@jbicha, current implementation is to disable verification for the dkms built modules in shim, making secure boot not that secure. An alternative way would be assisting users sign the built modules (which has key management problem). I'm not quite sure which way is preferred in upstream and/or Debian.
-- You received this bug notification because you are a member of Kernel Packages, which is subscribed to dkms in Ubuntu. https://bugs.launchpad.net/bugs/1651124 Title: Please merge dkms 2.3-1 from Debian testing (main) Status in dkms package in Ubuntu: New Bug description: dkms upstream has become back to life in recent months, and merged many patches from downstream communities, thus merging with the new release is worthy to get old bug fixed and new features incorporated. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/dkms/+bug/1651124/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp