| Summary: | Update Mozilla::CA to exclude compromised DigiNotar certificates | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Frédéric "LpSolit" Buclin <LpSolit> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | |
| Severity: | critical | ||
| Priority: | High | CC: | davidwhodgins, dmorganec, jquelin, sysadmin-bugs |
| Version: | 1 | Keywords: | validated_update |
| Target Milestone: | Mageia 1 | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Source RPM: | perl-Mozilla-CA | CVE: | |
| Status comment: | |||
| Attachments: | Script used to test perl-Mozilla-CA | ||
|
Description
Frédéric "LpSolit" Buclin
2011-10-08 19:12:31 CEST
Frédéric "LpSolit" Buclin
2011-10-08 19:12:49 CEST
Assignee:
bugsquad =>
jquelin pushed to mga1 core/updates_testing please validate & sync to core/updates CC:
(none) =>
jquelin Looks good to me, on x86. I tested it via LWP::UserAgent and some websites using SSL. Created attachment 924 [details]
Script used to test perl-Mozilla-CA
Running the script should not show anything for the connection to paypal,
and should fail for the connection to diginotar.
Testing complete on i586 for the srpm
perl-Mozilla-CA-20110914.0.0-1.1.mga1.src.rpm
Update validated. Can someone from the sysadmin team push the srpm perl-Mozilla-CA-20110914.0.0-1.1.mga1.src.rpm from Core Updates Testing to Core Updates. Advisory: This update revokes the compromised DigiNotar certificates for perl applications. Keywords:
(none) =>
validated_update update pushed. Status:
NEW =>
RESOLVED |