Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 620502 - <net-libs/polarssl-1.3.14: crash or remote code execution on clients using session tickets or SNI (CVE-2015-5291)
Summary: <net-libs/polarssl-1.3.14: crash or remote code execution on clients using se...
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B2 [noglsa cve]
Keywords:
Depends on:
Blocks: CVE-2015-5291
  Show dependency tree
 
Reported: 2017-06-03 12:22 UTC by GLSAMaker/CVETool Bot
Modified: 2017-07-15 23:08 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description GLSAMaker/CVETool Bot gentoo-dev 2017-06-03 12:22:39 UTC
CVE-2015-5291 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5291):
  Heap-based buffer overflow in PolarSSL 1.x before 1.2.17 and ARM mbed TLS
  (formerly PolarSSL) 1.3.x before 1.3.14 and 2.x before 2.1.2 allows remote
  SSL servers to cause a denial of service (client crash) and possibly execute
  arbitrary code via a long hostname to the server name indication (SNI)
  extension, which is not properly handled when creating a ClientHello
  message.  NOTE: this identifier has been SPLIT per ADT3 due to different
  affected version ranges. See CVE-2015-8036 for the session ticket issue that
  was introduced in 1.3.0.
Comment 1 Aaron Bauman (RETIRED) gentoo-dev 2017-07-15 23:08:41 UTC
GLSA Vote: No