shim-signed 1.34.5 source package in Ubuntu
Changelog
shim-signed (1.34.5) bionic; urgency=medium * Don't try to save new dkms list if we're still dealing with password validation for enrollment. (LP: #1766312) * Specify kernel version when installing/uninstalling modules while doing batch signing on upgrade. * Do a better job at finding kernel modules from DKMS if they are in sub- directories. * Don't prompt if DKMS is installed but there are no DKMS-built modules installed. (LP: #1766261) -- Mathieu Trudel-Lapierre <email address hidden> Mon, 23 Apr 2018 15:29:44 -0400
Upload details
- Uploaded by:
- Mathieu Trudel-Lapierre
- Uploaded to:
- Bionic
- Original maintainer:
- Steve Langasek
- Architectures:
- amd64
- Section:
- utils
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section |
---|
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
shim-signed_1.34.5.tar.xz | 313.6 KiB | d34597a9a6945a78506202ba7b06a62a51af15d0b9061b6f28782a6ed3ab007b |
shim-signed_1.34.5.dsc | 1.6 KiB | dc6ae5634b255f8f94841c44545b2f47ab726e12ac825893c239dde3c1128fbd |
Available diffs
- diff from 1.34.4 to 1.34.5 (1.1 KiB)
Binary packages built by this source
- shim-signed: Secure Boot chain-loading bootloader (Microsoft-signed binary)
This package provides a minimalist boot loader which allows verifying
signatures of other UEFI binaries against either the Secure Boot DB/DBX or
against a built-in signature database. Its purpose is to allow a small,
infrequently-changing binary to be signed by the UEFI CA, while allowing
an OS distributor to revision their main bootloader independently of the CA.
.
This package contains the version of the bootloader binary signed by the
Microsoft UEFI CA.