what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2013-003

Mandriva Linux Security Advisory 2013-003
Posted Jan 10, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-003 - Google reported to Mozilla that TURKTRUST, a certificate authority in Mozillas root program, had mis-issued two intermediate certificates to customers. The issue was not specific to Firefox but there was evidence that one of the certificates was used for man-in-the-middle traffic management of domain names that the customer did not legitimately own or control. This issue was resolved by revoking the trust for these specific mis-issued certificates. The rootcerts package has been upgraded to address this flaw and the Mozilla NSS package has been rebuilt to pickup the changes.

tags | advisory, root
systems | linux, mandriva
advisories | CVE-2013-0743
SHA-256 | 3d94d3b0d2d1647beb5ae26b794650a765c690cdc66365234712f301f98b0429

Mandriva Linux Security Advisory 2013-003

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2013:003
http://www.mandriva.com/security/
_______________________________________________________________________

Package : rootcerts
Date : January 9, 2013
Affected: 2011.
_______________________________________________________________________

Problem Description:

Google reported to Mozilla that TURKTRUST, a certificate authority in
Mozillas root program, had mis-issued two intermediate certificates
to customers. The issue was not specific to Firefox but there was
evidence that one of the certificates was used for man-in-the-middle
(MITM) traffic management of domain names that the customer did not
legitimately own or control. This issue was resolved by revoking the
trust for these specific mis-issued certificates (CVE-2013-0743).

The rootcerts package has been upgraded to address this flaw and the
Mozilla NSS package has been rebuilt to pickup the changes.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0743
http://www.mozilla.org/security/announce/2013/mfsa2013-20.html
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2011:
196c985cb9a0c43026b517740bc84964 2011/i586/libnss3-3.14-0.2-mdv2011.0.i586.rpm
9e8211d7552f2f4c29e5100c2e22666d 2011/i586/libnss-devel-3.14-0.2-mdv2011.0.i586.rpm
73cac4a13ff3263762bd6e6958fd9ee5 2011/i586/libnss-static-devel-3.14-0.2-mdv2011.0.i586.rpm
22b7d7c8c8cb651dc8f029ea4a21df62 2011/i586/nss-3.14-0.2-mdv2011.0.i586.rpm
d4104fdc7fd808e2065cf11c9579881e 2011/i586/rootcerts-20121229.00-1-mdv2011.0.i586.rpm
8892d8d81576147685b6c6c2f27a3cc1 2011/i586/rootcerts-java-20121229.00-1-mdv2011.0.i586.rpm
2a1932633742f095598acbc71a65e07e 2011/SRPMS/nss-3.14-0.2.src.rpm
988252152ffcacd263670b84a70a4eb3 2011/SRPMS/rootcerts-20121229.00-1.src.rpm

Mandriva Linux 2011/X86_64:
cceba1cdc46199e9acf7702784637321 2011/x86_64/lib64nss3-3.14-0.2-mdv2011.0.x86_64.rpm
6cea0e30ea682bf7a067486b17205107 2011/x86_64/lib64nss-devel-3.14-0.2-mdv2011.0.x86_64.rpm
ba17542fa03c2e19ad05f49fd7be52bc 2011/x86_64/lib64nss-static-devel-3.14-0.2-mdv2011.0.x86_64.rpm
d89adc7b2d715f9979e30b40881c7f6a 2011/x86_64/nss-3.14-0.2-mdv2011.0.x86_64.rpm
6f42e1222e7670a942e887f6e1dd5a00 2011/x86_64/rootcerts-20121229.00-1-mdv2011.0.x86_64.rpm
da48a7a352314122da074e9831d6a8ac 2011/x86_64/rootcerts-java-20121229.00-1-mdv2011.0.x86_64.rpm
2a1932633742f095598acbc71a65e07e 2011/SRPMS/nss-3.14-0.2.src.rpm
988252152ffcacd263670b84a70a4eb3 2011/SRPMS/rootcerts-20121229.00-1.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFQ7YQ2mqjQ0CJFipgRAhEXAKCO40WVKjgaPnLl2Miwavd8dbpWxwCgv5jg
bOqBKm41lnWZcvt9di0Tp+8=
=nfc8
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close