@jbicha, current implementation is to disable verification for the dkms
built modules in shim, making secure boot not that secure. An
alternative way would be assisting users sign the built modules (which
has key management problem). I'm not quite sure which way is preferred
in upstream and/or Debian.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to dkms in Ubuntu.
https://bugs.launchpad.net/bugs/1651124

Title:
   Please merge dkms 2.3-1 from Debian testing  (main)

Status in dkms package in Ubuntu:
  New

Bug description:
  dkms upstream has become back to life in recent months, and merged
  many patches from downstream communities, thus merging with the new
  release is worthy to get old bug fixed and new features incorporated.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dkms/+bug/1651124/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to