Your message dated Wed, 24 Sep 2014 22:17:42 +0000
with message-id <[email protected]>
and subject line Bug#501123: fixed in ca-certificates 20130119+deb7u1
has caused the Debian Bug report #501123,
regarding ca-certificates should be in stable-updates
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
501123: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=501123
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
package: ca-certificates
version: 20070303
severity: wishlist

Hi,

thanks for maintaining ca-certificates!

ca-certificates in etch is quite outdated, eg the current certificates for  
SPI and cacert are missing. (so I actually wonder if wishlist is an 
approriate severity for this or not...)

Why don't you put ca-certificates in the volatile repository? Seems like an 
ideal candidate to me... :)


regards,
        Holger

Attachment: pgpDAoQMF5GnI.pgp
Description: PGP signature


--- End Message ---
--- Begin Message ---
Source: ca-certificates
Source-Version: 20130119+deb7u1

We believe that the bug you reported is fixed in the latest version of
ca-certificates, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Michael Shuler <[email protected]> (supplier of updated ca-certificates 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Sun, 30 Mar 2014 17:49:01 -0500
Source: ca-certificates
Binary: ca-certificates
Architecture: source all
Version: 20130119+deb7u1
Distribution: stable
Urgency: low
Maintainer: Michael Shuler <[email protected]>
Changed-By: Michael Shuler <[email protected]>
Description: 
 ca-certificates - Common CA certificates
Closes: 501123 683403
Changes: 
 ca-certificates (20130119+deb7u1) stable; urgency=low
 .
   * Stable update including one patch and current mozilla/certdata.txt.
     Closes: #501123
   * Fix certdata2pem.py for multiple CAs using the same CKA_LABEL.  Thanks
     to Marc Deslauriers for the patch.  Closes: #683403, LP: #1031333
   * Update mozilla/certdata.txt to version 1.97 (version now in nssckbi.h).
     Certificates added (+), removed (-), and renamed (~):
     + "ACCVRAIZ1"
     + "Atos TrustedRoot 2011"
     + "CA Disig Root R1"
     + "CA Disig Root R2"
     + "China Internet Network Information Center EV Certificates Root"
     + "D-TRUST Root Class 3 CA 2 2009"
     + "D-TRUST Root Class 3 CA 2 EV 2009"
     + "E-Tugra Certification Authority"
     + "PSCProcert"
     + "SG TRUST SERVICES RACINE"
     + "StartCom Certification Authority"
     ~ "StartCom Certification Authority"_2
       (both StartCom CAs now included with duplicate CKA_LABEL fix)
     + "Swisscom Root CA 2"
     + "Swisscom Root EV CA 2"
     + "T-TeleSec GlobalRoot Class 2"
     + "TURKTRUST Certificate Services Provider Root 2007"
     + "TWCA Global Root CA"
     + "TeliaSonera Root CA v1"
     + "Verisign Class 3 Public Primary Certification Authority"
     ~ "Verisign Class 3 Public Primary Certification Authority"_2
       (both Verisign Class 3 CAs now included with duplicate CKA_LABEL fix)
     - "Equifax Secure eBusiness CA 2"
     - "Firmaprofesional Root CA"
     - "TC TrustCenter Universal CA III"
     - "TDC OCES Root CA"
     - "Wells Fargo Root CA"
Checksums-Sha1: 
 b748601c22ab2b287070a04592b6bd741018aeca 1420 
ca-certificates_20130119+deb7u1.dsc
 c9757404c90cbdbf9aeb3d22d5a474c070a449ce 366422 
ca-certificates_20130119+deb7u1.tar.gz
 7eb7b59ddb7457f0a4cbe5e9d5c84865cb067ced 209900 
ca-certificates_20130119+deb7u1_all.deb
Checksums-Sha256: 
 da324d3fee3498ce3af95fae0631db8ef7a4da3cc6b8e383cb4294cbcc68c09f 1420 
ca-certificates_20130119+deb7u1.dsc
 58c8269f7fb7fce80fbabffc6fa636430580cffc7e2fd19df4e235ac3e6c34b6 366422 
ca-certificates_20130119+deb7u1.tar.gz
 3494ecfd607e4233d8d1a656eceb6bd109d756bc0afe9d3b29dfc0acc4fe19cf 209900 
ca-certificates_20130119+deb7u1_all.deb
Files: 
 f56fe81cf57d80807b431e7dd1062be6 1420 misc optional 
ca-certificates_20130119+deb7u1.dsc
 11153de41d44b83d9eab4421c8e58305 366422 misc optional 
ca-certificates_20130119+deb7u1.tar.gz
 b5baf87a78b48366ceff3f1ffa112209 209900 misc optional 
ca-certificates_20130119+deb7u1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBAgAGBQJUIwlQAAoJEFb2GnlAHawE2DEIAIqpA/S8WOF5Y5BW9YLcAM8X
c7RfXs3XQY4Mi3HjJCavwRb/FvmUdugTt/3hvXHs7vRfyS3UJ2//DSuxp3l49zQF
rWCVZEhgcg6Fnoz4aiJ1KvM1iV2GI53HXsNoj+AapTIpfxScV7y5VyrV01t5qNwd
MOUl0SrK8vK11/nkm+1DSJRMFHnlPm2zPLpNTfbD65CKhxmSMdOPIaj2KUS3swKS
EXbE2fmXiWhrunGwnExHCGBXfBQButCPybzHX1SZphWEhGjqxdIZvuPKDp16v4Uh
2vdSLR24BmdTJKNLLBTk14/Oq+0cFEMtmA/vwTU/zdQv9FK9roIWQOTEV7HQ2a8=
=9oP2
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to