First published: Mon May 31 2021(Updated: )
A flaw was found in the ptp4l program of the linuxptp package. When ptp4l is operating on a little-endian architecture as a PTP transparent clock, a remote attacker could send a crafted one-step sync message to cause an information leak or crash. The highest threat from this vulnerability is to data confidentiality and system availability. This flaw affects linuxptp versions before 3.1.1 and before 2.0.1.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linuxptp | 1.9.2-1+deb10u1 3.1-2.1 3.1.1-4 4.0-1 | |
Linuxptp Project Linuxptp | <2.0.1 | |
Linuxptp Project Linuxptp | >=3.0<3.1.1 | |
Redhat Enterprise Linux | =8.0 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
redhat/linuxptp | <3.1.1 | 3.1.1 |
redhat/linuxptp | <2.0.1 | 2.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3571 is a vulnerability found in the ptp4l program of the linuxptp package, which can be exploited by a remote attacker to cause an information leak or crash.
If you are using the linuxptp package with the ptp4l program operating on a little-endian architecture as a PTP transparent clock, you may be vulnerable to CVE-2021-3571.
The severity of CVE-2021-3571 is high, with a CVSS score of 7.1.
To fix CVE-2021-3571, update your linuxptp package to version 1.9.2-1+deb10u1, 3.1-2.1, 3.1.1-4, or 4.0-1, depending on the version you are using.
Yes, you can find more information about CVE-2021-3571 at the following references: [link1](https://bugzilla.redhat.com/show_bug.cgi?id=1966241), [link2](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RHRUVSDP673LXJ5HGIPQPWPIYUPWYQA7/), [link3](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VUBKTRCMJ6VKS7DIBSZQB4ATSKVCJYXJ/).