On Wednesday, 9 July 2025 at 09:52, Daniel P. Berrangé <berra...@redhat.com> 
wrote:
> Historically fwupd wasn't able to cope with this, but recent releases
> have been enhanced to handle the updates that Linux users will need
> to see, which should mitigate the worst of the impact. There's a
> reasonable overview of the situation here:
> https://fwupd.github.io/libfwupdplugin/uefi-db.html

Agreed -- I was about to add a link to that exact page. 
 
> I'm unclear if fwupd would push the /old/ SB certs out to new HW which
> only has the new SB certs - i'm guessing probably not ?

We wouldn't be able to, we'd have to have a KEK *update* which included the old 
db key -- which vendors won't do.

The tl;dr: is:

 * You might get a "BIOS" update that adds the new db, otherwise
 * You might get a new KEK update (this is per-vendor, so only vendors 
cooperating with Microsoft have updates available -- as more get added I'll add 
them to the LVFS)
 * Once you've deployed the new KEK (and rebooted) you should get the new db 
update too (shared between vendors)

The KEK updates are going out at ~98% success, and db update is ~99% success -- 
but even 1% multiplied by millions of people is a fair few failures to deploy 
-- the "failed to write efivarfs" thing. What fixes it for some people is 
rebooting and clearing the BIOS to factory defaults -- this has the effect of 
triggering a "de-fragmentation" of the available efivar space so that there's 
enough contiguous space to deploy the update. The older your BIOS the more 
likely you are to hit this.

In the cases where even a factory default reset doesn't fix it, it's probably 
because the system vendor never actually tested if the db update works -- 
usually the more you pay for the system the more QA for things like this was 
done.

In the pathological case at least one vendor has lost the private key used for 
signing their PK, so they're having to issue firmware updates to replace the PK 
on the running system -- which could be a terrible idea from an attestation 
point of view. Those kind of vendors are also not the kind of vendors that 
usually issue bios updates (usually because of "cost") so the solution there is 
to turn off secure boot. If you're running a 7 year old system firmware then 
UEFI secure boot certificates are probably quite low on your compliance list.

Richard.

-- 
_______________________________________________
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to