Apache Avro Java SDK vulnerable to Improper Input Validation (CVE-2023-39410)

Brocade Fabric OS

2 more products

23262

01 May 2024

16 April 2024

CLOSED

MEDIUM

7.5 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2023-39410

Brocade Security Advisory ID

BSA-2023-2454

Component

Apache Avro Java 

 

 

Summary

When deserializing untrusted or corrupted data, it is possible for a reader to consume memory beyond the allowed constraints and thus lead to out of memory on the system.

This issue affects Java applications using Apache Avro Java SDK up to and including 1.11.2. Users should update to apache-avro version 1.11.3 which addresses this issue.

Products Affected

Brocade SANnav before Brocade SANnav v2.3.0a

Products Confirmed Not Affected

  • Brocade Fabric OS
  • Brocade ASCG

Solution

A security update is provided in Brocade v2.3.1, v2.3.0a, and later releases.

Revision History

Version

Change

Date

1.0

Initial Publication

4/11/2024

 

Disclaimer

THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.