A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing
36219
15 October 2025
15 October 2025
CLOSED
MEDIUM
5.3 Medium -- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2024-12243
Brocade Security Advisory ID |
BSA-2025-3019 |
Component |
gnuTLS |
|
|
Summary
GNU TLS is vulnerable to a denial-of-service (DoS) due to inefficient certificate processing in the libtasn1 library. An attacker could present a maliciously crafted certificate that contains a large amount of subject alternative name or name constraint inputs, potentially leading to excessive resource consumption which could cause a denial-of-service.
Products Affected
- Brocade SANnav versions before 2.4.0a
- Brocade ASCG versions before 3.3.0a
Products Not Affected
- Brocade Fabric OS
[VEX Justification: Component_not_present]
Solution
- Security update provided in Brocade SANnav 2.4.0a and 3.0.0
- Security update provided in Brocade ASCG 3.3.0a
Revision History
Version |
Change |
Date |
1.0 |
Initial Publication |
October 14, 2025 |
Disclaimer
THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.