From 6dcfd37c5b77d102330c75a0f0200fccbfdbc31b Mon Sep 17 00:00:00 2001 From: Sven Eckelmann Date: Sun, 25 Oct 2020 20:33:30 +0100 Subject: DLA-2414-1 Signed-off-by: Holger Levsen --- english/lts/security/2020/dla-2414.data | 10 ++++++++++ english/lts/security/2020/dla-2414.wml | 23 +++++++++++++++++++++++ 2 files changed, 33 insertions(+) create mode 100644 english/lts/security/2020/dla-2414.data create mode 100644 english/lts/security/2020/dla-2414.wml diff --git a/english/lts/security/2020/dla-2414.data b/english/lts/security/2020/dla-2414.data new file mode 100644 index 00000000000..bcc0ee33c15 --- /dev/null +++ b/english/lts/security/2020/dla-2414.data @@ -0,0 +1,10 @@ +DLA-2414-1 fastd +2020-10-25 +CVE-2020-27638 Bug#972521 +fastd +yes +yes +no + +#use wml::debian::security + diff --git a/english/lts/security/2020/dla-2414.wml b/english/lts/security/2020/dla-2414.wml new file mode 100644 index 00000000000..9222e428b84 --- /dev/null +++ b/english/lts/security/2020/dla-2414.wml @@ -0,0 +1,23 @@ +LTS security update + +

In fastd, a fast and secure tunnelling daemon, a receive buffer +handling problem was discovered which allows a denial of service +(memory exhaustion) when receiving packets with an invalid type code.

+ +

For Debian 9 stretch, this problem has been fixed in version +18-2+deb9u1.

+ +

We recommend that you upgrade your fastd packages.

+ +

For the detailed security status of fastd please refer to +its security tracker page at: +https://security-tracker.debian.org/tracker/fastd

+ +

Further information about Debian LTS security advisories, how to apply +these updates to your system and frequently asked questions can be +found at: https://wiki.debian.org/LTS

+
+ +# do not modify the following line +#include "$(ENGLISHDIR)/lts/security/2020/dla-2414.data" +# $Id: $ -- cgit v1.2.3