package linux-image-2.6.31-20-386 2.6.31-20.58 failed to install/upgrade: subprocess installed post-installation script returned error exit status 2
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
initramfs-tools (Ubuntu) |
Confirmed
|
Undecided
|
Unassigned |
Bug Description
Binary package hint: initramfs-tools
I updated my Ubuntu 9.1 and in the grub it shows two normal boot options namely Ubuntu 9.1and ubuntu 2.6.31-20 and recovery mode of both but i can't boot from the updated grub. it boots only from the older grub option. when i tried to boot from the updated grub option this error message is displayed.
"Kernel panic not syncing" followed by some other datas. recently i updated the software packages and then there is a option which says it can be marked for installation. i downloaded the file but during the installation process it became stuck. nothing is being installed. after that i tried installing the linux image using terminal. but it also get stuck.
now the result is that i can't install any of the software which is supported by ubuntu and i can't access to the synaptic package manager.
when i try to access the synaptic package manager it shows the error message as shown below
E: dpkg was interrupted, you must manually run 'sudo dpkg --configure -a' to correct the problem.
E: _cache->open() failed, please report.
ProblemType: Package
Architecture: i386
Date: Wed Mar 31 08:44:47 2010
DistroRelease: Ubuntu 9.10
ErrorMessage: subprocess installed post-installation script returned error exit status 2
InstallationMedia: Ubuntu 9.10 "Karmic Koala" - Release i386 (20091028.5)
NonfreeKernelMo
Package: linux-image-
ProcVersionSign
SourcePackage: initramfs-tools
Title: package linux-image-
Uname: Linux 2.6.31-14-generic i686
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find.