Red Hat Customer Portal

Skip to main content

Main Navigation

  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
Red Hat Logo Customer Portal
  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Search
  • Log In
  • Language
Troubleshooting an issue? Try Solution Engine—our new support tool.

Log in to Your Red Hat Account

Log In

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.

Register

If you are a new customer, register now for access to product evaluations and purchasing capabilities.

Need access to an account?

If your company has an existing Red Hat account, your organization administrator can grant you access.

If you have any questions, please contact customer service.

Red Hat Account Number:

Red Hat Account

  • Account Details
  • User Management
  • Account Maintenance

Customer Portal

  • My Profile
  • Notifications
  • Help

For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.

Log Out

Select Your Language

  • English
  • Español
  • Deutsch
  • Italiano
  • 한국어
  • Français
  • 日本語
  • Português
  • 中文 (中国)
  • русский
Red Hat Customer Portal
  • Products & Services
  • Tools
  • Security
  • Community
  • Infrastructure and Management

  • Cloud Computing

  • Storage

  • JBoss Development and Management

  • JBoss Integration and Automation

  • Mobile

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Tower
  • Red Hat Ansible Engine
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat Cloud Infrastructure
  • Red Hat Cloud Suite
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat OpenShift Application Runtimes
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat JBoss Data Grid
  • Red Hat JBoss Web Server
  • Red Hat JBoss Operations Network
  • Red Hat Developer Studio
  • Red Hat JBoss Data Virtualization
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
  • Red Hat 3scale API Management
  • Red Hat Mobile Application Platform
View All Products
  • Support
  • Production Support
  • Development Support
  • Product Life Cycle & Update Policies

Services

  • Consulting
  • Technical Account Management
  • Training & Certifications
  • Documentation
  • Red Hat Enterprise Linux
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Ecosystem
  • Browse Certified Solutions
  • Partner Resources

Tools

  • Solution Engine
  • Packages
  • Errata
  • Customer Portal Labs
  • Configuration
  • Deployment
  • Security
  • Troubleshooting
  • Red Hat Insights

Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

Red Hat Product Security Center

Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

Product Security Center

Security Updates

  • Security Advisories
  • Red Hat CVE Database
  • Security Labs

Keep your systems secure with Red Hat's specialized responses for high-priority security vulnerabilities.

  • View Responses

Resources

  • Overview
  • Security Blog
  • Security Measurement
  • Severity Ratings
  • Backporting Policies
  • Product Signing (GPG) Keys

Customer Portal Community

  • Discussions
  • Blogs
  • Private Groups
  • Community Activity

Customer Events

  • Red Hat Convergence
  • Red Hat Summit

Stories

  • Red Hat Subscription Value
  • You Asked. We Acted.
  • Open Source Communities
Red Hat Product Errata RHSA-2016:0780 - Security Advisory
Issued:
2016-05-10
Updated:
2016-05-10

RHSA-2016:0780 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: ntp security and bug fix update

Type/Severity

Security Advisory: Moderate

Topic

An update for ntp is now available for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The Network Time Protocol (NTP) is used to synchronize a computer's time with another referenced time source. These packages include the ntpd service which continuously adjusts system time and utilities used to query and configure the ntpd service.

Security Fix(es):

  • It was found that the fix for CVE-2014-9750 was incomplete: three issues were found in the value length checks in NTP's ntp_crypto.c, where a packet with particular autokey operations that contained malicious data was not always being completely validated. A remote attacker could use a specially crafted NTP packet to crash ntpd. (CVE-2015-7691, CVE-2015-7692, CVE-2015-7702)
  • A memory leak flaw was found in ntpd's CRYPTO_ASSOC. If ntpd was configured to use autokey authentication, an attacker could send packets to ntpd that would, after several days of ongoing attack, cause it to run out of memory. (CVE-2015-7701)
  • An off-by-one flaw, leading to a buffer overflow, was found in cookedprint functionality of ntpq. A specially crafted NTP packet could potentially cause ntpq to crash. (CVE-2015-7852)
  • A NULL pointer dereference flaw was found in the way ntpd processed 'ntpdc reslist' commands that queried restriction lists with a large amount of entries. A remote attacker could potentially use this flaw to crash ntpd. (CVE-2015-7977)
  • A stack-based buffer overflow flaw was found in the way ntpd processed 'ntpdc reslist' commands that queried restriction lists with a large amount of entries. A remote attacker could use this flaw to crash ntpd. (CVE-2015-7978)
  • It was found that ntpd could crash due to an uninitialized variable when processing malformed logconfig configuration commands. (CVE-2015-5194)
  • It was found that ntpd would exit with a segmentation fault when a statistics type that was not enabled during compilation (e.g. timingstats) was referenced by the statistics or filegen configuration command. (CVE-2015-5195)
  • It was discovered that the sntp utility could become unresponsive due to being caught in an infinite loop when processing a crafted NTP packet. (CVE-2015-5219)
  • It was found that NTP's :config command could be used to set the pidfile and driftfile paths without any restrictions. A remote attacker could use this flaw to overwrite a file on the file system with a file containing the pid of the ntpd process (immediately) or the current estimated drift of the system clock (in hourly intervals). (CVE-2015-7703)

The CVE-2015-5219 and CVE-2015-7703 issues were discovered by Miroslav Lichvár (Red Hat).

For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.8 Release Notes and Red Hat Enterprise Linux 6.8 Technical Notes linked from the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for IBM z Systems 6 s390x
  • Red Hat Enterprise Linux for Power, big endian 6 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386

Fixes

  • BZ - 1254542 - CVE-2015-5194 ntp: crash with crafted logconfig configuration command
  • BZ - 1254544 - CVE-2015-5195 ntp: ntpd crash when processing config commands with statistics type
  • BZ - 1254547 - CVE-2015-7703 ntp: config command can be used to set the pidfile and drift file paths
  • BZ - 1255118 - CVE-2015-5219 ntp: infinite loop in sntp processing crafted packet
  • BZ - 1274254 - CVE-2015-7691 CVE-2015-7692 CVE-2015-7702 ntp: incomplete checks in ntp_crypto.c
  • BZ - 1274255 - CVE-2015-7701 ntp: slow memory leak in CRYPTO_ASSOC
  • BZ - 1274261 - CVE-2015-7852 ntp: ntpq atoascii memory corruption vulnerability
  • BZ - 1286969 - ntpstat reports synchronized even when the local ntpd doesn't synchronize with any time server.
  • BZ - 1300269 - CVE-2015-7977 ntp: restriction list NULL pointer dereference
  • BZ - 1300270 - CVE-2015-7978 ntp: stack exhaustion in recursive traversal of restriction list

CVEs

  • CVE-2015-5194
  • CVE-2015-5195
  • CVE-2015-5219
  • CVE-2015-7691
  • CVE-2015-7692
  • CVE-2015-7701
  • CVE-2015-7702
  • CVE-2015-7703
  • CVE-2015-7852
  • CVE-2015-7977
  • CVE-2015-7978

References

  • http://www.redhat.com/security/updates/classification/#normal
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
ntp-4.2.6p5-10.el6.src.rpm SHA-256: 1d0c0a6aded87b0d90aabeb685299598819ec126e89396ee2213eb9ca162f6af
x86_64
ntp-4.2.6p5-10.el6.x86_64.rpm SHA-256: 34cf6ef41b9e8ae9831d5569aa699977cc632d90be2f608c90591995bc0b410b
ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
ntp-perl-4.2.6p5-10.el6.x86_64.rpm SHA-256: c1994b2b2fed186dec7289de5edc7d44e7cb502d2c22e8d53ae93533a233e15d
ntpdate-4.2.6p5-10.el6.x86_64.rpm SHA-256: e84925b42932edd61b2c3ca02b930a35b8e219b108c149b1d55f8ecb862b7bcf
i386
ntp-4.2.6p5-10.el6.i686.rpm SHA-256: 6acb51dbaf5d42f4f9e7bffb9e9c434d6ff4128d959f482a81a98c9f160b6efb
ntp-debuginfo-4.2.6p5-10.el6.i686.rpm SHA-256: 7a5fbade8dc26c8c34c67f7e8392a57d76f8cdbe50251f805d69e7fd948aa035
ntp-debuginfo-4.2.6p5-10.el6.i686.rpm SHA-256: 7a5fbade8dc26c8c34c67f7e8392a57d76f8cdbe50251f805d69e7fd948aa035
ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
ntp-perl-4.2.6p5-10.el6.i686.rpm SHA-256: 5858a35de910dc7ca9d0c7f3bd2cc05328b3396594a008194c932ce9bc80ea73
ntpdate-4.2.6p5-10.el6.i686.rpm SHA-256: d02bf0b71ded5337181f2e69d0c8ecf374273915a1048517b7d0d7e41be235aa

Red Hat Enterprise Linux Workstation 6

SRPM
ntp-4.2.6p5-10.el6.src.rpm SHA-256: 1d0c0a6aded87b0d90aabeb685299598819ec126e89396ee2213eb9ca162f6af
x86_64
ntp-4.2.6p5-10.el6.x86_64.rpm SHA-256: 34cf6ef41b9e8ae9831d5569aa699977cc632d90be2f608c90591995bc0b410b
ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
ntp-perl-4.2.6p5-10.el6.x86_64.rpm SHA-256: c1994b2b2fed186dec7289de5edc7d44e7cb502d2c22e8d53ae93533a233e15d
ntpdate-4.2.6p5-10.el6.x86_64.rpm SHA-256: e84925b42932edd61b2c3ca02b930a35b8e219b108c149b1d55f8ecb862b7bcf
i386
ntp-4.2.6p5-10.el6.i686.rpm SHA-256: 6acb51dbaf5d42f4f9e7bffb9e9c434d6ff4128d959f482a81a98c9f160b6efb
ntp-debuginfo-4.2.6p5-10.el6.i686.rpm SHA-256: 7a5fbade8dc26c8c34c67f7e8392a57d76f8cdbe50251f805d69e7fd948aa035
ntp-debuginfo-4.2.6p5-10.el6.i686.rpm SHA-256: 7a5fbade8dc26c8c34c67f7e8392a57d76f8cdbe50251f805d69e7fd948aa035
ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
ntp-perl-4.2.6p5-10.el6.i686.rpm SHA-256: 5858a35de910dc7ca9d0c7f3bd2cc05328b3396594a008194c932ce9bc80ea73
ntpdate-4.2.6p5-10.el6.i686.rpm SHA-256: d02bf0b71ded5337181f2e69d0c8ecf374273915a1048517b7d0d7e41be235aa

Red Hat Enterprise Linux Desktop 6

SRPM
ntp-4.2.6p5-10.el6.src.rpm SHA-256: 1d0c0a6aded87b0d90aabeb685299598819ec126e89396ee2213eb9ca162f6af
x86_64
ntp-4.2.6p5-10.el6.x86_64.rpm SHA-256: 34cf6ef41b9e8ae9831d5569aa699977cc632d90be2f608c90591995bc0b410b
ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
ntp-perl-4.2.6p5-10.el6.x86_64.rpm SHA-256: c1994b2b2fed186dec7289de5edc7d44e7cb502d2c22e8d53ae93533a233e15d
ntpdate-4.2.6p5-10.el6.x86_64.rpm SHA-256: e84925b42932edd61b2c3ca02b930a35b8e219b108c149b1d55f8ecb862b7bcf
i386
ntp-4.2.6p5-10.el6.i686.rpm SHA-256: 6acb51dbaf5d42f4f9e7bffb9e9c434d6ff4128d959f482a81a98c9f160b6efb
ntp-debuginfo-4.2.6p5-10.el6.i686.rpm SHA-256: 7a5fbade8dc26c8c34c67f7e8392a57d76f8cdbe50251f805d69e7fd948aa035
ntp-debuginfo-4.2.6p5-10.el6.i686.rpm SHA-256: 7a5fbade8dc26c8c34c67f7e8392a57d76f8cdbe50251f805d69e7fd948aa035
ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
ntp-perl-4.2.6p5-10.el6.i686.rpm SHA-256: 5858a35de910dc7ca9d0c7f3bd2cc05328b3396594a008194c932ce9bc80ea73
ntpdate-4.2.6p5-10.el6.i686.rpm SHA-256: d02bf0b71ded5337181f2e69d0c8ecf374273915a1048517b7d0d7e41be235aa

Red Hat Enterprise Linux for IBM z Systems 6

SRPM
ntp-4.2.6p5-10.el6.src.rpm SHA-256: 1d0c0a6aded87b0d90aabeb685299598819ec126e89396ee2213eb9ca162f6af
s390x
ntp-4.2.6p5-10.el6.s390x.rpm SHA-256: c78bab82a4c7c7c6ce8acb0b24acacf7da69329103f2b7358354957f0641fc27
ntp-debuginfo-4.2.6p5-10.el6.s390x.rpm SHA-256: bc79ddde97781dbab9d672f2db07e72d150deda7f7d874e47ce119a38c66e0e6
ntp-debuginfo-4.2.6p5-10.el6.s390x.rpm SHA-256: bc79ddde97781dbab9d672f2db07e72d150deda7f7d874e47ce119a38c66e0e6
ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
ntp-perl-4.2.6p5-10.el6.s390x.rpm SHA-256: 58b8a46c111096f9612575dad6c8d9075e6ac91a4230efb97d258f0e1517bf4d
ntpdate-4.2.6p5-10.el6.s390x.rpm SHA-256: aa03e58b1b6ca55014d7fe3b833be38328d52f4717f40d7c74e82d1aeae3a117

Red Hat Enterprise Linux for Power, big endian 6

SRPM
ntp-4.2.6p5-10.el6.src.rpm SHA-256: 1d0c0a6aded87b0d90aabeb685299598819ec126e89396ee2213eb9ca162f6af
ppc64
ntp-4.2.6p5-10.el6.ppc64.rpm SHA-256: 98259a9d2845021f17f158b2d78ba444f64cd56b9b6ec3c08599587383c68eeb
ntp-debuginfo-4.2.6p5-10.el6.ppc64.rpm SHA-256: 8984cd2a77f02f801708b67a6aee92179efebcd11a224f08ff2f6d0ddb8a183b
ntp-debuginfo-4.2.6p5-10.el6.ppc64.rpm SHA-256: 8984cd2a77f02f801708b67a6aee92179efebcd11a224f08ff2f6d0ddb8a183b
ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
ntp-perl-4.2.6p5-10.el6.ppc64.rpm SHA-256: 6d64e0f69cd119b856f27b0a26521f1feb0b1b4ab928a8ec02632f9795068a50
ntpdate-4.2.6p5-10.el6.ppc64.rpm SHA-256: 2cce35eafcafa9031458021e7d1eff7272941c1ca33d3f4872ea47a2fbf61cad

Red Hat Enterprise Linux for Scientific Computing 6

SRPM
ntp-4.2.6p5-10.el6.src.rpm SHA-256: 1d0c0a6aded87b0d90aabeb685299598819ec126e89396ee2213eb9ca162f6af
x86_64
ntp-4.2.6p5-10.el6.x86_64.rpm SHA-256: 34cf6ef41b9e8ae9831d5569aa699977cc632d90be2f608c90591995bc0b410b
ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
ntp-perl-4.2.6p5-10.el6.x86_64.rpm SHA-256: c1994b2b2fed186dec7289de5edc7d44e7cb502d2c22e8d53ae93533a233e15d
ntpdate-4.2.6p5-10.el6.x86_64.rpm SHA-256: e84925b42932edd61b2c3ca02b930a35b8e219b108c149b1d55f8ecb862b7bcf

Red Hat Enterprise Linux Server from RHUI 6

SRPM
ntp-4.2.6p5-10.el6.src.rpm SHA-256: 1d0c0a6aded87b0d90aabeb685299598819ec126e89396ee2213eb9ca162f6af
x86_64
ntp-4.2.6p5-10.el6.x86_64.rpm SHA-256: 34cf6ef41b9e8ae9831d5569aa699977cc632d90be2f608c90591995bc0b410b
ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
ntp-perl-4.2.6p5-10.el6.x86_64.rpm SHA-256: c1994b2b2fed186dec7289de5edc7d44e7cb502d2c22e8d53ae93533a233e15d
ntpdate-4.2.6p5-10.el6.x86_64.rpm SHA-256: e84925b42932edd61b2c3ca02b930a35b8e219b108c149b1d55f8ecb862b7bcf
i386
ntp-4.2.6p5-10.el6.i686.rpm SHA-256: 6acb51dbaf5d42f4f9e7bffb9e9c434d6ff4128d959f482a81a98c9f160b6efb
ntp-debuginfo-4.2.6p5-10.el6.i686.rpm SHA-256: 7a5fbade8dc26c8c34c67f7e8392a57d76f8cdbe50251f805d69e7fd948aa035
ntp-debuginfo-4.2.6p5-10.el6.i686.rpm SHA-256: 7a5fbade8dc26c8c34c67f7e8392a57d76f8cdbe50251f805d69e7fd948aa035
ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
ntp-perl-4.2.6p5-10.el6.i686.rpm SHA-256: 5858a35de910dc7ca9d0c7f3bd2cc05328b3396594a008194c932ce9bc80ea73
ntpdate-4.2.6p5-10.el6.i686.rpm SHA-256: d02bf0b71ded5337181f2e69d0c8ecf374273915a1048517b7d0d7e41be235aa

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • openshift.com
  • developers.redhat.com
  • connect.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2018 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter Facebook Google+