Go to file
Julien Cristau c117735c20 Import Debian changes 0.9+1474479173.6c180c6-1
shim (0.9+1474479173.6c180c6-1) unstable; urgency=medium

  [ Steve Langasek ]
  * Initial Debian upload.  Closes: #820052.
  * Update Standards-Version.
  * Embed the newly-minted Debian CA certificate.
  * Vendorize debian/rules so that the same package can be used in both
    Debian and Ubuntu without modification.
  * Fix debian/copyright to match the spec (last match wins, not first)
  * Fix shim.efi to not be executable.
  * Add watchfile.
  * Support parallel builds, because eh why not
  * Update Vcs-Bzr.
  * Resync with Ubuntu, including patch to fix debian/copyright.

  [ Julien Cristau ]
  * Add some missing copyright holders in d/copyright, update
    Upstream-Contact.  Thanks to Helen Koike for the help.

shim (0.9+1474479173.6c180c6-0ubuntu1) UNRELEASED; urgency=medium

  [ Helen Koike ]
  * debian/copyright: add OpenSSL license 

  [ Mathieu Trudel-Lapierre ]
  * New upstream release.
  * debian/copyright: patches should be BSD, like the rest of the upstream
    code.
  * debian/patches/unused-variable: dropped; applied upstream.
  * debian/patches/binutils-version-matching: dropped, fixed upstream.
  * debian/shim.install: built EFI binaries were renamed; update our install
    file to properly pick up shim (shim$arch), MokManager (mm$arch), and
    fallback (fb$arch).

shim (0.9+1465500757.14a5905-0ubuntu1) yakkety; urgency=medium

  * New upstream release.
    - Better handle LoadOptions. (LP: #1581299)
    - Measure state and second stage in TPM.
    - Mirror MokSBState in runtime as MokSBStateRT.
    - Fix failure to build with GCC 5. (LP: #1429978)
    - Various bug fixes and other improvements.
  * Refreshed patches.
    - Remaining patches:
      + second-stage-path
      + sbsigntool-not-pesign 
  * debian/patches/unused-variable: remove unused variable size.
  * debian/patches/binutils-version-matching: revert d9a4c912 to correctly
    match objcopy's version on Ubuntu.
  * debian/copyright: update copyright for patches.

shim (0.8-0ubuntu2) wily; urgency=medium

  * No-change rebuild against gnu-efi 3.0v-5ubuntu1.

shim (0.8-0ubuntu1) wily; urgency=medium

  * New upstream release.
    - Clarify meaning of insecure_mode. (LP: #1384973)
  * debian/patches/CVE-2014-3675.patch, debian/patches/CVE-2014-3677.patch,
    debian/patches/0001-Update-openssl-to-0.9.8za.patch: dropped, included
    in the upstream release.
  * debian/patches/sbsigntool-not-pesign,debian/patches/second-stage-path:
    refreshed.

shim (0.7-0ubuntu4) utopic; urgency=medium

  * SECURITY UPDATE: heap overflow and out-of-bounds read access when
    parsing DHCPv6 information
    - debian/patches/CVE-2014-3675.patch: apply proper bounds checking
      when parsing data provided in DHCPv6 packets.
    - CVE-2014-3675
    - CVE-2014-3676
  * SECURITY UPDATE: memory corruption when processing user-provided key
    lists
    - debian/patches/CVE-2014-3677.patch: detect malformed machine owner
      key (MOK) lists and ignore them, avoiding possible memory corruption.
    - CVE-2014-3677

shim (0.7-0ubuntu2) utopic; urgency=medium

  * Restore debian/patches/prototypes, which still is needed on shim 0.7
    but only detected on the buildds.
  * Update debian/patches/prototypes with some new declarations needed for
    openssl 0.9.8za update.

shim (0.7-0ubuntu1) utopic; urgency=medium

  * New upstream release.
    - fix spurious error message when fallback.efi is not present, as will
      always be the case for removable media.  LP: #1297069.
    - drop most patches, included upstream.
  * debian/patches/0001-Update-openssl-to-0.9.8za.patch: cherry-pick
    openssl 0.9.8za in via upstream.

shim (0.4-0ubuntu5) utopic; urgency=low

  * Install fallback.efi.signed as well, to lay the groundwork for fallback
    handling (wanted when we have to move a drive between machines, or when
    the firmware loses its marbles^W nvram).

shim (0.4-0ubuntu4) saucy; urgency=low

  * debian/patches/fix-tftp-prototype: pass the right arguments to
    EFI_PXE_BASE_CODE_TFTP_READ_FILE.
  * debian/patches/build-with-Werror: Build with -Werror to catch future
    prototype mismatches.
  * debian/patches/fix-compiler-warnings: Fix remaining compiler
    warnings in netboot.c.
  * debian/patches/tftp-proper-nul-termination: fix nul termination
    errors in filenames passed to tftp.
  * debian/patches/netboot-cleanup: roll-up of miscellaneous fixes to
    the netboot code.

shim (0.4-0ubuntu3) saucy; urgency=low

  [ Steve Langasek ]
  * Install MokManager.efi.signed in the package.
  * debian/patches/no-output-by-default.patch: Don't print any
    informational messages.  Closes LP: #1074302.

  [ Stéphane Graber ]
  * debian/patches/no-print-on-unsigned: Don't print an error message when
    validating an unsigned binary as that tends to hang Lenovo machines.
    (LP: #1087501)

shim (0.4-0ubuntu2) saucy; urgency=low

  * Add missing build-dependency on openssl.

shim (0.4-0ubuntu1) saucy; urgency=low

  * New upstream release.
  * Drop debian/patches/shim-before-loadimage; upstream has changed this to
    not call loadimage at all.
  * debian/patches/sbsigntool-not-pesign: Sign MokManager with
    sbsigntool instead of pesign.
  * Add a versioned build-dependency on gnu-efi.

shim (0~20120906.bcd0a4e8-0ubuntu4) quantal-proposed; urgency=low

  * debian/patches/shim-before-loadimage: Use direct verification first
    before LoadImage.  Addresses an issue where Lenovo's SecureBoot
    implementation pops an error message on any verification failure - avoid
    calling LoadImage at all unless we have to.

shim (0~20120906.bcd0a4e8-0ubuntu3) quantal; urgency=low

  * debian/patches/second-stage-path: Chainload grubx64.efi, not
    grub.efi.

shim (0~20120906.bcd0a4e8-0ubuntu2) quantal; urgency=low

  * debian/patches/prototypes: Include missing prototypes, and disable
    use of BIO_new_file.
  * Only build the package for amd64; we're not signing an i386 shim at this
    stage so there's no point in building it.

shim (0~20120906.bcd0a4e8-0ubuntu1) quantal; urgency=low

  * Initial release.
  * Include the Canonical Secure Boot master CA.
2017-08-04 12:10:50 -04:00
Cryptlib Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
debian Import Debian changes 0.9+1474479173.6c180c6-1 2017-08-04 12:10:50 -04:00
include Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
lib Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
.gitignore Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
cert.S Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
COPYRIGHT Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
crypt_blowfish.c Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
crypt_blowfish.h Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
elf_aarch64_efi.lds Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
elf_arm_efi.lds Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
elf_ia32_efi.lds Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
elf_ia64_efi.lds Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
elf_x86_64_efi.lds Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
fallback.c Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
hexdump.h Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
httpboot.c Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
httpboot.h Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
make-certs Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
Makefile Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
MokManager.c Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
MokVars.txt Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
netboot.c Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
netboot.h Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
PasswordCrypt.c Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
PasswordCrypt.h Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
README Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
README.fallback Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
replacements.c Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
replacements.h Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
shim.c Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
shim.h Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
testplan.txt Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
TODO Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
tpm.c Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
tpm.h Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
ucs2.h Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
version.c.in Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00
version.h Import Upstream version 0.9+1474479173.6c180c6 2017-08-04 12:10:50 -04:00

shim is a trivial EFI application that, when run, attempts to open and
execute another application. It will initially attempt to do this via the
standard EFI LoadImage() and StartImage() calls. If these fail (because secure
boot is enabled and the binary is not signed with an appropriate key, for
instance) it will then validate the binary against a built-in certificate. If
this succeeds and if the binary or signing key are not blacklisted then shim
will relocate and execute the binary.

shim will also install a protocol which permits the second-stage bootloader
to perform similar binary validation. This protocol has a GUID as described
in the shim.h header file and provides a single entry point. On 64-bit systems
this entry point expects to be called with SysV ABI rather than MSABI, and
so calls to it should not be wrapped.

To use shim, simply place a DER-encoded public certificate in a file such as
pub.cer and build with "make VENDOR_CERT_FILE=pub.cer".