Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian....@packages.debian.org
Usertags: pu

Hey folks,

This is the current upstream version of grub2 (2.06), built for
bullseye as an upgrade path from 2.04-20. I know we normally don't
want to do this kind of thing, but I believe this is genuinely the
best way to keep on top of grub2 security issues.

Grub2 has had several sets of major security updates in the last couple
of years, particularly relevant in Secure Boot terms (BootHole et
al). Back before the bullseye release, Colin spent a *lot* of time
rebasing security fixes from GRUB 2.04 onto the 2.02 that we were
using in buster, and I know he was very worried about breaking some of
them and maybe introducing new holes. AFAICS it worked ok that time,
but...

We're now on to upstream 2.06 in unstable and bookworm, and that's
been the target for upstream hardening and patch work that's been
needed for the latest round of CVEs. There's also been a lot of code
scanning and static analysis done to find more issues before they
becoms CVE-worthy, and that's great!

There are some backported fixes to go into 2.04 and I've seen people
talking about 2.02 as well. *However*, I'm very worried that we don't
have the time and skills available to verify all the fixes against
three different upstream releases :-(.

The debdiff for the changes is way too large to include here. They're
obviously not minimal. If you really want to see it, look at [1].

I've tested locally on various machines using both UEFI and BIOS boot,
and all looks good here. The existing 2.06-3 package in bookworm that
I based on seems stable enough. The only real change I've made to that
(beyond usual backport noise) is to revert the change that disables
os-prober by default. I don't think that change is suitable for a
stable update.

[1] https://jack.einval.com/tmp/grub2_2.06-3~deb11u1.debdiff.gz


-- System Information:
Debian Release: 10.12
  APT prefers oldstable-updates
  APT policy: (500, 'oldstable-updates'), (500, 'oldstable-debug'), (500, 
'oldoldstable'), (500, 'oldstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.10.0-0.bpo.15-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_CPU_OUT_OF_SPEC, TAINT_WARN
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_GB:en (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Reply via email to