Package: ca-certificates Version: 20230311 Severity: normal File: /usr/share/ca-certificates/mozilla/E-Tugra_Certification_Authority.crt
I noticed that there is one expired certificate in ca-certificates: $ cat test now=$(date -u) date -d "$now" now="$(date -d "$now" +%s)" for f in /usr/share/ca-certificates/mozilla/* ; do date="$(openssl x509 -enddate -noout -in "$f" | cut -d= -f2)" d="$(date -d "$date" +%s)" if [ $((d<=now)) -eq 1 ] ; then echo Expired: $f $date $d $now fi done $ sh test Sun 12 Mar 2023 10:17:20 AWST Expired: /usr/share/ca-certificates/mozilla/E-Tugra_Certification_Authority.crt Mar 3 12:09:48 2023 GMT 1677845388 1678587440 -- System Information: Debian Release: bookworm/sid APT prefers testing-security APT policy: (950, 'testing-security'), (900, 'testing-debug'), (900, 'testing'), (800, 'unstable-debug'), (800, 'unstable'), (790, 'buildd-unstable'), (700, 'experimental-debug'), (700, 'experimental'), (690, 'buildd-experimental') merged-usr: no Architecture: amd64 (x86_64) Kernel: Linux 6.1.0-6-amd64 (SMP w/8 CPU threads; PREEMPT) Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=en_AU.utf8, LC_CTYPE=en_AU.utf8 (charmap=UTF-8), LANGUAGE=en_AU:en Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages ca-certificates depends on: ii debconf [debconf-2.0] 1.5.82 ii openssl 3.0.8-1 ca-certificates recommends no packages. ca-certificates suggests no packages. -- debconf information excluded -- bye, pabs https://wiki.debian.org/PaulWise
signature.asc
Description: This is a digitally signed message part