Bug 321191 (CVE-2007-4995)

Summary: CVE-2007-4995 openssl dtls out of order vulnerabilitiy
Product: [Other] Security Response Reporter: Mark J. Cox <mjc>
Component: vulnerabilityAssignee: Tomas Mraz <tmraz>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: kreilly, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2008-01-16 17:45:58 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 321211, 321221    
Bug Blocks:    
Attachments:
Description Flags
draft advisory
none
proposed patch none

Description Mark J. Cox 2007-10-06 08:10:36 UTC
The OpenSSL team reported a flaw in OpenSSL DTLS support (introduced in OpenSSL
0.9.8) that could potentially lead to arbitrary code execution.

This will only affect OpenSSL with Red Hat Enterprise Linux 5, not earlier
versions.  We don't ship any client or server that uses DTLS by default.

We need to investigate the technical nature of the flaw to determine if the flaw
is captured by the various technologies in OpenSSL.  

Currently embargoed, public date not yet set.

Comment 1 Mark J. Cox 2007-10-06 08:10:36 UTC
Created attachment 218291 [details]
draft advisory

Comment 2 Mark J. Cox 2007-10-06 08:11:13 UTC
Created attachment 218311 [details]
proposed patch

Comment 6 Mark J. Cox 2007-10-12 10:57:17 UTC
now public, removing embargo
http://www.openssl.org/news/secadv_20071012.txt

Comment 7 Red Hat Product Security 2008-01-16 17:45:58 UTC
This issue was addressed in:

Red Hat Enterprise Linux:
  http://rhn.redhat.com/errata/RHSA-2007-0964.html

Fedora:
  https://admin.fedoraproject.org/updates/F7/FEDORA-2007-2530