pwshub.com

Microsoft security update breaks dual-boot Linux systems using Secure Boot

Serving tech enthusiasts for over 25 years.
TechSpot means tech analysis and advice you can trust.

Facepalm: Microsoft recently released its latest batch of monthly security updates for Windows and other software products. However, a bug fix designed to address a Secure Boot vulnerability discovered two years ago is causing issues for Linux users, rendering dual-boot configurations unbootable.

Microsoft's Patch Tuesday for August 2024 includes a fix for a security vulnerability in the Grub2 boot loader, which is used by many Linux operating systems. Tracked as CVE-2022-2601, this flaw, discovered in 2022, could lead to an out-of-bounds write with a potential bypass of Secure Boot protection.

The Grub2 boot loader provides compatibility with the Secure Boot technology on PCs running Linux systems. After installing the new patch, Windows applies a Secure Boot Advanced Targeting (SBAT) policy to block vulnerable Linux boot loaders that could compromise OS security.

Microsoft explained that the SBAT value would not be applied to dual-boot systems with both Windows and Linux on the boot drive, so the patch was expected not to impact these systems. However, many users with dual-boot configurations have reported that the CVE-2022-2601 update still rendered booting into a Linux OS impossible.

The issue appears to affect various Linux distributions, including popular ones such as Ubuntu, Linux Mint, Zorin OS, Puppy Linux, and others. Affected systems typically display a "Security Policy Violation" error at boot, indicating a failed check on "shim SBAT data." Boot problems have been reported on both dual-boot systems and on Windows devices running Linux from an ISO image, USB drive, or optical media.

Microsoft's bulletin noted that only older Linux distros' ISOs were expected to experience boot issues following the CVE-2022-2601 patch. However, users with systems released in 2024 also seem to be affected. The only reliable way to restore a bootable state appears to be disabling Secure Boot entirely. Alternatively, users can follow the steps to remove the SBAT policy introduced by Microsoft this past week.

Secure Boot has long been a point of contention in the Linux community. Designed to protect Windows PCs from rootkits and sophisticated attacks, this technology has introduced significant compatibility issues with Linux, while offering minimal protection against real-world malware or for the Windows ecosystem as a whole.

Source: techspot.com

Related stories
1 week ago - CISA wants you to leap on Citrix and Ivanti issues. Adobe, Intel, SAP also bid for patching priorities Patch Tuesday Another Patch Tuesday has dawned, as usual with the unpleasant news that there are pressing security weaknesses and...
2 weeks ago - Grab the last of the Labor Day deals on Apple products, outdoor gear and more before they're gone.
1 month ago - Now there's an idea – parsing config data in user mode Updated  Microsoft has vowed to reduce cybersecurity vendors' reliance on kernel-mode code, which was at the heart of the CrowdStrike super-snafu this month.…
2 weeks ago - There's a new method hackers are using to exploit Windows devices, which can expose numerous old vulnerabilities to allow them to take full control of your system.
1 month ago - And boy, did last Friday's Windows fiasco ever prove that yet again Opinion CrowdStrike's recent Windows debacle will surely earn a prominent place in the annals of epic tech failures. On July 19, the cybersecurity giant accomplished what...
Other stories
8 minutes ago - Write better code, urges Jen Easterly. And while you're at it, give crime gangs horrible names like 'Evil Ferret' Software developers who ship buggy, insecure code are the real villains in the cyber crime story, according to Jen Easterly,...
47 minutes ago - The Indian government has approved $2.7 billion in new spending for its space program.
47 minutes ago - heard you like apps — Windows App replaces Microsoft Remote Desktop on macOS, iOS, and Android. Enlarge / The...
47 minutes ago - LinkedIn limits opt-outs to future training, warns AI models may spout personal data.
47 minutes ago - BUSTED — iServer provided a simple service for phishing credentials to unlock phones. Getty Images ...