[<prev] [next>] [day] [month] [year] [list]
Message-Id: <20110831164820.2972E59DE4@kinkhorst.com>
Date: Wed, 31 Aug 2011 18:48:20 +0200 (CEST)
From: Thijs Kinkhorst <thijs@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 2299-1] ca-certificates security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2299-1 security@...ian.org
http://www.debian.org/security/ Thijs Kinkhorst
August 31, 2011 http://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : ca-certificates
Vulnerability : comprimised certificate authority
Problem type : local/remote
Debian-specific: no
Debian Bug : 639744
An unauthorized SSL certificate has been found in the wild issued
the DigiNotar Certificate Authority, obtained through a security
compromise with said company. Debian, like other software
distributors, has as a precaution decided to disable the DigiNotar
Root CA by default in its ca-certificates bundle.
For other software in Debian that ships a CA bundle, like the
Mozilla suite, updates are forthcoming.
For the oldstable distribution (lenny), the ca-certificates package
does not contain this root CA.
For the stable distribution (squeeze), the root CA has been
disabled starting ca-certificates version 20090814+nmu3.
For the testing distribution (wheezy) and unstable distribution
(sid), the root CA has been disabled starting ca-certificates
version 20110502+nmu1.
We recommend that you upgrade your ca-certificates packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iQEcBAEBAgAGBQJOXmW6AAoJEOxfUAG2iX57w/sIAM1IXqr2QRL8NfF9dU8iWvzI
2HzaqwiCE1+MmFxg/vvXuosgxVTbqytRkJ6fnbbsz3pPtjeQCZqG/z0RP7d7Dkv+
YdAc4aMoCyAzavYoGjCw0vIgs6BJNeZmJVixqpceDzHie+o0FNL29FkHjpgeTpZk
9oIRSaeG+YMUypmJf9V0ZpDIO/S/6WzNqfrskOkm8xZimHkMAOaSh86r3gmdX9Rd
RGqR3nEG1iiR6/yHB4UyZsnOJC93z5Rb9xH0vCmzcDyv7mbSOq+JxE8uN7H3YvOe
4dJeJX9jwCtQHb8Miw3j9IRHs0bOQLpuxUlxl+9F5DElPIqsXnfXAZC0HrqtkYo=
=yv4N
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists