summaryrefslogtreecommitdiff
path: root/www/security-entries/GNUTLS-SA-2015-1
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@gnutls.org>2016-09-10 19:57:59 +0200
committerNikos Mavrogiannopoulos <nmav@gnutls.org>2016-09-11 09:22:30 +0200
commit7c7774dfd034efa911f03b4a88de8ec01a4c282a (patch)
tree5cb9b934922d3b1de741993b45d24ced232002ff /www/security-entries/GNUTLS-SA-2015-1
parentc44580b1a6b177acfce74ee54d79f745baa1a6de (diff)
downloadgnutls-7c7774dfd034efa911f03b4a88de8ec01a4c282a.tar.gz
Included static page generation into treenew-web-pages
Also create a CI task to generate the web site and upload to gnutls.gitlab.io.
Diffstat (limited to 'www/security-entries/GNUTLS-SA-2015-1')
-rw-r--r--www/security-entries/GNUTLS-SA-2015-112
1 files changed, 12 insertions, 0 deletions
diff --git a/www/security-entries/GNUTLS-SA-2015-1 b/www/security-entries/GNUTLS-SA-2015-1
new file mode 100644
index 0000000000..a470f06fc6
--- /dev/null
+++ b/www/security-entries/GNUTLS-SA-2015-1
@@ -0,0 +1,12 @@
+ <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0282">
+ CVE-2015-0282</a>
+ </td>
+ <td>Signature forgery</td>
+ <td>This issue only affects versions of GnuTLS prior to 3.1.0 (released in 2012).
+ These versions don't verify the RSA PKCS #1 signature algorithm to
+ match the signature algorithm in the certificate, leading to a potential
+ downgrade to a disallowed algorithm, such as MD5, without detecting it.<br>
+
+ <b>Recommendation:</b> Upgrade to GnuTLS 3.1.0, or later.
+A patch will be included in gnutls_2_12_x branch for the users of that
+version that cannot upgrade.</td>