“Something has gone seriously wrong,” dual-boot systems warn after MS update
Microsoft's update to fix a GRUB vulnerability has caused boot failures in dual-boot systems, affecting Linux distributions like Debian and Ubuntu, while raising concerns about Secure Boot's reliability and security.
Read original articleA recent Microsoft update intended to address a significant vulnerability in the GRUB bootloader has inadvertently caused issues for many dual-boot systems running both Windows and Linux. Users began reporting boot failures with the error message, “Something has gone seriously wrong,” after the update was applied. The vulnerability, rated 8.6 out of 10 in severity, allowed potential bypassing of Secure Boot, a security feature designed to prevent malicious software from loading during startup. Despite Microsoft's assurances that the update would not affect dual-boot systems, it has rendered many devices unable to boot into Linux when Secure Boot is enabled. Affected distributions include popular ones like Debian, Ubuntu, and Linux Mint. Microsoft has not publicly acknowledged the issue or provided guidance for affected users, who are now seeking workarounds, such as disabling Secure Boot or deleting the newly implemented SBAT policy. This incident highlights ongoing concerns regarding the reliability of Secure Boot, which has faced multiple vulnerabilities in recent years, raising questions about its effectiveness in securing systems.
- Microsoft’s update intended to fix a GRUB vulnerability has caused boot failures in dual-boot systems.
- Users received error messages indicating a serious issue after the update was applied.
- The update affected various Linux distributions, including Debian and Ubuntu.
- Microsoft has not acknowledged the problem or provided solutions for affected users.
- The incident raises concerns about the security and reliability of Secure Boot technology.
Related
Microsoft says 8.5M systems hit by CrowdStrike BSOD, releases USB recovery tool
Microsoft addressed issues caused by a faulty CrowdStrike security update affecting 8.5 million Windows systems. A USB recovery tool was released to delete the problematic file, emphasizing the need for thorough update testing.
Secure Boot is completely broken on 200 models from 5 big device makers
Researchers from Binarly found that Secure Boot is compromised on over 200 device models due to a leaked cryptographic key, posing significant security risks until manufacturers issue firmware updates.
Compromising the Secure Boot Process
Researchers from Binarly revealed a security vulnerability in the Secure Boot process affecting over 200 device models due to a leaked cryptographic key, raising concerns about potential cyberattacks and security practices.
Tell HN: Microsoft SecureBoot "Breaking" Changes, Today's Milestone
Microsoft's Patch Tuesday updates KB5041585 and KB5041580 for Windows 10 and 11 fix boot issues with older Linux ISO images and automatically blacklist compromised SecureBoot keys, excluding dual-boot systems.
Dual-boot systems fail after Microsoft update
Microsoft's update to fix a GRUB vulnerability caused boot failures in dual-boot systems, affecting Linux distributions. Users reported issues, and Microsoft has not acknowledged or provided support for the problem.
Shim is really only required on Linux when dual-booting, and really only because the entire Trusted Computing Platform architecture is not user-centric and is designed around the needs of Microsoft more than any other entity. But because they at least paid lip-service to users, you have the ability to just eliminate Microsoft keys entirely on your system and go all-in on custom Secure Boot w/ Linux. I am hard-pressed to find a reason for any moderately technical user to still be running Windows in 2024, as most important productivity tools are primarily or at least optionally web-based, and Linux is significantly better in every other capacity.
Here's a good litmus test for a company we're considering joining: do at least their engineers (if not their PowerPoint+Excel biz people) use Linux for their laptops, not only for their servers? If they do use Linux, I'm just going to assert that they're likely more clueful than average.
Similar with startup hiring. Two options for this: (1) give a resume-screening boost to people who seem to have bought into Linux; or (2) announce in your job posts that the company pragmatically uses Linux for everything, to attract people who see that as clueful, and scare away a lot of others.
(Unfortunately, #2 also alienates some mostly-clueful people who really like Macs, and maybe even some clueful people who, through some cruel accident of history and gaming rigs, only know how to do Windows.)
(Actually, even more than Linux, I suspect that a startup using a BSD would probably be more technically clueful than the average Linux shop. Because some fringe tech seems to attracts the smartest and/or best-motivated techies disproportionately. But I'd say Linux is a sweeter spot overall for more startups.)
Might as well disable secure boot if that's not a concern, or make sure the boot loader is up to date if dual booting Windows 11. I can't imagine new machines shipping without SB.
Looking for certain files on a random partition? A list of distros and versions? A partition type? Anything seems to be error prone and likely to miss something.
I think it's obvious why Microsoft has only recent patched the issue: because Linux distros really lag behind on se curie issues like these. Hence the warning some people receive: they're still using a vulnerable boot configuration that was fixed two years ago.
In a similar vein, Microsoft waited a year before automatically releasing a secure boot related patch that affected Windows, so system administrators wouldn't be blindsided: https://msrc.microsoft.com/blog/2023/05/guidance-related-to-...
The impact of these patches is minor for most consumer devices, but for corporate environments where IT may need to go around entering Bitlocker recovery keys in some edge cases (and where recovery media needs to be made using a recent ISO or it won't work), people need a reasonable time to prepare.
get rid of secure boot, more problems solved
if you run Windows in 2024 you deserve all the misery you get
Related
Microsoft says 8.5M systems hit by CrowdStrike BSOD, releases USB recovery tool
Microsoft addressed issues caused by a faulty CrowdStrike security update affecting 8.5 million Windows systems. A USB recovery tool was released to delete the problematic file, emphasizing the need for thorough update testing.
Secure Boot is completely broken on 200 models from 5 big device makers
Researchers from Binarly found that Secure Boot is compromised on over 200 device models due to a leaked cryptographic key, posing significant security risks until manufacturers issue firmware updates.
Compromising the Secure Boot Process
Researchers from Binarly revealed a security vulnerability in the Secure Boot process affecting over 200 device models due to a leaked cryptographic key, raising concerns about potential cyberattacks and security practices.
Tell HN: Microsoft SecureBoot "Breaking" Changes, Today's Milestone
Microsoft's Patch Tuesday updates KB5041585 and KB5041580 for Windows 10 and 11 fix boot issues with older Linux ISO images and automatically blacklist compromised SecureBoot keys, excluding dual-boot systems.
Dual-boot systems fail after Microsoft update
Microsoft's update to fix a GRUB vulnerability caused boot failures in dual-boot systems, affecting Linux distributions. Users reported issues, and Microsoft has not acknowledged or provided support for the problem.