USN-4610-1: fastd vulnerability
29 October 2020
fastd could be made to remotely exhaust resources if it received specially crafted packets.
Releases
Packages
- fastd - Fast and Secure Tunneling Daemon
Details
It was discovered that fastd did not properly handle receive buffers under
certain circumstances. A remote attacker could possibly use this issue to
cause a memory leak, resulting in a denial of service. (CVE-2020-27638)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 20.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-4718-1: fastd-doc, fastd