Amazon Linux 2 Security Advisory: ALAS-2020-1455
Advisory Release Date: 2020-07-14 02:38 Pacific
Advisory Updated Date: 2020-07-17 00:46 Pacific
ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows remote attackers to cause a denial of service (daemon exit or system time change) by predicting transmit timestamps for use in spoofed packets. The victim must be relying on unauthenticated IPv4 time sources. There must be an off-path attacker who can query time from the victim's ntpd instance. (CVE-2020-13817)
ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows an off-path attacker to block unauthenticated synchronization via a server mode packet with a spoofed source IP address, because transmissions are rescheduled even when a packet lacks a valid origin timestamp. (CVE-2020-11868)
Affected Packages:
ntp
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update ntp to update your system.
aarch64:
ntp-4.2.6p5-29.amzn2.0.2.aarch64
ntpdate-4.2.6p5-29.amzn2.0.2.aarch64
sntp-4.2.6p5-29.amzn2.0.2.aarch64
ntp-debuginfo-4.2.6p5-29.amzn2.0.2.aarch64
i686:
ntp-4.2.6p5-29.amzn2.0.2.i686
ntpdate-4.2.6p5-29.amzn2.0.2.i686
sntp-4.2.6p5-29.amzn2.0.2.i686
ntp-debuginfo-4.2.6p5-29.amzn2.0.2.i686
noarch:
ntp-perl-4.2.6p5-29.amzn2.0.2.noarch
ntp-doc-4.2.6p5-29.amzn2.0.2.noarch
src:
ntp-4.2.6p5-29.amzn2.0.2.src
x86_64:
ntp-4.2.6p5-29.amzn2.0.2.x86_64
ntpdate-4.2.6p5-29.amzn2.0.2.x86_64
sntp-4.2.6p5-29.amzn2.0.2.x86_64
ntp-debuginfo-4.2.6p5-29.amzn2.0.2.x86_64