{"schema_version":"1.7.2","id":"OESA-2021-1368","modified":"2021-09-30T11:03:14Z","published":"2021-09-30T11:03:14Z","upstream":["CVE-2021-3570"],"summary":"linuxptp security update","details":"Linuxptp is an implementation of the Precision Time Protocol (PTP) according to IEEE standard 1588 for Linux. The dual design goals are to provide a robust implementation of the standard and to use the most relevant and modern Application Programming Interfaces (API) offered by the Linux kernel. Supporting legacy APIs and other platforms is not a goal.\r\n\r\nSecurity Fix(es):\r\n\r\nA flaw was found in the ptp4l program of the linuxptp package. A missing length check when forwarding a PTP message between ports allows a remote attacker to cause an information leak, crash, or potentially remote code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2021-3570)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP1","name":"linuxptp","purl":"pkg:rpm/openEuler/linuxptp\u0026distro=openEuler-20.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.0-5.oe1"}]}],"ecosystem_specific":{"aarch64":["linuxptp-debuginfo-2.0-5.oe1.aarch64.rpm","linuxptp-debugsource-2.0-5.oe1.aarch64.rpm","linuxptp-2.0-5.oe1.aarch64.rpm"],"noarch":["linuxptp-help-2.0-5.oe1.noarch.rpm"],"src":["linuxptp-2.0-5.oe1.src.rpm"],"x86_64":["linuxptp-2.0-5.oe1.x86_64.rpm","linuxptp-debugsource-2.0-5.oe1.x86_64.rpm","linuxptp-debuginfo-2.0-5.oe1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:20.03-LTS-SP2","name":"linuxptp","purl":"pkg:rpm/openEuler/linuxptp\u0026distro=openEuler-20.03-LTS-SP2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.0-5.oe1"}]}],"ecosystem_specific":{"aarch64":["linuxptp-2.0-5.oe1.aarch64.rpm","linuxptp-debugsource-2.0-5.oe1.aarch64.rpm","linuxptp-debuginfo-2.0-5.oe1.aarch64.rpm"],"noarch":["linuxptp-help-2.0-5.oe1.noarch.rpm"],"src":["linuxptp-2.0-5.oe1.src.rpm"],"x86_64":["linuxptp-debugsource-2.0-5.oe1.x86_64.rpm","linuxptp-2.0-5.oe1.x86_64.rpm","linuxptp-debuginfo-2.0-5.oe1.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1368"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3570"}],"database_specific":{"severity":"High"}}