shim-signed 1.34.7 source package in Ubuntu
Changelog
shim-signed (1.34.7) bionic; urgency=medium * debian/shim-signed.postinst: it's not guaranteed that all linux-image packages currently installed have dkms modules built for them. Gracefully handle any failures in the path for signing existing dkms modules on upgrade due to absent modules. LP: #1766391. * Add a dependency on sbsigntool for kmodsign, which we use directly. -- Steve Langasek <email address hidden> Mon, 23 Apr 2018 21:47:50 -0700
Upload details
- Uploaded by:
- Steve Langasek
- Uploaded to:
- Bionic
- Original maintainer:
- Steve Langasek
- Architectures:
- amd64
- Section:
- utils
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section |
---|
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
shim-signed_1.34.7.tar.xz | 313.9 KiB | 74aefa78372c4d14239745d7fa64a6f6a08291e56f73050405ea6f0b26d067ce |
shim-signed_1.34.7.dsc | 1.6 KiB | df010bf9f3de3c00c084422f52e7594a0dbd3364b156e32e3c91ade6685c9297 |
Available diffs
- diff from 1.34.6 to 1.34.7 (1.1 KiB)
Binary packages built by this source
- shim-signed: Secure Boot chain-loading bootloader (Microsoft-signed binary)
This package provides a minimalist boot loader which allows verifying
signatures of other UEFI binaries against either the Secure Boot DB/DBX or
against a built-in signature database. Its purpose is to allow a small,
infrequently-changing binary to be signed by the UEFI CA, while allowing
an OS distributor to revision their main bootloader independently of the CA.
.
This package contains the version of the bootloader binary signed by the
Microsoft UEFI CA.