#grub2

2025-05-05

Laptop only recognizes bootable USB in Legacy but not UEFI? #boot #grub2 #uefi

askubuntu.com/q/1547141/612

2025-05-05

Full_Disk_Encryption_Howto_2019 fails at installing grub #boot #partitioning #grub2 #encryption #externalhdd

askubuntu.com/q/1547120/612

Patrick Wu :neocat_flag_bi:patrick@o0o.social
2025-05-01

Fedora 42 is kinda messing with my mind right now... the GRUB2 entry all become "Fedora Linux 42 (Workstation Edition)" without Kernel version... After some investigation, realized on line 192 in `/usr/lib/kernel/install.d/90-loaderentry.install`, for all kernel entries generated to /boot/loader/entries/, it only uses $PRETTY_NAME from /etc/os-release for $title while GRUB2 loads only the $title... after modifying the title, it finally went normal...

#linux #fedora #grub2 #grub

2025-05-01

Dual booting of Windows 11 pro and Ubuntu #dualboot #grub2 #windows11

askubuntu.com/q/1546889/612

2025-04-25

Free space in boot partition while installing updates/ Failed to install grub #dualboot #grub2 #updates #bootpartition

askubuntu.com/q/1546504/612

2025-04-25

Ubuntu 20.04.6 no longer going to login screen after updates #boot #dualboot #grub2 #gui #loginscreen

askubuntu.com/q/1546484/612

2025-04-25

Boot issues after installing OpenMediaVault – lost GRUB, can't access anything, getting rid of old SSD #grub2 #mint

askubuntu.com/q/1546475/612

2025-04-25

Not able to boot into Windows after Ubuntu update (Dualboot) #boot #dualboot #grub2 #uefi #windows

askubuntu.com/q/1546473/612

2025-04-07

Security Week 2515: уязвимости в загрузчике GRUB2

На прошлой неделе компания Microsoft отчиталась об обнаружении 11 уязвимостей в загрузчике GRUB2 с открытым исходным кодом. Мотивацией для Microsoft проанализировать опенсорсный проект была потенциально высокая опасность уязвимостей в GRUB: их эксплуатация может привести к компрометации операционной системы и открыть для потенциального атакующего полный доступ к пользовательским данным. Отдельным интересным моментом данного исследовательского проекта стало использование искусственного интеллекта, версии Microsoft Copilot, специально разработанной для устранения прорех в безопасности. В Microsoft прямо говорят, что использования Security Copilot самого по себе недостаточно для эффективного обнаружения уязвимостей, сервис лишь способен ускорить процесс поиска проблем в исходном коде. Помимо ИИ, в проекте также были задействованы традиционные инструменты, такие как статический анализ кода, фаззинг и ручной анализ. Тем не менее была показана эффективность языковой модели для обнаружения потенциально опасных участков кода, которые затем можно проверить и вручную.

habr.com/ru/companies/kaspersk

#grub2 #microsoft #copilot

Benjamin Carr, Ph.D. 👨🏻‍💻🧬BenjaminHCCarr@hachyderm.io
2025-04-02

#Microsoft used its #AI-powered #SecurityCopilot to discover 20 previously unknown vulnerabilities in the #GRUB2, #UBoot, and #Barebox #opensource #bootloaders.
GRUB2 (GRand Unified Bootloader) is the default boot loader for most #Linux distributions, including Ubuntu, while U-Boot and Barebox are commonly used in embedded and #IoT devices.
bleepingcomputer.com/news/secu #ITSec

Opalsec :verified:Opalsec@infosec.exchange
2025-04-01

The North Koreans and Russians have been busy, Insiders abound, and attacker tradecraft continues to evolve!

Catch all this and more in our latest wrap-up of the day's news:

🗞️ opalsec.io/daily-news-update-m

There are a few noteworthy stories to get across - here's the TL;DR to get you up to speed:

🕵️ North Korean Infiltration: This is way bigger than many think. DPRK nationals are landing jobs inside global companies, gaining privileged access ("keys to the kingdom" level!). DTEX reports active investigations in 7% of their Fortune Global 2000 clients, and CrowdStrike notes nearly 40% of their NK-related IR cases involved insiders. They move fast post-hire, pivoting to supply chains and installing RATs disguised as onboarding. Watch out for highly anomalous login behaviour (like days-long sessions!). Rigorous remote hiring checks (camera on, resume checks, comms style) are crucial.

🎣 ClickFix Tactics by Lazarus: The infamous North Korean group is evolving its 'Contagious Interview' campaign (now dubbed 'ClickFake' by Sekoia). They're targeting crypto job seekers (shifting focus to non-tech roles too!) with fake website/document errors ('ClickFix'). These prompt users to run PowerShell/curl commands, dropping the 'GolangGhost' backdoor. Watch out for lures impersonating giants like Coinbase or Kraken. Sekoia has shared YARA rules – definitely worth checking out.

💻 WordPress MU-Plugin Abuse: Bad actors are getting stealthy by hiding malicious code in WordPress "Must-Use Plugins" (wp-content/mu-plugins/). These execute automatically on every page load without activation, making them hard to spot. Sucuri is seeing redirects to fake browser updates, webshell backdoors fetching code from GitHub, and JS hijackers replacing content or links. Keep those instances patched, clean up unused plugins/themes, and lock down admin accounts (MFA!).

Check out what else happened in the past 24 hours, and subscribe to get each edition straight to your inbox:
📨 opalsec.io/daily-news-update-m

#CyberSecurity #InfoSec #ThreatIntelligence #Hacking #DataBreach #Phishing #Malware #WordPress #NorthKorea #Russia #Ukraine #AI #SecurityCopilot #GRUB2 #Bootloaders #InsiderThreat #DataProtection #CyberAttack #infosecurity #cybersecuritynews #ClickFix

O Iago :linux: :debian:IGVazquez@vivaldi.net
2025-03-25

So, what to do? First, enter in the 3rd OS (Open SUSE) (before going in Windows!!!) and copy the contents being in /boot/grub/grub.cfg (to use in the 2nd OS, so use some Internet or USB or whatever). Second, in the 2nd OS (Debian-like) paste those contents in a new file /boot/grub/custom.cfg (see forums.debian.net/viewtopic.ph, forums.debian.net/viewtopic.ph) And 3rd, it is possible you have to replace in that file the entries /boot with entries /@/boot (forums.opensuse.org/t/trying-t).

You can check this in the grub: press c to enter in the command line tool, press ls -l to see the partitions, and for example if (hd0,gpt1) is one of them, 'ls (hd0,gpt1)'+tab will show you the possible paths, being of the form '/boot' or being first '/@' and then '/@/boot'... (askubuntu.com/a/616821/830271)

Anyway, I got Open SUSE Tumbleweed installed and accessible with Debian Grub2 after all the previous afternoon+evening+night looking for a solution.

2/2

#OpenSUSE #Debian #DualBoot #Grub #Grub2 #Linux

Reshmi Aravindreshmi@mstdn.social
2025-03-25

GRUB developers are preparing 73 security patches for 2025 — a major cleanup effort tackling old CVEs, long-standing issues, and security debt. Most fixes are already upstream. #SecureBoot users, keep an eye on this.

Details: phoronix.com/news/GRUB2-73-Pat
#Linux #Grub #grub2 #Security #OpenSource

Natasha Nox 🇺🇦🇵🇸Natanox@chaos.social
2025-03-18

Oh no, oh fuck.
#Linux #meme #grub2

Meme featuring two men in black shirts with serious expressions. Caption: "Your computer when a Linux system update goes horribly wrong: Best I can do is" 
Below them is a screenshot of a grub rescue shell, indicating a system failure.
Christian Gudriancgudrian@social.tchncs.de
2025-03-16

Ich habe gestern mein #Fedora-System von #Grub2 auf #sdboot umgestellt. Ich war froh, noch eine bootfähige Installation auf einer externen SSD gefunden zu haben, mit der ich meine Fehler korrigieren konnte… 😅

2025-03-06

#AskFedi I am looking for hints on how to make #GRUB2 look less dogshit. Something like the Refind UI is barely acceptable.

Carsten Müllermalison@soc.nochn.net
2025-01-25

Übrigens: Wenn ihr von #Ventoy bootet, wählt nicht die Option Normal sondern #Grub2 sonst meckert euer Mac mit:

"not a secure boot platform 14"

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst