CVE-2015-5291

Priority
Description
Heap-based buffer overflow in PolarSSL 1.x before 1.2.17 and ARM mbed TLS
(formerly PolarSSL) 1.3.x before 1.3.14 and 2.x before 2.1.2 allows remote
SSL servers to cause a denial of service (client crash) and possibly
execute arbitrary code via a long hostname to the server name indication
(SNI) extension, which is not properly handled when creating a ClientHello
message. NOTE: this identifier has been SPLIT per ADT3 due to different
affected version ranges. See CVE-2015-8036 for the session ticket issue
that was introduced in 1.3.0.
Notes
 sbeattie> polarssl now known as mbed
Package
Upstream:released (2.1.2-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (2.2.1-2)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (2.2.1-2)
Ubuntu 18.10 (Cosmic Cuttlefish):not-affected (2.2.1-2)
Ubuntu 19.04 (Disco Dingo):not-affected (2.2.1-2)
Package
Upstream:released (1.2.17, 1.3.14)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Ubuntu 14.04 LTS (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 18.10 (Cosmic Cuttlefish):DNE
Ubuntu 19.04 (Disco Dingo):DNE
More Information

Updated: 2019-01-14 21:17:26 UTC (commit 51f9b73af244ba86b9321e46e526586c25a8e060)