Name | CVE-2022-23491 |
Description | Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi 2022.12.07 removes root certificates from "TrustCor" from the root store. These are in the process of being removed from Mozilla's trust store. TrustCor's root certificates are being removed pursuant to an investigation prompted by media reporting that TrustCor's ownership also operated a business that produced spyware. Conclusions of Mozilla's investigation can be found in the linked google group discussion. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
python-certifi (PTS) | bullseye | 2020.6.20-1 | vulnerable |
| bookworm | 2022.9.24-1 | vulnerable |
| trixie | 2024.8.30-1 | vulnerable |
| sid | 2024.8.30+dfsg-1 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
python-certifi | source | (unstable) | (unfixed) | unimportant | | |
Notes
https://github.com/certifi/python-certifi/security/advisories/GHSA-43fp-rhv2-5gv8
Debian's python-certifi is patched to return the location of Debian-provided CA certificates