shim-signed (1.32~16.04.1) xenial; urgency=medium

  * Backport shim-signed 1.32 to 16.04. (LP: #1700170)

shim-signed (1.32) artful; urgency=medium

  * Handle cleanup of /var/lib/shim-signed on package purge.

shim-signed (1.31) artful; urgency=medium

  * Fix regression in postinst when /var/lib/dkms does not exist.
    (LP#1700195)
  * Sort the list of dkms modules when recording.

shim-signed (1.30) artful; urgency=medium

  * update-secureboot-policy: track the installed DKMS modules so we can skip
    failing unattended upgrades if they hasn't changed (ie. if no new DKMS
    modules have been installed, just honour the user's previous decision to
    not disable shim validation). (LP: #1695578)
  * update-secureboot-policy: allow re-enabling shim validation when no DKMS
    packages are installed. (LP: #1673904)
  * debian/source_shim-signed.py: add the textual representation of SecureBoot
    and MokSBStateRT EFI variables rather than just adding the files directly;
    also, make sure we include the relevant EFI bits from kernel log.
    (LP: #1680279)

shim-signed (1.29) artful; urgency=medium

  * Makefile: Generate BOOT$arch.CSV, for use with fallback.
  * debian/rules: make sure we can do per-arch EFI files.

Date: Mon, 10 Jul 2017 17:43:10 -0400
Changed-By: Mathieu Trudel-Lapierre <cypher...@ubuntu.com>
Maintainer: Steve Langasek <steve.langa...@ubuntu.com>
Signed-By: Steve Langasek <steve.langa...@canonical.com>
https://launchpad.net/ubuntu/+source/shim-signed/1.32~16.04.1
Format: 1.8
Date: Mon, 10 Jul 2017 17:43:10 -0400
Source: shim-signed
Binary: shim-signed
Architecture: source
Version: 1.32~16.04.1
Distribution: xenial
Urgency: medium
Maintainer: Steve Langasek <steve.langa...@ubuntu.com>
Changed-By: Mathieu Trudel-Lapierre <cypher...@ubuntu.com>
Description:
 shim-signed - Secure Boot chain-loading bootloader (Microsoft-signed binary)
Launchpad-Bugs-Fixed: 1673904 1680279 1695578 1700170
Changes:
 shim-signed (1.32~16.04.1) xenial; urgency=medium
 .
   * Backport shim-signed 1.32 to 16.04. (LP: #1700170)
 .
 shim-signed (1.32) artful; urgency=medium
 .
   * Handle cleanup of /var/lib/shim-signed on package purge.
 .
 shim-signed (1.31) artful; urgency=medium
 .
   * Fix regression in postinst when /var/lib/dkms does not exist.
     (LP#1700195)
   * Sort the list of dkms modules when recording.
 .
 shim-signed (1.30) artful; urgency=medium
 .
   * update-secureboot-policy: track the installed DKMS modules so we can skip
     failing unattended upgrades if they hasn't changed (ie. if no new DKMS
     modules have been installed, just honour the user's previous decision to
     not disable shim validation). (LP: #1695578)
   * update-secureboot-policy: allow re-enabling shim validation when no DKMS
     packages are installed. (LP: #1673904)
   * debian/source_shim-signed.py: add the textual representation of SecureBoot
     and MokSBStateRT EFI variables rather than just adding the files directly;
     also, make sure we include the relevant EFI bits from kernel log.
     (LP: #1680279)
 .
 shim-signed (1.29) artful; urgency=medium
 .
   * Makefile: Generate BOOT$arch.CSV, for use with fallback.
   * debian/rules: make sure we can do per-arch EFI files.
Checksums-Sha1:
 a511ddb753c1267be0d465f3ff117bea178477de 1471 shim-signed_1.32~16.04.1.dsc
 155c696740a932e23a21348bd2b25e9fed38041c 312204 shim-signed_1.32~16.04.1.tar.xz
Checksums-Sha256:
 372b3736c1937b9be9bdf4b2ed2cc2fae935bf13cb6007ec666cecda91f69cbf 1471 
shim-signed_1.32~16.04.1.dsc
 1ec003040cb9a3cea85a9257953cd8a88e029233e0dfb8793d390bd960e2f9c0 312204 
shim-signed_1.32~16.04.1.tar.xz
Files:
 8182ebfe44605710b486a14b977e9378 1471 utils optional 
shim-signed_1.32~16.04.1.dsc
 57a347411f47bfff8058ca4fcc37678a 312204 utils optional 
shim-signed_1.32~16.04.1.tar.xz
-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes

Reply via email to