From my understanding after reading the posted articles, if you do this you will just delete the policy that was created by the Microsoft patch in order to fix a GRUB vulnerability. This will effectively restore to the vulnerable state but let your system boot with the Shim bootloader already installed. Secure Boot is a mess, but I think the clear thing for any Linux distribution to do is to create a Shim bootloader update that can be booted on affected systems. This of course will lead to a break and fix loop with Microsoft. The moment statistics show a rise on Linux desktop usage, MS applies patch for 2022 vulnerability and breaks the experience of all newbies. Sigh...Code:
sudo mokutil --set-sbat-policy delete
Statistics: Posted by IT-Nerd — 2024-08-25 19:40