Add reference

This commit is contained in:
raja-grewal 2025-06-06 13:07:52 +00:00 committed by GitHub
parent dd0b55cc45
commit 72613203b9
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
2 changed files with 2 additions and 1 deletions

View file

@ -143,7 +143,7 @@ and simultaneous multithreading (SMT) is disabled. See the
Note, to achieve complete protection for known CPU vulnerabilities, the latest Note, to achieve complete protection for known CPU vulnerabilities, the latest
security microcode (BIOS/UEFI) updates must be installed on the system. Furthermore, security microcode (BIOS/UEFI) updates must be installed on the system. Furthermore,
if using Secure Boot, the Secure Boot Forbidden Signature Database (DBX) must be kept if using Secure Boot, the Secure Boot Forbidden Signature Database (DBX) must be kept
up to date through [UEFI Revocation List](https://uefi.org/revocationlistfile) updates. up to date through [UEFI Revocation List](https://github.com/microsoft/secureboot_objects) updates.
CPU mitigations: CPU mitigations:

View file

@ -30,6 +30,7 @@
## The UEFI Revocation List contains signatures of now revoked firmware and software used in booting systems. ## The UEFI Revocation List contains signatures of now revoked firmware and software used in booting systems.
## If using compatible hardware, the database can be updated directly in user space using fwupd. ## If using compatible hardware, the database can be updated directly in user space using fwupd.
## Note that incorrectly performing DBX updates can potentially lead to serious functionality issues. ## Note that incorrectly performing DBX updates can potentially lead to serious functionality issues.
## https://github.com/microsoft/secureboot_objects
## https://uefi.org/revocationlistfile ## https://uefi.org/revocationlistfile
## https://github.com/fwupd/fwupd ## https://github.com/fwupd/fwupd