shim 15.4-0ubuntu9 source package in Ubuntu

Changelog

shim (15.4-0ubuntu9) hirsute; urgency=medium

  * Fix booting installer media on some machines (LP: #1937115)
    - Always fallback to the default loader (PR #393)
    - Dump load options parsed (PR #393)
    - Disable load option parsing on removable media path (PR #399)
  * trivial: Fix a minor overflow in the mok importing code (PR #365)
  * Fix fall back loader to find the correct boot entry, avoiding potential
    corruption of firmware (PR #396).

 -- Julian Andres Klode <email address hidden>  Fri, 06 Aug 2021 13:16:33 +0200

Upload details

Uploaded by:
Julian Andres Klode
Uploaded to:
Hirsute
Original maintainer:
Ubuntu Developers
Architectures:
amd64 arm64
Section:
admin
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Jammy release main admin
Bionic updates main admin
Hirsute updates main admin
Focal updates main admin
Impish release main admin

Builds

Hirsute: [FULLYBUILT] amd64 [FULLYBUILT] arm64

Downloads

File Size SHA-256 Checksum
shim_15.4.orig.tar.bz2 1.2 MiB 8344473dd10569588b8238a4656b8fab226714eea9f5363f8c410aa8a5090297
shim_15.4-0ubuntu9.debian.tar.xz 45.8 KiB d0b4e161bd557951e625d8d51c86d186b94b5375d56467ef68aced4e11b3ed6d
shim_15.4-0ubuntu9.dsc 2.1 KiB 763aef4cbf2977f3659a6dcbe002110a9f41039ec6ab2ad0e7b044fd2472ef84

View changes file

Binary packages built by this source

shim: boot loader to chain-load signed boot loaders under Secure Boot

 This package provides a minimalist boot loader which allows verifying
 signatures of other UEFI binaries against either the Secure Boot DB/DBX or
 against a built-in signature database. Its purpose is to allow a small,
 infrequently-changing binary to be signed by the UEFI CA, while allowing
 an OS distributor to revision their main bootloader independently of the CA.

shim-dbg: boot loader to chain-load signed boot loaders under Secure Boot (dbg symbols)

 This package provides a minimalist boot loader which allows verifying
 signatures of other UEFI binaries against either the Secure Boot DB/DBX or
 against a built-in signature database. Its purpose is to allow a small,
 infrequently-changing binary to be signed by the UEFI CA, while allowing
 an OS distributor to revision their main bootloader independently of the CA.
 .
 Debug symbols.