On 26/02/14 19:17, Andreas Metzler wrote:
> On 2014-02-26 Daniel Pocock <dan...@pocock.pro> wrote:
>> Package: libgnutls26
>> Severity: serious
>> Version: 2.12.20-8
> 
> [...]
>> - running gnutls-cli in debug mode, I notice the following:
> [...]
> 
> Can you check whether this is fixed in GnuTLS 3.x? - It is available
> in wheezy-backports.
> 

I already removed the cacert.org certs from that server and changed to
another root so it is not something I can test immediately.

Even if 3.x fixes it, people will still be using wheezy for another good
12-18 months so this probably needs to go in a security update to avoid
massive inconvenience (unless cacert.org decides to go back to SHA-256)

Also, I started a thread on the cacert mailing list about this issue:

https://lists.cacert.org/wws/arc/cacert/2014-02/msg00001.html


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to