CVE-2015-5291 (retired)

Heap-based buffer overflow in PolarSSL 1.x before 1.2.17 and ARM mbed TLS
(formerly PolarSSL) 1.3.x before 1.3.14 and 2.x before 2.1.2 allows remote
SSL servers to cause a denial of service (client crash) and possibly
execute arbitrary code via a long hostname to the server name indication
(SNI) extension, which is not properly handled when creating a ClientHello
message. NOTE: this identifier has been SPLIT per ADT3 due to different
affected version ranges. See CVE-2015-8036 for the session ticket issue
that was introduced in 1.3.0.
 sbeattie> polarssl now known as mbed
Upstream:released (2.1.2-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (2.2.1-2)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (2.2.1-2)
Ubuntu 19.04 (Disco Dingo):not-affected (2.2.1-2)
Ubuntu 19.10 (Eoan):not-affected (2.2.1-2)
Upstream:released (1.2.17, 1.3.14)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needed)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 19.04 (Disco Dingo):DNE
Ubuntu 19.10 (Eoan):DNE
More Information

Updated: 2019-09-19 15:54:16 UTC (commit d32ebc32606b9517c6fa7d65a15441e2a57a6de5)