[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#962008: marked as done (RFS: ca-certificates/20200601 [RC] -- Common CA certificates)



Your message dated Wed, 3 Jun 2020 15:48:27 +0200
with message-id <5d863397-13ee-3e1f-e340-b7c3cefaa81a@collabora.co.uk>
and subject line Re: RFS: ca-certificates/20200601 [RC] -- Common CA certificates
has caused the Debian Bug report #962008,
regarding RFS: ca-certificates/20200601 [RC] -- Common CA certificates
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
962008: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962008
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: sponsorship-requests
Severity: important

Dear mentors,

I am looking for a sponsor for my package "ca-certificates"

 * Package name    : ca-certificates
   Version         : 20200601
 * License         : Mozilla Public License Version 2.0
 * Vcs             : https://salsa.debian.org/debian/ca-certificates
   Section         : misc

It builds those binary packages:

  ca-certificates - Common CA certificates
  ca-certificates-udeb - Common CA certificates - udeb

To access further information about this package, please visit the following URL:

  https://mentors.debian.net/package/ca-certificates

Alternatively, one can download the package with dget using this command:

dget -x https://mentors.debian.net/debian/pool/main/c/ca-certificates/ca-certificates_20200601.dsc

Changes since the last upload:

  * debian/control:
    Set Standards-Version: 4.5.0.2
    Set Build-Depends: debhelper-compat (= 13)
  * debian/copyright:
    Replace tabs in license text
  * mozilla/{certdata.txt,nssckbi.h}:
    Update Mozilla certificate authority bundle to version 2.40.
    Closes: #956411, #955038
  * mozilla/blacklist.txt
    Add distrusted Symantec CA list to blacklist for explicit removal.
    Closes: #911289
    Blacklist expired root certificate, "AddTrust External Root"
    Closes: #961907
    The following certificate authorities were added (+):
    + "Certigna Root CA"
    + "emSign ECC Root CA - C3"
    + "emSign ECC Root CA - G3"
    + "emSign Root CA - C1"
    + "emSign Root CA - G1"
    + "Entrust Root Certification Authority - G4"
    + "GTS Root R1"
    + "GTS Root R2"
    + "GTS Root R3"
    + "GTS Root R4"
    + "Hongkong Post Root CA 3"
    + "UCA Extended Validation Root"
    + "UCA Global G2 Root"
    The following certificate authorities were removed (-):
    - "AddTrust External Root"
    - "Certinomis - Root CA"
    - "Certplus Class 2 Primary CA"
    - "Deutsche Telekom Root CA 2"
    - "GeoTrust Global CA"
    - "GeoTrust Primary Certification Authority"
    - "GeoTrust Primary Certification Authority - G2"
    - "GeoTrust Primary Certification Authority - G3"
    - "GeoTrust Universal CA"
    - "thawte Primary Root CA"
    - "thawte Primary Root CA - G2"
    - "thawte Primary Root CA - G3"
    - "VeriSign Class 3 Public Primary Certification Authority - G4"
    - "VeriSign Class 3 Public Primary Certification Authority - G5"
    - "VeriSign Universal Root Certification Authority"

Regards,
Michael Shuler

--- End Message ---
--- Begin Message ---
On Mon, 1 Jun 2020 18:05:56 -0500 Michael Shuler
<michael@pbandjelly.org> wrote:
> I am looking for a sponsor for my package "ca-certificates"
> 
>   * Package name    : ca-certificates
>     Version         : 20200601
>   * License         : Mozilla Public License Version 2.0
>   * Vcs             : https://salsa.debian.org/debian/ca-certificates
>     Section         : misc

Closing the RFS for the upload to unstable since I have sponsored it
yesterday.

-- 
Cheers,
  Andrej

--- End Message ---

Reply to: