[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted ca-certificates 20090814~bpo50+1 (source all)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Sat, 23 Jan 2010 02:58:57 +0100
Source: ca-certificates
Binary: ca-certificates
Architecture: source all
Version: 20090814~bpo50+1
Distribution: lenny-backports
Urgency: low
Maintainer: Philipp Kern <pkern@debian.org>
Changed-By: Holger Levsen <holger@debian.org>
Description: 
 ca-certificates - Common CA certificates
Closes: 352637 419491 454334 473677 475240 476663 486737 495224 511150 534674 536331 541275
Changes: 
 ca-certificates (20090814~bpo50+1) lenny-backports; urgency=low
 .
   * Rebuild for lenny-backports, no changes needed.
 .
 ca-certificates (20090814) unstable; urgency=low
 .
   * Call Debconf and its db_purge as early as possible in postrm.
     (Closes: #541275)
 .
 ca-certificates (20090709) unstable; urgency=low
 .
   * Fix purge by checking for `/etc/ssl/certs' first.  (Closes: #536331)
 .
 ca-certificates (20090708) unstable; urgency=low
 .
   * Removed CA files:
     - cacert.org/root.crt and cacert.org/class3.crt:
       Both certificate files were deprecated with 20080809.  Users of these
       root certificates are encouraged to switch to
       `cacert.org/cacert.org.crt' which contains both class 1 and class 3
       roots joined in a single file.
     - quovadis.bm/QuoVadis_Root_Certification_Authority.crt:
       This certificate has been added into the Mozilla truststore and
       is available as `mozilla/QuoVadis_Root_CA.crt'.
   * Do not redirect c_rehash error messages to /dev/null.
     (Closes: #495224)
   * Remove dangling symlinks on purge, which also gets rid of the hash
     symlink for ca-certificates.crt.  (Closes: #475240)
   * Use subshells when grepping for certificates in config, avoiding
     SIGPIPE because of grep's immediate exit after it finds the pattern.
     (Closes: #486737)
   * Fix VERBOSE_ARG usage in update-ca-certificates.  Thanks to
     Robby Workman of Slackware.
   * Updated Standards-Version and FSF portal address in the copyright file.
 .
 ca-certificates (20090701) unstable; urgency=low
 .
   * Reactivated "Equifax Secure Global eBusiness CA".  (Closes: #534674)
     Rationale: The rogue collision CA has its validity period in the past.
     Thus it does not impose a risk upon us at the moment.
   * Restrict search for local certificates to add on files ending with '.crt'.
   * Canonicalize PEM names by applying the same set of substitions to
     local and other certificates like the Mozilla certdata dumper does.
 .
 ca-certificates (20090624) unstable; urgency=low
 .
   * Allow local certificate installation.  All certificates found
     in `/usr/local/share/ca-certificates' will be automatically added
     to the list of trusted certificates in `/etc/ssl/certs'.
     (Closes: #352637, #419491, #473677, #476663, #511150)
   * Updated Mozilla certificates from nss 3.12.3-1 (certdata.txt revision
     1.51):
     + COMODO ECC Certification Authority
     + DigiNotar Root CA
     + Network Solutions Certificate Authority
     + WellsSecure Public Root Certificate Authority
     - Equifax Secure Global eBusiness CA
     - UTN USERFirst Object Root CA
   * Reimplemented the Mozilla certdata parser mainly to exclude explicitly
     untrusted certificates.  This led to the exclusion of the
     "MD5 Collisions Forged Rogue CA 23c3" and its parent
     "Equifax Secure Global eBusiness CA".  Furthermore code signing-only
     certificates are no longer included neither.
   * Remove the purging of old PEM files in postinst dating back to
     versions earlier than 20030414.
   * Hooks are now called at every invocation of `update-ca-certificates'.
     If no changes were done to `/etc/ssl/certs', the input for the
     hooks will be empty, though.  Failure exit codes of hooks will not
     tear down the upgrade process anymore.  They are printed but ignored.
 .
 ca-certificates (20081127) unstable; urgency=low
 .
   * Remove /etc/ssl{,/certs} in postrm to please piuparts.  (Closes:
     #454334)
Checksums-Sha1: 
 9cabaedf30d466022f009d901d4f3c97965cb5f7 814 ca-certificates_20090814~bpo50+1.dsc
 7e1662847185bb6f003a6a63b369066c1e43e701 226932 ca-certificates_20090814~bpo50+1.tar.gz
 acd84432d3329fd49c1e3e13151d5d3b7e667ff7 153166 ca-certificates_20090814~bpo50+1_all.deb
Checksums-Sha256: 
 80eed00729d83edd112aeda6f49fdc4a43303ddb286847a8b85d5c49f721cefc 814 ca-certificates_20090814~bpo50+1.dsc
 d1b85d72847ba22eb3ebdf3ee082d5a3603530f3b7fea7c98c76d565ddb5ad7a 226932 ca-certificates_20090814~bpo50+1.tar.gz
 17280a28ea18be7b6ee296e6a47fdf610f68ff3548082955ef7b48ccf8d6cb60 153166 ca-certificates_20090814~bpo50+1_all.deb
Files: 
 77d637737bea9df4d9d11c0cfc0b0019 814 misc optional ca-certificates_20090814~bpo50+1.dsc
 346f41907093ec3c2099678d888a803e 226932 misc optional ca-certificates_20090814~bpo50+1.tar.gz
 820687ca124af41e727d24f836388155 153166 misc optional ca-certificates_20090814~bpo50+1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLWvfqUHLQNqxYNSARAh9yAJ0Z2OdW6p/xs6YgKJfRzMokjPo1lwCeIbGC
+G6TXQH94L5WL9rfDIUoUZs=
=EAj5
-----END PGP SIGNATURE-----


Accepted:
ca-certificates_20090814~bpo50+1.dsc
  to pool/main/c/ca-certificates/ca-certificates_20090814~bpo50+1.dsc
ca-certificates_20090814~bpo50+1.tar.gz
  to pool/main/c/ca-certificates/ca-certificates_20090814~bpo50+1.tar.gz
ca-certificates_20090814~bpo50+1_all.deb
  to pool/main/c/ca-certificates/ca-certificates_20090814~bpo50+1_all.deb


Reply to: