mirror of
https://github.com/Kicksecure/security-misc.git
synced 2025-07-25 13:35:23 -04:00
Add info on DBX updates via the UEFI Revocation List
This commit is contained in:
parent
f1b6bff30b
commit
15d13a8571
2 changed files with 13 additions and 3 deletions
|
@ -138,9 +138,12 @@ configuration file and significant hardening is applied to a myriad of component
|
|||
|
||||
Mitigations for known CPU vulnerabilities are enabled in their strictest form
|
||||
and simultaneous multithreading (SMT) is disabled. See the
|
||||
`/etc/default/grub.d/40_cpu_mitigations.cfg` configuration file. Note, to achieve
|
||||
complete protection for known CPU vulnerabilities, the latest security microcode
|
||||
(BIOS/UEFI) updates must also be installed on the system.
|
||||
`/etc/default/grub.d/40_cpu_mitigations.cfg` configuration file.
|
||||
|
||||
Note, to achieve complete protection for known CPU vulnerabilities, the latest
|
||||
security microcode (BIOS/UEFI) updates must be installed on the system. Furthermore,
|
||||
if using Secure Boot, the Secure Boot Forbidden Signature Database (DBX) must be kept
|
||||
up to date through [UEFI Revocation List](https://uefi.org/revocationlistfile) updates.
|
||||
|
||||
Boot parameters relating to kernel hardening, DMA mitigations, and entropy
|
||||
generation are outlined in the `/etc/default/grub.d/40_kernel_hardening.cfg`
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue