Key Information Environment SUSE Linux Enterprise Server 15 SUSE Linux Enterprise Server 12 SUSE Linux Enterprise Server 11 Security Vulnerability Vulnerability Name: "BootHole" grub2 UEFI secure boot lockdown bypass CVE ID: CVE-2020-10713 Related CVE IDs: CVE-2020-14308, CVE-2020-14309, CVE-2020-14310, CVE-2020-14311, CVE-2020-15706 Impact Description: Security researchers discovered a vulnerability in grub2 that allows bypassing UEFI secure boot lockdown restrictions, enabling the booting of unsigned code. Potential Impact: Attackers can run rootkit malware across reboots, becoming persistent malware regardless of the operating system. Solution Update Released: SUSE has released grub2 updates to address the security issue. UEFI Secure Boot Chain Updates: - SUSE’s updates will include an exclusion list of all previously released secure boot binaries. - Microsoft will release a global revocation list excluding all affected grub2 versions. Other Component Updates: SUSE has also released updated kernels and other secure boot-related packages. Special Considerations SUSE and other ecosystem vendors must maintain the integrity of the UEFI secure boot chain. Administrators must ensure all BootHole-related online updates are installed before applying these DBX list updates. Next Steps Monitor additional security advisories and updates related to the listed CVE IDs. Background Information Includes details on SUSE’s UEFI secure boot chain and the measures taken.