Processing control commands:
> tags 990748 + patch
Bug #990748 [src:linuxptp] linuxptp: CVE-2021-3570
Ignoring request to alter tags of bug #990748 to the same tags previously set
> tags 990749 + patch
Bug #990749 [src:linuxptp] linuxptp: CVE-2021-3571
Ignoring request to alter tags of bug
Processing control commands:
> tags 990748 + patch
Bug #990748 [src:linuxptp] linuxptp: CVE-2021-3570
Added tag(s) patch.
> tags 990749 + patch
Bug #990749 [src:linuxptp] linuxptp: CVE-2021-3571
Added tag(s) patch.
--
990748: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990748
990749:
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Tue, 06 Jul 2021 19:02:16 +0200
Source: kodi-pvr-iptvsimple
Architecture: source
Version: 7.6.5+ds1-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Multimedia Maintainers
Changed-By: Vasyl Gello
Changes:
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Tue, 06 Jul 2021 19:01:59 +0200
Source: kodi-inputstream-ffmpegdirect
Architecture: source
Version: 1.21.3+ds1-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Multimedia Maintainers
Changed-By: Vasyl
kodi-inputstream-ffmpegdirect_1.21.3+ds1-1_source.changes uploaded successfully
to localhost
along with the files:
kodi-inputstream-ffmpegdirect_1.21.3+ds1-1.dsc
kodi-inputstream-ffmpegdirect_1.21.3+ds1.orig.tar.xz
kodi-inputstream-ffmpegdirect_1.21.3+ds1-1.debian.tar.xz
kodi-pvr-iptvsimple_7.6.5+ds1-1_source.changes uploaded successfully to
localhost
along with the files:
kodi-pvr-iptvsimple_7.6.5+ds1-1.dsc
kodi-pvr-iptvsimple_7.6.5+ds1.orig.tar.xz
kodi-pvr-iptvsimple_7.6.5+ds1-1.debian.tar.xz
kodi-pvr-iptvsimple_7.6.5+ds1-1_amd64.buildinfo
Greetings,
Package: linuxptp
Version: 3.1-2
CVE-2021-3570
CVE-2021-3571
-Original Message-
From: Richard Cochran
Sent: Tuesday, 6 July 2021 00:30
To: oss-secur...@lists.openwall.com
Cc: linuxptp-us...@lists.sourceforge.net; linuxptp-de...@lists.sourceforge.net
Subject: [Linuxptp-devel] linuxptp:
Source: linuxptp
Version: 3.1-2
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team
Hi,
The following vulnerability was published for linuxptp.
CVE-2021-3571[0]:
| linuxptp: wrong length of one-step follow-up in transparent clock
If you fix the
Processing control commands:
> found -1 1.9.2-1
Bug #990748 [src:linuxptp] linuxptp: CVE-2021-3570
Marked as found in versions linuxptp/1.9.2-1.
--
990748: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990748
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Source: linuxptp
Version: 3.1-2
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team
Control: found -1 1.9.2-1
Hi,
The following vulnerability was published for linuxptp.
CVE-2021-3570[0]:
| linuxptp: missing length check of forwarded messages
If you
Regarding the following, written by "Paul Wise" on 2021-07-06 at 11:30 Uhr
+0800:
IIRC the telemetry is off by default when building from source and only
the official upstream binaries are affected.
Can confirm. I should have been explicit: check that the telemetry
code is DFSG, or if it's
11 matches
Mail list logo