Hello,

On 09/09/2021 19:11, Stefan Huehner wrote:
> looking a tiny bit at changelog for gnutls buster it looks like the backport 
> was already done :)
> 
> 3.6.7-4+deb10u5
> the _16 + _17 patches from the description sound like what i understand the 
> fix is (explore alternative verification paths...)
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961889

Thanks, that's a good reference for the gnutls part.

On 10/09/2021 10:55, Christoph Berg wrote:
> Note that stretch and later are using libssl1.1 by default, so only packages
> who were actively patched to keep using 1.0 are affected.

Thanks.
This notably includes curl :/  So this needs fixing as well.
An openssl[1.0] update is underway, I'll coordinate with Thorsten.

Also, a work-around is to drop the expiring CA:
$ rm /usr/share/ca-certificates/mozilla/DST_Root_CA_X3.crt
$ update-ca-certificate

Cheers!
Sylvain Beucler
Debian LTS Team

Reply via email to