shim-signed 1.47 source package in Ubuntu


shim-signed (1.47) impish; urgency=medium

  [ Balint Reczey ]
  * Fix boot on EFI 1.10 machines, for example on some MacBooks (LP: #1925010)

  [ Dimitri John Ledkov ]
  * Fix kernel warning when allocating MOK table (LP: #1925139)
  * Fix booting with shim SBState disabled (LP: #1925140)
  * Use -Zxz compression, for compatibility with dpkg in older releases.
    LP: #1925673

shim-signed (1.46) hirsute; urgency=medium

  * New upstream release 15.4 LP: #1921134
  * Ship fb & mm from shim-signed package.
  * Remove shim-canonical-unsigned dependency, now provided by shim
  * Generalize attaching externally supplied signatures, to aid building
    with embargoed or MS external signatures.

 -- Dimitri John Ledkov <email address hidden>  Fri, 30 Apr 2021 10:46:25 +0100

Upload details

Uploaded by:
Dimitri John Ledkov
Uploaded to:
Original maintainer:
Steve Langasek
amd64 arm64
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section


Impish: [FULLYBUILT] amd64 [FULLYBUILT] arm64


File Size SHA-256 Checksum
shim-signed_1.47.tar.xz 25.3 KiB 374aed467b5aded8d2c716e5025c320e4102d440a28d1cc67327223f4f966a84
shim-signed_1.47.dsc 1.6 KiB e8c81d588867398f4049c627f64fdca485c045cf728a4338c91d321098e568b1

Available diffs

View changes file

Binary packages built by this source

shim-signed: Secure Boot chain-loading bootloader (Microsoft-signed binary)

 This package provides a minimalist boot loader which allows verifying
 signatures of other UEFI binaries against either the Secure Boot DB/DBX or
 against a built-in signature database. Its purpose is to allow a small,
 infrequently-changing binary to be signed by the UEFI CA, while allowing
 an OS distributor to revision their main bootloader independently of the CA.
 This package contains the version of the bootloader binary signed by the
 Microsoft UEFI CA.