UbuntuUpdates.org

Package "grub2"




Name: grub2

Description:

GRand Unified Bootloader, version 2 (dummy package)

Latest version: *DELETED*
Release: bionic (18.04)
Level: proposed
Repository: universe
Homepage: http://www.gnu.org/software/grub/

Links

Save this URL for the latest version of "grub2": https://www.ubuntuupdates.org/grub2


Download "grub2"


Other versions of "grub2" in Bionic

Repository Area Version
base main 2.02-2ubuntu8
base universe 2.02-2ubuntu8
updates universe 2.02-2ubuntu8.12
updates main 2.02-2ubuntu8.12
PPA: Mint upstream 2.02~beta2-36ubuntu3.9+linuxmint1
PPA: Mint upstream 2.02~beta2-36ubuntu3.14+linuxmint1

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: *DELETED* 2019-02-11 02:06:24 UTC
No changelog for deleted or moved packages.

Version: 2.02-2ubuntu8.12 2019-02-08 01:07:45 UTC

  grub2 (2.02-2ubuntu8.12) bionic; urgency=medium

  * debian/grub-check-signatures: make sure grub-check-signatures conserves
    its execute bit.

Source diff to previous version

Version: 2.02-2ubuntu8.11 2019-02-07 22:07:28 UTC

  grub2 (2.02-2ubuntu8.11) bionic; urgency=medium

  [ Mathieu Trudel-Lapierre ]
  * debian/grub-check-signatures: properly account for DB showing as empty on
    some broken firmwares: Guard against mokutil --export --db failing, and do
    a better job at finding the DER certs for conversion to PEM format.
    (LP: #1814575)
  * debian/patches/linuxefi_disable_sb_fallback.patch: Disallow unsigned
    kernels if UEFI Secure Boot is enabled. If UEFI Secure Boot is enabled
    and kernel signature verification fails, do not boot the kernel. Patch
    from Linn Crosetto. (LP: #1401532)

  [ Steve Langasek ]
  * debian/patches/quick-boot-lvm.patch: checking the return value of
    'lsefi' when the command doesn't exist does not do what's expected, so
    instead check the value of $grub_platform which is simpler anyway.
    LP: #1814403.

 -- Mathieu Trudel-Lapierre <email address hidden> Tue, 05 Feb 2019 12:26:27 -0500

1814575 Updates failing because \
1401532 GRUB's Secure Boot implementation loads unsigned kernel without warning
1814403 Latest update causes 30 sec. menu delay timeout

Version: *DELETED* 2019-01-31 20:07:23 UTC
No changelog for deleted or moved packages.

Version: 2.02-2ubuntu8.10 2019-01-22 23:06:18 UTC

  grub2 (2.02-2ubuntu8.10) bionic; urgency=medium

  [ Mathieu Trudel-Lapierre ]
  * debian/grub-check-signatures: check kernel signatures against keys known
    in firmware, in case a kernel is signed but not using a key that will pass
    validation, such as when using kernels coming from a PPA. (LP: #1789918)
  * debian/patches/mkconfig_leave_breadcrumbs.patch: make sure grub-mkconfig
    leaves a trace of what files were sourced to help generate the config
    we're building. (LP: #1812863)

  [ Steve Langasek ]
  * debian/patches/quick-boot-lvm.patch: If we don't have writable
    grubenv and we're on EFI, always show the menu. Closes LP: #1800722.

 -- Mathieu Trudel-Lapierre <email address hidden> Wed, 09 Jan 2019 14:04:09 -0500

1789918 grub2 signed kernel enforcement doesn't check on upgrade that signatures are from trusted keys
1812863 No way to debug grub.cfg generation
1800722 EFI booting + /boot on LVM == inaccessible boot menu



About   -   Send Feedback to @ubuntu_updates