USN-4610-1: fastd vulnerability

28 October 2020

fastd could be made to remotely exhaust resources if it received specially crafted packets.

Releases

Packages

  • fastd - Fast and Secure Tunneling Daemon

Details

It was discovered that fastd did not properly handle receive buffers under
certain circumstances. A remote attacker could possibly use this issue to
cause a memory leak, resulting in a denial of service. (CVE-2020-27638)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 20.04

In general, a standard system update will make all the necessary changes.

References