The asn1_get_sequence_of function in library/asn1parse.c in PolarSSL 1.0 through 1.2.12 and 1.3.x through 1.3.9 does not properly initialize a pointer in the asn1_sequence linked list, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ASN.1 sequence in a certificate.
https://security.gentoo.org/glsa/201801-15
https://polarssl.org/tech-updates/security-advisories/polarssl-security-advisory-2014-04
http://www.debian.org/security/2015/dsa-3136
http://secunia.com/advisories/62610
http://secunia.com/advisories/62270
http://lists.opensuse.org/opensuse-updates/2015-02/msg00003.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148903.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148829.html