BSA-2017-250
Summary
Security Advisory ID : BSA-2017-250
Component : SSL TLS
Revision : 1.0: Interim
It was found using the <a href=https://github.com/google/oss-fuzz>OSS-FUZZ</a> fuzzer infrastructure that decoding a specially crafted OpenPGP certificate could lead to heap and stack overflows. This issue was fixed in GnuTLS 3.3.26 and 3.5.8.
Affected Products
Brocade is investigating its product lines to determine which products may be affected by this vulnerability and the impact on each affected product.
Products Confirmed Not Vulnerable
Brocade 5400 vRouter, Brocade 5600 vRouter, Brocade FastIron OS, Brocade NetIron OS, Brocade Network Advisor, Brocade ServerIron ADX, Brocade Services Director, Brocade SLX-OS, Brocade Virtual ADX, Brocade Virtual Traffic Manager: Software, and Brocade Virtual Web Application Firewall are confirmed not affected by this vulnerability.
Workaround
There are no workarounds that address this vulnerability.
Revision History
Version | Change | Date |
---|---|---|
1.0 | Initial Publication | August 25, 2017 |
1.0 | Initial Publication | May 2, 2017 |