Amazon Linux 1 Security Advisory: ALAS-2016-645
Advisory Release Date: 2016-02-09 13:30 Pacific
Advisory Updated Date: 2016-02-09 13:30 Pacific
A flaw was found in the way TLS 1.2 could use the MD5 hash function for signing ServerKeyExchange and Client Authentication packets during a TLS handshake. A man-in-the-middle attacker able to force a TLS connection to use the MD5 hash function could use this flaw to conduct collision attacks to impersonate a TLS server or an authenticated TLS client. (CVE-2015-7575)
Affected Packages:
nss
Issue Correction:
Run yum update nss to update your system.
i686:
nss-debuginfo-3.19.1-19.75.amzn1.i686
nss-pkcs11-devel-3.19.1-19.75.amzn1.i686
nss-sysinit-3.19.1-19.75.amzn1.i686
nss-tools-3.19.1-19.75.amzn1.i686
nss-3.19.1-19.75.amzn1.i686
nss-devel-3.19.1-19.75.amzn1.i686
src:
nss-3.19.1-19.75.amzn1.src
x86_64:
nss-tools-3.19.1-19.75.amzn1.x86_64
nss-debuginfo-3.19.1-19.75.amzn1.x86_64
nss-sysinit-3.19.1-19.75.amzn1.x86_64
nss-pkcs11-devel-3.19.1-19.75.amzn1.x86_64
nss-devel-3.19.1-19.75.amzn1.x86_64
nss-3.19.1-19.75.amzn1.x86_64