[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#962010: marked as done (RFS: ca-certificates/20200601~deb9u1 [RC] -- Common CA certificates)



Your message dated Wed, 3 Jun 2020 10:47:30 -0500
with message-id <030871fa-c67a-34d8-4b83-be1a0b0df620@pbandjelly.org>
and subject line Re: Bug#962008: RFS: ca-certificates/20200601 [RC] -- Common CA certificates
has caused the Debian Bug report #962010,
regarding RFS: ca-certificates/20200601~deb9u1 [RC] -- Common CA certificates
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
962010: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962010
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: sponsorship-requests
Severity: important

Dear mentors,

I am looking for a sponsor for my package "ca-certificates"

 * Package name    : ca-certificates
   Version         : 20200601~deb9u1
 * License         : Mozilla Public License Version 2.0
 * Vcs             : https://salsa.debian.org/debian/ca-certificates
   Section         : misc

It builds those binary packages:

  ca-certificates - Common CA certificates
  ca-certificates-udeb - Common CA certificates - udeb

To access further information about this package, please visit the following URL:

  https://mentors.debian.net/package/ca-certificates

Alternatively, one can download the package with dget using this command:

dget -x https://mentors.debian.net/debian/pool/main/c/ca-certificates/ca-certificates_20200601~deb9u1.dsc

Changes since the last upload:

  * Rebuild for stretch-security.
  * Merge changes from 20200601
    - d/control
  * This security release updates the Mozilla CA bundle and blacklists
    distrusted Symantec roots and the expired AddTrust External Root.

Regards,
Michael Shuler

--- End Message ---
--- Begin Message ---
Thanks to all for the quick advice.

On 6/3/20 8:40 AM, Michael Shuler wrote> I have received no reply from the security team, as of this message, so
awaiting their OK/advice.

The security team has replied, and I will prep the buster and stretch uploads for (old)stable-proposed-updates, along with a request to be included in the (old)stable-updates repositories.

Closing these RFS bugs, since they'll be resubmitted to release.debian.org:

buster-security:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962009
stretch-security:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962010

Andrew closed the unstable RFS #962008, so dropped -done cc.

--- End Message ---

Reply to: