Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2021:4321

Опубликовано: 15 нояб. 2021
Источник: rocky
Оценка: Moderate

Описание

Moderate: linuxptp security, bug fix, and enhancement update

For more information visit https://errata.rockylinux.org/RLSA-2021:4321

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
linuxptpx86_641.el8linuxptp-3.1.1-1.el8.x86_64.rpm

Показывать по

Связанные CVE

Связанные уязвимости

CVSS3: 7.1
ubuntu
почти 4 года назад

A flaw was found in the ptp4l program of the linuxptp package. When ptp4l is operating on a little-endian architecture as a PTP transparent clock, a remote attacker could send a crafted one-step sync message to cause an information leak or crash. The highest threat from this vulnerability is to data confidentiality and system availability. This flaw affects linuxptp versions before 3.1.1 and before 2.0.1.

CVSS3: 7.1
redhat
почти 4 года назад

A flaw was found in the ptp4l program of the linuxptp package. When ptp4l is operating on a little-endian architecture as a PTP transparent clock, a remote attacker could send a crafted one-step sync message to cause an information leak or crash. The highest threat from this vulnerability is to data confidentiality and system availability. This flaw affects linuxptp versions before 3.1.1 and before 2.0.1.

CVSS3: 7.1
nvd
почти 4 года назад

A flaw was found in the ptp4l program of the linuxptp package. When ptp4l is operating on a little-endian architecture as a PTP transparent clock, a remote attacker could send a crafted one-step sync message to cause an information leak or crash. The highest threat from this vulnerability is to data confidentiality and system availability. This flaw affects linuxptp versions before 3.1.1 and before 2.0.1.

CVSS3: 7.1
debian
почти 4 года назад

A flaw was found in the ptp4l program of the linuxptp package. When pt ...

CVSS3: 7.1
github
около 3 лет назад

A flaw was found in the ptp4l program of the linuxptp package. When ptp4l is operating on a little-endian architecture as a PTP transparent clock, a remote attacker could send a crafted one-step sync message to cause an information leak or crash. The highest threat from this vulnerability is to data confidentiality and system availability. This flaw affects linuxptp versions before 3.1.1 and before 2.0.1.