Description
Heap-based buffer overflow in PolarSSL 1.x before 1.2.17 and ARM mbed TLS
(formerly PolarSSL) 1.3.x before 1.3.14 and 2.x before 2.1.2 allows remote
SSL servers to cause a denial of service (client crash) and possibly
execute arbitrary code via a long hostname to the server name indication
(SNI) extension, which is not properly handled when creating a ClientHello
message. NOTE: this identifier has been SPLIT per ADT3 due to different
affected version ranges. See CVE-2015-8036 for the session ticket issue
that was introduced in 1.3.0.
Notes
sbeattie | polarssl now known as mbed |
Package
Upstream: | released
(2.1.2-1)
|
Ubuntu 18.04 LTS (Bionic Beaver): | not-affected
(2.2.1-2)
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 20.04 FIPS Compliant (Focal Fossa): | not-affected
(2.2.1-2)
|
Patches:
Package
Upstream: | released
(1.2.17, 1.3.14)
|
Ubuntu 18.04 LTS (Bionic Beaver): | DNE
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
(trusty was needed)
|
Ubuntu 20.04 FIPS Compliant (Focal Fossa): | DNE
|
Patches:
Updated: 2022-02-11 00:59:50 UTC (commit acb3d89ab51f1d5e5543fa993969c0eb13c71f04)