On Mon, Oct 04, 2021 at 09:45:10AM +0200, Tomas Barton wrote:
> Latest ruby package 2.3.3 in stretch includes OpenSSL 1.0.2u which can't
> handle
> expired CA.
>
> ruby -v -ropenssl -rfiddle -e 'puts Fiddle::Function.new(Fiddle.dlopen(nil)
> ["SSLeay_version"], [Fiddle::TYPE_INT], Fiddle::TYPE_VO
Latest ruby package 2.3.3 in stretch includes OpenSSL 1.0.2u which can't
handle expired CA.
ruby -v -ropenssl -rfiddle -e 'puts
Fiddle::Function.new(Fiddle.dlopen(nil)["SSLeay_version"],
[Fiddle::TYPE_INT], Fiddle::TYPE_VOIDP).call(0)'
ruby 2.3.3p222 (2016-11-21) [x86_64-linux-gnu]
OpenSSL 1.0.2u
Hey,
On Fri, 2021-10-01 at 14:12 +0200, Julien Cristau wrote:
> On Fri, Oct 01, 2021 at 10:14:27AM +0200, Sjoerd Simons wrote:
> > Package: ca-certificates
> > Version: 20210119
> > Severity: normal
> >
> > This is a similar situation as #961907. The DST Root CA X3
> > certificate in
> > ca-cert
On Fri, 1 Oct 2021 14:12:24 +0200 Julien Cristau wrote:
> Which implementations are affected? I know of openssl 1.0.2, which is
> not in any supported Debian release. Are recent versions of gnutls
> affected by this bug?
The CA store can be (and commonly is) used by other software on the
hosts
On Fri, Oct 01, 2021 at 10:14:27AM +0200, Sjoerd Simons wrote:
> Package: ca-certificates
> Version: 20210119
> Severity: normal
>
> This is a similar situation as #961907. The DST Root CA X3 certificate in
> ca-certificates has expired, which is a signer for "ISRG Root X1", which in
> turn i used
Package: ca-certificates
Version: 20210119
Severity: normal
This is a similar situation as #961907. The DST Root CA X3 certificate in
ca-certificates has expired, which is a signer for "ISRG Root X1", which in
turn i used by Letsencrypt. This causes some (older?) SSL implementation to
mark letsenc
6 matches
Mail list logo