Skip to navigation

Bug Fix Advisory Updated ntp package fixes initscript bug

Advisory: RHBA-2004:092-04
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2004-05-19
Last updated on: 2004-05-19
Affected Products: Red Hat Desktop (v. 3)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux WS (v. 3)

Details

An updated ntp package that fixes an initscript bug is now available for
Red Hat Enterprise Linux 3.

The Network Time Protocol (NTP) is used to synchronize a computer's time
with a reference time source.

An updated ntp package fixes an initscript bug that prevented NTP traffic
from coming through a firewall. In addition, the package has been modified
to remove its dependency on PERL.

Users of NTP should upgrade to these updated packages.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Updated packages

Red Hat Desktop (v. 3)

SRPMS:
ntp-4.1.2-4.EL3.1.src.rpm
File outdated by:  RHSA-2009:1651
    MD5: 0a2c34c9c80b4706112665d2fa68ec64
ntp-4.1.2-4.EL3.1.src.rpm
File outdated by:  RHSA-2009:1651
    MD5: 0a2c34c9c80b4706112665d2fa68ec64
 
IA-32:
ntp-4.1.2-4.EL3.1.i386.rpm
File outdated by:  RHSA-2009:1651
    MD5: be1669bd584de0e18d53298a4dd0e74e
 
x86_64:
ntp-4.1.2-4.EL3.1.x86_64.rpm
File outdated by:  RHSA-2009:1651
    MD5: c13c359334c5fe7e649604fb03c54cad
 
Red Hat Enterprise Linux AS (v. 3)

SRPMS:
ntp-4.1.2-4.EL3.1.src.rpm
File outdated by:  RHSA-2009:1651
    MD5: 0a2c34c9c80b4706112665d2fa68ec64
ntp-4.1.2-4.EL3.1.src.rpm
File outdated by:  RHSA-2009:1651
    MD5: 0a2c34c9c80b4706112665d2fa68ec64
 
IA-32:
ntp-4.1.2-4.EL3.1.i386.rpm
File outdated by:  RHSA-2009:1651
    MD5: be1669bd584de0e18d53298a4dd0e74e
 
IA-64:
ntp-4.1.2-4.EL3.1.ia64.rpm
File outdated by:  RHSA-2009:1651
    MD5: 0efe0c65dcf46a23d23cab098ecde671
 
PPC:
ntp-4.1.2-4.EL3.1.ppc.rpm
File outdated by:  RHSA-2009:1651
    MD5: 52d2983859597bbab679bede5f6d86a1
ftp://updates.redhat.com/rhn/repository/NULL/ntp/4.1.2-4.EL3.1/ppc64/ntp-4.1.2-4.EL3.1.ppc64.rpm
Missing file
    MD5: 2f46bb30bd7aec075de43afb83bdfc5d
 
s390:
ntp-4.1.2-4.EL3.1.s390.rpm
File outdated by:  RHSA-2009:1651
    MD5: 16c5d392bdeae3cc780910963a487c12
 
s390x:
ntp-4.1.2-4.EL3.1.s390x.rpm
File outdated by:  RHSA-2009:1651
    MD5: 2e7415cbbbc4ae852bf3c11f71a20c77
 
x86_64:
ntp-4.1.2-4.EL3.1.x86_64.rpm
File outdated by:  RHSA-2009:1651
    MD5: c13c359334c5fe7e649604fb03c54cad
 
Red Hat Enterprise Linux ES (v. 3)

SRPMS:
ntp-4.1.2-4.EL3.1.src.rpm
File outdated by:  RHSA-2009:1651
    MD5: 0a2c34c9c80b4706112665d2fa68ec64
ntp-4.1.2-4.EL3.1.src.rpm
File outdated by:  RHSA-2009:1651
    MD5: 0a2c34c9c80b4706112665d2fa68ec64
 
IA-32:
ntp-4.1.2-4.EL3.1.i386.rpm
File outdated by:  RHSA-2009:1651
    MD5: be1669bd584de0e18d53298a4dd0e74e
 
IA-64:
ntp-4.1.2-4.EL3.1.ia64.rpm
File outdated by:  RHSA-2009:1651
    MD5: 0efe0c65dcf46a23d23cab098ecde671
 
x86_64:
ntp-4.1.2-4.EL3.1.x86_64.rpm
File outdated by:  RHSA-2009:1651
    MD5: c13c359334c5fe7e649604fb03c54cad
 
Red Hat Enterprise Linux WS (v. 3)

SRPMS:
ntp-4.1.2-4.EL3.1.src.rpm
File outdated by:  RHSA-2009:1651
    MD5: 0a2c34c9c80b4706112665d2fa68ec64
ntp-4.1.2-4.EL3.1.src.rpm
File outdated by:  RHSA-2009:1651
    MD5: 0a2c34c9c80b4706112665d2fa68ec64
 
IA-32:
ntp-4.1.2-4.EL3.1.i386.rpm
File outdated by:  RHSA-2009:1651
    MD5: be1669bd584de0e18d53298a4dd0e74e
 
IA-64:
ntp-4.1.2-4.EL3.1.ia64.rpm
File outdated by:  RHSA-2009:1651
    MD5: 0efe0c65dcf46a23d23cab098ecde671
 
x86_64:
ntp-4.1.2-4.EL3.1.x86_64.rpm
File outdated by:  RHSA-2009:1651
    MD5: c13c359334c5fe7e649604fb03c54cad
 

Bugs fixed (see bugzilla for more information)

110828 - Error in ntpd init script


Keywords

ntp


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/