Bug Fix Advisory iputils bug fix update

Advisory: RHBA-2013:1290-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-09-26
Last updated on: 2013-09-26
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server AUS (v. 6.4)
Red Hat Enterprise Linux Server EUS (v. 6.4.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

An updated iputils package that fixes one bug is now available for Red Hat
Enterprise Linux 6.

The iputils package contains basic utilities for monitoring a network, including
ping.

This update fixes the following bug:

* Previously, when the system time was set backwards while the arping utility
was running, arping never exited. This update enhances arping's internal logic
that is responsible for the time measurement. As a result, arping works as
expected when the system time is set backwards while it is running. (BZ#998827)

Users of iputils are advised to upgrade to this updated package, which fixes
this bug.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
iputils-20071127-17.el6_4.2.src.rpm
File outdated by:  RHBA-2017:0604
    MD5: 4a677811c72d6ef7cae13e6006ddeb9b
SHA-256: ae6a9d05e70caa082f3d594d42e021922f0685444d6a690bd601ec2a0f4739a6
 
IA-32:
iputils-20071127-17.el6_4.2.i686.rpm
File outdated by:  RHBA-2017:0604
    MD5: 9f838f187cbd65b4563ba0957e35df3c
SHA-256: 9d4334b204f368bb268ee74bd8d8b9d78f5fbf9ef2d69e505ceb015c988bd262
iputils-debuginfo-20071127-17.el6_4.2.i686.rpm
File outdated by:  RHBA-2017:0604
    MD5: 8c04bc86d37b5b8dd6ee3c6beda27ea6
SHA-256: d849675d5d85959bb883797e28d1baf01ec67392c27a95794f2a77ae1ef3c971
 
x86_64:
iputils-20071127-17.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2017:0604
    MD5: f320444f6be2b57a60ecf86e73acbf89
SHA-256: 2a42f53916f47562a341bd468a1929d20f7473e6c59b28da9f98d95a1d29da3b
iputils-debuginfo-20071127-17.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2017:0604
    MD5: 11f08198738bb5b65743d3c299d62a03
SHA-256: 0b6d1c4478bf8d7967ea1c4546f7175fc24ae021fa9bec06ba1940e2d6d581d3
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
iputils-20071127-17.el6_4.2.src.rpm
File outdated by:  RHBA-2017:0604
    MD5: 4a677811c72d6ef7cae13e6006ddeb9b
SHA-256: ae6a9d05e70caa082f3d594d42e021922f0685444d6a690bd601ec2a0f4739a6
 
x86_64:
iputils-20071127-17.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2017:0604
    MD5: f320444f6be2b57a60ecf86e73acbf89
SHA-256: 2a42f53916f47562a341bd468a1929d20f7473e6c59b28da9f98d95a1d29da3b
iputils-debuginfo-20071127-17.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2017:0604
    MD5: 11f08198738bb5b65743d3c299d62a03
SHA-256: 0b6d1c4478bf8d7967ea1c4546f7175fc24ae021fa9bec06ba1940e2d6d581d3
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
iputils-20071127-17.el6_4.2.src.rpm
File outdated by:  RHBA-2017:0604
    MD5: 4a677811c72d6ef7cae13e6006ddeb9b
SHA-256: ae6a9d05e70caa082f3d594d42e021922f0685444d6a690bd601ec2a0f4739a6
 
IA-32:
iputils-20071127-17.el6_4.2.i686.rpm
File outdated by:  RHBA-2017:0604
    MD5: 9f838f187cbd65b4563ba0957e35df3c
SHA-256: 9d4334b204f368bb268ee74bd8d8b9d78f5fbf9ef2d69e505ceb015c988bd262
iputils-debuginfo-20071127-17.el6_4.2.i686.rpm
File outdated by:  RHBA-2017:0604
    MD5: 8c04bc86d37b5b8dd6ee3c6beda27ea6
SHA-256: d849675d5d85959bb883797e28d1baf01ec67392c27a95794f2a77ae1ef3c971
 
PPC:
iputils-20071127-17.el6_4.2.ppc64.rpm
File outdated by:  RHBA-2017:0604
    MD5: f9ffa6c994686ddccdaaebe6c5b3422c
SHA-256: 39eeb102430f9b4d43a33cd10130a1392391bdb7f2b6272ecd0de3f9c371b8c6
iputils-debuginfo-20071127-17.el6_4.2.ppc64.rpm
File outdated by:  RHBA-2017:0604
    MD5: 25c067349a3fd8e9d889d679515a9e91
SHA-256: 1918bfb2b7584951206d6d1d8c581733b12278cd1ca1fe8ed87ce6ce994227f8
 
s390x:
iputils-20071127-17.el6_4.2.s390x.rpm
File outdated by:  RHBA-2017:0604
    MD5: 59106ada3a792e2ee43407d67071a007
SHA-256: fa85619df15eb6714c7c7780e14c396e371595905d0b0e40ff3f4dffa983b0d8
iputils-debuginfo-20071127-17.el6_4.2.s390x.rpm
File outdated by:  RHBA-2017:0604
    MD5: 087e961de96e5559cef91db0ebe1c4a1
SHA-256: 614cf39abbcb60a7e7c68cc24b61f7b0f7a8f45eb336e70c8eadf6a70a6f8c38
 
x86_64:
iputils-20071127-17.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2017:0604
    MD5: f320444f6be2b57a60ecf86e73acbf89
SHA-256: 2a42f53916f47562a341bd468a1929d20f7473e6c59b28da9f98d95a1d29da3b
iputils-debuginfo-20071127-17.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2017:0604
    MD5: 11f08198738bb5b65743d3c299d62a03
SHA-256: 0b6d1c4478bf8d7967ea1c4546f7175fc24ae021fa9bec06ba1940e2d6d581d3
 
Red Hat Enterprise Linux Server AUS (v. 6.4)

SRPMS:
iputils-20071127-17.el6_4.2.src.rpm
File outdated by:  RHBA-2017:0604
    MD5: 4a677811c72d6ef7cae13e6006ddeb9b
SHA-256: ae6a9d05e70caa082f3d594d42e021922f0685444d6a690bd601ec2a0f4739a6
 
x86_64:
iputils-20071127-17.el6_4.2.x86_64.rpm     MD5: f320444f6be2b57a60ecf86e73acbf89
SHA-256: 2a42f53916f47562a341bd468a1929d20f7473e6c59b28da9f98d95a1d29da3b
iputils-debuginfo-20071127-17.el6_4.2.x86_64.rpm     MD5: 11f08198738bb5b65743d3c299d62a03
SHA-256: 0b6d1c4478bf8d7967ea1c4546f7175fc24ae021fa9bec06ba1940e2d6d581d3
 
Red Hat Enterprise Linux Server EUS (v. 6.4.z)

SRPMS:
iputils-20071127-17.el6_4.2.src.rpm
File outdated by:  RHBA-2017:0604
    MD5: 4a677811c72d6ef7cae13e6006ddeb9b
SHA-256: ae6a9d05e70caa082f3d594d42e021922f0685444d6a690bd601ec2a0f4739a6
 
IA-32:
iputils-20071127-17.el6_4.2.i686.rpm     MD5: 9f838f187cbd65b4563ba0957e35df3c
SHA-256: 9d4334b204f368bb268ee74bd8d8b9d78f5fbf9ef2d69e505ceb015c988bd262
iputils-debuginfo-20071127-17.el6_4.2.i686.rpm     MD5: 8c04bc86d37b5b8dd6ee3c6beda27ea6
SHA-256: d849675d5d85959bb883797e28d1baf01ec67392c27a95794f2a77ae1ef3c971
 
PPC:
iputils-20071127-17.el6_4.2.ppc64.rpm     MD5: f9ffa6c994686ddccdaaebe6c5b3422c
SHA-256: 39eeb102430f9b4d43a33cd10130a1392391bdb7f2b6272ecd0de3f9c371b8c6
iputils-debuginfo-20071127-17.el6_4.2.ppc64.rpm     MD5: 25c067349a3fd8e9d889d679515a9e91
SHA-256: 1918bfb2b7584951206d6d1d8c581733b12278cd1ca1fe8ed87ce6ce994227f8
 
s390x:
iputils-20071127-17.el6_4.2.s390x.rpm     MD5: 59106ada3a792e2ee43407d67071a007
SHA-256: fa85619df15eb6714c7c7780e14c396e371595905d0b0e40ff3f4dffa983b0d8
iputils-debuginfo-20071127-17.el6_4.2.s390x.rpm     MD5: 087e961de96e5559cef91db0ebe1c4a1
SHA-256: 614cf39abbcb60a7e7c68cc24b61f7b0f7a8f45eb336e70c8eadf6a70a6f8c38
 
x86_64:
iputils-20071127-17.el6_4.2.x86_64.rpm     MD5: f320444f6be2b57a60ecf86e73acbf89
SHA-256: 2a42f53916f47562a341bd468a1929d20f7473e6c59b28da9f98d95a1d29da3b
iputils-debuginfo-20071127-17.el6_4.2.x86_64.rpm     MD5: 11f08198738bb5b65743d3c299d62a03
SHA-256: 0b6d1c4478bf8d7967ea1c4546f7175fc24ae021fa9bec06ba1940e2d6d581d3
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
iputils-20071127-17.el6_4.2.src.rpm
File outdated by:  RHBA-2017:0604
    MD5: 4a677811c72d6ef7cae13e6006ddeb9b
SHA-256: ae6a9d05e70caa082f3d594d42e021922f0685444d6a690bd601ec2a0f4739a6
 
IA-32:
iputils-20071127-17.el6_4.2.i686.rpm
File outdated by:  RHBA-2017:0604
    MD5: 9f838f187cbd65b4563ba0957e35df3c
SHA-256: 9d4334b204f368bb268ee74bd8d8b9d78f5fbf9ef2d69e505ceb015c988bd262
iputils-debuginfo-20071127-17.el6_4.2.i686.rpm
File outdated by:  RHBA-2017:0604
    MD5: 8c04bc86d37b5b8dd6ee3c6beda27ea6
SHA-256: d849675d5d85959bb883797e28d1baf01ec67392c27a95794f2a77ae1ef3c971
 
x86_64:
iputils-20071127-17.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2017:0604
    MD5: f320444f6be2b57a60ecf86e73acbf89
SHA-256: 2a42f53916f47562a341bd468a1929d20f7473e6c59b28da9f98d95a1d29da3b
iputils-debuginfo-20071127-17.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2017:0604
    MD5: 11f08198738bb5b65743d3c299d62a03
SHA-256: 0b6d1c4478bf8d7967ea1c4546f7175fc24ae021fa9bec06ba1940e2d6d581d3
 
(The unlinked packages above are only available from the Red Hat Network)

Keywords

arping, iputils


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/