The OpenSSL team reported a flaw in OpenSSL DTLS support (introduced in OpenSSL 0.9.8) that could potentially lead to arbitrary code execution. This will only affect OpenSSL with Red Hat Enterprise Linux 5, not earlier versions. We don't ship any client or server that uses DTLS by default. We need to investigate the technical nature of the flaw to determine if the flaw is captured by the various technologies in OpenSSL. Currently embargoed, public date not yet set.
Created attachment 218291 [details] draft advisory
Created attachment 218311 [details] proposed patch
now public, removing embargo http://www.openssl.org/news/secadv_20071012.txt
This issue was addressed in: Red Hat Enterprise Linux: http://rhn.redhat.com/errata/RHSA-2007-0964.html Fedora: https://admin.fedoraproject.org/updates/F7/FEDORA-2007-2530