Skip to navigation

Bug Fix Advisory ntp bug fix update

Advisory: RHBA-2013:1800-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-12-09
Last updated on: 2013-12-09
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated ntp packages that fix one bug are now available for Red Hat Enterprise
Linux 5.

The Network Time Protocol (NTP) is used to synchronize a computer's time with
another referenced time source. This package includes the ntpd daemon which
continuously adjusts system time and utilities used to query and configure the
ntpd daemon.

This update fixes the following bug:

* Previously, with a complex Name Service Switch (NSS) configured and large NTP
request rate, the ntpd daemon needed more memory than was allowed by the memory
locking limit. As a consequence, the ntpd process could terminate unexpectedly.
To fix this bug, the memory locking limit has been doubled. As a result, ntpd no
longer crashes. (BZ#1037272)

Users of ntp are advised to upgrade to these updated packages, which fix this
bug.


Solution

Before applying this update, make sure all previously released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
ntp-4.2.2p1-17.el5_10.src.rpm     MD5: fc5450918f6b24b1c03d0c3f47383a0d
SHA-256: cb8493add042eff36484fc647fd25e6e49af2698be1e7a979afa97f98d087ec1
 
IA-32:
ntp-4.2.2p1-17.el5_10.i386.rpm     MD5: 0d780214bcc34a09102d1f3eeed761cd
SHA-256: 67bde651de9834791f8b0cfc1286352f31d6bfda5a41e551f2589d4c021248b7
ntp-debuginfo-4.2.2p1-17.el5_10.i386.rpm     MD5: 41ee280377043504bbb06d9200b92045
SHA-256: 73636c759537bdb1269fa7e1afa19eb209a55cc49c927a917f9ff1bdc9d96413
 
IA-64:
ntp-4.2.2p1-17.el5_10.ia64.rpm     MD5: d80e30531b88ce71e2883096df6a5715
SHA-256: be5762e74dcb2c2bfff6eacb75760d043721e1f1f39f28c456dc750f3c3f80db
ntp-debuginfo-4.2.2p1-17.el5_10.ia64.rpm     MD5: 5826df395f1db8057cf8260abe8657e6
SHA-256: c40e54987d28510370f8f4a1d849720141daa2bc39639171a65754ad5933d51c
 
PPC:
ntp-4.2.2p1-17.el5_10.ppc.rpm     MD5: 919148577dad42bdfaf477b6672397d1
SHA-256: b8a3535a220fd806886dd6535a69bff3444776d4007f112c2cebd45dea771e8c
ntp-debuginfo-4.2.2p1-17.el5_10.ppc.rpm     MD5: be6a3e1302f712eaec5aafeb2d63e59d
SHA-256: 8f987c3ca0a6fb8736a36bbcd9fb69e677532f0de24f446c8bb5b28bc47e2f26
 
s390x:
ntp-4.2.2p1-17.el5_10.s390x.rpm     MD5: 5058a19fdcd5f6a4628cfe4aaf2770fc
SHA-256: bc4b07f6cdfa2bf9df80badc1f8e6668b51e796e9906f5be72c274ddb0552811
ntp-debuginfo-4.2.2p1-17.el5_10.s390x.rpm     MD5: 68bdee1028b5cdc327d28d3ec9327c73
SHA-256: 8a012e8fc7de50b9d99eee5a45aedb46ae5c6ecb9a5df6f20124facbd8f03ea8
 
x86_64:
ntp-4.2.2p1-17.el5_10.x86_64.rpm     MD5: 6dffbb8c4ddca05e353f2d5b0211c7a1
SHA-256: 15b65f9ccda91b34ddee1c596ace73567e216afc34412dfff6536ab273c58843
ntp-debuginfo-4.2.2p1-17.el5_10.x86_64.rpm     MD5: a638a6fd19ec5e49b2f51ac80c1a4ffe
SHA-256: 65c3c25d4c976efec52b8b488ada1dcffc917a38e524154a37b88df6cd7d07eb
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
ntp-4.2.2p1-17.el5_10.src.rpm     MD5: fc5450918f6b24b1c03d0c3f47383a0d
SHA-256: cb8493add042eff36484fc647fd25e6e49af2698be1e7a979afa97f98d087ec1
 
IA-32:
ntp-4.2.2p1-17.el5_10.i386.rpm     MD5: 0d780214bcc34a09102d1f3eeed761cd
SHA-256: 67bde651de9834791f8b0cfc1286352f31d6bfda5a41e551f2589d4c021248b7
ntp-debuginfo-4.2.2p1-17.el5_10.i386.rpm     MD5: 41ee280377043504bbb06d9200b92045
SHA-256: 73636c759537bdb1269fa7e1afa19eb209a55cc49c927a917f9ff1bdc9d96413
 
x86_64:
ntp-4.2.2p1-17.el5_10.x86_64.rpm     MD5: 6dffbb8c4ddca05e353f2d5b0211c7a1
SHA-256: 15b65f9ccda91b34ddee1c596ace73567e216afc34412dfff6536ab273c58843
ntp-debuginfo-4.2.2p1-17.el5_10.x86_64.rpm     MD5: a638a6fd19ec5e49b2f51ac80c1a4ffe
SHA-256: 65c3c25d4c976efec52b8b488ada1dcffc917a38e524154a37b88df6cd7d07eb
 
(The unlinked packages above are only available from the Red Hat Network)

Keywords

ntp


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/