[ubuntu/xenial-proposed] shim-signed 1.32~16.04.1 (Accepted)
Mathieu Trudel-Lapierre
cyphermox at ubuntu.com
Thu Jul 13 21:07:56 UTC 2017
shim-signed (1.32~16.04.1) xenial; urgency=medium
* Backport shim-signed 1.32 to 16.04. (LP: #1700170)
shim-signed (1.32) artful; urgency=medium
* Handle cleanup of /var/lib/shim-signed on package purge.
shim-signed (1.31) artful; urgency=medium
* Fix regression in postinst when /var/lib/dkms does not exist.
(LP#1700195)
* Sort the list of dkms modules when recording.
shim-signed (1.30) artful; urgency=medium
* update-secureboot-policy: track the installed DKMS modules so we can skip
failing unattended upgrades if they hasn't changed (ie. if no new DKMS
modules have been installed, just honour the user's previous decision to
not disable shim validation). (LP: #1695578)
* update-secureboot-policy: allow re-enabling shim validation when no DKMS
packages are installed. (LP: #1673904)
* debian/source_shim-signed.py: add the textual representation of SecureBoot
and MokSBStateRT EFI variables rather than just adding the files directly;
also, make sure we include the relevant EFI bits from kernel log.
(LP: #1680279)
shim-signed (1.29) artful; urgency=medium
* Makefile: Generate BOOT$arch.CSV, for use with fallback.
* debian/rules: make sure we can do per-arch EFI files.
Date: Mon, 10 Jul 2017 17:43:10 -0400
Changed-By: Mathieu Trudel-Lapierre <cyphermox at ubuntu.com>
Maintainer: Steve Langasek <steve.langasek at ubuntu.com>
Signed-By: Steve Langasek <steve.langasek at canonical.com>
https://launchpad.net/ubuntu/+source/shim-signed/1.32~16.04.1
-------------- next part --------------
Format: 1.8
Date: Mon, 10 Jul 2017 17:43:10 -0400
Source: shim-signed
Binary: shim-signed
Architecture: source
Version: 1.32~16.04.1
Distribution: xenial
Urgency: medium
Maintainer: Steve Langasek <steve.langasek at ubuntu.com>
Changed-By: Mathieu Trudel-Lapierre <cyphermox at ubuntu.com>
Description:
shim-signed - Secure Boot chain-loading bootloader (Microsoft-signed binary)
Launchpad-Bugs-Fixed: 1673904 1680279 1695578 1700170
Changes:
shim-signed (1.32~16.04.1) xenial; urgency=medium
.
* Backport shim-signed 1.32 to 16.04. (LP: #1700170)
.
shim-signed (1.32) artful; urgency=medium
.
* Handle cleanup of /var/lib/shim-signed on package purge.
.
shim-signed (1.31) artful; urgency=medium
.
* Fix regression in postinst when /var/lib/dkms does not exist.
(LP#1700195)
* Sort the list of dkms modules when recording.
.
shim-signed (1.30) artful; urgency=medium
.
* update-secureboot-policy: track the installed DKMS modules so we can skip
failing unattended upgrades if they hasn't changed (ie. if no new DKMS
modules have been installed, just honour the user's previous decision to
not disable shim validation). (LP: #1695578)
* update-secureboot-policy: allow re-enabling shim validation when no DKMS
packages are installed. (LP: #1673904)
* debian/source_shim-signed.py: add the textual representation of SecureBoot
and MokSBStateRT EFI variables rather than just adding the files directly;
also, make sure we include the relevant EFI bits from kernel log.
(LP: #1680279)
.
shim-signed (1.29) artful; urgency=medium
.
* Makefile: Generate BOOT$arch.CSV, for use with fallback.
* debian/rules: make sure we can do per-arch EFI files.
Checksums-Sha1:
a511ddb753c1267be0d465f3ff117bea178477de 1471 shim-signed_1.32~16.04.1.dsc
155c696740a932e23a21348bd2b25e9fed38041c 312204 shim-signed_1.32~16.04.1.tar.xz
Checksums-Sha256:
372b3736c1937b9be9bdf4b2ed2cc2fae935bf13cb6007ec666cecda91f69cbf 1471 shim-signed_1.32~16.04.1.dsc
1ec003040cb9a3cea85a9257953cd8a88e029233e0dfb8793d390bd960e2f9c0 312204 shim-signed_1.32~16.04.1.tar.xz
Files:
8182ebfe44605710b486a14b977e9378 1471 utils optional shim-signed_1.32~16.04.1.dsc
57a347411f47bfff8058ca4fcc37678a 312204 utils optional shim-signed_1.32~16.04.1.tar.xz
More information about the Xenial-changes
mailing list