shim-signed 1.33.1~14.04.4 source package in Ubuntu
Changelog
shim-signed (1.33.1~14.04.4) trusty; urgency=medium * update-secureboot-policy: (LP: #1748983) - Backport update-secureboot-policy changes to generate a MOK and guide users through re-enabling validation and automatically signing DKMS modules. * debian/shim-signed.postinst: - When triggered, explicitly try to enroll the available MOK. * debian/shim-signed.install, openssl.cnf: Install some default configuration for creating our self-signed key. * debian/shim-signed.dirs: make sure we have a directory where to put a MOK. * debian/templates: update templates for update-secureboot-policy changes. * debian/control: Breaks dkms (<< 2.2.0.3-1.1ubuntu5.14.04.10~) since we're changing the behavior of update-secureboot-policy. -- Mathieu Trudel-Lapierre <email address hidden> Mon, 28 Jan 2019 11:02:00 -0500
Upload details
- Uploaded by:
- Mathieu Trudel-Lapierre
- Uploaded to:
- Trusty
- Original maintainer:
- Steve Langasek
- Architectures:
- amd64
- Section:
- utils
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section |
---|
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
shim-signed_1.33.1~14.04.4.tar.xz | 313.4 KiB | 82bbb6549dbbcb84b32130287f6eb30a3c926ac8ab75839c6b503cd130addc46 |
shim-signed_1.33.1~14.04.4.dsc | 1.7 KiB | 772a595d463001ffd111834f62e7b786a2139f59257f2d25cf03ff00aeacbb3b |
Available diffs
Binary packages built by this source
- shim-signed: Secure Boot chain-loading bootloader (Microsoft-signed binary)
This package provides a minimalist boot loader which allows verifying
signatures of other UEFI binaries against either the Secure Boot DB/DBX or
against a built-in signature database. Its purpose is to allow a small,
infrequently-changing binary to be signed by the UEFI CA, while allowing
an OS distributor to revision their main bootloader independently of the CA.
.
This package contains the version of the bootloader binary signed by the
Microsoft UEFI CA.