UEFI BIOS Updates Patch GRUB2 Security Vulnerability Verification Failed 0x1A Security Violation
OEMs like Dell are releasing UEFI BIOS Security Updates to patch a Security Vulnerability with the GRUB2 Bootloader CVE-2020-10713. The GRUB2 Bootloader is used for most the Linux Distributions that have previously passed Secure Boot. These UEFI BIOS Updates will now block these Linux Distributions from Booting giving Verification Failed: (0x1A) Security Violation. You should check to see if a newer installation is available. The Ubuntu 20.04.1 and Mint 20.1 Installation ISOs have been updated and will pass the patched Secure Boot. Older installation media will be rejected. Fedora 33 unfortunately hasn't been updated and will continue to be rejected. DeepIn 20 (1003) unfortunately hasn't been updated and will continue to be rejected.
More details from your OEM are available here:
https://www.dell.com/support/article/en-uk/sln322283/dell-response-to-grub2-vulnerabilities-which-may-allow-secure-boot-bypass?lang=en
https://support.lenovo.com/co/en/product_security/ps500336
https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04019en_us&docLocale=en_US
Ubuntu response:
https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-10713
Redhat (Fedora) response:
https://access.redhat.com/security/vulnerabilities/grub2bootloader
#Dell #UEFI #Linux