USN-1197-1: Firefox and Xulrunner vulnerability
1 September 2011
A certificate authority issued fraudulent certificates.
It was discovered that Dutch Certificate Authority DigiNotar had
mis-issued multiple fraudulent certificates. These certificates could allow
an attacker to perform a "machine-in-the-middle" (MITM) attack which would make
the user believe their connection is secure, but is actually being
For the protection of its users, Mozilla has removed the DigiNotar
certificate. Sites using certificates issued by DigiNotar will need to seek
another certificate vendor.
We are currently aware of a regression that blocks one of two Staat der
Nederlanden root certificates which are believed to still be secure. This
regression is being tracked at https://launchpad.net/bugs/838322.
The problem can be corrected by updating your system to the following package versions:
After a standard system upgrade you need to restart Firefox and any
applications that use Xulrunner to effect the necessary changes.