boot loader

Winsage
August 22, 2024
Microsoft is addressing issues from a security patch for a two-year-old vulnerability (CVE-2022-2601) in the GRUB open-source boot loader, which has caused crashes on dual-boot systems running Windows and Linux. The patch was intended to fix a buffer overflow vulnerability that could allow unauthorized access during system startup. Despite Microsoft's advisory stating that the latest Windows builds are not affected when using GRUB2, users reported problems booting their Linux distributions after the update. Microsoft acknowledged the issue and is working with Linux partners to resolve it. Users have shared workarounds, including disabling Secure Boot and deleting the SBAT policy. Separately, the US Cybersecurity and Infrastructure Security Agency (CISA) added the ProxyLogon vulnerability (CVE-2021-31196) in Microsoft Exchange Server to its Known Exploited Vulnerabilities Catalog, highlighting ongoing exploitation despite a patch released in July 2021.
Winsage
August 21, 2024
A recent Microsoft security update has caused booting issues for users of dual-boot systems running both Windows and Linux. The update, intended to fix a vulnerability in GRUB, was mistakenly applied to dual-boot systems, resulting in an error message: "something has gone seriously wrong." Affected Linux distributions include Debian, Linux Mint, Puppy Linux, Ubuntu, and Zorin OS. Users have been advised to temporarily disable secure boot to delete the problematic SBAT included in the update released on August 13, 2024, and then re-enable secure boot to restore functionality.
Winsage
August 21, 2024
Microsoft's recent security update has disrupted dual-boot systems running Windows and Linux by causing booting issues due to a patch for a vulnerability in the GRUB boot loader. Users are experiencing error messages like “security policy violation” and “something has gone seriously wrong” across various Linux distributions, including Ubuntu, Debian, and Linux Mint. The update was meant to enhance Secure Boot security, but it has led to boot failures for many users. A temporary workaround for Ubuntu users involves disabling Secure Boot in BIOS and executing a command to remove Microsoft's SBAT policy. Despite Secure Boot being a key security feature for Windows, it has vulnerabilities that may compromise its effectiveness. The situation highlights the need for better communication from Microsoft regarding the impact of their updates.
Winsage
August 21, 2024
Recent Windows updates rolled out on August 13 have caused booting issues for users of various Linux distributions, particularly affecting Ubuntu 24.04 LTS and its derivatives. The updates introduced security measures that block outdated boot loaders, specifically through the Secure Boot Advanced Targeting (SBAT) feature. This feature aims to address memory limitations in BIOS and recognizes when secure boot is compromised, leading to the failure of Linux boot loaders Shim and Grub. Only boot loaders from trusted sources, mainly Microsoft, can operate under Secure Boot. While the update does not apply to systems that dual boot Windows and Linux, reports indicate that Linux boot sticks may still be affected. Existing Linux installations on hard drives or SSDs will continue to function normally with the latest updates. Affected distributors will need to update their installation media, which may take several days, or users can disable Secure Boot, keeping in mind the need to document the Bitlocker recovery key to avoid issues with encrypted Windows installations.
Search