Chapter 23. Updating the Secure Boot Revocation List
You can update the UEFI Secure Boot Revocation List on your system so that Secure Boot identifies software with known security issues and prevents it from compromising your boot process.
23.1. The Secure Boot Revocation List Copy linkLink copied to clipboard!
The UEFI Secure Boot Revocation List (Secure Boot Forbidden Signature Database, dbx) identifies software that Secure Boot no longer allows to run. When security or stability issues are found, the list stores hash signatures to prevent compromised software from booting.
For example, a certain version of GRUB might contain a security issue that allows an attacker to bypass the Secure Boot mechanism. When the issue is found, the Revocation List adds hash signatures of all GRUB versions that contain the issue. As a result, only secure GRUB versions can boot on the system.
The Revocation List requires regular updates to recognize newly found issues. When updating the Revocation List, make sure to use a safe update method that does not cause your currently installed system to no longer boot.
23.2. Applying an online Revocation List update Copy linkLink copied to clipboard!
Update the Secure Boot Revocation List on your system to prevent known security issues. This safe procedure ensures the update does not prevent your system from booting.
Prerequisites
- Secure Boot is enabled on your system.
- Your system can access the internet for updates.
Procedure
Determine the current version of the Revocation List:
fwupdmgr get-devices
# fwupdmgr get-devicesCopy to Clipboard Copied! Toggle word wrap Toggle overflow See the
Current versionfield underUEFI dbx.Enable the LVFS Revocation List repository:
fwupdmgr enable-remote lvfs
# fwupdmgr enable-remote lvfsCopy to Clipboard Copied! Toggle word wrap Toggle overflow Refresh the repository metadata:
fwupdmgr refresh
# fwupdmgr refreshCopy to Clipboard Copied! Toggle word wrap Toggle overflow Apply the Revocation List update:
On the command line:
fwupdmgr update
# fwupdmgr updateCopy to Clipboard Copied! Toggle word wrap Toggle overflow In the graphical interface:
- Open the Software application
- Navigate to the Updates tab.
- Find the Secure Boot dbx Configuration Update entry.
- Click .
-
At the end of the update,
fwupdmgror Software asks you to reboot the system. Confirm the reboot.
Verification
After the reboot, check the current version of the Revocation List again:
fwupdmgr get-devices
# fwupdmgr get-devicesCopy to Clipboard Copied! Toggle word wrap Toggle overflow
23.3. Applying an offline Revocation List update Copy linkLink copied to clipboard!
Update the Secure Boot Revocation List from RHEL on systems without internet access to prevent known security issues. This safe procedure ensures the update does not prevent your system from booting.
Procedure
Determine the current version of the Revocation List:
fwupdmgr get-devices
# fwupdmgr get-devicesCopy to Clipboard Copied! Toggle word wrap Toggle overflow See the
Current versionfield underUEFI dbx.List the updates available from RHEL:
ls /usr/share/dbxtool/
# ls /usr/share/dbxtool/Copy to Clipboard Copied! Toggle word wrap Toggle overflow Select the most recent update file for your architecture. The file names use the following format:
DBXUpdate-date-architecture.cab
DBXUpdate-date-architecture.cabCopy to Clipboard Copied! Toggle word wrap Toggle overflow Install the selected update file:
fwupdmgr install /usr/share/dbxtool/DBXUpdate-date-architecture.cab
# fwupdmgr install /usr/share/dbxtool/DBXUpdate-date-architecture.cabCopy to Clipboard Copied! Toggle word wrap Toggle overflow -
At the end of the update,
fwupdmgrasks you to reboot the system. Confirm the reboot.
Verification
After the reboot, check the current version of the Revocation List again:
fwupdmgr get-devices
# fwupdmgr get-devicesCopy to Clipboard Copied! Toggle word wrap Toggle overflow