shim-signed 1.34.1 source package in Ubuntu

Changelog

shim-signed (1.34.1) bionic; urgency=medium

  * update-secureboot-policy: don't skip creating a MOK if Secure Boot is not
    enabled in firmware, but do guard against prompting users on a system that
    doesn't have efivars mounted or where SB is disabled. (LP: #1765515)

 -- Mathieu Trudel-Lapierre <email address hidden>  Thu, 19 Apr 2018 17:56:50 -0400

Upload details

Uploaded by:
Mathieu Trudel-Lapierre
Uploaded to:
Bionic
Original maintainer:
Steve Langasek
Architectures:
amd64
Section:
utils
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Builds

Bionic: [FULLYBUILT] amd64

Downloads

File Size SHA-256 Checksum
shim-signed_1.34.1.tar.xz 313.1 KiB 4eb40c0070890195f4877704cf0fb7665cb3ca5cce1f48968801d314e1a61bac
shim-signed_1.34.1.dsc 1.6 KiB 4c5451319fd3d1eefc3534daab1c5d20393f9ba7d274373b193082a36ca1336b

Available diffs

View changes file

Binary packages built by this source

shim-signed: Secure Boot chain-loading bootloader (Microsoft-signed binary)

 This package provides a minimalist boot loader which allows verifying
 signatures of other UEFI binaries against either the Secure Boot DB/DBX or
 against a built-in signature database. Its purpose is to allow a small,
 infrequently-changing binary to be signed by the UEFI CA, while allowing
 an OS distributor to revision their main bootloader independently of the CA.
 .
 This package contains the version of the bootloader binary signed by the
 Microsoft UEFI CA.