shim-signed 1.34.5 source package in Ubuntu

Changelog

shim-signed (1.34.5) bionic; urgency=medium

  * Don't try to save new dkms list if we're still dealing with password
    validation for enrollment. (LP: #1766312)
  * Specify kernel version when installing/uninstalling modules while doing
    batch signing on upgrade.
  * Do a better job at finding kernel modules from DKMS if they are in sub-
    directories.
  * Don't prompt if DKMS is installed but there are no DKMS-built modules
    installed. (LP: #1766261)

 -- Mathieu Trudel-Lapierre <email address hidden>  Mon, 23 Apr 2018 15:29:44 -0400

Upload details

Uploaded by:
Mathieu Trudel-Lapierre
Uploaded to:
Bionic
Original maintainer:
Steve Langasek
Architectures:
amd64
Section:
utils
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Builds

Bionic: [FULLYBUILT] amd64

Downloads

File Size SHA-256 Checksum
shim-signed_1.34.5.tar.xz 313.6 KiB d34597a9a6945a78506202ba7b06a62a51af15d0b9061b6f28782a6ed3ab007b
shim-signed_1.34.5.dsc 1.6 KiB dc6ae5634b255f8f94841c44545b2f47ab726e12ac825893c239dde3c1128fbd

Available diffs

View changes file

Binary packages built by this source

shim-signed: Secure Boot chain-loading bootloader (Microsoft-signed binary)

 This package provides a minimalist boot loader which allows verifying
 signatures of other UEFI binaries against either the Secure Boot DB/DBX or
 against a built-in signature database. Its purpose is to allow a small,
 infrequently-changing binary to be signed by the UEFI CA, while allowing
 an OS distributor to revision their main bootloader independently of the CA.
 .
 This package contains the version of the bootloader binary signed by the
 Microsoft UEFI CA.