First published: Thu Jan 07 2016(Updated: )
The GnuTLS library provides support for cryptographic algorithms and for<br>protocols such as Transport Layer Security (TLS).<br>A flaw was found in the way TLS 1.2 could use the MD5 hash function for<br>signing ServerKeyExchange and Client Authentication packets during a TLS<br>handshake. A man-in-the-middle attacker able to force a TLS connection to<br>use the MD5 hash function could use this flaw to conduct collision attacks<br>to impersonate a TLS server or an authenticated TLS client. (CVE-2015-7575)<br>All gnutls users are advised to upgrade to these updated packages, which<br>contain a backported patch to correct this issue. For the update to take<br>effect, all applications linked to the GnuTLS library must be restarted.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/gnutls | <3.3.8-14.el7_2 | 3.3.8-14.el7_2 |
redhat/gnutls | <3.3.8-14.el7_2 | 3.3.8-14.el7_2 |
redhat/gnutls-dane | <3.3.8-14.el7_2 | 3.3.8-14.el7_2 |
redhat/gnutls-dane | <3.3.8-14.el7_2 | 3.3.8-14.el7_2 |
redhat/gnutls-debuginfo | <3.3.8-14.el7_2 | 3.3.8-14.el7_2 |
redhat/gnutls-debuginfo | <3.3.8-14.el7_2 | 3.3.8-14.el7_2 |
redhat/gnutls-devel | <3.3.8-14.el7_2 | 3.3.8-14.el7_2 |
redhat/gnutls-devel | <3.3.8-14.el7_2 | 3.3.8-14.el7_2 |
redhat/gnutls-utils | <3.3.8-14.el7_2 | 3.3.8-14.el7_2 |
redhat/gnutls | <2.8.5-19.el6_7 | 2.8.5-19.el6_7 |
redhat/gnutls | <2.8.5-19.el6_7 | 2.8.5-19.el6_7 |
redhat/gnutls-debuginfo | <2.8.5-19.el6_7 | 2.8.5-19.el6_7 |
redhat/gnutls-debuginfo | <2.8.5-19.el6_7 | 2.8.5-19.el6_7 |
redhat/gnutls-devel | <2.8.5-19.el6_7 | 2.8.5-19.el6_7 |
redhat/gnutls-devel | <2.8.5-19.el6_7 | 2.8.5-19.el6_7 |
redhat/gnutls-guile | <2.8.5-19.el6_7 | 2.8.5-19.el6_7 |
redhat/gnutls-guile | <2.8.5-19.el6_7 | 2.8.5-19.el6_7 |
redhat/gnutls-utils | <2.8.5-19.el6_7 | 2.8.5-19.el6_7 |
redhat/gnutls-utils | <2.8.5-19.el6_7 | 2.8.5-19.el6_7 |
redhat/gnutls-utils | <3.3.8-14.el7_2 | 3.3.8-14.el7_2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2016:0012 is classified as moderate.
To fix RHSA-2016:0012, update the GnuTLS library to version 3.3.8-14.el7_2 or 2.8.5-19.el6_7 depending on your system.
RHSA-2016:0012 addresses a flaw in the GnuTLS library related to the use of the MD5 hash function in TLS 1.2 communications.
The affected packages include gnutls, gnutls-dane, gnutls-debuginfo, gnutls-devel, and gnutls-utils.
Yes, RHSA-2016:0012 is applicable to both el6 and el7 versions of affected packages.