shim-signed (1.33.1~14.04.4) trusty; urgency=medium * update-secureboot-policy: (LP: #1748983) - Backport update-secureboot-policy changes to generate a MOK and guide users through re-enabling validation and automatically signing DKMS modules. * debian/shim-signed.postinst: - When triggered, explicitly try to enroll the available MOK. * debian/shim-signed.install, openssl.cnf: Install some default configuration for creating our self-signed key. * debian/shim-signed.dirs: make sure we have a directory where to put a MOK. * debian/templates: update templates for update-secureboot-policy changes. * debian/control: Breaks dkms (<< 2.2.0.3-1.1ubuntu5.14.04.10~) since we're changing the behavior of update-secureboot-policy.
Date: Mon, 28 Jan 2019 11:02:00 -0500 Changed-By: Mathieu Trudel-Lapierre <cypher...@ubuntu.com> Maintainer: Steve Langasek <steve.langa...@ubuntu.com> https://launchpad.net/ubuntu/+source/shim-signed/1.33.1~14.04.4
Format: 1.8 Date: Mon, 28 Jan 2019 11:02:00 -0500 Source: shim-signed Binary: shim-signed Architecture: source Version: 1.33.1~14.04.4 Distribution: trusty Urgency: medium Maintainer: Steve Langasek <steve.langa...@ubuntu.com> Changed-By: Mathieu Trudel-Lapierre <cypher...@ubuntu.com> Description: shim-signed - Secure Boot chain-loading bootloader (Microsoft-signed binary) Launchpad-Bugs-Fixed: 1748983 Changes: shim-signed (1.33.1~14.04.4) trusty; urgency=medium . * update-secureboot-policy: (LP: #1748983) - Backport update-secureboot-policy changes to generate a MOK and guide users through re-enabling validation and automatically signing DKMS modules. * debian/shim-signed.postinst: - When triggered, explicitly try to enroll the available MOK. * debian/shim-signed.install, openssl.cnf: Install some default configuration for creating our self-signed key. * debian/shim-signed.dirs: make sure we have a directory where to put a MOK. * debian/templates: update templates for update-secureboot-policy changes. * debian/control: Breaks dkms (<< 2.2.0.3-1.1ubuntu5.14.04.10~) since we're changing the behavior of update-secureboot-policy. Checksums-Sha1: 035f3c0d58a9d98e850a00cadd1d56a2f0ef0f27 1692 shim-signed_1.33.1~14.04.4.dsc 02e4d9555899507ad688632959a0f2dcfb913c7e 320952 shim-signed_1.33.1~14.04.4.tar.xz 023653702a35d03d4c18c85e17954aafa1238bec 5945 shim-signed_1.33.1~14.04.4_source.buildinfo Checksums-Sha256: 772a595d463001ffd111834f62e7b786a2139f59257f2d25cf03ff00aeacbb3b 1692 shim-signed_1.33.1~14.04.4.dsc 82bbb6549dbbcb84b32130287f6eb30a3c926ac8ab75839c6b503cd130addc46 320952 shim-signed_1.33.1~14.04.4.tar.xz 200977c5d00c954b439e2a6b3b2870271d2dab3ab18a7e89c473e81c1ab7f4fd 5945 shim-signed_1.33.1~14.04.4_source.buildinfo Files: 5e6a1c4152046903ee60fef1478596ee 1692 utils optional shim-signed_1.33.1~14.04.4.dsc 8330baeb2e708a22df2f1b2fb0c21d7b 320952 utils optional shim-signed_1.33.1~14.04.4.tar.xz 7e13707c553762ab3d00edbff58f15e1 5945 utils optional shim-signed_1.33.1~14.04.4_source.buildinfo
-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes