CVE-2015-1182
Published: 27 January 2015
The asn1_get_sequence_of function in library/asn1parse.c in PolarSSL 1.0 through 1.2.12 and 1.3.x through 1.3.9 does not properly initialize a pointer in the asn1_sequence linked list, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ASN.1 sequence in a certificate.
Priority
Status
Package | Release | Status |
---|---|---|
mbedtls Launchpad, Ubuntu, Debian |
artful |
Not vulnerable
(1.3.9-2.1)
|
bionic |
Not vulnerable
(1.3.9-2.1)
|
|
cosmic |
Not vulnerable
(1.3.9-2.1)
|
|
disco |
Not vulnerable
(1.3.9-2.1)
|
|
precise |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(1.3.9-2.1)
|
|
wily |
Does not exist
|
|
xenial |
Not vulnerable
(1.3.9-2.1)
|
|
yakkety |
Not vulnerable
(1.3.9-2.1)
|
|
zesty |
Not vulnerable
(1.3.9-2.1)
|
|
polarssl Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
bionic |
Does not exist
|
|
cosmic |
Does not exist
|
|
disco |
Does not exist
|
|
lucid |
Ignored
(end of life)
|
|
precise |
Ignored
(end of life)
|
|
trusty |
Does not exist
(trusty was needed)
|
|
upstream |
Released
(1.3.9-2.1)
|
|
utopic |
Ignored
(end of life)
|
|
vivid |
Ignored
(end of life)
|
|
wily |
Not vulnerable
(1.3.9-2.1)
|
|
xenial |
Does not exist
|
|
yakkety |
Does not exist
|
|
zesty |
Does not exist
|
|
Patches: upstream: https://polarssl.org/tech-updates/security-advisories/polarssl-security-advisory-2014-04 |