This vulnerability involves a buffer overflow that could potentially allow attackers to bypass Secure Boot protections. To mitigate this risk, Microsoft has implemented Secure Boot Advanced Targeting (SBAT) in the update, designed to prevent bootloaders that might compromise Windows security. Users of Ventoy, and Ubuntu 24.04, reported that they were shown the following error:
Verifying shim SBAT data failed: Security Policy Violation
Something has gone seriously wrong: SBAT self-check failed: Security Policy Violation
Following this, the system may automatically shut down after a few seconds. However, this update was not intended for dual-boot systems, and it is unclear why it has impacted so many users running both Linux and Windows. Microsoft had suggested that only older Linux distributions would be affected, but reports indicate that newer distributions are also encountering the issue. As of now, Microsoft has not released a public statement or a subsequent update to address this issue. Users have limited options to resolve the problem. One approach is to manually disable Secure Boot in the BIOS settings. Alternatively, users who wish to maintain Secure Boot can delete the SBAT policy via their Linux system, which may allow the system to boot successfully with Secure Boot enabled.
Source: itfoss