[ubuntu/artful-proposed] shim-signed 1.30 (Accepted)

Mathieu Trudel-Lapierre cyphermox at ubuntu.com
Fri Jun 23 19:22:13 UTC 2017


shim-signed (1.30) artful; urgency=medium

  * update-secureboot-policy: track the installed DKMS modules so we can skip
    failing unattended upgrades if they hasn't changed (ie. if no new DKMS
    modules have been installed, just honour the user's previous decision to
    not disable shim validation). (LP: #1695578)
  * update-secureboot-policy: allow re-enabling shim validation when no DKMS
    packages are installed. (LP: #1673904)
  * debian/source_shim-signed.py: add the textual representation of SecureBoot
    and MokSBStateRT EFI variables rather than just adding the files directly;
    also, make sure we include the relevant EFI bits from kernel log.
    (LP: #1680279)

Date: Fri, 23 Jun 2017 14:37:21 -0400
Changed-By: Mathieu Trudel-Lapierre <cyphermox at ubuntu.com>
Maintainer: Steve Langasek <steve.langasek at ubuntu.com>
https://launchpad.net/ubuntu/+source/shim-signed/1.30
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 23 Jun 2017 14:37:21 -0400
Source: shim-signed
Binary: shim-signed
Architecture: source
Version: 1.30
Distribution: artful
Urgency: medium
Maintainer: Steve Langasek <steve.langasek at ubuntu.com>
Changed-By: Mathieu Trudel-Lapierre <cyphermox at ubuntu.com>
Description:
 shim-signed - Secure Boot chain-loading bootloader (Microsoft-signed binary)
Launchpad-Bugs-Fixed: 1673904 1680279 1695578
Changes:
 shim-signed (1.30) artful; urgency=medium
 .
   * update-secureboot-policy: track the installed DKMS modules so we can skip
     failing unattended upgrades if they hasn't changed (ie. if no new DKMS
     modules have been installed, just honour the user's previous decision to
     not disable shim validation). (LP: #1695578)
   * update-secureboot-policy: allow re-enabling shim validation when no DKMS
     packages are installed. (LP: #1673904)
   * debian/source_shim-signed.py: add the textual representation of SecureBoot
     and MokSBStateRT EFI variables rather than just adding the files directly;
     also, make sure we include the relevant EFI bits from kernel log.
     (LP: #1680279)
Checksums-Sha1:
 b681fe274b577eadfced969731252de623b23b5b 1439 shim-signed_1.30.dsc
 9aaa5a99448704a690aaad1488dd9bcf8dd2c125 311876 shim-signed_1.30.tar.xz
 81c69d78929ed7dbbd7b633394bc0f594bfc4060 5771 shim-signed_1.30_source.buildinfo
Checksums-Sha256:
 732d4b7e957dc10e389f08bfc313bfaa7f9e252f79383edcdb8693f5c975bb39 1439 shim-signed_1.30.dsc
 cb6fd26016f0dd8a077a4bcb149e3878dc14823138b06d631791fd46d3579ae0 311876 shim-signed_1.30.tar.xz
 0f29b80f668713f22f1230329319ac4f87efa03d4165dd0d53df3bdaa209c0ce 5771 shim-signed_1.30_source.buildinfo
Files:
 04036024cd7e7bb25e54b32af6c327da 1439 utils optional shim-signed_1.30.dsc
 6f0a2da6827d61a631fe9c49abbedbf7 311876 utils optional shim-signed_1.30.tar.xz
 19e66bec564570418e700664d79f2bbb 5771 utils optional shim-signed_1.30_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=0Md8
-----END PGP SIGNATURE-----


More information about the Artful-changes mailing list