Bug 321191 - (CVE-2007-4995) CVE-2007-4995 openssl dtls out of order vulnerabilitiy
CVE-2007-4995 openssl dtls out of order vulnerabilitiy
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
high Severity high
: ---
: ---
Assigned To: Tomas Mraz
: Security
Depends On: 321211 321221
  Show dependency treegraph
Reported: 2007-10-06 04:10 EDT by Mark J. Cox
Modified: 2008-01-16 12:45 EST (History)
2 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2008-01-16 12:45:58 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)
draft advisory (1.17 KB, text/plain)
2007-10-06 04:10 EDT, Mark J. Cox
no flags Details
proposed patch (40.37 KB, patch)
2007-10-06 04:11 EDT, Mark J. Cox
no flags Details | Diff

  None (edit)
Description Mark J. Cox 2007-10-06 04:10:36 EDT
The OpenSSL team reported a flaw in OpenSSL DTLS support (introduced in OpenSSL
0.9.8) that could potentially lead to arbitrary code execution.

This will only affect OpenSSL with Red Hat Enterprise Linux 5, not earlier
versions.  We don't ship any client or server that uses DTLS by default.

We need to investigate the technical nature of the flaw to determine if the flaw
is captured by the various technologies in OpenSSL.  

Currently embargoed, public date not yet set.
Comment 1 Mark J. Cox 2007-10-06 04:10:36 EDT
Created attachment 218291 [details]
draft advisory
Comment 2 Mark J. Cox 2007-10-06 04:11:13 EDT
Created attachment 218311 [details]
proposed patch
Comment 6 Mark J. Cox 2007-10-12 06:57:17 EDT
now public, removing embargo
Comment 7 Red Hat Product Security 2008-01-16 12:45:58 EST
This issue was addressed in:

Red Hat Enterprise Linux:


Note You need to log in before you can comment on or make changes to this bug.