CVE-2015-5291

Priority
Description
Heap-based buffer overflow in PolarSSL 1.x before 1.2.17 and ARM mbed TLS
(formerly PolarSSL) 1.3.x before 1.3.14 and 2.x before 2.1.2 allows remote
SSL servers to cause a denial of service (client crash) and possibly
execute arbitrary code via a long hostname to the server name indication
(SNI) extension, which is not properly handled when creating a ClientHello
message. NOTE: this identifier has been SPLIT per ADT3 due to different
affected version ranges. See CVE-2015-8036 for the session ticket issue
that was introduced in 1.3.0.
Notes
sbeattiepolarssl now known as mbed
Package
Upstream:released (2.1.2-1)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (2.2.1-2)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 20.04 FIPS Compliant (Focal Fossa):not-affected (2.2.1-2)
Patches:
Package
Upstream:released (1.2.17, 1.3.14)
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needed)
Ubuntu 20.04 FIPS Compliant (Focal Fossa):DNE
Patches:
More Information

Updated: 2022-02-11 00:59:50 UTC (commit acb3d89ab51f1d5e5543fa993969c0eb13c71f04)