shim-signed 1.34.7 source package in Ubuntu

Changelog

shim-signed (1.34.7) bionic; urgency=medium

  * debian/shim-signed.postinst: it's not guaranteed that all linux-image
    packages currently installed have dkms modules built for them.
    Gracefully handle any failures in the path for signing existing dkms
    modules on upgrade due to absent modules.  LP: #1766391.
  * Add a dependency on sbsigntool for kmodsign, which we use directly.

 -- Steve Langasek <email address hidden>  Mon, 23 Apr 2018 21:47:50 -0700

Upload details

Uploaded by:
Steve Langasek
Uploaded to:
Bionic
Original maintainer:
Steve Langasek
Architectures:
amd64
Section:
utils
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Builds

Bionic: [FULLYBUILT] amd64

Downloads

File Size SHA-256 Checksum
shim-signed_1.34.7.tar.xz 313.9 KiB 74aefa78372c4d14239745d7fa64a6f6a08291e56f73050405ea6f0b26d067ce
shim-signed_1.34.7.dsc 1.6 KiB df010bf9f3de3c00c084422f52e7594a0dbd3364b156e32e3c91ade6685c9297

Available diffs

View changes file

Binary packages built by this source

shim-signed: Secure Boot chain-loading bootloader (Microsoft-signed binary)

 This package provides a minimalist boot loader which allows verifying
 signatures of other UEFI binaries against either the Secure Boot DB/DBX or
 against a built-in signature database. Its purpose is to allow a small,
 infrequently-changing binary to be signed by the UEFI CA, while allowing
 an OS distributor to revision their main bootloader independently of the CA.
 .
 This package contains the version of the bootloader binary signed by the
 Microsoft UEFI CA.