Your message dated Wed, 28 Nov 2012 21:32:27 +0000
with message-id <e1tdpf5-0002ir...@franck.debian.org>
and subject line Bug#537051: fixed in ca-certificates 20121114
has caused the Debian Bug report #537051,
regarding ca-certificates 20090709: installation error
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
537051: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=537051
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: ca-certificates
Version: 20090709
OS: debian/testing
Problem:
installation apparently completed,
but there were some errors
---------------------------SNIPPET OF INSTALLATION from
/var/log/apt/term.log------------------------
Setting up ca-certificates (20090709) ...
Updating certificates in /etc/ssl/certs... WARNING: Skipping duplicate
certificate ca-certificates.crt
4 added, 4 removed; done.
Running hooks in /etc/ca-certificates/update.d....
updating keystore /etc/ssl/certs/java/cacerts...
keytool error: java.security.NoSuchAlgorithmException: SHA384withECDSA
Signature not available
error adding /etc/ssl/certs/COMODO_ECC_Certification_Authority.pem
Certificate was added to keystore
added: /etc/ssl/certs/DigiNotar_Root_CA.pem
Certificate was added to keystore
added: /etc/ssl/certs/Network_Solutions_Certificate_Authority.pem
Certificate was added to keystore
added: /etc/ssl/certs/WellsSecure_Public_Root_Certificate_Authority.pem
does not exists: /etc/ssl/certs/class3.pem
does not exists: /etc/ssl/certs/root.pem
does not exists: /etc/ssl/certs/UTN_USERFirst_Object_Root_CA.pem
does not exists: /etc/ssl/certs/QuoVadis_Root_Certification_Authority.pem
failed.
E: /etc/ca-certificates/update.d/jks-keystore exited with code 1.
done.
Setting up gstreamer0.10-ffmpeg (0.10.8-1) ...
....
After installation:
fermi:~# aptitude show ca-certificates
Package: ca-certificates
State: installed
Automatically installed: yes
Version: 20090709
Priority: optional
Section: misc
Maintainer: Philipp Kern <pk...@debian.org>
Uncompressed Size: 758k
Architecture: all
Compressed Size: 155k
Filename: pool/main/c/ca-certificates/ca-certificates_20090709_all.deb
MD5sum: 72c284149d15b336a1758af819192d21
Archive: testing, now
Depends: openssl, debconf (>= 0.5) | debconf-2.0
Description: Common CA certificates
This package includes PEM files of CA certificates to allow SSL-based
applications to check
for the authenticity of SSL connections.
It includes, among others, certificate authorities used by the Debian
infrastructure and
those shipped with Mozilla's browsers.
Please note that certificate authorities whose certificates are
included in this package are
not in any way audited for trustworthiness and RFC 3647 compliance,
and that full
responsibility to assess them belongs to the local system administrator.
fermi:~#
fermi:~# uname -a
Linux fermi 2.6.26-2-486 #1 Sun Jun 21 04:15:19 UTC 2009 i686 GNU/Linux
fermi:~#
--- End Message ---
--- Begin Message ---
Source: ca-certificates
Source-Version: 20121114
We believe that the bug you reported is fixed in the latest version of
ca-certificates, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 537...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Michael Shuler <mich...@pbandjelly.org> (supplier of updated ca-certificates
package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Wed, 14 Nov 2012 23:58:59 -0600
Source: ca-certificates
Binary: ca-certificates
Architecture: source all
Version: 20121114
Distribution: unstable
Urgency: low
Maintainer: Michael Shuler <mich...@pbandjelly.org>
Changed-By: Michael Shuler <mich...@pbandjelly.org>
Description:
ca-certificates - Common CA certificates
Closes: 537051
Changes:
ca-certificates (20121114) unstable; urgency=low
.
[ Don Armstrong ]
* Breaks ca-certificates-java (<<20121112+nmu1); partially fixing #537051.
* Provide update-ca-certificates and update-ca-certificates-fresh
triggers.
* Call the triggers using no-await so that the configuration files from
the newer version of ca-certificates-java are in places before the
upgrade. Closes: #537051.
.
[ Michael Shuler ]
* Add note to previous mozilla/certdata.txt changelog entry to document
CKT_NSS_MUST_VERIFY_TRUST changes.
Checksums-Sha1:
79dbf5c34c1ec4747a3c2335e4dd647846f888d9 1747 ca-certificates_20121114.dsc
abc3b25006fea83ae8ea141b21d22a7069e2863b 305166 ca-certificates_20121114.tar.gz
76b90337124ba069d20ea6df5da1d101c24c6730 192630
ca-certificates_20121114_all.deb
Checksums-Sha256:
675a6c13b72a846ffe915d38a81286c4ae872b8facd46372df19b82b24935160 1747
ca-certificates_20121114.dsc
a0cd6007da337b9772b4c1f426c106fb1b8e6afd72a5f7566f3ea55eb3f7ee59 305166
ca-certificates_20121114.tar.gz
f6991820d1c6431a7db42e92efa51f4058e921bdcc491a906dc1309e9ba35286 192630
ca-certificates_20121114_all.deb
Files:
e60d45d75dbdc7d64e7c619e0027b4a0 1747 misc optional
ca-certificates_20121114.dsc
3000802ea54fbe3a9b6aaa58428241c3 305166 misc optional
ca-certificates_20121114.tar.gz
aec4dda82afd8d8f2e14ce0ab1d3ac48 192630 misc optional
ca-certificates_20121114_all.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iQIVAwUBULZ+VocvcCxNbiWoAQIaTg//Y7vG3+9Yte2VdLK7KVkV+I3kTLiJqm01
Iu/A9mSt428GVqFDP7gHechug6zmvjOsXf4tgR6YEIWFUuTFyQw3vKT4y+1ogPZP
zriZu1d1Hd0Kf4LDVw+lTHk+5DnCnNZzUMeInqWctoMbvGr9E0vRzo168eAWEzqS
oIWHXL7xRzeFwxMBjKRIvlfDaAeqBNHQMQrClPYCRDa8kdfHPIRV6XdG/H6aJsVF
0j6QiGvcXkG20CKNAhnMTv2OPCiBqhV56JU9MJ1w6bxZd/ZDarO8ECgE7NdTtkxL
7isYnM2lvaSCXxoci2xSzrO/Lq0W5hDskwZT8975qCOixt3XRNo2KUBDEe8Qu5I6
SBXCaYaZjebJ3c4hq1Ozrb1gK9RMCdROdTUt7PlaPMfssGKhS1BV/YbV9x907ost
6iVXRc6+ZKlXTjx/rrTKKiNj04Do2M+OOgNq+So4Kr63u9xkDx+cZf7TlE1TkyZz
U0m/8PXqQDabZVF5c/XqlGWa0AcKbtIrWBG2DWBaXlDjr9oSiJQCwl3KlJf896gO
Y18gZLODggANiuAhg957+GEz7AN+N/dLa+h2Iu7xE04Wy4tzDuEdomS32BisvEdq
1ukhrLYSHi//2iy7B8XmxMfWSLcLeg9xb0mRzF41Bf4xTMhFZENWTxWrzZCrPQEv
1Q360P5JeXk=
=XONG
-----END PGP SIGNATURE-----
--- End Message ---