** Changed in: ca-certificates (Debian)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/854927
Title:
c_rehash creating bogus links to ca-certificates.crt
** Changed in: ca-certificates (Debian)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/854927
Title:
c_rehash creating bogus links to ca-certificates.crt
To manag
** Changed in: ca-certificates (Debian)
Status: Unknown => New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/854927
Title:
c_rehash creating bogus links to ca-certificates.crt
To manage noti
** Bug watch added: Debian Bug tracker #643667
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=643667
** Changed in: ca-certificates (Debian)
Importance: Undecided => Unknown
** Changed in: ca-certificates (Debian)
Status: New => Unknown
** Changed in: ca-certificates (Debian)
Rem
This bug was fixed in the package ca-certificates - 20110502+nmu1ubuntu5
---
ca-certificates (20110502+nmu1ubuntu5) oneiric; urgency=low
* Tweak postinst to not run update-ca-certificates multiple times and remove
dangerous plain c_rehash snippet; LP: #854927.
-- Loic Minier
I've sent a patch to Debian including Steve's changes to remove ca-
certificates.crt before running c_rehash in update-ca-certificates; will
set bug id once I have it.
** Changed in: ca-certificates (Ubuntu Oneiric)
Status: Triaged => Fix Committed
--
You received this bug notification be
While this wont happen with current ca-certificates, I think we should revert
the changes which caused this bug:
in Debian's 20110421 QA upload, a c_rehash call was added to postinst for
upgrades from versions <= 20090814+nmu3, this was an attempt to rebuild the
symlinks in /etc/ssl/certs, but b
Should be fixed by Loïc's recent change:
openssl (1.0.0e-2ubuntu2) oneiric; urgency=low
* Unapply patch c_rehash-multi and comment it out in the series as it breaks
parsing of certificates with CRLF line endings and other cases (see
Debian #642314 for discussion), it also changes the se
** Also affects: ca-certificates (Debian)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/854927
Title:
c_rehash creating bogus links to ca-certificates.crt
Whoops, I'm also unwell today and not thinking clearly. But in any case
HTTPS works too:
$ wget https://www.google.com
--2011-09-21 14:52:14-- https://www.google.com/
Resolving www.google.com... 209.85.147.147, 209.85.147.99, 209.85.147.103, ...
Connecting to www.google.com|209.85.147.147|:443..
What exactly are you trying to show Colin? You're connecting to http...
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/854927
Title:
c_rehash creating bogus links to ca-certificates.crt
To manage no
Is this really the entirety of the bug? With the new openssl but the
old ca-certificates, I ran:
$ sudo update-ca-certificates --fresh
...
$ ls -l /usr/lib/ssl/certs/55a10908.0
lrwxrwxrwx 1 root root 19 2011-09-21 13:27 /usr/lib/ssl/certs/55a10908.0 ->
ca-certificates.crt
$ curl -sS http
Following up on the irc comment that Steve Langasek pasted, I can
confirm that reverting the patch http://bazaar.launchpad.net/~ubuntu-
branches/ubuntu/oneiric/openssl/oneiric/revision/58#debian/patches
/c_rehash-multi.patch followed by update-ca-certificates --fresh
(without the workaround Steve a
This bug was fixed in the package ca-certificates - 20110502+nmu1ubuntu2
---
ca-certificates (20110502+nmu1ubuntu2) oneiric; urgency=low
* Really only call --fresh on upgrade, instead of all the time; thanks to
Adam Conrad for catching this in the queue.
ca-certificates (201105
14 matches
Mail list logo