BSA-2017-275
Summary Security Advisory ID : BSA-2017-275 Component : OpenSSH Revision : 2.0: Final
The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.
Affected Products
Brocade Fabric OS versions before 8.2.0, 7.4.2b.
Products Confirmed Not Vulnerable
No other Brocade Fibre Channel technology products from Broadcom are currently known to be affected by this vulnerability.
Solution
Security updates for the issues described in this advisory are provided in Brocade Fabric OS (FOS) v8.2.0, v7.4.2b and later releases. The patch releases have been posted to the MyBrocade web portal.
Recommended Action
Brocade recommends that all customers running the impacted version(s) install the patch(es).
Revision History
Version | Change | Date |
---|---|---|
1.0 | Initial Publication | May 17, 2017 |
2.0 | Updated for Fibre Channel Only. | July 15, 2019 |