Print

Print


Synopsis:          Moderate: gnutls security update
Advisory ID:       SLSA-2016:0012-1
Issue Date:        2016-01-07
CVE Numbers:       CVE-2015-7575
--

A flaw was found in the way TLS 1.2 could use the MD5 hash function for
signing ServerKeyExchange and Client Authentication packets during a TLS
handshake. A man-in-the-middle attacker able to force a TLS connection to
use the MD5 hash function could use this flaw to conduct collision attacks
to impersonate a TLS server or an authenticated TLS client.
(CVE-2015-7575)

For the update to take effect, all applications linked to the GnuTLS
library must be restarted.
--

SL6
  x86_64
    gnutls-2.8.5-19.el6_7.i686.rpm
    gnutls-2.8.5-19.el6_7.x86_64.rpm
    gnutls-debuginfo-2.8.5-19.el6_7.i686.rpm
    gnutls-debuginfo-2.8.5-19.el6_7.x86_64.rpm
    gnutls-utils-2.8.5-19.el6_7.x86_64.rpm
    gnutls-devel-2.8.5-19.el6_7.i686.rpm
    gnutls-devel-2.8.5-19.el6_7.x86_64.rpm
    gnutls-guile-2.8.5-19.el6_7.i686.rpm
    gnutls-guile-2.8.5-19.el6_7.x86_64.rpm
  i386
    gnutls-2.8.5-19.el6_7.i686.rpm
    gnutls-debuginfo-2.8.5-19.el6_7.i686.rpm
    gnutls-utils-2.8.5-19.el6_7.i686.rpm
    gnutls-devel-2.8.5-19.el6_7.i686.rpm
    gnutls-guile-2.8.5-19.el6_7.i686.rpm
SL7
  x86_64
    gnutls-3.3.8-14.el7_2.i686.rpm
    gnutls-3.3.8-14.el7_2.x86_64.rpm
    gnutls-dane-3.3.8-14.el7_2.i686.rpm
    gnutls-dane-3.3.8-14.el7_2.x86_64.rpm
    gnutls-debuginfo-3.3.8-14.el7_2.i686.rpm
    gnutls-debuginfo-3.3.8-14.el7_2.x86_64.rpm
    gnutls-utils-3.3.8-14.el7_2.x86_64.rpm
    gnutls-c++-3.3.8-14.el7_2.i686.rpm
    gnutls-c++-3.3.8-14.el7_2.x86_64.rpm
    gnutls-devel-3.3.8-14.el7_2.i686.rpm
    gnutls-devel-3.3.8-14.el7_2.x86_64.rpm

- Scientific Linux Development Team