BSA-2017-275

Brocade Fabric OS

2 more products

21330

15 July 2019

17 May 2017

Closed

High

7.8

N/A

CVE-2016-10012

Summary

Security Advisory ID : BSA-2017-275

Component : OpenSSH

Revision : 2.0: Final



The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.

Affected Products
Brocade Fabric OS versions before 8.2.0,  7.4.2b.

Products Confirmed Not Vulnerable
No other Brocade Fibre Channel technology products from Broadcom are currently known to be affected by this vulnerability.

Solution
Security updates for the issues described in this advisory are provided in Brocade Fabric OS (FOS) v8.2.0, v7.4.2b and later releases. The patch releases have been posted to the MyBrocade web portal.

Recommended Action
Brocade recommends that all customers running the impacted version(s) install the patch(es).

Revision History

Version Change Date
1.0 Initial Publication May 17, 2017
2.0 Updated for  Fibre Channel Only.  July 15, 2019