[ubuntu/zesty-proposed] shim-signed 1.32~17.04.1 (Accepted)

Mathieu Trudel-Lapierre cyphermox at ubuntu.com
Thu Jul 13 20:57:40 UTC 2017


shim-signed (1.32~17.04.1) zesty; urgency=medium

  * Backport shim-signed 1.32 to 17.04. (LP: #1700170)

shim-signed (1.32) artful; urgency=medium

  * Handle cleanup of /var/lib/shim-signed on package purge.

shim-signed (1.31) artful; urgency=medium

  * Fix regression in postinst when /var/lib/dkms does not exist.
    (LP#1700195)
  * Sort the list of dkms modules when recording.

shim-signed (1.30) artful; urgency=medium

  * update-secureboot-policy: track the installed DKMS modules so we can skip
    failing unattended upgrades if they hasn't changed (ie. if no new DKMS
    modules have been installed, just honour the user's previous decision to
    not disable shim validation). (LP: #1695578)
  * update-secureboot-policy: allow re-enabling shim validation when no DKMS
    packages are installed. (LP: #1673904)
  * debian/source_shim-signed.py: add the textual representation of SecureBoot
    and MokSBStateRT EFI variables rather than just adding the files directly;
    also, make sure we include the relevant EFI bits from kernel log.
    (LP: #1680279)

shim-signed (1.29) artful; urgency=medium

  * Makefile: Generate BOOT$arch.CSV, for use with fallback.
  * debian/rules: make sure we can do per-arch EFI files.

Date: Mon, 10 Jul 2017 17:10:08 -0400
Changed-By: Mathieu Trudel-Lapierre <cyphermox at ubuntu.com>
Maintainer: Steve Langasek <steve.langasek at ubuntu.com>
Signed-By: Steve Langasek <steve.langasek at canonical.com>
https://launchpad.net/ubuntu/+source/shim-signed/1.32~17.04.1
-------------- next part --------------
Format: 1.8
Date: Mon, 10 Jul 2017 17:10:08 -0400
Source: shim-signed
Binary: shim-signed
Architecture: source
Version: 1.32~17.04.1
Distribution: zesty
Urgency: medium
Maintainer: Steve Langasek <steve.langasek at ubuntu.com>
Changed-By: Mathieu Trudel-Lapierre <cyphermox at ubuntu.com>
Description:
 shim-signed - Secure Boot chain-loading bootloader (Microsoft-signed binary)
Launchpad-Bugs-Fixed: 1673904 1680279 1695578 1700170
Changes:
 shim-signed (1.32~17.04.1) zesty; urgency=medium
 .
   * Backport shim-signed 1.32 to 17.04. (LP: #1700170)
 .
 shim-signed (1.32) artful; urgency=medium
 .
   * Handle cleanup of /var/lib/shim-signed on package purge.
 .
 shim-signed (1.31) artful; urgency=medium
 .
   * Fix regression in postinst when /var/lib/dkms does not exist.
     (LP#1700195)
   * Sort the list of dkms modules when recording.
 .
 shim-signed (1.30) artful; urgency=medium
 .
   * update-secureboot-policy: track the installed DKMS modules so we can skip
     failing unattended upgrades if they hasn't changed (ie. if no new DKMS
     modules have been installed, just honour the user's previous decision to
     not disable shim validation). (LP: #1695578)
   * update-secureboot-policy: allow re-enabling shim validation when no DKMS
     packages are installed. (LP: #1673904)
   * debian/source_shim-signed.py: add the textual representation of SecureBoot
     and MokSBStateRT EFI variables rather than just adding the files directly;
     also, make sure we include the relevant EFI bits from kernel log.
     (LP: #1680279)
 .
 shim-signed (1.29) artful; urgency=medium
 .
   * Makefile: Generate BOOT$arch.CSV, for use with fallback.
   * debian/rules: make sure we can do per-arch EFI files.
Checksums-Sha1:
 7d6858fd60dbd199cbcadc2f5b2bbc5b035e0f40 1471 shim-signed_1.32~17.04.1.dsc
 bca7c43a550142e0cbd0616257bf647c2a6e86dd 312676 shim-signed_1.32~17.04.1.tar.xz
Checksums-Sha256:
 126d3a546dba328be6bdbfbe204ae75b52b170049dd923ee9c6022ed886f058a 1471 shim-signed_1.32~17.04.1.dsc
 be829a67d7f5bad495556f62ec0454071e9e375956deebba26dec8ffe245cbda 312676 shim-signed_1.32~17.04.1.tar.xz
Files:
 2a65ff4d0659ae484bf246e600a13d4f 1471 utils optional shim-signed_1.32~17.04.1.dsc
 b2a148ffc30a51dd543ed2c02890311c 312676 utils optional shim-signed_1.32~17.04.1.tar.xz


More information about the Zesty-changes mailing list