ALAS2-2019-1367


Amazon Linux 2 Security Advisory: ALAS-2019-1367
Advisory Release Date: 2019-11-19 17:52 Pacific
Advisory Updated Date: 2019-11-22 20:54 Pacific
Severity: Low

Issue Overview:

The ntpq and ntpdc command-line utilities that are part of ntp package are vulnerable to stack-based buffer overflow via crafted hostname. Applications using these vulnerable utilities with an untrusted input may be potentially exploited, resulting in a crash or arbitrary code execution under privileges of that application.(CVE-2018-12327)


Affected Packages:

ntp


Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.


Issue Correction:
Run yum update ntp to update your system.

New Packages:
aarch64:
    ntp-4.2.6p5-29.amzn2.0.1.aarch64
    ntpdate-4.2.6p5-29.amzn2.0.1.aarch64
    sntp-4.2.6p5-29.amzn2.0.1.aarch64
    ntp-debuginfo-4.2.6p5-29.amzn2.0.1.aarch64

i686:
    ntp-4.2.6p5-29.amzn2.0.1.i686
    ntpdate-4.2.6p5-29.amzn2.0.1.i686
    sntp-4.2.6p5-29.amzn2.0.1.i686
    ntp-debuginfo-4.2.6p5-29.amzn2.0.1.i686

noarch:
    ntp-perl-4.2.6p5-29.amzn2.0.1.noarch
    ntp-doc-4.2.6p5-29.amzn2.0.1.noarch

src:
    ntp-4.2.6p5-29.amzn2.0.1.src

x86_64:
    ntp-4.2.6p5-29.amzn2.0.1.x86_64
    ntpdate-4.2.6p5-29.amzn2.0.1.x86_64
    sntp-4.2.6p5-29.amzn2.0.1.x86_64
    ntp-debuginfo-4.2.6p5-29.amzn2.0.1.x86_64