It was reported by the GnuTLS project that a ServerKeyExchange signature sent by the server is not verified to be in the acceptable by the client set of algorithms. That has the effect of allowing MD5 signatures (which are disabled by default) in the ServerKeyExchange message. It is not believed that this bug can be exploited because a fraudulent signature has to be generated in real-time which is not known to be possible. However, since attacks can only get better it is recommended to update to a GnuTLS version which addresses the issue. References: http://www.gnutls.org/security.html
Created gnutls tracking bugs for this issue: Affects: fedora-all [bug 1218513]
Statement: The gnutls packages in Red Hat Enterprise Linux 5 do not support TLS 1.2 and are not affected by this flaw. Red Hat Product Security has rated this issue as having Low security impact. For Red Hat Enterprise Linux 6 and 7, a future update may address this flaw.
gnutls-3.3.15-1.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.
gnutls-3.3.15-1.fc21 has been pushed to the Fedora 21 stable repository. If problems still persist, please make note of it in this bug report.