http://bugzilla.opensuse.org/show_bug.cgi?id=1195118 http://bugzilla.opensuse.org/show_bug.cgi?id=1195118#c6 Takashi Iwai <tiwai@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Component|Release Notes |Installation Assignee|sknorr@suse.com |yast2-maintainers@suse.de QA Contact|lubos.kocman@suse.com |jsrain@suse.com --- Comment #6 from Takashi Iwai <tiwai@suse.com> --- Hrm, then indeed there must be some flaw in the installation process or cert packaging script. I tried by myself and found the same problem. In the zypper log, I found the lines: 2022-02-09 10:10:54|install|perl-libwww-perl|6.31-1.17|noarch||openSUSE-Leap-15.3-2|625baf3b98a428ca87c6a00193c31bf9e9fb63dfd6e74766fff1068a61144aa1| # 2022-02-09 10:10:55 openSUSE-signkey-cert-20210302-lp153.1.1.x86_64.rpm installed ok # Additional rpm output: # Failed to get root password hash # Failed to import /etc/uefi/certs/BDD31A9E-kmp.crt I guess that's the culprit? The package %post invokes mokutil --import "$cert" --root-pw and it seems accessing /etc/shadow and co. (Reassigned back to category Installation) -- You are receiving this mail because: You are on the CC list for the bug.