Verification-failed on trusty:
ii grub-common 2.02~beta2-9ubuntu1.17
amd64 GRand Unified Bootloader (common files)
ii grub-efi-amd64 2.02~beta2-9ubuntu1.17
amd64 GRand Unified Bootloader, version 2 (EFI-AMD64
version)
ii grub-efi-amd64-bin 2.02~beta2-9ubuntu1.17
amd64 GRand Unified Bootloader, version 2 (EFI-AMD64
binaries)
ii grub-efi-amd64-signed 1.34.19+2.02~beta2-9ubuntu1.17
amd64 GRand Unified Bootloader, version 2 (EFI-AMD64
version, signed)
ii grub-legacy-ec2 0.7.5-0ubuntu1.23
all Handles update-grub for ec2 instances
ii grub-pc-bin 2.02~beta2-9ubuntu1.17
amd64 GRand Unified Bootloader, version 2 (PC/BIOS
binaries)
ii grub2-common 2.02~beta2-9ubuntu1.17
amd64 GRand Unified Bootloader (common files for
version 2)
Kernel signatures are correctly enforced, but a postinst check is
missing in grub2-signed to check signatures before applying the next
update (missing in grub2-signed 1.34.19)
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
** Tags removed: verification-done-trusty
** Tags added: verification-failed-trusty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1401532
Title:
GRUB's Secure Boot implementation loads unsigned kernel without
warning
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1401532/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs