[Bug 2043101] Re: Mantic+noble inadvertently includes the luks2 module in signed grub-efis
Steve Langasek
2043101 at bugs.launchpad.net
Tue Nov 28 04:36:15 UTC 2023
Hello Mate, or anyone else affected,
Accepted grub2-unsigned into mantic-proposed. The package will build now
and be available at
https://launchpad.net/ubuntu/+source/grub2-unsigned/2.12~rc1-10ubuntu4.1
in a few hours, and then in the -proposed repository.
Please help us by testing this new package. See
https://wiki.ubuntu.com/Testing/EnableProposed for documentation on how
to enable and use -proposed. Your feedback will aid us getting this
update out to other Ubuntu users.
If this package fixes the bug for you, please add a comment to this bug,
mentioning the version of the package you tested, what testing has been
performed on the package and change the tag from verification-needed-
mantic to verification-done-mantic. If it does not fix the bug for you,
please add a comment stating that, and change the tag to verification-
failed-mantic. In either case, without details of your testing we will
not be able to proceed.
Further information regarding the verification process can be found at
https://wiki.ubuntu.com/QATeam/PerformingSRUVerification . Thank you in
advance for helping!
N.B. The updated package will be released to -updates after the bug(s)
fixed by this package have been verified and the package has been in
-proposed for a minimum of 7 days.
** Description changed:
[ Impact ]
- * The luks2 module was accidentally enabled during a merge from Debian. This
- isn't intended to be a supported feature, and we should disable it before
- users accidentally start relying on it.
+ * The luks2 module was accidentally enabled during a merge from Debian. This
+ isn't intended to be a supported feature, and we should disable it before
+ users accidentally start relying on it.
- * Removing it early in the mantic cycle reduces the chance someone relies on
- it, and hence gets broken when upgrading to noble where it is already gone.
+ * Removing it early in the mantic cycle reduces the chance someone relies on
+ it, and hence gets broken when upgrading to noble where it is already gone.
[ Test Plan ]
- * Boot GRUB2 in Secure Boot mode and make sure LUKS2 is unavailable.
- (e.g. insmod luks2 should throw an error)
+ * Boot GRUB2 in Secure Boot mode and make sure LUKS2 is unavailable.
+ (e.g. insmod luks2 should throw an error)
[ Where problems could occur ]
- * If someone already managed to create a Mantic install with /boot on a LUKS2
- encrypted location, this update will break booting with Secure Boot on.
+ * If someone already managed to create a Mantic install with /boot on a LUKS2
+ encrypted location, this update will break booting with Secure Boot on.
- * However this was never a supported configuration, and this required
- deliberate manual effort to achieve.
+ * However this was never a supported configuration from any installer,
+ and this required deliberate manual effort to achieve.
** Changed in: grub2-unsigned (Ubuntu Mantic)
Status: Incomplete => Fix Committed
** Tags added: verification-needed verification-needed-mantic
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to grub2-unsigned in Ubuntu.
https://bugs.launchpad.net/bugs/2043101
Title:
Mantic+noble inadvertently includes the luks2 module in signed grub-
efis
Status in grub2-unsigned package in Ubuntu:
Fix Released
Status in grub2-unsigned source package in Mantic:
Fix Committed
Status in grub2-unsigned source package in Noble:
Fix Released
Bug description:
[ Impact ]
* The luks2 module was accidentally enabled during a merge from Debian. This
isn't intended to be a supported feature, and we should disable it before
users accidentally start relying on it.
* Removing it early in the mantic cycle reduces the chance someone relies on
it, and hence gets broken when upgrading to noble where it is already gone.
[ Test Plan ]
* Boot GRUB2 in Secure Boot mode and make sure LUKS2 is unavailable.
(e.g. insmod luks2 should throw an error)
[ Where problems could occur ]
* If someone already managed to create a Mantic install with /boot on a LUKS2
encrypted location, this update will break booting with Secure Boot on.
* However this was never a supported configuration from any
installer, and this required deliberate manual effort to achieve.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/grub2-unsigned/+bug/2043101/+subscriptions
More information about the foundations-bugs
mailing list