Your message dated Wed, 23 Jan 2019 02:38:55 +0000
with message-id <e1gm8rl-000edl...@fasolo.debian.org>
and subject line Bug#895482: fixed in ca-certificates 20190110
has caused the Debian Bug report #895482,
regarding Fails to upgrade: installed ca-certificates package post-installation
script subprocess returned error exit status 4
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
895482: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=895482
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: ca-certificates
Version: 20180409
Severity: serious
Upgrading ca-certificates from 20170717 to 20180409 fails for me as
follows on one machine:
Before unpacking, I have been shown this dialog, which I acknowledged
by pressing enter:
┌────────────────────────┤ ca-certificates configuration
├─────────────────────────┐
│ During upgrades, new certificates will be added. Please choose
those you trust. │
│
│
│ New certificates to activate:
│
│
│
│ [ ] mozilla/GDCA_TrustAUTH_R5_ROOT.crt
│
│ [ ] mozilla/SSL.com_EV_Root_Certification_Authority_ECC.crt
│
│ [ ] mozilla/SSL.com_EV_Root_Certification_Authority_RSA_R2.crt
│
│ [ ] mozilla/SSL.com_Root_Certification_Authority_ECC.crt
│
│ [ ] mozilla/SSL.com_Root_Certification_Authority_RSA.crt
│
│ [ ] mozilla/TrustCor_ECA-1.crt
│
│ [ ] mozilla/TrustCor_RootCert_CA-1.crt
│
│ [ ] mozilla/TrustCor_RootCert_CA-2.crt
│
│
│
│
│
│ <Ok>
│
│
│
└──────────────────────────────────────────────────────────────────────────────────┘
Unpacking went fine:
Preparing to unpack .../04-ca-certificates_20180409_all.deb ...
Unpacking ca-certificates (20180409) over (20170717) ...
The first as well as the second try to configure ca-certificates
failed identically:
Setting up ca-certificates (20180409) ...
Updating certificates in /etc/ssl/certs...
W: /usr/share/ca-certificates/mozilla/AddTrust_Public_Services_Root.crt not
found, but listed in /etc/ca-certificates.conf.
W: /usr/share/ca-certificates/mozilla/AddTrust_Qualified_Certificates_Root.crt
not found, but listed in /etc/ca-certificates.conf.
W: /usr/share/ca-certificates/mozilla/UTN_USERFirst_Hardware_Root_CA.crt not
found, but listed in /etc/ca-certificates.conf.
W: /usr/share/ca-certificates/mozilla/DST_ACES_CA_X6.crt not found, but listed
in /etc/ca-certificates.conf.
rehash: skipping DST_ACES_CA_X6.pem, cannot open file
rehash: skipping AddTrust_Qualified_Certificates_Root.pem, cannot open file
rehash: skipping UTN_USERFirst_Hardware_Root_CA.pem, cannot open file
rehash: skipping AddTrust_Public_Services_Root.pem, cannot open file
dpkg: error processing package ca-certificates (--configure):
installed ca-certificates package post-installation script subprocess returned
error exit status 4
[…]
Errors were encountered while processing:
ca-certificates
[…]
E: Sub-process /usr/bin/dpkg returned an error code (1)
[…]
Setting up ca-certificates (20180409) ...
Updating certificates in /etc/ssl/certs...
W: /usr/share/ca-certificates/mozilla/AddTrust_Public_Services_Root.crt not
found, but listed in /etc/ca-certificates.conf.
W: /usr/share/ca-certificates/mozilla/AddTrust_Qualified_Certificates_Root.crt
not found, but listed in /etc/ca-certificates.conf.
W: /usr/share/ca-certificates/mozilla/UTN_USERFirst_Hardware_Root_CA.crt not
found, but listed in /etc/ca-certificates.conf.
W: /usr/share/ca-certificates/mozilla/DST_ACES_CA_X6.crt not found, but listed
in /etc/ca-certificates.conf.
rehash: skipping DST_ACES_CA_X6.pem, cannot open file
rehash: skipping AddTrust_Qualified_Certificates_Root.pem, cannot open file
rehash: skipping UTN_USERFirst_Hardware_Root_CA.pem, cannot open file
rehash: skipping AddTrust_Public_Services_Root.pem, cannot open file
dpkg: error processing package ca-certificates (--configure):
installed ca-certificates package post-installation script subprocess returned
error exit status 4
Errors were encountered while processing:
ca-certificates
On other sid installations (including architectures amd64, i386 and
armhf), the upgrade worked fine, despite most (if not all) of my
systems have similar ca-certificates settings, namely
"ca-certificates/trust_new_crts: ask" and just a few CAs
selected. It's though very likely that the actual list of CAs differs
from installation to installation as I enabled further ones per
machine as needed.
-- System Information:
Debian Release: buster/sid
APT prefers unstable
APT policy: (990, 'unstable'), (600, 'testing'), (500, 'unstable-debug'),
(500, 'buildd-unstable'), (110, 'experimental'), (1, 'experimental-debug'), (1,
'buildd-experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Kernel: Linux 4.14.0-3-amd64 (SMP w/4 CPU cores)
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE=C.UTF-8
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)
LSM: AppArmor: enabled
Versions of packages ca-certificates depends on:
ii debconf [debconf-2.0] 1.5.66
ii openssl 1.1.0h-2
ca-certificates recommends no packages.
ca-certificates suggests no packages.
-- debconf information:
ca-certificates/new_crts:
ca-certificates/title:
* ca-certificates/enable_crts: CAcert/class3.crt, CAcert/root.crt,
mozilla/AddTrust_External_Root.crt, mozilla/AddTrust_Public_Services_Root.crt,
mozilla/AddTrust_Qualified_Certificates_Root.crt, mozilla/DST_ACES_CA_X6.crt,
mozilla/DST_Root_CA_X3.crt, mozilla/Deutsche_Telekom_Root_CA_2.crt,
mozilla/DigiCert_Assured_ID_Root_CA.crt, mozilla/DigiCert_Global_Root_CA.crt,
mozilla/DigiCert_High_Assurance_EV_Root_CA.crt, mozilla/GeoTrust_Global_CA.crt,
mozilla/GlobalSign_ECC_Root_CA_-_R4.crt,
mozilla/GlobalSign_ECC_Root_CA_-_R5.crt, mozilla/GlobalSign_Root_CA.crt,
mozilla/GlobalSign_Root_CA_-_R2.crt, mozilla/GlobalSign_Root_CA_-_R3.crt,
mozilla/Go_Daddy_Class_2_CA.crt,
mozilla/Go_Daddy_Root_Certificate_Authority_-_G2.crt,
mozilla/QuoVadis_Root_CA.crt, mozilla/QuoVadis_Root_CA_1_G3.crt,
mozilla/QuoVadis_Root_CA_2.crt, mozilla/QuoVadis_Root_CA_2_G3.crt,
mozilla/QuoVadis_Root_CA_3.crt, mozilla/QuoVadis_Root_CA_3_G3.crt,
mozilla/Staat_der_Nederlanden_Root_CA_-_G2.crt,
mozilla/SwissSign_Gold_CA_-_G2.crt, mozilla/SwissSign_Silver_CA_-_G2.crt,
mozilla/USERTrust_ECC_Certification_Authority.crt,
mozilla/USERTrust_RSA_Certification_Authority.crt,
mozilla/UTN_USERFirst_Hardware_Root_CA.crt,
mozilla/VeriSign_Class_3_Public_Primary_Certification_Authority_-_G4.crt,
mozilla/VeriSign_Class_3_Public_Primary_Certification_Authority_-_G5.crt,
mozilla/VeriSign_Universal_Root_Certification_Authority.crt,
mozilla/Verisign_Class_3_Public_Primary_Certification_Authority_-_G3.crt,
* ca-certificates/trust_new_crts: ask
--- End Message ---
--- Begin Message ---
Source: ca-certificates
Source-Version: 20190110
We believe that the bug you reported is fixed in the latest version of
ca-certificates, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 895...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Michael Shuler <mich...@pbandjelly.org> (supplier of updated ca-certificates
package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Thu, 10 Jan 2019 19:31:31 -0600
Source: ca-certificates
Binary: ca-certificates ca-certificates-udeb
Architecture: source all
Version: 20190110
Distribution: unstable
Urgency: high
Maintainer: Michael Shuler <mich...@pbandjelly.org>
Changed-By: Michael Shuler <mich...@pbandjelly.org>
Description:
ca-certificates - Common CA certificates
ca-certificates-udeb - Common CA certificates - udeb (udeb)
Closes: 895473 895482 911303 916833
Changes:
ca-certificates (20190110) unstable; urgency=high
.
* debian/control:
Depend on openssl (>= 1.1.1).
Set Standards-Version: 4.3.0.1.
Set Build-Depends: debhelper-compat (= 12); drop d/compat
Remove trailing whitespace from d/changelog.
* debian/ca-certificates.postinst:
Fix permissions on /usr/local/share/ca-certificates when using symlinks.
Closes: #916833
* sbin/update-ca-certificates:
Remove orphan symlinks found in /etc/ssl/certs to prevent `openssl
rehash` from exiting with an error. Closes: #895482, #895473
This will also fix removal of user CA certificates from /usr/local without
needing to run --fresh. Closes: #911303
* mozilla/{certdata.txt,nssckbi.h}:
Update Mozilla certificate authority bundle to version 2.28.
The following certificate authorities were added (+):
+ "GlobalSign Root CA - R6"
+ "OISTE WISeKey Global Root GC CA"
The following certificate authorities were removed (-):
- "Certplus Root CA G1"
- "Certplus Root CA G2"
- "OpenTrust Root CA G1"
- "OpenTrust Root CA G2"
- "OpenTrust Root CA G3"
- "TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H5"
- "Visa eCommerce Root"
Checksums-Sha1:
9313a30f8c26430fdd1650aa356fa15fa1ba9522 1805 ca-certificates_20190110.dsc
47d4584eae85fc905e4994766eb3930a8a84e2e1 243472 ca-certificates_20190110.tar.xz
c1c6b7943359ef689dc1c9b602a4f60d5c536bee 116708
ca-certificates-udeb_20190110_all.udeb
282c2431137d6b5696dbea4c1b41ca57dbd1a09d 156920
ca-certificates_20190110_all.deb
e152d4fd58742bc255fb20050415212b8e8f136f 6138
ca-certificates_20190110_amd64.buildinfo
Checksums-Sha256:
bffbfe63a1ad2a07c6094502f05899c65edba93aefe58682f440e000fc65f6f0 1805
ca-certificates_20190110.dsc
ee4bf0f4c6398005f5b5ca4e0b87b82837ac5c3b0280a1cb3a63c47555c3a675 243472
ca-certificates_20190110.tar.xz
f83d4d141c8a08d4ac5a3beae67b5ec7d09190aa533a57a59513c1344b4ad2d9 116708
ca-certificates-udeb_20190110_all.udeb
f55f88c8cc8fe014fa931fa22eae763fb12771e2b2a04a07bba5e4fdf3a3da6c 156920
ca-certificates_20190110_all.deb
927ecb8a4c04b9228234bb603952b86e9502f2362ed2d0ffee9f6b9487d1df0e 6138
ca-certificates_20190110_amd64.buildinfo
Files:
e1b3a61d2ae8fd7bc833e9c4bcae5f13 1805 misc optional
ca-certificates_20190110.dsc
e91d3d9259127ba2dbb65fda58d73f31 243472 misc optional
ca-certificates_20190110.tar.xz
53420cffab0b76b848af0e348698f484 116708 debian-installer optional
ca-certificates-udeb_20190110_all.udeb
e19d56b1ec337f0841c8af944b509537 156920 misc optional
ca-certificates_20190110_all.deb
d45ce8387a59b51158659067db8115fb 6138 misc optional
ca-certificates_20190110_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=RRTi
-----END PGP SIGNATURE-----
--- End Message ---