<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for shim</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2020:2629-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2020-09-14T16:12:03Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2020-09-14T16:12:03Z</InitialReleaseDate>
    <CurrentReleaseDate>2020-09-14T16:12:03Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for shim</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for shim fixes the following issues:

This update addresses the 'BootHole' security issue (master CVE CVE-2020-10713), by
disallowing binaries signed by the previous SUSE UEFI signing key from booting.

This update should only be installed after updates of grub2, the Linux kernel and (if used)
Xen from July / August 2020 are applied.


Changes:

Use vendor-dbx to block old SUSE/openSUSE signkeys (bsc#1168994)

+ Add dbx-cert.tar.xz which contains the certificates to block
  and a script, generate-vendor-dbx.sh, to generate
  vendor-dbx.bin
+ Add vendor-dbx.bin as the vendor dbx to block unwanted keys


- Update the path to grub-tpm.efi in shim-install (bsc#1174320)
- Only check EFI variable copying when Secure Boot is enabled (bsc#1173411)
- Use the full path of efibootmgr to avoid errors when invoking
  shim-install from packagekitd (bsc#1168104)
- shim-install: add check for btrfs is used as root file system to enable
  relative path lookup for file. (bsc#1153953) 
- shim-install: install MokManager to \EFI\boot to process the
  pending MOK request (bsc#1175626, bsc#1175656)

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2020-2629,SUSE-SLE-Module-Basesystem-15-SP1-2020-2629,SUSE-SLE-Module-Basesystem-15-SP2-2020-2629</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2020/suse-su-20202629-1/</URL>
      <Description>Link for SUSE-SU-2020:2629-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2020-September/007421.html</URL>
      <Description>E-Mail link for SUSE-SU-2020:2629-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1113225</URL>
      <Description>SUSE Bug 1113225</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1121268</URL>
      <Description>SUSE Bug 1121268</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1153953</URL>
      <Description>SUSE Bug 1153953</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1168104</URL>
      <Description>SUSE Bug 1168104</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1168994</URL>
      <Description>SUSE Bug 1168994</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173411</URL>
      <Description>SUSE Bug 1173411</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174320</URL>
      <Description>SUSE Bug 1174320</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175626</URL>
      <Description>SUSE Bug 1175626</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175656</URL>
      <Description>SUSE Bug 1175656</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10713/</URL>
      <Description>SUSE CVE CVE-2020-10713 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Basesystem 15 SP1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Basesystem 15 SP1">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP1" CPE="cpe:/o:suse:sle-module-basesystem:15:sp1">SUSE Linux Enterprise Module for Basesystem 15 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Basesystem 15 SP2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Basesystem 15 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP2" CPE="cpe:/o:suse:sle-module-basesystem:15:sp2">SUSE Linux Enterprise Module for Basesystem 15 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="shim-15+git47-3.8.1">
      <FullProductName ProductID="shim-15+git47-3.8.1">shim-15+git47-3.8.1</FullProductName>
    </Branch>
    <Relationship ProductReference="shim-15+git47-3.8.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP1:shim-15+git47-3.8.1">shim-15+git47-3.8.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="shim-15+git47-3.8.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP2:shim-15+git47-3.8.1">shim-15+git47-3.8.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in grub2, prior to version 2.06. An attacker may use the GRUB 2 flaw to hijack and tamper the GRUB verification process. This flaw also allows the bypass of Secure Boot protections. In order to load an untrusted or modified kernel, an attacker would first need to establish access to the system such as gaining physical access, obtain the ability to alter a pxe-boot network, or have remote access to a networked system with root access. With this access, an attacker could then craft a string to cause a buffer overflow by injecting a malicious payload that leads to arbitrary code execution within GRUB. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.</Note>
    </Notes>
    <CVE>CVE-2020-10713</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP1:shim-15+git47-3.8.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP2:shim-15+git47-3.8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-20202629-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10713.html</URL>
        <Description>CVE-2020-10713</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1168994</URL>
        <Description>SUSE Bug 1168994</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173456</URL>
        <Description>SUSE Bug 1173456</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173812</URL>
        <Description>SUSE Bug 1173812</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1199353</URL>
        <Description>SUSE Bug 1199353</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
