
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability (CVE-2021-3571) was discovered in the ptp4l program of the linuxptp package. The issue affects linuxptp versions before 3.1.1 and before 2.0.1, specifically when ptp4l is operating on a little-endian architecture as a PTP transparent clock (CVE Details, Red Hat).
When ptp4l is operating on a little-endian architecture as a PTP transparent clock and forwards a one-step sync message, it generates a follow-up message which has an incorrect length, sending data past the message buffer. The vulnerability has been assigned a CVSS v3 score of 7.1 (Moderate impact) (Red Hat, Bugzilla).
The highest threats from this vulnerability are to data confidentiality and system availability. The information leak is considered not very useful on its own as ptp4l doesn't handle any sensitive or confidential data like passwords, private keys, etc (Bugzilla).
The vulnerability has been fixed in linuxptp versions 3.1.1 and 2.0.1. Updates have been released through various distributions including Red Hat Enterprise Linux 8 via RHSA-2021:4321 and Fedora (Red Hat, Debian).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."