File _patchinfo of Package patchinfo.16030

<patchinfo incident="16030">
  <issue tracker="bnc" id="1168994">VUL-0: CVE-2020-10713: grub2: parsing overflows can bypass secure boot restrictions</issue>
  <issue tracker="cve" id="2020-10713"></issue>
  <issue tracker="bnc" id="1121268">GCC 9: shim build fails</issue>
  <issue tracker="bnc" id="1168104">Issue with Patch openSUSE-2020-401</issue>
  <issue tracker="bnc" id="1173411">SLES 15 sp2 fails to boot with older uefi with Failed to set MokListRT: Invalid Parameter</issue>
  <issue tracker="bnc" id="1113225">shim build failed with hash is unmatched</issue>
  <issue tracker="bnc" id="1153953">Leap 42.3 boot error snapshot missing</issue>
  <issue tracker="bnc" id="1174320">shim-install uses wrong paths for EFI files</issue>
  <issue tracker="bnc" id="1175626">Recent update run on August 21, 2020 kills bootloader</issue>
  <issue tracker="bnc" id="1175656"></issue>
  <packager>gary_lin</packager>
  <rating>moderate</rating>
  <category>security</category>
  <summary>Security update for shim</summary>
  <description>This update for shim fixes the following issues:

This update addresses the "BootHole" security issue (master CVE CVE-2020-10713), by
disallowing binaries signed by the previous SUSE UEFI signing key from booting.

This update should only be installed after updates of grub2, the Linux kernel and (if used)
Xen from July / August 2020 are applied.


Changes:

Use vendor-dbx to block old SUSE/openSUSE signkeys (bsc#1168994)

+ Add dbx-cert.tar.xz which contains the certificates to block
  and a script, generate-vendor-dbx.sh, to generate
  vendor-dbx.bin
+ Add vendor-dbx.bin as the vendor dbx to block unwanted keys


- Update the path to grub-tpm.efi in shim-install (bsc#1174320)
- Only check EFI variable copying when Secure Boot is enabled (bsc#1173411)
- Use the full path of efibootmgr to avoid errors when invoking
  shim-install from packagekitd (bsc#1168104)
- shim-install: add check for btrfs is used as root file system to enable
  relative path lookup for file. (bsc#1153953) 
- shim-install: install MokManager to \EFI\boot to process the
  pending MOK request (bsc#1175626, bsc#1175656)

</description>
<message>Please make sure that all "BootHole" related security updates are installed (grub2, kernel, and possibly xen) before rebooting with this updated shim.</message>
</patchinfo>
openSUSE Build Service is sponsored by