"GTE CyberTrust Global Root", which we happen to use widely in our
institution, also is a version *1* x509 certificate.
So the libgnutls13 update broke several of our apps.
A quick search among the files in "ca-certificates" package shows up to
20 version-1 certificates over a total of 102.
This is about 20% now-untrusted trustworthy root certificates, how could
one regard this as being a harmless routine security update ?
--
Ce message a ete verifie par MailScanner
pour des virus ou des polluriels et rien de
suspect n'a ete trouve.
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org