TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Grub2 security update renders system unbootable

134 pointsby beefhashalmost 5 years ago

15 comments

peterialmost 5 years ago
I assume this is related to this from yesterday <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=23990075" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=23990075</a> Which is about revoking secure boot keys
Wowfunhappyalmost 5 years ago
There was a story on HN last night from Debian where they laid out this issue, and basically stated &quot;Yes, this security update is going to render some systems unbootable, here is why we&#x27;re doing it anyway.&quot;<p><a href="https:&#x2F;&#x2F;www.debian.org&#x2F;security&#x2F;2020-GRUB-UEFI-SecureBoot&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.debian.org&#x2F;security&#x2F;2020-GRUB-UEFI-SecureBoot&#x2F;</a><p>Stability is important, especially when it comes to unbootable machines—but I don&#x27;t quite know what anyone was supposed to do here. If a user has secure boot enabled, the OS has to assume that the user wants&#x2F;needs security at that level of the chain—and it is therefor responsible for ensuring the chain&#x27;s integrity. In this case, there was no way to do that without some machines (temporarily) failing to boot.<p>What would have been a better way to handle this?
评论 #24000798 未加载
评论 #24003082 未加载
评论 #24000493 未加载
kd913almost 5 years ago
I will state the same comment as last time.<p>Can distros maybe consider moving to systemd-boot at some point? Systemd is already built in and can handle things like mounting pretty easily and simply.<p>It is a hell of a lot leaner than grub, doesn&#x27;t use a billion superfluous modules. That and it is a lot easier to prevent tampering compared with the cumbersome nonsense that is grub passwords.<p>Oh and it enables distros to gather accurate boot times and enables booting into UEFI direct from the desktop.<p>It works with secureboot&#x2F;shim&#x2F;Hashtool. Also each distro has it&#x27;s bootloader entries in separate folders to avoid accidental conflicts.
评论 #24000097 未加载
评论 #24000140 未加载
评论 #23999928 未加载
评论 #24003068 未加载
jacquesmalmost 5 years ago
If you are wondering why many people <i>hate</i> updating working systems, no matter what the security implications, look no further than this.<p>Time and again it is an innocent security update that would end up in a reinstall, finding a bunch of bloat ware on a system, losing critical functionality, data loss and time lost.<p>Updates should be restricted to the absolute minimum and tested to the point that deploying them does not put customer data at risk.
评论 #24000291 未加载
评论 #24000755 未加载
评论 #24001445 未加载
评论 #23999807 未加载
评论 #24000310 未加载
评论 #24000001 未加载
评论 #24000056 未加载
评论 #24001140 未加载
znpyalmost 5 years ago
The stablest systems I had the pleasure to manage were two identical rhel6 clusters into different geographical locations for higher availability and fault tolerance. Such systems were installed, turned on and never touched again. Kernel 2.6.32 that managed about six-seven years of uptime up to mid-2019. We operated a lot onto such systems, mounting and unmounting iscsi devices, starting and stopping stuff, turning on and off network interfaces and clustered filesystem (thanks to Veritas cluster manager).<p>The key move was never updating.<p>Such systems were literally mission critical, without that cluster the whole company was unable to produce its main products.<p>Considering how much stuff they ran and how many simultaneous users were connected, I was humbled by their stability (and by rhel&#x27;s stability).<p>If you&#x27;re getting angry at this post: the customer was not in the it field and was completely okay with buying new hardware and doing a full reinstall every X years.
评论 #24001249 未加载
psanfordalmost 5 years ago
The link is to a redhat bug report, but the issue is also affecting other distros: <a href="https:&#x2F;&#x2F;bugs.launchpad.net&#x2F;ubuntu&#x2F;+source&#x2F;grub2&#x2F;+bug&#x2F;1889509" rel="nofollow">https:&#x2F;&#x2F;bugs.launchpad.net&#x2F;ubuntu&#x2F;+source&#x2F;grub2&#x2F;+bug&#x2F;1889509</a>
awillalmost 5 years ago
This is why I dislike grub. It&#x27;s really, really bloated. A bootloader just needs to pick the partition to boot, and little else. I switched to gummiboot ages ago, and it&#x27;s so simple. There&#x27;s far less to go wrong (gummiboot got absorbed by systemd, so it&#x27;s now called systemd-boot)
protomythalmost 5 years ago
Am I reading this correctly that &quot;yum update&quot; is all I have to do to screw up an 8.2 minimal install?
评论 #24000870 未加载
jkingsberyalmost 5 years ago
&quot;This update enhances security by making the system unbootable, which is the most secure a computer can be.&quot;
bjornedstromalmost 5 years ago
After reading this I decided to downgrade my Ubuntu machine for now until it&#x27;s figured out. There are instructions here: <a href="https:&#x2F;&#x2F;wiki.ubuntu.com&#x2F;SecurityTeam&#x2F;KnowledgeBase&#x2F;GRUB2SecureBootBypass" rel="nofollow">https:&#x2F;&#x2F;wiki.ubuntu.com&#x2F;SecurityTeam&#x2F;KnowledgeBase&#x2F;GRUB2Secu...</a> under the heading &quot;DOWNGRADE `GRUB2`&#x2F;`GRUB2-SIGNED` TO THE PREVIOUS VERSION FOR RECOVERY&quot;<p>Under the heading is a small shell script that will download the old debs for you. Note that for it to work and not have wget spam 404:s, you have to update the entire GRUB2_LP_URL and GRUB2_SIGNED_LP_URL to the links in the little table. At first glance it looks like you only have to change GRUB2_VERSION and GRUB2_SIGNED_VERSION.
RedShift1almost 5 years ago
Grub2 is not a bootloader. I&#x27;m not even really sure what it is. In Grub 1 you had a configuration file with the operating systems you wanted to boot. Simple, effective. With grub2 all I&#x27;m seeing is a bunch of sh scripts that are impossible to write by hand.
tmikaeldalmost 5 years ago
Again? I remember when zfs didn&#x27;t init in time so grub found no root. It was fun panic when it&#x27;s on a virtualization server..
sgtalmost 5 years ago
On this subject, a few months ago I had Ubuntu servers suddenly failing due to a bizarre automatic snap update that basically took most of our Docker containers down. Did anyone experience this with production systems?
wtracyalmost 5 years ago
Any word on whether the equivalent update on Debian has similar issues?
评论 #24000062 未加载
gojomoalmost 5 years ago
Well, a system that can&#x27;t be booted is totally secure against many kinds of remote &amp; local attacks. So, &quot;mission accomplished&quot;, I guess?