The latest security patch by Microsoft has inadvertently disrupted dual-boot systems running both Windows and Linux, causing boot issues for many users.
The update, intended to fix a longstanding vulnerability in the GRUB boot loader used by Linux distributions, was not supposed to affect devices configured to dual-boot both operating systems. However, users have reported that their Linux installations are now unable to boot properly.
The patch, released as part of Microsoft’s regular security updates, aimed to address a vulnerability in Secure Boot, a technology designed to prevent malicious firmware from loading during the boot process.
The flaw had been identified two years ago, but Microsoft only recently issued a fix. Secure Boot is an essential feature in both Windows and many Linux distributions, ensuring that only trusted software can be executed during startup.
The vulnerability allowed attackers to bypass Secure Boot protections by exploiting weaknesses in GRUB, the widely-used Linux boot loader.
Despite assurances from Microsoft that the update would not impact dual-boot systems, users across various online forums have reported encountering error messages such as “Security Policy Violation” and “Something has gone seriously wrong” when attempting to boot into Linux.
Affected distributions include popular ones like Ubuntu, Debian, Linux Mint, Zorin OS, and Puppy Linux. The problem appears to stem from Microsoft’s implementation of the Secure Boot Advanced Targeting (SBAT) update, which was intended to block vulnerable Linux boot loaders to enhance Windows security.
Microsoft has yet to officially acknowledge the problem or provide a solution, leaving users searching for workarounds. Some have found temporary fixes by disabling Secure Boot in their system’s BIOS settings, while others have resorted to deleting the SBAT policy from their Linux installations.
However, these solutions may not be suitable for all users, particularly those who rely on Secure Boot for security purposes.
Comments 1