Bug 689430

Summary: Compromised certificates
Product: [Other] Security Response Reporter: Josh Bressers <bressers>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: bressers, collura, ddumas, emaldona, huzaifas, jhorak, jlieskov, jorton, kengert, matt, mboisver, mjc, rrelyea, security-response-team, stransky, tmraz, vkrizan, wnefal+redhatbugzilla
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2015-07-29 14:18:08 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Josh Bressers 2011-03-21 14:05:48 UTC
It has been reported that a small number of certificates have been compromised. Upstream has a patch which blacklists these certificates.

Comment 2 errata-xmlrpc 2011-03-22 20:50:59 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 4

Via RHSA-2011:0375 https://rhn.redhat.com/errata/RHSA-2011-0375.html

Comment 3 errata-xmlrpc 2011-03-22 21:11:25 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 4
  Red Hat Enterprise Linux 5
  Red Hat Enterprise Linux 6

Via RHSA-2011:0374 https://rhn.redhat.com/errata/RHSA-2011-0374.html

Comment 4 errata-xmlrpc 2011-03-22 21:11:49 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 4
  Red Hat Enterprise Linux 5
  Red Hat Enterprise Linux 6

Via RHSA-2011:0373 https://rhn.redhat.com/errata/RHSA-2011-0373.html

Comment 6 Matt McCutchen 2011-03-23 15:02:42 UTC
Shouldn't the certificates be blacklisted in NSS, not PSM, so that all applications benefit?

Comment 7 Kai Engert (:kaie) (inactive account) 2011-03-23 15:24:35 UTC
The Mozilla application level patch was done first.

We are working on an NSS level patch, too.

Comment 9 Kai Engert (:kaie) (inactive account) 2011-03-23 18:21:00 UTC
link in comment 8 doesn't work for me.
this one does:
http://blogs.comodo.com/it-security/data-security/the-recent-ca-compromise/

Comment 10 Tomas Hoger 2011-03-24 13:50:38 UTC
The list of CNs from the Comodo incident report:
  http://www.comodo.com/Comodo-Fraud-Incident-2011-03-23.html

Domain:  mail.google.com
Serial:  047ECBE9FCA55F7BD09EAE36E10CAE1E

Domain:  www.google.com
Serial:  00F5C86AF36162F13A64F54F6DC9587C06

Domain:  login.yahoo.com
Serial:  00D7558FDAF5F1105BB213282B707729A3

Domain:  login.yahoo.com
Serial:  392A434F0E07DF1F8AA305DE34E0C229

Domain:  login.yahoo.com
Serial:  3E75CED46B693021218830AE86A82A71

Domain:  login.skype.com
Serial:  00E9028B9578E415DC1A710A2B88154447

Domain:  addons.mozilla.org
Serial:  009239D5348F40D1695A745470E1F23F43

Domain:  login.live.com
Serial:  00B0B7133ED096F9B56FAE91C874BD3AC0

Domain:  global trustee
Serial:  00D8F35F4EB7872B2DAB0692E315382FB0

Comment 13 errata-xmlrpc 2011-04-29 03:04:06 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6
  Red Hat Enterprise Linux 5
  Red Hat Enterprise Linux 4

Via RHSA-2011:0472 https://rhn.redhat.com/errata/RHSA-2011-0472.html

Comment 14 Red Hat Bugzilla 2013-10-04 00:19:55 UTC
Removing external tracker bug with the id '18338' as it is not valid for this tracker