USN-4610-1: fastd vulnerability
Publication date
29 October 2020
Overview
fastd could be made to remotely exhaust resources if it received specially crafted packets.
Releases
Packages
- fastd - Fast and Secure Tunneling Daemon
Details
It was discovered that fastd did not properly handle receive buffers under
certain circumstances. A remote attacker could possibly use this issue to
cause a memory leak, resulting in a denial of service. (CVE-2020-27638)
It was discovered that fastd did not properly handle receive buffers under
certain circumstances. A remote attacker could possibly use this issue to
cause a memory leak, resulting in a denial of service. (CVE-2020-27638)
Update instructions
In general, a standard system update will make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
20.04 focal | fastd – 18-3ubuntu0.1 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.