Chapter 24. Updating the Secure Boot Revocation List
Update the UEFI Secure Boot Revocation List to identify software with known security issues and prevent it from compromising the boot process.
24.1. The Secure Boot Revocation List Copy linkLink copied to clipboard!
The UEFI Secure Boot Revocation List, or the Secure Boot Forbidden Signature Database (dbx), is a list that identifies software that Secure Boot no longer allows to run.
When a security issue or a stability problem is found in software that interfaces with Secure Boot, such as in the GRUB boot loader, the Revocation List stores its hash signature. Software with such a recognized signature cannot run during boot, and the system boot fails to prevent compromising the system.
For example, a certain version of GRUB might contain a security issue that allows an attacker to bypass the Secure Boot mechanism. When the issue is found, the Revocation List adds hash signatures of all GRUB versions that contain the issue. As a result, only secure GRUB versions can boot on the system.
The Revocation List requires regular updates to recognize newly found issues. When updating the Revocation List, make sure to use a safe update method that does not cause your currently installed system to no longer boot.
24.2. Applying an online Revocation List update Copy linkLink copied to clipboard!
To prevent known security issues, you can update the Secure Boot Revocation List on your system. This procedure is safe and ensures that the update does not prevent your system from booting.
Prerequisites
- Secure Boot is enabled on your system.
- Your system is connected to internet for updates.
Procedure
Determine the current version of the Revocation List:
# *fwupdmgr get-devices*See the
Current versionfield underUEFI dbx.Enable the LVFS Revocation List repository:
# *fwupdmgr enable-remote lvfs*Refresh the repository metadata:
# *fwupdmgr refresh*Apply the Revocation List update:
On the command line:
# *fwupdmgr update*In the graphical interface:
- Open the Software application
- Navigate to the Updates tab.
- Find the Secure Boot dbx Configuration Update entry.
- Click .
-
At the end of the update,
fwupdmgror Software asks you to reboot the system. Confirm the reboot.
Verification
After the reboot, check the current version of the Revocation List again:
# *fwupdmgr get-devices*
24.3. Applying an offline Revocation List update Copy linkLink copied to clipboard!
To prevent known security issues on a system with no internet connection, you can update the Secure Boot Revocation List from Red Hat Enterprise Linux. This procedure is safe and ensures that the update does not prevent your system from booting.
Procedure
Identify the current version of the Revocation List:
# *fwupdmgr get-devices*See the
Current versionfield underUEFI dbx.List the updates available from RHEL:
# *ls /usr/share/dbxtool/*Select the most recent update file for your architecture. The file names use the following format:
DBXUpdate-date-architecture.cabInstall the selected update file:
# fwupdmgr install /usr/share/dbxtool/DBXUpdate-date-architecture.cab-
At the end of the update,
fwupdmgrasks you to reboot the system. Confirm the reboot.
Verification
After the reboot, check the current version of the Revocation List again:
# *fwupdmgr get-devices*