Apache Avro Java SDK vulnerable to Improper Input Validation (CVE-2023-39410)
23262
01 May 2024
16 April 2024
CLOSED
MEDIUM
7.5 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2023-39410
Brocade Security Advisory ID |
BSA-2023-2454 |
Component |
Apache Avro Java |
|
|
Summary
When deserializing untrusted or corrupted data, it is possible for a reader to consume memory beyond the allowed constraints and thus lead to out of memory on the system.
This issue affects Java applications using Apache Avro Java SDK up to and including 1.11.2. Users should update to apache-avro version 1.11.3 which addresses this issue.
Products Affected
Brocade SANnav before Brocade SANnav v2.3.0a
Products Confirmed Not Affected
- Brocade Fabric OS
- Brocade ASCG
Solution
A security update is provided in Brocade v2.3.1, v2.3.0a, and later releases.
Revision History
Version |
Change |
Date |
1.0 |
Initial Publication |
4/11/2024 |
Disclaimer
THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.