This fixes certificate chain validation involving the expired "AddTrust External Root".
Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:
sudo dnf upgrade --refresh --advisory=FEDORA-2020-6ec1d85ab1
Please login to add feedback.
This update has been submitted for testing by ueno.
This update's test gating status has been changed to 'waiting'.
This update's test gating status has been changed to 'ignored'.
The new build fixes the cert validation issue for me:
Before upgrade:
We should fix this in F31 as well.
This update has been pushed to testing.
This update can be pushed to stable now if the maintainer wishes
This update has been submitted for stable by ueno.
This works for me. Hopefully can be pushed out to updates soon because a lot of people are bound to be affected.
This update has been pushed to stable.
Hm, instead of removing the expired cert from the CA store, this update...ignores the expired certificate now?
@ckujau, no, the message is just misleading. The certificate is internally dropped from the input chain, and the cross signed (non-expired) certificate is used from the system trust store. See the background of the fix: https://gitlab.com/gnutls/gnutls/-/issues/1008#note_352448705
I'll try to update the command output later.
@ckujau, if you are in doubt, try (temporarily) blacklisting the cross-signed "COMODO RSA Certification Authority" on the system and see if the connection fails as expected: