CVE-2021-3570
Published: 5 July 2021
A flaw was found in the ptp4l program of the linuxptp package. A missing length check when forwarding a PTP message between ports allows a remote attacker to cause an information leak, crash, or potentially remote code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. This flaw affects linuxptp versions before 3.1.1, before 2.0.1, before 1.9.3, before 1.8.1, before 1.7.1, before 1.6.1 and before 1.5.1.
Priority
Status
Package | Release | Status |
---|---|---|
linuxptp Launchpad, Ubuntu, Debian |
bionic |
Released
(1.8-1ubuntu0.1)
|
focal |
Released
(1.9.2-1ubuntu0.1)
|
|
groovy |
Ignored
(end of life)
|
|
hirsute |
Ignored
(end of life)
|
|
impish |
Not vulnerable
(3.1-2.1)
|
|
jammy |
Not vulnerable
(3.1-2.1)
|
|
kinetic |
Not vulnerable
(3.1-2.1)
|
|
lunar |
Not vulnerable
(3.1-2.1)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(2.6.12~rc2)
|
|
xenial |
Released
(1.6-1ubuntu0.1~esm1)
Available with Ubuntu Pro |
|
Patches: upstream: https://github.com/richardcochran/linuxptp/commit/a1e63aa3a7304647913707c4df01f3df430806ab upstream: https://github.com/richardcochran/linuxptp/commit/ce15e4de5926724557e8642ec762a210632f15ca upstream: https://github.com/richardcochran/linuxptp/commit/c15da0756d9b0ad9c0b9307c4a8685b490b76485 upstream: https://github.com/richardcochran/linuxptp/commit/7795df89dd4f94e0f55959dc61a85535d0f01cae |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |