"GTE CyberTrust Global Root", which we happen to use widely in our institution, also is a version *1* x509 certificate.

So the libgnutls13 update broke several of our apps.

A quick search among the files in "ca-certificates" package shows up to 20 version-1 certificates over a total of 102.

This is about 20% now-untrusted trustworthy root certificates, how could one regard this as being a harmless routine security update ?



--
Ce message a ete verifie par MailScanner
pour des virus ou des polluriels et rien de
suspect n'a ete trouve.




--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to