I couldn't talk about this publicly before, but I reported a vulnerability in systemd-boot where it loads unsigned dtbs, if you sign systemd-boot yourself for internal uses, on arm64 or riscv64, you want to follow the advisory in
https://github.com/systemd/systemd/security/advisories/GHSA-6m6p-rjcq-334c
and apply the patches.
@palmer Oh I think it is possible to build u-boot for various platforms with EBBR secure booting thingies, but I don't know.
But these are the only two cases where there could theoretically be problems.
@palmer secure boot threat model really only targets UEFI rootkits placed in your storage from inside your OS.
@palmer @juliank I listed riscv64 together with arm64 because I know it's possible to at least build sd-boot for it (we do it in Debian), so there's affected software out there. Whether it can actually be used in practice in the real world is anyone's guess, and that's part of the reason it's low severity