Bug 1559 - [UPDATE REQUEST] [UPSTREAM UPDATE] nspr
: [UPDATE REQUEST] [UPSTREAM UPDATE] nspr
Status: RESOLVED FIXED
Product: Server Bugs
Classification: ROSA Server
Component: Main Packages
: unspecified
: All Linux
: Normal normal
: ---
Assigned To: Andrew Lukoshko
: ROSA Server Bugs
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2013-02-01 06:40 MSK by Andrew Lukoshko
Modified: 2013-10-23 13:33 MSD (History)
1 user (show)

See Also:
RPM Package:
ISO-related:
Bad POT generating:
Upstream:
vladimir.potapov: qa_verified+
andrew.lukoshko: published_server+


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Andrew Lukoshko 2013-02-01 06:40:35 MSK
Update for nspr from RHEL6 upstream.

Advisory:
* It was found that a Certificate Authority (CA) mis-issued two intermediate
certificates to customers. These certificates could be used to launch
man-in-the-middle attacks. This update renders those certificates as
untrusted. This covers all uses of the certificates, including SSL, S/MIME,
and code signing.

http://rhn.redhat.com/errata/RHSA-2013-0213.html

Build lists:
https://abf.rosalinux.ru/build_lists/940418
https://abf.rosalinux.ru/build_lists/940419
Comment 1 Vladimir Potapov 2013-02-01 14:37:39 MSK
nspr-4.9.2-0.res6.1
*************** RHEL Advisory ******************
RHSA-2013-0213
It was found that a Certificate Authority (CA) mis-issued two intermediate
certificates to customers. These certificates could be used to launch
man-in-the-middle attacks. This update renders those certificates as
untrusted. This covers all uses of the certificates, including SSL, S/MIME,
and code signing.
************************************************
QA Verfifed