Heap-based buffer overflow in PolarSSL 1.x before 1.2.17 and ARM mbed TLS
(formerly PolarSSL) 1.3.x before 1.3.14 and 2.x before 2.1.2 allows remote
SSL servers to cause a denial of service (client crash) and possibly
execute arbitrary code via a long hostname to the server name indication
(SNI) extension, which is not properly handled when creating a ClientHello
message. NOTE: this identifier has been SPLIT per ADT3 due to different
affected version ranges. See CVE-2015-8036 for the session ticket issue
that was introduced in 1.3.0.
sbeattiepolarssl now known as mbed
Upstream:released (2.1.2-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (2.2.1-2)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (2.2.1-2)
Ubuntu 19.10 (Eoan Ermine):not-affected (2.2.1-2)
Upstream:released (1.2.17, 1.3.14)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needed)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 19.10 (Eoan Ermine):DNE
More Information

Updated: 2020-03-18 22:39:29 UTC (commit 2ea7df7bd1e69e1e489978d2724a936eb3faa1b8)