tag | 990e006d47255f73b0244d6533ad340b3639f432 | |
---|---|---|
tagger | Paul Nardini <nardini@google.com> | Mon Sep 13 17:01:37 2021 |
object | 9ac519e58ce225ee662f3ac4ce44dfa53f144e9d |
Shim 15.4 submission for ChromeOS, 2021-09-13-2
commit | 9ac519e58ce225ee662f3ac4ce44dfa53f144e9d | [log] [tgz] |
---|---|---|
author | Paul Nardini <nardini@google.com> | Mon Sep 13 16:35:49 2021 |
committer | Paul Nardini <nardini@google.com> | Mon Sep 13 16:35:49 2021 |
tree | 530c323986e946ac2a48060605c494db8d37acc9 | |
parent | 4a6262da3f8431f21cd25579888928fa7c8ab771 [diff] |
Next set of updates for first Google shim submission This CL is a follow on from updating shim's SBAT with a new product identifier and includes: * Binaries with updated SBAT entries * Build log for updated binaries * README.md updates to point at a new shim-build tag BUG=b:195737944 TEST=none Change-Id: I441dd55cca9fa5eb536d399bb96092fd36891a29
This repo is for review of requests for signing shim. To create a request for review:
Note that we really only have experience with using GRUB2 on Linux, so asking us to endorse anything else for signing is going to require some convincing on your part.
Here's the template:
Chrome OS (reven board)
Chrome OS is a Linux distribution. We want to enable (and encourage) our user base to boot Chrome OS (reven) with secure boot enabled.
Please create your shim binaries starting with the 15.4 shim release tar file: https://github.com/rhboot/shim/releases/download/15.4/shim-15.4.tar.bz2
We can confirm that all of our shim binaries are built from the referenced tarball.
https://github.com/rhboot/shim/tree/15.4
We are applying the following patches to fix critical regressions that have been identified in shim 15.4:
https://github.com/rhboot/shim/pull/364 https://github.com/rhboot/shim/pull/362 https://github.com/rhboot/shim/pull/357 https://github.com/rhboot/shim/pull/361
We're using upstream GRUB2 2.06
What exact implementation of Secureboot in GRUB2 ( if this is your bootloader ) you have ?
Upstream GRUB2 shim_lock verifier
If bootloader, shim loading is, GRUB2, and previous shims were trusting affected by CVE-2020-14372, CVE-2020-25632, CVE-2020-25647, CVE-2020-27749, CVE-2020-27779, CVE-2021-20225, CVE-2021-20233, CVE-2020-10713, CVE-2020-14308, CVE-2020-14309, CVE-2020-14310, CVE-2020-14311, CVE-2020-15705, and if you were shipping the shim_lock module CVE-2021-3418 ( July 2020 grub2 CVE list + March 2021 grub2 CVE list ) grub2:
N/A
We do not use this functionality.
We are changing to a new certificate.
All shim binaries can be built using our Dockerfile and instructions in the README.md of https://chromium.googlesource.com/external/github.com/neverware/shim-build/+/refs/tags/v9
We made our initial shim submissions as Neverware (see https://github.com/rhboot/shim-review/issues/27 and https://github.com/rhboot/shim-review/issues/106). We had a recent shim submission as Google approved for CloudReady (https://github.com/rhboot/shim-review/issues/193). This submission is for the project as it will be built on Google infrastructure, switching to the chromeos/reven identifier.