drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Deaktivierung eines Zertifikats in ca-certificates
Name: |
Deaktivierung eines Zertifikats in ca-certificates |
|
ID: |
DSA-2299-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Keine Angabe |
|
Datum: |
Do, 1. September 2011, 17:24 |
|
Referenzen: |
Keine Angabe |
|
Applikationen: |
ca-certificates |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
- ------------------------------------------------------------------------- Debian Security Advisory DSA-2299-1 security@debian.org http://www.debian.org/security/ Thijs Kinkhorst August 31, 2011 http://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : ca-certificates Vulnerability : comprimised certificate authority Problem type : local/remote Debian-specific: no Debian Bug : 639744
An unauthorized SSL certificate has been found in the wild issued the DigiNotar Certificate Authority, obtained through a security compromise with said company. Debian, like other software distributors, has as a precaution decided to disable the DigiNotar Root CA by default in its ca-certificates bundle.
For other software in Debian that ships a CA bundle, like the Mozilla suite, updates are forthcoming.
For the oldstable distribution (lenny), the ca-certificates package does not contain this root CA.
For the stable distribution (squeeze), the root CA has been disabled starting ca-certificates version 20090814+nmu3.
For the testing distribution (wheezy) and unstable distribution (sid), the root CA has been disabled starting ca-certificates version 20110502+nmu1.
We recommend that you upgrade your ca-certificates packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux)
iQEcBAEBAgAGBQJOXmW6AAoJEOxfUAG2iX57w/sIAM1IXqr2QRL8NfF9dU8iWvzI 2HzaqwiCE1+MmFxg/vvXuosgxVTbqytRkJ6fnbbsz3pPtjeQCZqG/z0RP7d7Dkv+ YdAc4aMoCyAzavYoGjCw0vIgs6BJNeZmJVixqpceDzHie+o0FNL29FkHjpgeTpZk 9oIRSaeG+YMUypmJf9V0ZpDIO/S/6WzNqfrskOkm8xZimHkMAOaSh86r3gmdX9Rd RGqR3nEG1iiR6/yHB4UyZsnOJC93z5Rb9xH0vCmzcDyv7mbSOq+JxE8uN7H3YvOe 4dJeJX9jwCtQHb8Miw3j9IRHs0bOQLpuxUlxl+9F5DElPIqsXnfXAZC0HrqtkYo= =yv4N -----END PGP SIGNATURE-----
-- To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org Archive: http://lists.debian.org/20110831164820.2972E59DE4@kinkhorst.com
|
|
|
|