Bugzilla – Bug 808104
release notes: with crypted lvm in UEFI mode no /boot partition is proposed
Last modified: 2013-03-13 19:04:53 UTC
+++ This bug was initially created as a clone of Bug #808017 +++ This only affects installations in UEFI mode. In the partitioning proposal when checking the option to use lvm (which is required for full disk encryption) YaST does not create a separate /boot partition. That means the kernel and initrd end up in the (potentially encrypted) lvm container, inaccessible to the boot loader. To get full disk encryption when using UEFI the partitioning has to be done manually.
Fixed in SVN: 3.4. Crypted LVM in UEFI Mode Needs /boot Partition This only affects installations in UEFI mode. In the partitioning proposal when checking the option to use LVM (which is required for full disk encryption) YaST does not create a separate /boot partition. That means kernel and initrd end up in the (potentially encrypted) LVM container, inaccessible to the boot loader. To get full disk encryption when using UEFI, partitioning has to be done manually.
openSUSE-RU-2013:0449-1: An update that has 7 recommended fixes can now be installed. Category: recommended (important) Bug References: 804773,808104,808108,808111,808116,808595,808614 CVE References: Sources used: openSUSE 12.3 (src): release-notes-openSUSE-12.3.6-1.6.1