Microsoft’s latest security update has ruined dual-boot Windows and Linux PCs

Share via:


Microsoft’s latest monthly security update is wreaking havoc on dual-boot Windows and Linux systems. The software giant issued a security patch last week to fix a two-year-old vulnerability in the GRUB open-source boot loader used by lots of Linux devices. Microsoft’s patch wasn’t supposed to hit dual-boot devices, but many have found it has and it’s now stopping their Linux installs from booting properly.

Ars Technica reports that multiple Linux dual-boot users are seeing “security policy violation” messages, along with “something has gone seriously wrong” errors. There are reports of issues across Reddit, Ubuntu forums, and elsewhere. Distributions including Ubuntu, Debian, Linux Mint, Zorin OS, and Puppy Linux have all been affected by Microsoft’s patch.

The update was supposed to fix a vulnerability that allowed hackers to bypass Secure Boot, a technology that’s widely used by Windows and Linux distributions to ensure malicious firmware isn’t loaded onto devices during boot. Microsoft said earlier this month it would apply “a Secure Boot Advanced Targeting (SBAT) update to block vulnerable Linux boot loaders that could have an impact on Windows security,” but that the update would not be applied to dual-boot systems with both Windows and Linux so it “should not affect these systems.”

Microsoft hasn’t commented on the issues its update has caused, but there is a workaround for Ubuntu users that involves disabling Secure Boot at the BIOS level and then logging into a Ubuntu user account and opening a terminal to delete Microsoft’s SBAT policy.

Microsoft has been using Secure Boot in Windows for years, and made it a key requirement for Windows 11 to use the technology to secure against BIOS rootkits. Researchers have found plenty of vulnerabilities in Secure Boot over the years, and recently it was discovered that Secure Boot is completely broken on many PCs.



Source link

Disclaimer

We strive to uphold the highest ethical standards in all of our reporting and coverage. We StartupNews.fyi want to be transparent with our readers about any potential conflicts of interest that may arise in our work. It’s possible that some of the investors we feature may have connections to other businesses, including competitors or companies we write about. However, we want to assure our readers that this will not have any impact on the integrity or impartiality of our reporting. We are committed to delivering accurate, unbiased news and information to our audience, and we will continue to uphold our ethics and principles in all of our work. Thank you for your trust and support.

Popular

More Like this

Microsoft’s latest security update has ruined dual-boot Windows and Linux PCs


Microsoft’s latest monthly security update is wreaking havoc on dual-boot Windows and Linux systems. The software giant issued a security patch last week to fix a two-year-old vulnerability in the GRUB open-source boot loader used by lots of Linux devices. Microsoft’s patch wasn’t supposed to hit dual-boot devices, but many have found it has and it’s now stopping their Linux installs from booting properly.

Ars Technica reports that multiple Linux dual-boot users are seeing “security policy violation” messages, along with “something has gone seriously wrong” errors. There are reports of issues across Reddit, Ubuntu forums, and elsewhere. Distributions including Ubuntu, Debian, Linux Mint, Zorin OS, and Puppy Linux have all been affected by Microsoft’s patch.

The update was supposed to fix a vulnerability that allowed hackers to bypass Secure Boot, a technology that’s widely used by Windows and Linux distributions to ensure malicious firmware isn’t loaded onto devices during boot. Microsoft said earlier this month it would apply “a Secure Boot Advanced Targeting (SBAT) update to block vulnerable Linux boot loaders that could have an impact on Windows security,” but that the update would not be applied to dual-boot systems with both Windows and Linux so it “should not affect these systems.”

Microsoft hasn’t commented on the issues its update has caused, but there is a workaround for Ubuntu users that involves disabling Secure Boot at the BIOS level and then logging into a Ubuntu user account and opening a terminal to delete Microsoft’s SBAT policy.

Microsoft has been using Secure Boot in Windows for years, and made it a key requirement for Windows 11 to use the technology to secure against BIOS rootkits. Researchers have found plenty of vulnerabilities in Secure Boot over the years, and recently it was discovered that Secure Boot is completely broken on many PCs.



Source link

Disclaimer

We strive to uphold the highest ethical standards in all of our reporting and coverage. We StartupNews.fyi want to be transparent with our readers about any potential conflicts of interest that may arise in our work. It’s possible that some of the investors we feature may have connections to other businesses, including competitors or companies we write about. However, we want to assure our readers that this will not have any impact on the integrity or impartiality of our reporting. We are committed to delivering accurate, unbiased news and information to our audience, and we will continue to uphold our ethics and principles in all of our work. Thank you for your trust and support.

Website Upgradation is going on for any glitch kindly connect at office@startupnews.fyi

More like this

Vega Protocol retires chain and token after near unanimous...

The community will now move forward with proposals...

September 12, 2024 –AirPods 4 tidbits, iPhone 16 Pro...

Listen to a recap of the top stories...

OpenAI Releases its New AI Model, OpenAI o1 (Internally...

The wait is finally over, and after much...

Popular

Upcoming Events

Startup Information that matters. Get in your inbox Daily!