linuxptp-3.1.1-1.el8
エラータID: AXSA:2021-2668:04
The linuxptp packages provide Precision Time Protocol (PTP) implementation for Linux according to IEEE standard 1588 for Linux. The dual design goals are to provide a robust implementation of the standard and to use the most relevant and modern Application Programming Interfaces (API) offered by the Linux kernel.
The following packages have been upgraded to a later upstream version: linuxptp (3.1.1). (BZ#1895005)
Security Fix(es):
* linuxptp: wrong length of one-step follow-up in transparent clock (CVE-2021-3571)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2021-3571
A flaw was found in the ptp4l program of the linuxptp package. When ptp4l is operating on a little-endian architecture as a PTP transparent clock, a remote attacker could send a crafted one-step sync message to cause an information leak or crash. The highest threat from this vulnerability is to data confidentiality and system availability. This flaw affects linuxptp versions before 3.1.1 and before 2.0.1.
Update packages.
A flaw was found in the ptp4l program of the linuxptp package. When ptp4l is operating on a little-endian architecture as a PTP transparent clock, a remote attacker could send a crafted one-step sync message to cause an information leak or crash. The highest threat from this vulnerability is to data confidentiality and system availability. This flaw affects linuxptp versions before 3.1.1 and before 2.0.1.
N/A
SRPMS
- linuxptp-3.1.1-1.el8.src.rpm
MD5: d15ed6492e7f1fbebe3f4d234d2b33b6
SHA-256: 38e220b06564ef2e7995427836d0fe2c8db9d29bc744c3e6de44d4cb402234f5
Size: 296.07 kB
Asianux Server 8 for x86_64
- linuxptp-3.1.1-1.el8.x86_64.rpm
MD5: 087c52b093054f1be1039209cefffc3f
SHA-256: b739fe5fcb7a477b24479bffbfc2bc5efa8ee70d451eeca375c3b55e7ea94392
Size: 226.41 kB