[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#919433: marked as done (RFS: ca-certificates/20190110 [RC;Security])



Your message dated Wed, 23 Jan 2019 02:45:00 +0100
with message-id <20190123014500.GM18595@sym.noone.org>
and subject line Re: Bug#919433: RFS: ca-certificates/20190110 [RC;Security]
has caused the Debian Bug report #919433,
regarding RFS: ca-certificates/20190110 [RC;Security]
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
919433: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=919433
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: sponsorship-requests
Severity: important

Dear mentors,

I am looking for a sponsor for my package "ca-certificates"

  * Package name    : ca-certificates
    Version         : 20190110
  * License         : GPL-2+, MPL-2.0
    Section         : misc

It builds those binary packages:

  ca-certificates - Common CA certificates
  ca-certificates-udeb - Common CA certificates - udeb (udeb)

To access further information about this package, please visit the
following URL:

  https://mentors.debian.net/package/ca-certificates


Alternatively, one can download the package with dget using this command:

  dget -x
https://mentors.debian.net/debian/pool/main/c/ca-certificates/ca-certificates_20190110.dsc

Changes since the last upload:

ca-certificates (20190110) unstable; urgency=high

  * debian/control:
    Depend on openssl (>= 1.1.1).
    Set Standards-Version: 4.3.0.1.
    Set Build-Depends: debhelper-compat (= 12); drop d/compat
    Remove trailing whitespace from d/changelog.
  * debian/ca-certificates.postinst:
    Fix permissions on /usr/local/share/ca-certificates when using symlinks.
    Closes: #916833
  * sbin/update-ca-certificates:
    Remove orphan symlinks found in /etc/ssl/certs to prevent `openssl
    rehash` from exiting with an error. Closes: #895482, #895473
    This will also fix removal of user CA certificates from /usr/local
without
    needing to run --fresh. Closes: #911303
  * mozilla/{certdata.txt,nssckbi.h}:
    Update Mozilla certificate authority bundle to version 2.28.
    The following certificate authorities were added (+):
    + "GlobalSign Root CA - R6"
    + "OISTE WISeKey Global Root GC CA"
    The following certificate authorities were removed (-):
    - "Certplus Root CA G1"
    - "Certplus Root CA G2"
    - "OpenTrust Root CA G1"
    - "OpenTrust Root CA G2"
    - "OpenTrust Root CA G3"
    - "TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H5"
    - "Visa eCommerce Root"

 -- Michael Shuler <michael@pbandjelly.org>  Thu, 10 Jan 2019 19:31:31 -0600

-- 
Kind regards,
Michael



Attachment: signature.asc
Description: OpenPGP digital signature


--- End Message ---
--- Begin Message ---
Hi Michael,

Michael Shuler wrote:
>   * Package name    : ca-certificates
>     Version         : 20190110

Uploaded.

Thanks again for your work on especially this release.

>   * sbin/update-ca-certificates:
>     Remove orphan symlinks found in /etc/ssl/certs to prevent `openssl
>     rehash` from exiting with an error. Closes: #895482, #895473
>     This will also fix removal of user CA certificates from /usr/local without
>     needing to run --fresh. Closes: #911303

This fix indeed worked for my two machines where the previous upload
failed to configure properly. Yay!

		Regards, Axel
-- 
 ,''`.  |  Axel Beckert <abe@debian.org>, https://people.debian.org/~abe/
: :' :  |  Debian Developer, ftp.ch.debian.org Admin
`. `'   |  4096R: 2517 B724 C5F6 CA99 5329  6E61 2FF9 CD59 6126 16B5
  `-    |  1024D: F067 EA27 26B9 C3FC 1486  202E C09E 1D89 9593 0EDE

--- End Message ---

Reply to: