RHEL 6 : ca-certificates (RHSA-2011:1248)

high Nessus Plugin ID 56086

Synopsis

The remote Red Hat host is missing a security update.

Description

An updated ca-certificates package that fixes one security issue is now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having important security impact.

This package contains the set of CA certificates chosen by the Mozilla Foundation for use with the Internet Public Key Infrastructure (PKI).

It was found that a Certificate Authority (CA) issued fraudulent HTTPS certificates. This update removes that CA's root certificate from the ca-certificates package, rendering any HTTPS certificates signed by that CA as untrusted. (BZ#734381)

All users should upgrade to this updated package. After installing the update, all applications using the ca-certificates package must be restarted for the changes to take effect.

Solution

Update the affected ca-certificates package.

See Also

https://access.redhat.com/errata/RHSA-2011:1248

Plugin Details

Severity: High

ID: 56086

File Name: redhat-RHSA-2011-1248.nasl

Version: 1.13

Type: local

Agent: unix

Published: 9/6/2011

Updated: 1/14/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:ca-certificates, cpe:/o:redhat:enterprise_linux:6, cpe:/o:redhat:enterprise_linux:6.1

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 9/2/2011

Vulnerability Publication Date: 9/2/2011

Reference Information

RHSA: 2011:1248