-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2200-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff March 23, 2011 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : iceweasel Vulnerability : none in iceweasel Problem type : none in iceweasel Debian-specific: no CVE ID : not available This update for Iceweasel, a web browser based on Firefox, updates the certificate blacklist for several fraudulent HTTPS certificates. More details can be found in a blog posting by Jacob Appelbaum of the Tor project: https://blog.torproject.org/category/tags/ssl-tls-ca-tor-certificates-torbrowser For the oldstable distribution (lenny), this problem has been fixed in version 1.9.0.19-9 of the xulrunner source package. For the stable distribution (squeeze), this problem has been fixed in version 3.5.16-6. For the unstable distribution (sid), this problem has been fixed in version 3.5.18-1. For the experimental distribution, this problem has been fixed in version 4.0~rc2-1. We recommend that you upgrade your iceweasel packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iEYEARECAAYFAk2KXjwACgkQXm3vHE4uylrljgCgxyjj11P46OhefLrw8A7B3A6v HVgAn2y4vZH4H6UB88wB6x6NqeQ7J+Mj =ZoU0 -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/