Denial of Service in fastd
ID: | USN-4718-1 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.10 |
Datum: | Di, 2. Februar 2021, 22:37 |
Referenzen: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27638 |
Applikationen: | fastd |
Originalnachricht |
|
--===============7199945756595304972== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="BOKacYhQ+x31HxR3" Content-Disposition: inline --BOKacYhQ+x31HxR3 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline ========================================================================== Ubuntu Security Notice USN-4718-1 February 02, 2021 fastd vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.10 - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: fastd could be made to denial of service it if received a specially crafted input. Software Description: - fastd: Fast and Secure Tunneling Daemon Details: It was discovered that fastd incorrectly handled certain packets. An attacker could possibly use this issue to cause a denial of service. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.10: fastd 19-3ubuntu0.1 Ubuntu 18.04 LTS: fastd 18-3ubuntu0.18.04.1 Ubuntu 16.04 LTS: fastd 17-4ubuntu0.1 In general, a standard system update will make all the necessary changes. References: https://usn.ubuntu.com/4718-1 CVE-2020-27638 Package Information: https://launchpad.net/ubuntu/+source/fastd/19-3ubuntu0.1 https://launchpad.net/ubuntu/+source/fastd/18-3ubuntu0.18.04.1 https://launchpad.net/ubuntu/+source/fastd/17-4ubuntu0.1 --BOKacYhQ+x31HxR3 Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAABCgAdFiEEf+ebRFcoyOoAQoOeRbznW4QLH2kFAmAZbr0ACgkQRbznW4QL H2ngug//STuM+O1dYyJzZuJ4U+GndK3xZHSC2waAVB2q4YNakdDK2WKsAJ1RTuaI ibJwiKA7Vxj3+sWd6WrFUBUvUf6tNHabGVJrQOosEqYitezSNBB995o2LzVeGlkH ouRpAHcpieomadEvV64s1zN+HGMwvFQSquLI5V7LHnT9+LK4eB1OTJYfT25AqDEm xB01VpB7WmnLkCb+3bfKYHQqikrLRBorsdmvsu8hReWceO/v7PSFWKAvdCZRGPHz SEh7Cz6F4Q3oyAnzb02a9u1JO0OdF/E4moMSfj+3YBp4ofzh2fxx2XZiJM0Gv+sG HGX1ZXgDrZlrKzLNVhiWNDGOljEa1EJGy5uozQ1pdH477wRllaF6aLEvIU8daDyy +kHlQTHj8vhRvjuPSZEOfUHW59LyvhmKHsC3LYipGXiXkgbpg+/tRAVB1cerE06M Bnd2VY+MKjb8ktzD2Lp6rqOyj8Faa2cjYQVNnga+3K0z4MWbyODAmBBCDpD4OHj1 0O1j96REj/upXvv2NNe/ni+wcXEOzP5hoOfM4DBM9SW0cdec2msIKrI9dcLEJjBR WQJB1muzxqZ/g6svOGKYBMtBuQPaS+Pn+nfAuqAK9UjZWel3XquGMz3ukuVJdGA8 4kl+RSiutuRKqnqe2YBZvaYjeDrVzlymL6CCJQxzxyiToho0bDs= =qg/y -----END PGP SIGNATURE----- --BOKacYhQ+x31HxR3-- --===============7199945756595304972== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce |