USN-1197-5: CA Certificates vulnerability

Publication date

9 September 2011

Overview

A certificate authority mis-issued fraudulent certificates.


Packages

Details

USN-1197-1 addressed an issue in Firefox and Xulrunner pertaining to the
Dutch Certificate Authority DigiNotar mis-issuing fraudulent certificates.
This update provides the corresponding update for ca-certificates.

Original advisory details:

It was discovered that Dutch Certificate Authority DigiNotar, had
mis-issued multiple fraudulent certificates. These certificates could allow
an attacker to perform a "machine-in-the-middle" (MITM) attack which would make
the user believe their connection is secure, but is actually being
monitored.

For the protection of its users, Mozilla has removed the DigiNotar
certificate. Sites using certificates issued by DigiNotar will need to seek
another certificate vendor.

We are currently aware of a regression that blocks one of two Staat der
Nederlanden root certificates which are believed to still be secure. This
regression is being tracked at

USN-1197-1 addressed an issue in Firefox and Xulrunner pertaining to the
Dutch Certificate Authority DigiNotar mis-issuing fraudulent certificates.
This update provides the corresponding update for ca-certificates.

Original advisory details:

It was discovered that Dutch Certificate Authority DigiNotar, had
mis-issued multiple fraudulent certificates. These certificates could allow
an attacker to perform a "machine-in-the-middle" (MITM) attack which would make
the user believe their connection is secure, but is actually being
monitored.

For the protection of its users, Mozilla has removed the DigiNotar
certificate. Sites using certificates issued by DigiNotar will need to seek
another certificate vendor.

We are currently aware of a regression that blocks one of two Staat der
Nederlanden root certificates which are believed to still be secure. This
regression is being tracked at https://launchpad.net/bugs/838322.


Update instructions

After a standard system update you need to restart any application using ca-certificates to make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
11.04 natty ca-certificates –  20090814+nmu2ubuntu0.1
10.10 maverick ca-certificates –  20090814ubuntu0.10.10.1
10.04 lucid ca-certificates –  20090814ubuntu0.10.04.1

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›