I tried to get it to display the updates installed, but with sudo fwupdmgr get-history --verbose
(and also without the --verbose flag) i got this output
(pkttyagent:9822): GLib-GIO-DEBUG: 09:27:40.852: Using cross-namespace EXTERNAL authentication (this will deadlock if server is GDBus < 2.73.3)
(fwupdmgr:9820): GLib-GIO-DEBUG: 09:27:40.858: _g_io_module_get_default: Found default implementation dconf (DConfSettingsBackend) for ‘gsettings-backend’
(fwupdmgr:9820): dconf-DEBUG: 09:27:40.858: watch_fast: "/system/proxy/" (establishing: 0, active: 0)
(fwupdmgr:9820): dconf-DEBUG: 09:27:40.858: watch_fast: "/system/proxy/http/" (establishing: 0, active: 0)
(fwupdmgr:9820): dconf-DEBUG: 09:27:40.858: watch_fast: "/system/proxy/https/" (establishing: 0, active: 0)
(fwupdmgr:9820): dconf-DEBUG: 09:27:40.858: watch_fast: "/system/proxy/ftp/" (establishing: 0, active: 0)
(fwupdmgr:9820): dconf-DEBUG: 09:27:40.859: watch_fast: "/system/proxy/socks/" (establishing: 0, active: 0)
(fwupdmgr:9820): dconf-DEBUG: 09:27:40.859: unwatch_fast: "/system/proxy/" (active: 0, establishing: 1)
(fwupdmgr:9820): dconf-DEBUG: 09:27:40.859: unwatch_fast: "/system/proxy/http/" (active: 0, establishing: 1)
(fwupdmgr:9820): dconf-DEBUG: 09:27:40.859: unwatch_fast: "/system/proxy/https/" (active: 0, establishing: 1)
(fwupdmgr:9820): dconf-DEBUG: 09:27:40.859: unwatch_fast: "/system/proxy/ftp/" (active: 0, establishing: 1)
(fwupdmgr:9820): dconf-DEBUG: 09:27:40.859: unwatch_fast: "/system/proxy/socks/" (active: 0, establishing: 1)
(fwupdmgr:9820): GLib-GIO-DEBUG: 09:27:40.861: _g_io_module_get_default: Found default implementation local (GLocalVfs) for ‘gio-vfs’
(fwupdmgr:9820): pxbackend-DEBUG: 09:27:40.861: px_config_sysconfig_set_config_file: Could not read file /etc/sysconfig/proxy
(fwupdmgr:9820): pxbackend-DEBUG: 09:27:40.861: Active config plugins:
(fwupdmgr:9820): pxbackend-DEBUG: 09:27:40.861: - config-env
(fwupdmgr:9820): pxbackend-DEBUG: 09:27:40.861: - config-kde
(fwupdmgr:9820): pxbackend-DEBUG: 09:27:40.861: - config-gnome
(fwupdmgr:9820): pxbackend-DEBUG: 09:27:40.861: - config-sysconfig
(fwupdmgr:9820): GLib-GIO-DEBUG: 09:27:40.862: Failed to initialize portal (GNetworkMonitorPortal) for gio-network-monitor: Not using portals
(fwupdmgr:9820): GLib-GIO-DEBUG: 09:27:40.864: Using cross-namespace EXTERNAL authentication (this will deadlock if server is GDBus < 2.73.3)
(fwupdmgr:9820): GLib-GIO-DEBUG: 09:27:40.864: Using cross-namespace EXTERNAL authentication (this will deadlock if server is GDBus < 2.73.3)
(fwupdmgr:9820): dconf-DEBUG: 09:27:40.866: watch_established: "/system/proxy/" (establishing: 0)
(fwupdmgr:9820): dconf-DEBUG: 09:27:40.866: watch_established: "/system/proxy/http/" (establishing: 0)
(fwupdmgr:9820): dconf-DEBUG: 09:27:40.867: watch_established: "/system/proxy/https/" (establishing: 0)
(fwupdmgr:9820): dconf-DEBUG: 09:27:40.867: watch_established: "/system/proxy/ftp/" (establishing: 0)
(fwupdmgr:9820): dconf-DEBUG: 09:27:40.867: watch_established: "/system/proxy/socks/" (establishing: 0)
(fwupdmgr:9820): GLib-GIO-DEBUG: 09:27:40.868: _g_io_module_get_default: Found default implementation networkmanager (GNetworkMonitorNM) for ‘gio-network-monitor’
(fwupdmgr:9820): pxbackend-DEBUG: 09:27:40.868: px_manager_constructed: Up and running
(fwupdmgr:9820): GLib-GIO-DEBUG: 09:27:40.868: _g_io_module_get_default: Found default implementation libproxy (GLibproxyResolver) for ‘gio-proxy-resolver’
(fwupdmgr:9820): Fwupd-DEBUG: 09:27:41.529: Emitting ::status-changed() [idle]
FuMain-INFO: 09:27:41.560: FwupdDevice:
DeviceId: 362301da643102b9f38477387e2193e57abaa590
Name: UEFI dbx
Guid: c6682ade-b5ec-57c4-b687-676351208742
Plugin: uefi_dbx
Flags: internal|updatable|supported|needs-reboot|reported|historical|usable-during-update|only-version-upgrade|signed-payload
Version: 272
Created: 2023-06-22
Modified: 2023-06-22
UpdateState: success
[Release]
AppstreamId: org.linuxfoundation.dbx.x64.firmware
RemoteId: lvfs
Version: 371
Filename: de143fc38b339d982079517b6f01bcec5246cf5e
Protocol: org.uefi.dbx
Checksum: SHA1(bc6a604b29918d67d5fef745ad4375ca3d43d05e)
Flags: none
HostEnclosureKind: 1f
DistroVersion: 38
HostSku: LENOVO_MT_82HU_BU_idea_FM_IdeaPad Flex 5 14ALC05
BootMgrDesc: legacy
RuntimeVersion(org.freedesktop.fwupd): 1.9.2
RuntimeVersion(org.kernel): 6.3.8-200.fc38.x86_64
CpuArchitecture: x86_64
UEFIUXCapsule: Enabled
SecureBoot: Enabled
HostFamily: IdeaPad Flex 5 14ALC05
HostBiosVersion: GJCN22WW
HostVendor: LENOVO
RuntimeVersion(org.freedesktop.gusb): 0.4.5
KernelName: Linux
DistroPrettyName: Fedora Linux 38 (Workstation Edition)
FwupdSupported: True
DistroName: Fedora Linux
RuntimeVersion(com.hughsie.libjcat): 0.1.13
DistroVariant: workstation
KernelVersion: 6.3.8-200.fc38.x86_64
CompileVersion(org.freedesktop.gusb): 0.4.5
HostFirmwareMajorRelease: 01
HostProduct: 82HU
BootTime: 1687427249
RuntimeVersion(org.freedesktop.fwupd-efi): 1.4
CpuModel: Advanced Micro Devices, Inc. AMD Ryzen 3 5300U with Radeon Graphics
HostBaseboardManufacturer: LENOVO
KernelCmdline: quiet
HostBiosMajorRelease: 01
HostBiosVendor: LENOVO
CompileVersion(com.hughsie.libxmlb): 0.3.11
CompileVersion(com.hughsie.libjcat): 0.1.13
HostBaseboardProduct: LNVNB161216
EfivarNvramUsed: 28119
DistroId: fedora
CompileVersion(org.freedesktop.fwupd): 1.9.2
HostFirmwareMinorRelease: 0e
HostBiosMinorRelease: 16
FuMain-INFO: 09:27:41.560: Secure Boot dbx Configuration Update:
New version: 371
Remote ID: lvfs
Release ID: 35287
Summary: UEFI Secure Boot Forbidden Signature Database
Variant: x64
License: Proprietary
Size: 21,2 kB
Created: 2023-05-09
Urgency: High
Tested by Lenovo:
Tested: 2024-11-20
Distribution: fedora 39 (workstation)
Old version: 217
Version[fwupd]: 1.9.20
Tested by Wistron:
Tested: 2024-06-06
Distribution: ubuntu 22.04
Old version: 267
Version[fwupd]: 1.9.15
Tested by HP:
Tested: 2024-06-04
Distribution: fedora 39 (workstation)
Old version: 77
Version[fwupd]: 1.9.20
Tested by HP:
Tested: 2024-04-24
Distribution: ubuntu 22.04
Old version: 83
Version[fwupd]: 1.9.16
Tested by HP:
Tested: 2024-03-21
Distribution: fedora 39 (workstation)
Old version: 217
Version[fwupd]: 1.9.15
Tested by Lenovo:
Tested: 2024-02-20
Distribution: fedora 39 (workstation)
Old version: 77
Version[fwupd]: 1.9.5
Tested by Lenovo:
Tested: 2024-01-12
Distribution: fedora 39 (workstation)
Old version: 220
Version[fwupd]: 1.9.11
Tested by DMC Group:
Tested: 2023-07-11
Distribution: fedora 38 (workstation)
Old version: 211
Version[fwupd]: 1.9.2
Tested by Jabra:
Tested: 2023-07-03
Distribution: ubuntu 22.04
Old version: 220
Version[fwupd]: 1.9.3
Vendor: Linux Foundation
Duration: 1 second
Release Flags: • Trusted metadata
Description:
Insecure versions of the Microsoft Windows boot manager affected by Black Lotus were added to the list of forbidden signatures due to a discovered security problem.This updates the dbx to the latest release from Microsoft.
Before installing the update, fwupd will check for any affected executables in the ESP and will refuse to update if it finds any boot binaries signed with any of the forbidden signatures.Applying this update may also cause some Windows install media to not start correctly.
Issue: CVE-2022-21894
Checksum: fc3feb015df2710fcfa07583d31b5975ee398357016699cfff067f422ab91e13
└─Secure Boot dbx Configuration Update:
New version: 371
Remote ID: lvfs
Release ID: 35287
Summary: UEFI Secure Boot Forbidden Signature Database
Variant: x64
License: Proprietary
Size: 21,2 kB
Created: 2023-05-09
Urgency: High
Tested by Lenovo:
Tested: 2024-11-20
Distribution: fedora 39 (workstation)
Old version: 217
Version[fwupd]: 1.9.20
Tested by Wistron:
Tested: 2024-06-06
Distribution: ubuntu 22.04
Old version: 267
Version[fwupd]: 1.9.15
Tested by HP:
Tested: 2024-06-04
Distribution: fedora 39 (workstation)
Old version: 77
Version[fwupd]: 1.9.20
Tested by HP:
Tested: 2024-04-24
Distribution: ubuntu 22.04
Old version: 83
Version[fwupd]: 1.9.16
Tested by HP:
Tested: 2024-03-21
Distribution: fedora 39 (workstation)
Old version: 217
Version[fwupd]: 1.9.15
Tested by Lenovo:
Tested: 2024-02-20
Distribution: fedora 39 (workstation)
Old version: 77
Version[fwupd]: 1.9.5
Tested by Lenovo:
Tested: 2024-01-12
Distribution: fedora 39 (workstation)
Old version: 220
Version[fwupd]: 1.9.11
Tested by DMC Group:
Tested: 2023-07-11
Distribution: fedora 38 (workstation)
Old version: 211
Version[fwupd]: 1.9.2
Tested by Jabra:
Tested: 2023-07-03
Distribution: ubuntu 22.04
Old version: 220
Version[fwupd]: 1.9.3
Vendor: Linux Foundation
Duration: 1 second
Release Flags: • Trusted metadata
Description:
Insecure versions of the Microsoft Windows boot manager affected by Black Lotus were added to the list of forbidden signatures due to a discovered security problem.This updates the dbx to the latest release from Microsoft.
Before installing the update, fwupd will check for any affected executables in the ESP and will refuse to update if it finds any boot binaries signed with any of the forbidden signatures.Applying this update may also cause some Windows install media to not start correctly.
Issue: CVE-2022-21894
Checksum: fc3feb015df2710fcfa07583d31b5975ee398357016699cfff067f422ab91e13
I’m not sure if its helpful, but if it isnt, how could I produce something helpful?
The commands I tried were suggested by a chatbot, as i dont know of any way of seeing that