Skip to content

Comments

[Secure Boot KEK Update] RedHat PK-Signed KEK Update#328

Merged
Flickdm merged 1 commit intomicrosoft:mainfrom
kraxel:kek-update/redhat
Dec 5, 2025
Merged

[Secure Boot KEK Update] RedHat PK-Signed KEK Update#328
Flickdm merged 1 commit intomicrosoft:mainfrom
kraxel:kek-update/redhat

Conversation

@kraxel
Copy link
Contributor

@kraxel kraxel commented Dec 2, 2025

OEM Certificate Submission

OEM Name: RedHat
Contact Email: secalert@redhat.com

Certificate Details

  • Platform Key Thumbprint: fdfc7f3c7ef3e05776add79878216c9be0e19597 [SHA1]
  • Platform Key Thumbprint: 7f122fab825041c2b0c67696bb151db6f39fed7df2d1104107f5b892b354ef5c [SHA256]
  • Expiration Date: 2037-10-25

Testing Completed

  • Windows validation
  • Linux validation

Security Review

  • No known security issues

Additional Notes

none

@kraxel
Copy link
Contributor Author

kraxel commented Dec 2, 2025

@microsoft-github-policy-service agree company="RedHat"

@kraxel kraxel force-pushed the kek-update/redhat branch from a84a0e9 to 924314b Compare December 4, 2025 08:23
@kraxel kraxel force-pushed the kek-update/redhat branch from 924314b to a6db5ac Compare December 4, 2025 19:27
@Flickdm
Copy link
Member

Flickdm commented Dec 5, 2025

Thank you! I confirmed a6db5ac contains the correct payload

INFO:root:Validating: KEKUpdate_RedHat_PK1.bin
INFO:root:Verifying authenticated variable: KEKUpdate_RedHat_PK1.bin
INFO:root:[+] Authenticated variable signature is VALID
INFO:root:  Cryptographic Signature: VALID
INFO:root:  Expected Payload: True

@Flickdm Flickdm requested a review from apop5 December 5, 2025 21:01
@Flickdm Flickdm merged commit dfdf6ef into microsoft:main Dec 5, 2025
2 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants