shim-signed 1.34.1 source package in Ubuntu
Changelog
shim-signed (1.34.1) bionic; urgency=medium * update-secureboot-policy: don't skip creating a MOK if Secure Boot is not enabled in firmware, but do guard against prompting users on a system that doesn't have efivars mounted or where SB is disabled. (LP: #1765515) -- Mathieu Trudel-Lapierre <email address hidden> Thu, 19 Apr 2018 17:56:50 -0400
Upload details
- Uploaded by:
- Mathieu Trudel-Lapierre
- Uploaded to:
- Bionic
- Original maintainer:
- Steve Langasek
- Architectures:
- amd64
- Section:
- utils
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section |
---|
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
shim-signed_1.34.1.tar.xz | 313.1 KiB | 4eb40c0070890195f4877704cf0fb7665cb3ca5cce1f48968801d314e1a61bac |
shim-signed_1.34.1.dsc | 1.6 KiB | 4c5451319fd3d1eefc3534daab1c5d20393f9ba7d274373b193082a36ca1336b |
Available diffs
- diff from 1.34 to 1.34.1 (855 bytes)
Binary packages built by this source
- shim-signed: Secure Boot chain-loading bootloader (Microsoft-signed binary)
This package provides a minimalist boot loader which allows verifying
signatures of other UEFI binaries against either the Secure Boot DB/DBX or
against a built-in signature database. Its purpose is to allow a small,
infrequently-changing binary to be signed by the UEFI CA, while allowing
an OS distributor to revision their main bootloader independently of the CA.
.
This package contains the version of the bootloader binary signed by the
Microsoft UEFI CA.