tag | 914e9dad90d39c87aefa525007a9bb6def8a4ed3 | |
---|---|---|
tagger | Paul Nardini <nardini@google.com> | Tue Sep 14 20:58:35 2021 |
object | bc056f29e882ba45a9dd3b423f4f3b444e4944d9 |
Shim 15.4 submission for Chrome OS (reven), 2021-09-13-3
commit | bc056f29e882ba45a9dd3b423f4f3b444e4944d9 | [log] [tgz] |
---|---|---|
author | Paul Nardini <nardini@google.com> | Tue Sep 14 20:27:53 2021 |
committer | Paul Nardini <nardini@google.com> | Tue Sep 14 20:27:53 2021 |
tree | d128f1763a17c16fb67bd9376334f613d6898a35 | |
parent | 9ac519e58ce225ee662f3ac4ce44dfa53f144e9d [diff] |
Update to shim-build tag v10 for reviewer comments Update README.md to point to tag v10 of the shim-build repository, which recently changed to address shim reviewer comments. build.log reflects a build that contains the newly renamed patch files. Output binary hashes with new patch files are identical to existing binaries. BUG=b:195737944 TEST=none Change-Id: I1fb3a99346c1c09fa34500d7478502e018fc22a6
This repo is for review of requests for signing shim. To create a request for review:
Note that we really only have experience with using GRUB2 on Linux, so asking us to endorse anything else for signing is going to require some convincing on your part.
Here's the template:
Chrome OS (reven board)
Chrome OS is a Linux distribution. We want to enable (and encourage) our user base to boot Chrome OS (reven) with secure boot enabled.
Please create your shim binaries starting with the 15.4 shim release tar file: https://github.com/rhboot/shim/releases/download/15.4/shim-15.4.tar.bz2
We can confirm that all of our shim binaries are built from the referenced tarball.
https://github.com/rhboot/shim/tree/15.4
We are applying the following patches to fix critical regressions that have been identified in shim 15.4:
https://github.com/rhboot/shim/pull/364 https://github.com/rhboot/shim/pull/362 https://github.com/rhboot/shim/pull/357 https://github.com/rhboot/shim/pull/361
We're using upstream GRUB2 2.06
What exact implementation of Secureboot in GRUB2 ( if this is your bootloader ) you have ?
Upstream GRUB2 shim_lock verifier
If bootloader, shim loading is, GRUB2, and previous shims were trusting affected by CVE-2020-14372, CVE-2020-25632, CVE-2020-25647, CVE-2020-27749, CVE-2020-27779, CVE-2021-20225, CVE-2021-20233, CVE-2020-10713, CVE-2020-14308, CVE-2020-14309, CVE-2020-14310, CVE-2020-14311, CVE-2020-15705, and if you were shipping the shim_lock module CVE-2021-3418 ( July 2020 grub2 CVE list + March 2021 grub2 CVE list ) grub2:
N/A
We do not use this functionality.
We are changing to a new certificate.
All shim binaries can be built using our Dockerfile and instructions in the README.md of https://chromium.googlesource.com/external/github.com/neverware/shim-build/+/refs/tags/v10
We made our initial shim submissions as Neverware (see https://github.com/rhboot/shim-review/issues/27 and https://github.com/rhboot/shim-review/issues/106). We had a recent shim submission as Google approved for CloudReady (https://github.com/rhboot/shim-review/issues/193). This submission is for the project as it will be built on Google infrastructure, switching to the chromeos/reven identifier.