ALAS2-2020-1455


Amazon Linux 2 Security Advisory: ALAS-2020-1455
Advisory Release Date: 2020-07-14 02:38 Pacific
Advisory Updated Date: 2020-07-17 00:46 Pacific
Severity: Medium

Issue Overview:

ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows remote attackers to cause a denial of service (daemon exit or system time change) by predicting transmit timestamps for use in spoofed packets. The victim must be relying on unauthenticated IPv4 time sources. There must be an off-path attacker who can query time from the victim's ntpd instance. (CVE-2020-13817)

ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows an off-path attacker to block unauthenticated synchronization via a server mode packet with a spoofed source IP address, because transmissions are rescheduled even when a packet lacks a valid origin timestamp. (CVE-2020-11868)


Affected Packages:

ntp


Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.


Issue Correction:
Run yum update ntp to update your system.

New Packages:
aarch64:
    ntp-4.2.6p5-29.amzn2.0.2.aarch64
    ntpdate-4.2.6p5-29.amzn2.0.2.aarch64
    sntp-4.2.6p5-29.amzn2.0.2.aarch64
    ntp-debuginfo-4.2.6p5-29.amzn2.0.2.aarch64

i686:
    ntp-4.2.6p5-29.amzn2.0.2.i686
    ntpdate-4.2.6p5-29.amzn2.0.2.i686
    sntp-4.2.6p5-29.amzn2.0.2.i686
    ntp-debuginfo-4.2.6p5-29.amzn2.0.2.i686

noarch:
    ntp-perl-4.2.6p5-29.amzn2.0.2.noarch
    ntp-doc-4.2.6p5-29.amzn2.0.2.noarch

src:
    ntp-4.2.6p5-29.amzn2.0.2.src

x86_64:
    ntp-4.2.6p5-29.amzn2.0.2.x86_64
    ntpdate-4.2.6p5-29.amzn2.0.2.x86_64
    sntp-4.2.6p5-29.amzn2.0.2.x86_64
    ntp-debuginfo-4.2.6p5-29.amzn2.0.2.x86_64