Hide Forgot
Quoting upstream advisory: http://www.openssl.org/news/secadv_20120118.txt A flaw in the fix to CVE-2011-4108 can be exploited in a denial of service attack. Only DTLS applications using OpenSSL 1.0.0f and 0.9.8s are affected. The fix for CVE-2011-4108 (bug #771770) introduced a regression that can allow remote attacker to crash DTLS servers using affected OpenSSL version because of an out-of-bounds read. This issue is corrected in OpenSSL 1.0.0g or 0.9.8t. Upstream fix: http://cvs.openssl.org/chngview?cn=22032 (0.9.8) http://cvs.openssl.org/chngview?cn=22037 (1.0.0)
As openssl updates for Red Hat Enterprise Linux addressing CVE-2011-4108 have not been released yet, no released openssl version in Red Hat Enterprise Linux is affected by this flaw. Future updates will use corrected CVE-2011-4108 fix that does not introduce this problem. openssl packages versions in Red Hat Enterprise Linux 3 and 4 do not have DTLS support and hence can not be affected by this issue or CVE-2011-4108. Statement: Not vulnerable. This issue did not affect the versions of openssl as shipped with Red Hat Enterprise Linux 3, 4, 5, and 6.
Created openssl tracking bugs for this issue Affects: fedora-all [bug 783122]
openssl-1.0.0g-1.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report.
openssl-1.0.0g-1.fc15 has been pushed to the Fedora 15 stable repository. If problems still persist, please make note of it in this bug report.