRPM
ntp-4.2.6p5-10.el6.src.rpm SHA-256: 1d0c0a6aded87b0d90aabeb685299598819ec126e89396ee2213eb9ca162f6af
s390x
ntp-4.2.6p5-10.el6.s390x.rpm SHA-256: c78bab82a4c7c7c6ce8acb0b24acacf7da69329103f2b7358354957f0641fc27
ntp-debuginfo-4.2.6p5-10.el6.s390x.rpm SHA-256: bc79ddde97781dbab9d672f2db07e72d150deda7f7d874e47ce119a38c66e0e6
ntp-debuginfo-4.2.6p5-10.el6.s390x.rpm SHA-256: bc79ddde97781dbab9d672f2db07e72d150deda7f7d874e47ce119a38c66e0e6
ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
ntp-perl-4.2.6p5-10.el6.s390x.rpm SHA-256: 58b8a46c111096f9612575dad6c8d9075e6ac91a4230efb97d258f0e1517bf4d
ntpdate-4.2.6p5-10.el6.s390x.rpm SHA-256: aa03e58b1b6ca55014d7fe3b833be38328d52f4717f40d7c74e82d1aeae3a117

Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6

SRPM
ntp-4.2.6p5-10.el6.src.rpm SHA-256: 1d0c0a6aded87b0d90aabeb685299598819ec126e89396ee2213eb9ca162f6af
s390x
ntp-4.2.6p5-10.el6.s390x.rpm SHA-256: c78bab82a4c7c7c6ce8acb0b24acacf7da69329103f2b7358354957f0641fc27
ntp-debuginfo-4.2.6p5-10.el6.s390x.rpm SHA-256: bc79ddde97781dbab9d672f2db07e72d150deda7f7d874e47ce119a38c66e0e6
ntp-debuginfo-4.2.6p5-10.el6.s390x.rpm SHA-256: bc79ddde97781dbab9d672f2db07e72d150deda7f7d874e47ce119a38c66e0e6
ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
ntp-perl-4.2.6p5-10.el6.s390x.rpm SHA-256: 58b8a46c111096f9612575dad6c8d9075e6ac91a4230efb97d258f0e1517bf4d
ntpdate-4.2.6p5-10.el6.s390x.rpm SHA-256: aa03e58b1b6ca55014d7fe3b833be38328d52f4717f40d7c74e82d1aeae3a117

Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6

SRPM
ntp-4.2.6p5-10.el6.src.rpm SHA-256: 1d0c0a6aded87b0d90aabeb685299598819ec126e89396ee2213eb9ca162f6af
x86_64
ntp-4.2.6p5-10.el6.x86_64.rpm SHA-256: 34cf6ef41b9e8ae9831d5569aa699977cc632d90be2f608c90591995bc0b410b
ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
ntp-perl-4.2.6p5-10.el6.x86_64.rpm SHA-256: c1994b2b2fed186dec7289de5edc7d44e7cb502d2c22e8d53ae93533a233e15d
ntpdate-4.2.6p5-10.el6.x86_64.rpm SHA-256: e84925b42932edd61b2c3ca02b930a35b8e219b108c149b1d55f8ecb862b7bcf
i386
ntp-4.2.6p5-10.el6.i686.rpm SHA-256: 6acb51dbaf5d42f4f9e7bffb9e9c434d6ff4128d959f482a81a98c9f160b6efb
ntp-debuginfo-4.2.6p5-10.el6.i686.rpm SHA-256: 7a5fbade8dc26c8c34c67f7e8392a57d76f8cdbe50251f805d69e7fd948aa035
ntp-debuginfo-4.2.6p5-10.el6.i686.rpm SHA-256: 7a5fbade8dc26c8c34c67f7e8392a57d76f8cdbe50251f805d69e7fd948aa035
ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
ntp-perl-4.2.6p5-10.el6.i686.rpm SHA-256: 5858a35de910dc7ca9d0c7f3bd2cc05328b3396594a008194c932ce9bc80ea73
ntpdate-4.2.6p5-10.el6.i686.rpm SHA-256: d02bf0b71ded5337181f2e69d0c8ecf374273915a1048517b7d0d7e41be235aa

Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6

SRPM
ntp-4.2.6p5-10.el6.src.rpm SHA-256: 1d0c0a6aded87b0d90aabeb685299598819ec126e89396ee2213eb9ca162f6af
s390x
ntp-4.2.6p5-10.el6.s390x.rpm SHA-256: c78bab82a4c7c7c6ce8acb0b24acacf7da69329103f2b7358354957f0641fc27
ntp-debuginfo-4.2.6p5-10.el6.s390x.rpm SHA-256: bc79ddde97781dbab9d672f2db07e72d150deda7f7d874e47ce119a38c66e0e6
ntp-debuginfo-4.2.6p5-10.el6.s390x.rpm SHA-256: bc79ddde97781dbab9d672f2db07e72d150deda7f7d874e47ce119a38c66e0e6
ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
ntp-perl-4.2.6p5-10.el6.s390x.rpm SHA-256: 58b8a46c111096f9612575dad6c8d9075e6ac91a4230efb97d258f0e1517bf4d
ntpdate-4.2.6p5-10.el6.s390x.rpm SHA-256: aa03e58b1b6ca55014d7fe3b833be38328d52f4717f40d7c74e82d1aeae3a117

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility