- Issued:
- 2016-10-19
- Updated:
- 2016-10-19
RHBA-2016:2081 - Bug Fix Advisory
Synopsis
ntp bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated ntp packages that fix one bug are now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.
Description
The Network Time Protocol (NTP) is used to synchronize a computer's time with another referenced time source. This package includes the ntpd daemon which continuously adjusts system time and utilities used to query and configure the ntpd daemon.
This update fixes the following bug:
- Previously, when the ntpd daemon was configured with the "-x" option to adjust the system clock slowly instead of changing the time instantaneously, the system clock was incorrectly changed instantaneously when a leap second occurred. In certain applications, this could lead to a variety of system clock related problems, such as incorrect event sorting or triggering. To fix this bug, ntpd now adjusts for the leap second slowly over a long interval, which prevents the described problems. (BZ#1381600)
Users of ntp are advised to upgrade to these updated packages, which fix this bug.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux Server - AUS 6.5 x86_64
- Red Hat Enterprise Linux Server - TUS 6.5 x86_64
Fixes
- BZ - 1381600 - ntpd -x steps clock on leap second
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server - AUS 6.5
SRPM | |
---|---|
ntp-4.2.6p5-2.el6_5.2.src.rpm | SHA-256: c7c0018e35670f903fb6a0ad71e8a0d3620ba31c5ba0fc44b2d3a9b1e05a1c7a |
x86_64 | |
ntp-4.2.6p5-2.el6_5.2.x86_64.rpm | SHA-256: 891d4474b9e319e1c8575b4e72035d658eb92370496e3fa1799f9e0fe5d6e918 |
ntp-debuginfo-4.2.6p5-2.el6_5.2.x86_64.rpm | SHA-256: efd6ce810704d8281feea8391c4f5cde43c052614ba2b9ba2904dd27f81dff91 |
ntp-debuginfo-4.2.6p5-2.el6_5.2.x86_64.rpm | SHA-256: efd6ce810704d8281feea8391c4f5cde43c052614ba2b9ba2904dd27f81dff91 |
ntp-doc-4.2.6p5-2.el6_5.2.noarch.rpm | SHA-256: 586cba5ddbf9b6ea3b7047a918ede9ff6a56ad23af17ba34c871bf85705d1585 |
ntp-perl-4.2.6p5-2.el6_5.2.x86_64.rpm | SHA-256: 531b962cdbf2bea25dce3d10a4071e5722025b805c123f97791717426d6ce857 |
ntpdate-4.2.6p5-2.el6_5.2.x86_64.rpm | SHA-256: 4008c3fa8cecc16252b26c5ecb9ccf833dd42456acbd0a5762e0f8b6a9fa90bb |
Red Hat Enterprise Linux Server - TUS 6.5
SRPM | |
---|---|
ntp-4.2.6p5-2.el6_5.2.src.rpm | SHA-256: c7c0018e35670f903fb6a0ad71e8a0d3620ba31c5ba0fc44b2d3a9b1e05a1c7a |
x86_64 | |
ntp-4.2.6p5-2.el6_5.2.x86_64.rpm | SHA-256: 891d4474b9e319e1c8575b4e72035d658eb92370496e3fa1799f9e0fe5d6e918 |
ntp-debuginfo-4.2.6p5-2.el6_5.2.x86_64.rpm | SHA-256: efd6ce810704d8281feea8391c4f5cde43c052614ba2b9ba2904dd27f81dff91 |
ntp-debuginfo-4.2.6p5-2.el6_5.2.x86_64.rpm | SHA-256: efd6ce810704d8281feea8391c4f5cde43c052614ba2b9ba2904dd27f81dff91 |
ntp-doc-4.2.6p5-2.el6_5.2.noarch.rpm | SHA-256: 586cba5ddbf9b6ea3b7047a918ede9ff6a56ad23af17ba34c871bf85705d1585 |
ntp-perl-4.2.6p5-2.el6_5.2.x86_64.rpm | SHA-256: 531b962cdbf2bea25dce3d10a4071e5722025b805c123f97791717426d6ce857 |
ntpdate-4.2.6p5-2.el6_5.2.x86_64.rpm | SHA-256: 4008c3fa8cecc16252b26c5ecb9ccf833dd42456acbd0a5762e0f8b6a9fa90bb |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.