Crimson Hat and CentOS programs aren’t booting because of BootHole patches

A cartoon worm erupts from a computer chip.

Enlarge / Safety updates meant to patch the BootHole UEFI vulnerability are rendering some Linux programs unable in addition in any respect. (credit score: Aurich Lawson)

Early this morning, an pressing bug confirmed up at Crimson Hat’s bugzilla bug tracker—a person found that the RHSA_2020:3216 grub2 safety replace and RHSA-2020:3218 kernel safety replace rendered an RHEL 8.2 system unbootable. The bug was reported as reproducible on any clear minimal set up of Crimson Hat Enterprise Linux 8.2.

The patches have been meant to shut a newly found vulnerability within the GRUB2 boot supervisor known as BootHole. The vulnerability itself left a technique for system attackers to doubtlessly set up “bootkit” malware on a Linux system regardless of that system being protected with UEFI Safe Boot.

RHEL and CentOS

Sadly, Crimson Hat’s patch to GRUB2 and the kernel, as soon as utilized, are leaving patched programs unbootable. The problem is confirmed to have an effect on RHEL 7.Eight and RHEL 8.2, and it could have an effect on RHEL 8.1 and seven.9 as effectively. RHEL-derivative distribution CentOS can be affected.

Learn 6 remaining paragraphs | Feedback

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *