Red Hat Customer Portal

Skip to main content

Main Navigation

  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Automation Platform
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat Advanced Cluster Management for Kubernetes
      • Red Hat Quay
      • Red Hat CodeReady Workspaces
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • Runtimes
      • Back
      • Red Hat Runtimes
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat Data Grid
      • Red Hat JBoss Web Server
      • Red Hat Single Sign On
      • Red Hat support for Spring Boot
      • Red Hat build of Node.js
      • Red Hat build of Thorntail
      • Red Hat build of Eclipse Vert.x
      • Red Hat build of OpenJDK
      • Red Hat build of Quarkus
      • Red Hat CodeReady Studio
    • Integration and Automation
      • Back
      • Red Hat Integration
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat 3scale API Management
      • Red Hat JBoss Data Virtualization
      • Red Hat Process Automation
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
    • Support
    • Production Support
    • Development Support
    • Product Life Cycles
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem Catalog
    • Partner Resources
    • Red Hat in the Public Cloud
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Troubleshoot a product issue
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • 한국어
    • 日本語
    • 中文 (中国)
Red Hat Customer Portal
  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Automation Platform
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat Advanced Cluster Management for Kubernetes
      • Red Hat Quay
      • Red Hat CodeReady Workspaces
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • Runtimes
      • Back
      • Red Hat Runtimes
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat Data Grid
      • Red Hat JBoss Web Server
      • Red Hat Single Sign On
      • Red Hat support for Spring Boot
      • Red Hat build of Node.js
      • Red Hat build of Thorntail
      • Red Hat build of Eclipse Vert.x
      • Red Hat build of OpenJDK
      • Red Hat build of Quarkus
      • Red Hat CodeReady Studio
    • Integration and Automation
      • Back
      • Red Hat Integration
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat 3scale API Management
      • Red Hat JBoss Data Virtualization
      • Red Hat Process Automation
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
    • Support
    • Production Support
    • Development Support
    • Product Life Cycles
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem Catalog
    • Partner Resources
    • Red Hat in the Public Cloud
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Troubleshoot a product issue
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • 한국어
    • 日本語
    • 中文 (中国)
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Search
  • Log In
  • Language
Or troubleshoot an issue.

Log in to Your Red Hat Account

Log In

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.

Register

If you are a new customer, register now for access to product evaluations and purchasing capabilities.

Need access to an account?

If your company has an existing Red Hat account, your organization administrator can grant you access.

If you have any questions, please contact customer service.

Red Hat Account Number:

Red Hat Account

  • Account Details
  • User Management
  • Account Maintenance
  • Account Team

Customer Portal

  • My Profile
  • Notifications
  • Help

For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.

Log Out

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)
Red Hat Customer Portal Red Hat Customer Portal
  • Products & Services
  • Tools
  • Security
  • Community
  • Infrastructure and Management

  • Cloud Computing

  • Storage

  • Runtimes

  • Integration and Automation

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage
  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus
  • Red Hat CodeReady Studio
  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
View All Products
  • Support
  • Production Support
  • Development Support
  • Product Life Cycles

Services

  • Consulting
  • Technical Account Management
  • Training & Certifications
  • Documentation
  • Red Hat Enterprise Linux
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Ecosystem Catalog
  • Red Hat in the Public Cloud
  • Partner Resources

Tools

  • Troubleshoot a product issue
  • Packages
  • Errata
  • Customer Portal Labs
  • Configuration
  • Deployment
  • Security
  • Troubleshooting

Red Hat Insights

Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

  • Learn more
  • Go to Insights

Red Hat Product Security Center

Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

Product Security Center

Security Updates

  • Security Advisories
  • Red Hat CVE Database
  • Security Labs

Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

  • View Responses

Resources

  • Overview
  • Security Blog
  • Security Measurement
  • Severity Ratings
  • Backporting Policies
  • Product Signing (GPG) Keys

Customer Portal Community

  • Discussions
  • Blogs
  • Private Groups
  • Community Activity

Customer Events

  • Red Hat Convergence
  • Red Hat Summit

Stories

  • Red Hat Subscription Value
  • You Asked. We Acted.
  • Open Source Communities
Red Hat Product Errata RHSA-2016:0780 - Security Advisory
Issued:
2016-05-10
Updated:
2016-05-10

RHSA-2016:0780 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: ntp security and bug fix update

Type/Severity

Security Advisory: Moderate

Topic

An update for ntp is now available for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The Network Time Protocol (NTP) is used to synchronize a computer's time with another referenced time source. These packages include the ntpd service which continuously adjusts system time and utilities used to query and configure the ntpd service.

Security Fix(es):

  • It was found that the fix for CVE-2014-9750 was incomplete: three issues were found in the value length checks in NTP's ntp_crypto.c, where a packet with particular autokey operations that contained malicious data was not always being completely validated. A remote attacker could use a specially crafted NTP packet to crash ntpd. (CVE-2015-7691, CVE-2015-7692, CVE-2015-7702)
  • A memory leak flaw was found in ntpd's CRYPTO_ASSOC. If ntpd was configured to use autokey authentication, an attacker could send packets to ntpd that would, after several days of ongoing attack, cause it to run out of memory. (CVE-2015-7701)
  • An off-by-one flaw, leading to a buffer overflow, was found in cookedprint functionality of ntpq. A specially crafted NTP packet could potentially cause ntpq to crash. (CVE-2015-7852)
  • A NULL pointer dereference flaw was found in the way ntpd processed 'ntpdc reslist' commands that queried restriction lists with a large amount of entries. A remote attacker could potentially use this flaw to crash ntpd. (CVE-2015-7977)
  • A stack-based buffer overflow flaw was found in the way ntpd processed 'ntpdc reslist' commands that queried restriction lists with a large amount of entries. A remote attacker could use this flaw to crash ntpd. (CVE-2015-7978)
  • It was found that ntpd could crash due to an uninitialized variable when processing malformed logconfig configuration commands. (CVE-2015-5194)
  • It was found that ntpd would exit with a segmentation fault when a statistics type that was not enabled during compilation (e.g. timingstats) was referenced by the statistics or filegen configuration command. (CVE-2015-5195)
  • It was discovered that the sntp utility could become unresponsive due to being caught in an infinite loop when processing a crafted NTP packet. (CVE-2015-5219)
  • It was found that NTP's :config command could be used to set the pidfile and driftfile paths without any restrictions. A remote attacker could use this flaw to overwrite a file on the file system with a file containing the pid of the ntpd process (immediately) or the current estimated drift of the system clock (in hourly intervals). (CVE-2015-7703)

The CVE-2015-5219 and CVE-2015-7703 issues were discovered by Miroslav Lichvár (Red Hat).

For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.8 Release Notes and Red Hat Enterprise Linux 6.8 Technical Notes linked from the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for IBM z Systems 6 s390x
  • Red Hat Enterprise Linux for Power, big endian 6 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x

Fixes

  • BZ - 1254542 - CVE-2015-5194 ntp: crash with crafted logconfig configuration command
  • BZ - 1254544 - CVE-2015-5195 ntp: ntpd crash when processing config commands with statistics type
  • BZ - 1254547 - CVE-2015-7703 ntp: config command can be used to set the pidfile and drift file paths
  • BZ - 1255118 - CVE-2015-5219 ntp: infinite loop in sntp processing crafted packet
  • BZ - 1274254 - CVE-2015-7691 CVE-2015-7692 CVE-2015-7702 ntp: incomplete checks in ntp_crypto.c
  • BZ - 1274255 - CVE-2015-7701 ntp: slow memory leak in CRYPTO_ASSOC
  • BZ - 1274261 - CVE-2015-7852 ntp: ntpq atoascii memory corruption vulnerability
  • BZ - 1286969 - ntpstat reports synchronized even when the local ntpd doesn't synchronize with any time server.
  • BZ - 1300269 - CVE-2015-7977 ntp: restriction list NULL pointer dereference
  • BZ - 1300270 - CVE-2015-7978 ntp: stack exhaustion in recursive traversal of restriction list

CVEs

  • CVE-2015-5194
  • CVE-2015-5195
  • CVE-2015-5219
  • CVE-2015-7691
  • CVE-2015-7692
  • CVE-2015-7701
  • CVE-2015-7702
  • CVE-2015-7703
  • CVE-2015-7852
  • CVE-2015-7977
  • CVE-2015-7978

References

  • http://www.redhat.com/security/updates/classification/#normal
  • Note: More recent versions of these packages may be available. Click a package name for more details.

    Red Hat Enterprise Linux Server 6

    SRPM
    ntp-4.2.6p5-10.el6.src.rpm SHA-256: 1d0c0a6aded87b0d90aabeb685299598819ec126e89396ee2213eb9ca162f6af
    x86_64
    ntp-4.2.6p5-10.el6.x86_64.rpm SHA-256: 34cf6ef41b9e8ae9831d5569aa699977cc632d90be2f608c90591995bc0b410b
    ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
    ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
    ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
    ntp-perl-4.2.6p5-10.el6.x86_64.rpm SHA-256: c1994b2b2fed186dec7289de5edc7d44e7cb502d2c22e8d53ae93533a233e15d
    ntpdate-4.2.6p5-10.el6.x86_64.rpm SHA-256: e84925b42932edd61b2c3ca02b930a35b8e219b108c149b1d55f8ecb862b7bcf
    i386
    ntp-4.2.6p5-10.el6.i686.rpm SHA-256: 6acb51dbaf5d42f4f9e7bffb9e9c434d6ff4128d959f482a81a98c9f160b6efb
    ntp-debuginfo-4.2.6p5-10.el6.i686.rpm SHA-256: 7a5fbade8dc26c8c34c67f7e8392a57d76f8cdbe50251f805d69e7fd948aa035
    ntp-debuginfo-4.2.6p5-10.el6.i686.rpm SHA-256: 7a5fbade8dc26c8c34c67f7e8392a57d76f8cdbe50251f805d69e7fd948aa035
    ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
    ntp-perl-4.2.6p5-10.el6.i686.rpm SHA-256: 5858a35de910dc7ca9d0c7f3bd2cc05328b3396594a008194c932ce9bc80ea73
    ntpdate-4.2.6p5-10.el6.i686.rpm SHA-256: d02bf0b71ded5337181f2e69d0c8ecf374273915a1048517b7d0d7e41be235aa

    Red Hat Enterprise Linux Workstation 6

    SRPM
    ntp-4.2.6p5-10.el6.src.rpm SHA-256: 1d0c0a6aded87b0d90aabeb685299598819ec126e89396ee2213eb9ca162f6af
    x86_64
    ntp-4.2.6p5-10.el6.x86_64.rpm SHA-256: 34cf6ef41b9e8ae9831d5569aa699977cc632d90be2f608c90591995bc0b410b
    ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
    ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
    ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
    ntp-perl-4.2.6p5-10.el6.x86_64.rpm SHA-256: c1994b2b2fed186dec7289de5edc7d44e7cb502d2c22e8d53ae93533a233e15d
    ntpdate-4.2.6p5-10.el6.x86_64.rpm SHA-256: e84925b42932edd61b2c3ca02b930a35b8e219b108c149b1d55f8ecb862b7bcf
    i386
    ntp-4.2.6p5-10.el6.i686.rpm SHA-256: 6acb51dbaf5d42f4f9e7bffb9e9c434d6ff4128d959f482a81a98c9f160b6efb
    ntp-debuginfo-4.2.6p5-10.el6.i686.rpm SHA-256: 7a5fbade8dc26c8c34c67f7e8392a57d76f8cdbe50251f805d69e7fd948aa035
    ntp-debuginfo-4.2.6p5-10.el6.i686.rpm SHA-256: 7a5fbade8dc26c8c34c67f7e8392a57d76f8cdbe50251f805d69e7fd948aa035
    ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
    ntp-perl-4.2.6p5-10.el6.i686.rpm SHA-256: 5858a35de910dc7ca9d0c7f3bd2cc05328b3396594a008194c932ce9bc80ea73
    ntpdate-4.2.6p5-10.el6.i686.rpm SHA-256: d02bf0b71ded5337181f2e69d0c8ecf374273915a1048517b7d0d7e41be235aa

    Red Hat Enterprise Linux Desktop 6

    SRPM
    ntp-4.2.6p5-10.el6.src.rpm SHA-256: 1d0c0a6aded87b0d90aabeb685299598819ec126e89396ee2213eb9ca162f6af
    i386
    ntp-4.2.6p5-10.el6.i686.rpm SHA-256: 6acb51dbaf5d42f4f9e7bffb9e9c434d6ff4128d959f482a81a98c9f160b6efb
    ntp-debuginfo-4.2.6p5-10.el6.i686.rpm SHA-256: 7a5fbade8dc26c8c34c67f7e8392a57d76f8cdbe50251f805d69e7fd948aa035
    ntp-debuginfo-4.2.6p5-10.el6.i686.rpm SHA-256: 7a5fbade8dc26c8c34c67f7e8392a57d76f8cdbe50251f805d69e7fd948aa035
    ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
    ntp-perl-4.2.6p5-10.el6.i686.rpm SHA-256: 5858a35de910dc7ca9d0c7f3bd2cc05328b3396594a008194c932ce9bc80ea73
    ntpdate-4.2.6p5-10.el6.i686.rpm SHA-256: d02bf0b71ded5337181f2e69d0c8ecf374273915a1048517b7d0d7e41be235aa
    x86_64
    ntp-4.2.6p5-10.el6.x86_64.rpm SHA-256: 34cf6ef41b9e8ae9831d5569aa699977cc632d90be2f608c90591995bc0b410b
    ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
    ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
    ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
    ntp-perl-4.2.6p5-10.el6.x86_64.rpm SHA-256: c1994b2b2fed186dec7289de5edc7d44e7cb502d2c22e8d53ae93533a233e15d
    ntpdate-4.2.6p5-10.el6.x86_64.rpm SHA-256: e84925b42932edd61b2c3ca02b930a35b8e219b108c149b1d55f8ecb862b7bcf

    Red Hat Enterprise Linux for IBM z Systems 6

    SRPM
    ntp-4.2.6p5-10.el6.src.rpm SHA-256: 1d0c0a6aded87b0d90aabeb685299598819ec126e89396ee2213eb9ca162f6af
    s390x
    ntp-4.2.6p5-10.el6.s390x.rpm SHA-256: c78bab82a4c7c7c6ce8acb0b24acacf7da69329103f2b7358354957f0641fc27
    ntp-debuginfo-4.2.6p5-10.el6.s390x.rpm SHA-256: bc79ddde97781dbab9d672f2db07e72d150deda7f7d874e47ce119a38c66e0e6
    ntp-debuginfo-4.2.6p5-10.el6.s390x.rpm SHA-256: bc79ddde97781dbab9d672f2db07e72d150deda7f7d874e47ce119a38c66e0e6
    ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
    ntp-perl-4.2.6p5-10.el6.s390x.rpm SHA-256: 58b8a46c111096f9612575dad6c8d9075e6ac91a4230efb97d258f0e1517bf4d
    ntpdate-4.2.6p5-10.el6.s390x.rpm SHA-256: aa03e58b1b6ca55014d7fe3b833be38328d52f4717f40d7c74e82d1aeae3a117

    Red Hat Enterprise Linux for Power, big endian 6

    SRPM
    ntp-4.2.6p5-10.el6.src.rpm SHA-256: 1d0c0a6aded87b0d90aabeb685299598819ec126e89396ee2213eb9ca162f6af
    ppc64
    ntp-4.2.6p5-10.el6.ppc64.rpm SHA-256: 98259a9d2845021f17f158b2d78ba444f64cd56b9b6ec3c08599587383c68eeb
    ntp-debuginfo-4.2.6p5-10.el6.ppc64.rpm SHA-256: 8984cd2a77f02f801708b67a6aee92179efebcd11a224f08ff2f6d0ddb8a183b
    ntp-debuginfo-4.2.6p5-10.el6.ppc64.rpm SHA-256: 8984cd2a77f02f801708b67a6aee92179efebcd11a224f08ff2f6d0ddb8a183b
    ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
    ntp-perl-4.2.6p5-10.el6.ppc64.rpm SHA-256: 6d64e0f69cd119b856f27b0a26521f1feb0b1b4ab928a8ec02632f9795068a50
    ntpdate-4.2.6p5-10.el6.ppc64.rpm SHA-256: 2cce35eafcafa9031458021e7d1eff7272941c1ca33d3f4872ea47a2fbf61cad

    Red Hat Enterprise Linux for Scientific Computing 6

    SRPM
    ntp-4.2.6p5-10.el6.src.rpm SHA-256: 1d0c0a6aded87b0d90aabeb685299598819ec126e89396ee2213eb9ca162f6af
    x86_64
    ntp-4.2.6p5-10.el6.x86_64.rpm SHA-256: 34cf6ef41b9e8ae9831d5569aa699977cc632d90be2f608c90591995bc0b410b
    ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
    ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
    ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
    ntp-perl-4.2.6p5-10.el6.x86_64.rpm SHA-256: c1994b2b2fed186dec7289de5edc7d44e7cb502d2c22e8d53ae93533a233e15d
    ntpdate-4.2.6p5-10.el6.x86_64.rpm SHA-256: e84925b42932edd61b2c3ca02b930a35b8e219b108c149b1d55f8ecb862b7bcf

    Red Hat Enterprise Linux Server from RHUI 6

    SRPM
    ntp-4.2.6p5-10.el6.src.rpm SHA-256: 1d0c0a6aded87b0d90aabeb685299598819ec126e89396ee2213eb9ca162f6af
    i386
    ntp-4.2.6p5-10.el6.i686.rpm SHA-256: 6acb51dbaf5d42f4f9e7bffb9e9c434d6ff4128d959f482a81a98c9f160b6efb
    ntp-debuginfo-4.2.6p5-10.el6.i686.rpm SHA-256: 7a5fbade8dc26c8c34c67f7e8392a57d76f8cdbe50251f805d69e7fd948aa035
    ntp-debuginfo-4.2.6p5-10.el6.i686.rpm SHA-256: 7a5fbade8dc26c8c34c67f7e8392a57d76f8cdbe50251f805d69e7fd948aa035
    ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
    ntp-perl-4.2.6p5-10.el6.i686.rpm SHA-256: 5858a35de910dc7ca9d0c7f3bd2cc05328b3396594a008194c932ce9bc80ea73
    ntpdate-4.2.6p5-10.el6.i686.rpm SHA-256: d02bf0b71ded5337181f2e69d0c8ecf374273915a1048517b7d0d7e41be235aa
    x86_64
    ntp-4.2.6p5-10.el6.x86_64.rpm SHA-256: 34cf6ef41b9e8ae9831d5569aa699977cc632d90be2f608c90591995bc0b410b
    ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
    ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
    ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
    ntp-perl-4.2.6p5-10.el6.x86_64.rpm SHA-256: c1994b2b2fed186dec7289de5edc7d44e7cb502d2c22e8d53ae93533a233e15d
    ntpdate-4.2.6p5-10.el6.x86_64.rpm SHA-256: e84925b42932edd61b2c3ca02b930a35b8e219b108c149b1d55f8ecb862b7bcf

    Red Hat Enterprise Linux Server - Extended Life Cycle Support 6

    SRPM
    ntp-4.2.6p5-10.el6.src.rpm SHA-256: 1d0c0a6aded87b0d90aabeb685299598819ec126e89396ee2213eb9ca162f6af
    x86_64
    ntp-4.2.6p5-10.el6.x86_64.rpm SHA-256: 34cf6ef41b9e8ae9831d5569aa699977cc632d90be2f608c90591995bc0b410b
    ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
    ntp-debuginfo-4.2.6p5-10.el6.x86_64.rpm SHA-256: 9d97d7a1624e8f92450517349eb662a4d0f050df22c5a1b47ae0cd58e56f4ff4
    ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
    ntp-perl-4.2.6p5-10.el6.x86_64.rpm SHA-256: c1994b2b2fed186dec7289de5edc7d44e7cb502d2c22e8d53ae93533a233e15d
    ntpdate-4.2.6p5-10.el6.x86_64.rpm SHA-256: e84925b42932edd61b2c3ca02b930a35b8e219b108c149b1d55f8ecb862b7bcf
    i386
    ntp-4.2.6p5-10.el6.i686.rpm SHA-256: 6acb51dbaf5d42f4f9e7bffb9e9c434d6ff4128d959f482a81a98c9f160b6efb
    ntp-debuginfo-4.2.6p5-10.el6.i686.rpm SHA-256: 7a5fbade8dc26c8c34c67f7e8392a57d76f8cdbe50251f805d69e7fd948aa035
    ntp-debuginfo-4.2.6p5-10.el6.i686.rpm SHA-256: 7a5fbade8dc26c8c34c67f7e8392a57d76f8cdbe50251f805d69e7fd948aa035
    ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
    ntp-perl-4.2.6p5-10.el6.i686.rpm SHA-256: 5858a35de910dc7ca9d0c7f3bd2cc05328b3396594a008194c932ce9bc80ea73
    ntpdate-4.2.6p5-10.el6.i686.rpm SHA-256: d02bf0b71ded5337181f2e69d0c8ecf374273915a1048517b7d0d7e41be235aa

    Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6

    SRPM
    ntp-4.2.6p5-10.el6.src.rpm SHA-256: 1d0c0a6aded87b0d90aabeb685299598819ec126e89396ee2213eb9ca162f6af
    s390x
    ntp-4.2.6p5-10.el6.s390x.rpm SHA-256: c78bab82a4c7c7c6ce8acb0b24acacf7da69329103f2b7358354957f0641fc27
    ntp-debuginfo-4.2.6p5-10.el6.s390x.rpm SHA-256: bc79ddde97781dbab9d672f2db07e72d150deda7f7d874e47ce119a38c66e0e6
    ntp-debuginfo-4.2.6p5-10.el6.s390x.rpm SHA-256: bc79ddde97781dbab9d672f2db07e72d150deda7f7d874e47ce119a38c66e0e6
    ntp-doc-4.2.6p5-10.el6.noarch.rpm SHA-256: 75183ed0843802ebe821fa678a9cc08cf55d726f277b2e9743a69edf057c81d4
    ntp-perl-4.2.6p5-10.el6.s390x.rpm SHA-256: 58b8a46c111096f9612575dad6c8d9075e6ac91a4230efb97d258f0e1517bf4d
    ntpdate-4.2.6p5-10.el6.s390x.rpm SHA-256: aa03e58b1b6ca55014d7fe3b833be38328d52f4717f40d7c74e82d1aeae3a117

    The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

    Red Hat

    Quick Links

    • Downloads
    • Subscriptions
    • Support Cases
    • Customer Service
    • Product Documentation

    Help

    • Contact Us
    • Customer Portal FAQ
    • Log-in Assistance

    Site Info

    • Trust Red Hat
    • Browser Support Policy
    • Accessibility
    • Awards and Recognition
    • Colophon

    Related Sites

    • redhat.com
    • openshift.com
    • developers.redhat.com
    • connect.redhat.com
    • cloud.redhat.com

    About

    • Red Hat Subscription Value
    • About Red Hat
    • Red Hat Jobs
    Copyright © 2021 Red Hat, Inc.
    • Privacy Statement
    • Customer Portal Terms of Use
    • All Policies and Guidelines
    Red Hat Summit
    Twitter Facebook