Amazon Linux 1 Security Advisory: ALAS-2015-496
Advisory Release Date: 2015-03-23 08:31 Pacific
Advisory Updated Date: 2015-03-23 08:57 Pacific
It was reported (http://bugs.ntp.org/show_bug.cgi?id=2671) that ntp misses validation of vallen value, leading to various information leaks. See for more details. (CVE-2014-9297)
It was reported (http://bugs.ntp.org/show_bug.cgi?id=2672) that ntp allows bypassing source IP ACLs on some OSes when ::1 spoofed. (CVE-2014-9298)
Affected Packages:
ntp
Issue Correction:
Run yum update ntp to update your system.
i686:
ntp-debuginfo-4.2.6p5-27.23.amzn1.i686
ntp-4.2.6p5-27.23.amzn1.i686
ntpdate-4.2.6p5-27.23.amzn1.i686
noarch:
ntp-perl-4.2.6p5-27.23.amzn1.noarch
ntp-doc-4.2.6p5-27.23.amzn1.noarch
src:
ntp-4.2.6p5-27.23.amzn1.src
x86_64:
ntpdate-4.2.6p5-27.23.amzn1.x86_64
ntp-4.2.6p5-27.23.amzn1.x86_64
ntp-debuginfo-4.2.6p5-27.23.amzn1.x86_64