You have been subscribed to a public bug by Marc Deslauriers (mdeslaur):

Binary package hint: grub2

In clean installation of Ubuntu (and it's derivative KUbuntu) local users can 
get local root access to machine using Recovery Console. Also in Grub menu he 
can edit properties of be runned Ubuntu and also get local root access. We 
don't look at situation with no root password. But Grub menu entries and 
editing boot options should be password protected.
In particular, should be defined superuser in /etc/grub.d/10_headers and in 
/etc/grub.d/10_linux make change like this:

  if ${recovery} ; then
    title="$(gettext_quoted "%s, with Linux %s (recovery mode)")"
    printf "menuentry '${title}' ${CLASS} --users superman {\n" "${os}" 
"${version}"
  else
    title="$(gettext_quoted "%s, with Linux %s")"
    printf "menuentry '${title}' ${CLASS} {\n" "${os}" "${version}"
  fi
  
It is important for Ubuntu installations in, in particular, educational 
institutions, for protecting from vandals.
Also, password setting for Grub should be provided by installer and should be 
cli (and gui, possible) tools for changing Grub2 password.

** Affects: grub2 (Ubuntu)
     Importance: Undecided
         Status: New

-- 
Security issue in default installation
https://bugs.edge.launchpad.net/bugs/631315
You received this bug notification because you are a member of Ubuntu Bugs, 
which is a direct subscriber.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to