[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1Tszub-0007UG-1p@titan.mandriva.com>
Date: Wed, 09 Jan 2013 18:58:01 +0100
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2013:003 ] rootcerts
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2013:003
http://www.mandriva.com/security/
_______________________________________________________________________
Package : rootcerts
Date : January 9, 2013
Affected: 2011.
_______________________________________________________________________
Problem Description:
Google reported to Mozilla that TURKTRUST, a certificate authority in
Mozillas root program, had mis-issued two intermediate certificates
to customers. The issue was not specific to Firefox but there was
evidence that one of the certificates was used for man-in-the-middle
(MITM) traffic management of domain names that the customer did not
legitimately own or control. This issue was resolved by revoking the
trust for these specific mis-issued certificates (CVE-2013-0743).
The rootcerts package has been upgraded to address this flaw and the
Mozilla NSS package has been rebuilt to pickup the changes.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0743
http://www.mozilla.org/security/announce/2013/mfsa2013-20.html
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2011:
196c985cb9a0c43026b517740bc84964 2011/i586/libnss3-3.14-0.2-mdv2011.0.i586.rpm
9e8211d7552f2f4c29e5100c2e22666d 2011/i586/libnss-devel-3.14-0.2-mdv2011.0.i586.rpm
73cac4a13ff3263762bd6e6958fd9ee5 2011/i586/libnss-static-devel-3.14-0.2-mdv2011.0.i586.rpm
22b7d7c8c8cb651dc8f029ea4a21df62 2011/i586/nss-3.14-0.2-mdv2011.0.i586.rpm
d4104fdc7fd808e2065cf11c9579881e 2011/i586/rootcerts-20121229.00-1-mdv2011.0.i586.rpm
8892d8d81576147685b6c6c2f27a3cc1 2011/i586/rootcerts-java-20121229.00-1-mdv2011.0.i586.rpm
2a1932633742f095598acbc71a65e07e 2011/SRPMS/nss-3.14-0.2.src.rpm
988252152ffcacd263670b84a70a4eb3 2011/SRPMS/rootcerts-20121229.00-1.src.rpm
Mandriva Linux 2011/X86_64:
cceba1cdc46199e9acf7702784637321 2011/x86_64/lib64nss3-3.14-0.2-mdv2011.0.x86_64.rpm
6cea0e30ea682bf7a067486b17205107 2011/x86_64/lib64nss-devel-3.14-0.2-mdv2011.0.x86_64.rpm
ba17542fa03c2e19ad05f49fd7be52bc 2011/x86_64/lib64nss-static-devel-3.14-0.2-mdv2011.0.x86_64.rpm
d89adc7b2d715f9979e30b40881c7f6a 2011/x86_64/nss-3.14-0.2-mdv2011.0.x86_64.rpm
6f42e1222e7670a942e887f6e1dd5a00 2011/x86_64/rootcerts-20121229.00-1-mdv2011.0.x86_64.rpm
da48a7a352314122da074e9831d6a8ac 2011/x86_64/rootcerts-java-20121229.00-1-mdv2011.0.x86_64.rpm
2a1932633742f095598acbc71a65e07e 2011/SRPMS/nss-3.14-0.2.src.rpm
988252152ffcacd263670b84a70a4eb3 2011/SRPMS/rootcerts-20121229.00-1.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
iD8DBQFQ7YQ2mqjQ0CJFipgRAhEXAKCO40WVKjgaPnLl2Miwavd8dbpWxwCgv5jg
bOqBKm41lnWZcvt9di0Tp+8=
=nfc8
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists