First published: Wed Feb 25 2015(Updated: )
GnuTLS before 3.3.13 does not validate that the signature algorithms match when importing a certificate.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/GnuTLS | <3.3.13 | 3.3.13 |
GnuTLS | <3.3.13 | |
Debian | =7.0 | |
Red Hat Enterprise Linux | =5.0 | |
Red Hat Enterprise Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0294 is considered a moderate severity vulnerability due to the potential for mismatched signature algorithms during certificate import.
To fix CVE-2015-0294, update GnuTLS to version 3.3.13 or later to ensure proper validation of signature algorithms.
All versions of GnuTLS prior to 3.3.13 are affected by CVE-2015-0294.
There are currently no known exploitations of CVE-2015-0294 that could lead to forged certificates.
CVE-2015-0294 affects GnuTLS on various platforms including Debian and Red Hat Enterprise Linux versions prior to the patched version.