On Fri, 09 Oct 2015 22:02:21 +0200 Salvatore Bonaccorso <car...@debian.org> 
wrote:
> Source: polarssl
> Version: 1.2.8-2
> Severity: grave
> Tags: security upstream fixed-upstream
> 
> Hi,
> 
> the following vulnerability was published for polarssl.
> 
> CVE-2015-5291[0]:
> Remote attack on clients using session tickets or SNI

I believe this can be fixed by applying these 4 commits (although I'm
not sure if all of them are needed, and please double check):
https://github.com/ARMmbed/mbedtls/commit/c988f32adde62a169ba340fee0da15aecd40e76e
https://github.com/ARMmbed/mbedtls/commit/b1e325d6b2bd9c504536fbbd45dce348f0a6c40c
https://github.com/ARMmbed/mbedtls/commit/643a922c56b77235e88f106fb1b41c1a764cea5f
https://github.com/ARMmbed/mbedtls/commit/f3e6e4badb35760c9a543ee69b7449cb0cd9784b

This may be easier than packaging the new upstream version since that
requires an ABI break.

James

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to