LibExpat Vulnerable to Denial-of-Service (DoS) via Uncontrolled Resource Consumption in 'xmlparse.c' File
37140
03 March 2026
03 March 2026
OPEN
MEDIUM
6.5
CVE-2025-32990, CVE-2025-6395
|
Brocade Security Advisory ID |
BSA-2026-3199 |
|
Component |
gnutils |
|
|
|
Summary
CVE-2025-32990
A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads certain settings from a template file, it allows an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory corruption and a denial-of-service (DoS) that could potentially crash the system.
CVE-2025-6395
A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite().
Products Affected
- Brocade SANnav base OS (OVA deployment) before 2.4.0b
- Brocade ASCG base OS (OVA deployment) before 3.4.0
Products Not Affected
- Brocade Fabric OS
[VEX Justification: Component_not_present] - Brocade SANnav
[VEX Justification: Vulnerable_code_cannot_be_contolled_by_adversary] - Brocade ASCG
[VEX Justification: Vulnerable_code_cannot_be_contolled_by_adversary]
Solution
- Solution provided in Brocade ASCG OVA version 3.4.0
- Solution provided in Brocade SANnav OVA versions 2.4.0b and 3.0.0
- SANnav base OS Security update also provided in the sannav_ova_8x_os OVA patch which can be applied to all SANnav OVA releases 2.3.0 through 2.4.0a
Revision History
|
Version |
Change |
Date |
|
1.0 |
Initial Publication |
March 3, 2026 |
Disclaimer
THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.