[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#976094: buster-pu: package grub2/2.02+dfsg1-20+deb10u3



Hi Colin

On Sun, Nov 29, 2020 at 04:57:08PM +0000, Colin Watson wrote:
> Package: release.debian.org
> Severity: normal
> Tags: buster
> User: release.debian.org@packages.debian.org
> Usertags: pu
> 
> Following the security updates in July for the "BootHole" set of
> vulnerabilities, we had a number of reports of failures to boot after
> the upgrade.  These weren't fundamentally a new problem, in that we've
> always had a smattering of such reports after GRUB kernel/module ABI
> changes, but it's obviously problematic for affected users and it
> creates a considerable distraction from trying to work out whether the
> security update itself is in fact OK, so I'd like to attempt to improve
> the situation in stable.
> 
> The attached patch is a set of backports from unstable, partly by me and
> partly from similar attempts to improve upgrade reliability in Ubuntu,
> thanks to Dimitri John Ledkov.  I also needed to backport a patch from
> GRUB 2.04 which it turns out Dimitri's patch was implicitly relying on,
> since otherwise some of our self-tests failed.
> 
> I've targeted this at buster, but I can send it to buster-security
> instead if people feel that's more appropriate.

In my opinion targetting it via a point release is is right here as
those are basically not new issues introduced by the last updates and
scheduling it in the point releases make it possible to batch it
together with other updates which would nedd a reboot anyway (usually
there is a rebase of the kernel as well at such times).

Unfortunately 29th november was just a bit tight for the 10.7 point
release.

Regards,
Salvatore


Reply to: