RHSA-2016:0008

Affecting openssl-libs package, versions <1:1.0.1e-51.el7_2.2

Report new vulnerabilities
medium severity
Do your applications use this vulnerable package? Test your applications

Overview

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library. A flaw was found in the way TLS 1.2 could use the MD5 hash function for signing ServerKeyExchange and Client Authentication packets during a TLS handshake. A man-in-the-middle attacker able to force a TLS connection to use the MD5 hash function could use this flaw to conduct collision attacks to impersonate a TLS server or an authenticated TLS client. (CVE-2015-7575) All openssl users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.

CVE
RHSA-2016:0008
Snyk ID
SNYK-CENTOS7-OPENSSLLIBS-286235
Published
27 Jun, 2018