Miroslav Lichvar reported that the ptp4l program in linuxptp, an implementation of the Precision Time Protocol (PTP), does not validate the messageLength field of incoming messages, allowing a remote attacker to cause a denial of service, information leak, or potentially remote code execution. For the stable distribution (buster), this problem has been fixed in version 1.9.2-1+deb10u1. We recommend that you upgrade your linuxptp packages. For the detailed security status of linuxptp please refer to its security tracker page at: https://security-tracker.debian.org/tracker/linuxptp
Miroslav Lichvar reported that the ptp4l program in linuxptp, an implementation of the Precision Time Protocol (PTP), does not validate the messageLength field of incoming messages, allowing a remote attacker to cause a denial of service, information leak, or potentially remote code execution.
For the stable distribution (buster), this problem has been fixed in version 1.9.2-1+deb10u1.
We recommend that you upgrade your linuxptp packages.
For the detailed security status of linuxptp please refer to its security tracker page at: https://security-tracker.debian.org/tracker/linuxptp