On Fri, 1 Oct 2021 14:12:24 +0200 Julien Cristau <jul...@cristau.org> wrote:
> Which implementations are affected?  I know of openssl 1.0.2, which is
> not in any supported Debian release.  Are recent versions of gnutls
> affected by this bug?

The CA store can be (and commonly is) used by other software on the
hosts which doesn't necessarily even ship from Debian, with varying
implementations that sometimes poorly handle this situation.  We've
observed the lack of this blacklist cause a production issue for an
Envoy binary connecting to other servers with Let's Encrypt certs,
which uses a bundled boringssl implementation and reads the system
root store from this package (and worked around it by blacklisting in
our local config manually).  Some other softwares (e.g. mono, java
implementations, etc) can be similarly-affected.  Given the cert is
expired, it's hard to imagine any real harm from its removal - but
removing it can fix a lot of subtle issues going on around the world
since yesterday's DST Root CA X3 expiry.

Reply via email to