Merge branch 'c8' into a8
This commit is contained in:
commit
05cdfa96b6
2
.gitignore
vendored
2
.gitignore
vendored
@ -1 +1 @@
|
|||||||
SOURCES/shim-15.4.tar.bz2
|
SOURCES/shim-15.6.tar.bz2
|
||||||
|
@ -1 +1 @@
|
|||||||
d70485792a300bfa66f551adf7ae766451dfe7c0 SOURCES/shim-15.4.tar.bz2
|
3df0ab5cefc74fdf865cb36aea0e923cb4b6b3ed SOURCES/shim-15.6.tar.bz2
|
||||||
|
@ -1,32 +0,0 @@
|
|||||||
From 1bea91ba72165d97c3b453cf769cb4bc5c07207a Mon Sep 17 00:00:00 2001
|
|
||||||
From: Peter Jones <pjones@redhat.com>
|
|
||||||
Date: Wed, 31 Mar 2021 14:54:52 -0400
|
|
||||||
Subject: [PATCH] Fix a broken file header on ia32
|
|
||||||
|
|
||||||
Commit c6281c6a195edee61185 needs to have included a ". = ALIGN(4096)"
|
|
||||||
directive before .reloc, but fails to do so.
|
|
||||||
|
|
||||||
As a result, binutils, which does not care about the actual binary
|
|
||||||
format's constraints in any way, does not enforce the section alignment,
|
|
||||||
and it will not load.
|
|
||||||
|
|
||||||
Signed-off-by: Peter Jones <pjones@redhat.com>
|
|
||||||
---
|
|
||||||
elf_ia32_efi.lds | 1 +
|
|
||||||
1 file changed, 1 insertion(+)
|
|
||||||
|
|
||||||
diff --git a/elf_ia32_efi.lds b/elf_ia32_efi.lds
|
|
||||||
index 742e0a47a73..497a3a15265 100644
|
|
||||||
--- a/elf_ia32_efi.lds
|
|
||||||
+++ b/elf_ia32_efi.lds
|
|
||||||
@@ -15,6 +15,7 @@ SECTIONS
|
|
||||||
*(.gnu.linkonce.t.*)
|
|
||||||
_etext = .;
|
|
||||||
}
|
|
||||||
+ . = ALIGN(4096);
|
|
||||||
.reloc :
|
|
||||||
{
|
|
||||||
*(.reloc)
|
|
||||||
--
|
|
||||||
2.30.2
|
|
||||||
|
|
0
SOURCES/dbx.esl
Normal file
0
SOURCES/dbx.esl
Normal file
@ -1 +1 @@
|
|||||||
shim.cloudlinux,1,CloudLinux,shim,15.4-4,security@cloudlinux.com
|
shim.cloudlinux,2,CloudLinux,shim,15.6,security@cloudlinux.com
|
||||||
|
|
@ -20,9 +20,9 @@ fi
|
|||||||
findsource()
|
findsource()
|
||||||
{
|
{
|
||||||
(
|
(
|
||||||
cd "${RPM_BUILD_ROOT}"
|
cd ${RPM_BUILD_ROOT}
|
||||||
find usr/src/debug/ -type d | sed -e "s,^,%dir /," | sort -u | tac
|
find usr/src/debug/ -type d | sed "s,^,%dir /,"
|
||||||
find usr/src/debug/ -type f | sed -e "s,^,/," | sort -u | tac
|
find usr/src/debug/ -type f | sed "s,^,/,"
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -32,12 +32,9 @@ finddebug()
|
|||||||
declare -a dirs=()
|
declare -a dirs=()
|
||||||
declare -a files=()
|
declare -a files=()
|
||||||
declare -a excludes=()
|
declare -a excludes=()
|
||||||
declare -a tmp=()
|
|
||||||
|
|
||||||
pushd "${RPM_BUILD_ROOT}" >/dev/null 2>&1
|
pushd ${RPM_BUILD_ROOT} >/dev/null 2>&1
|
||||||
|
for x in $(find usr/lib/debug/ -type f -iname *.efi.debug); do
|
||||||
mapfile -t tmp < <(find usr/lib/debug/ -type f -iname "*.efi.debug")
|
|
||||||
for x in "${tmp[@]}" ; do
|
|
||||||
if ! [ -e "${x}" ]; then
|
if ! [ -e "${x}" ]; then
|
||||||
break
|
break
|
||||||
fi
|
fi
|
||||||
@ -60,10 +57,8 @@ finddebug()
|
|||||||
excludes[${#excludes[@]}]=${x%%.debug}
|
excludes[${#excludes[@]}]=${x%%.debug}
|
||||||
fi
|
fi
|
||||||
done
|
done
|
||||||
for x in "${files[@]}" ; do
|
for x in ${files[@]} ; do
|
||||||
declare name
|
declare name=$(dirname /${x})
|
||||||
|
|
||||||
name=$(dirname "/${x}")
|
|
||||||
while [ "${name}" != "/" ]; do
|
while [ "${name}" != "/" ]; do
|
||||||
case "${name}" in
|
case "${name}" in
|
||||||
"/usr/lib/debug"|"/usr/lib"|"/usr")
|
"/usr/lib/debug"|"/usr/lib"|"/usr")
|
||||||
@ -72,24 +67,24 @@ finddebug()
|
|||||||
dirs[${#dirs[@]}]=${name}
|
dirs[${#dirs[@]}]=${name}
|
||||||
;;
|
;;
|
||||||
esac
|
esac
|
||||||
name=$(dirname "${name}")
|
name=$(dirname ${name})
|
||||||
done
|
done
|
||||||
done
|
done
|
||||||
|
|
||||||
popd >/dev/null 2>&1
|
popd >/dev/null 2>&1
|
||||||
for x in "${dirs[@]}" ; do
|
for x in ${dirs[@]} ; do
|
||||||
echo "%dir ${x}"
|
echo "%dir ${x}"
|
||||||
done | sort | uniq
|
done | sort | uniq
|
||||||
for x in "${files[@]}" ; do
|
for x in ${files[@]} ; do
|
||||||
echo "/${x}"
|
echo "/${x}"
|
||||||
done | sort | uniq
|
done | sort | uniq
|
||||||
for x in "${excludes[@]}" ; do
|
for x in ${excludes[@]} ; do
|
||||||
echo "%exclude /${x}"
|
echo "%exclude /${x}"
|
||||||
done
|
done
|
||||||
}
|
}
|
||||||
|
|
||||||
findsource > "build-${mainarch}/debugsource.list"
|
findsource > build-${mainarch}/debugsource.list
|
||||||
finddebug "${mainarch}" > "build-${mainarch}/debugfiles.list"
|
finddebug ${mainarch} > build-${mainarch}/debugfiles.list
|
||||||
if [ -v altarch ]; then
|
if [ -v altarch ]; then
|
||||||
finddebug "${altarch}" > "build-${altarch}/debugfiles.list"
|
finddebug ${altarch} > build-${altarch}/debugfiles.list
|
||||||
fi
|
fi
|
||||||
|
0
SOURCES/shim.patches
Normal file
0
SOURCES/shim.patches
Normal file
@ -1,6 +1,13 @@
|
|||||||
%global pesign_vre 0.106-1
|
%global pesign_vre 0.106-1
|
||||||
|
%global gnuefi_vre 1:3.0.5-6
|
||||||
%global openssl_vre 1.0.2j
|
%global openssl_vre 1.0.2j
|
||||||
|
|
||||||
|
%global debug_package %{nil}
|
||||||
|
%global __debug_package 1
|
||||||
|
%global _binaries_in_noarch_packages_terminate_build 0
|
||||||
|
%global __debug_install_post %{SOURCE100} x64 ia32
|
||||||
|
%undefine _debuginfo_subpackages
|
||||||
|
|
||||||
%global efidir almalinux
|
%global efidir almalinux
|
||||||
%global shimrootdir %{_datadir}/shim/
|
%global shimrootdir %{_datadir}/shim/
|
||||||
%global shimversiondir %{shimrootdir}/%{version}-%{release}
|
%global shimversiondir %{shimrootdir}/%{version}-%{release}
|
||||||
@ -9,32 +16,24 @@
|
|||||||
%global efialtarch ia32
|
%global efialtarch ia32
|
||||||
%global shimaltdir %{shimversiondir}/%{efialtarch}
|
%global shimaltdir %{shimversiondir}/%{efialtarch}
|
||||||
|
|
||||||
%global debug_package %{nil}
|
|
||||||
%global __debug_package 1
|
|
||||||
%global _binaries_in_noarch_packages_terminate_build 0
|
|
||||||
%global __debug_install_post %{SOURCE100} %{efiarch} %{efialtarch}
|
|
||||||
%undefine _debuginfo_subpackages
|
|
||||||
|
|
||||||
# currently here's what's in our dbx: nothing
|
|
||||||
%global dbxfile %{nil}
|
|
||||||
|
|
||||||
Name: shim-unsigned-%{efiarch}
|
Name: shim-unsigned-%{efiarch}
|
||||||
Version: 15.4
|
Version: 15.6
|
||||||
Release: 4%{?dist}.alma
|
Release: 1.el8.alma
|
||||||
Summary: First-stage UEFI bootloader
|
Summary: First-stage UEFI bootloader
|
||||||
ExclusiveArch: x86_64
|
ExclusiveArch: x86_64
|
||||||
License: BSD
|
License: BSD
|
||||||
URL: https://github.com/rhboot/shim
|
URL: https://github.com/rhboot/shim
|
||||||
Source0: https://github.com/rhboot/shim/releases/download/%{version}/shim-%{version}.tar.bz2
|
Source0: https://github.com/rhboot/shim/releases/download/%{version}/shim-%{version}.tar.bz2
|
||||||
Source1: clsecureboot001.cer
|
Source1: clsecureboot001.cer
|
||||||
%if 0%{?dbxfile}
|
# currently here's what's in our dbx:
|
||||||
Source2: %{dbxfile}
|
# nothing.
|
||||||
%endif
|
Source2: dbx.esl
|
||||||
Source3: sbat.cloudlinux.csv
|
Source3: sbat.cloudlinux.csv
|
||||||
|
Source4: shim.patches
|
||||||
|
|
||||||
Source100: shim-find-debuginfo.sh
|
Source100: shim-find-debuginfo.sh
|
||||||
|
|
||||||
Patch0001: 0001-Fix-a-broken-file-header-on-ia32.patch
|
%include %{SOURCE4}
|
||||||
|
|
||||||
BuildRequires: gcc make
|
BuildRequires: gcc make
|
||||||
BuildRequires: elfutils-libelf-devel
|
BuildRequires: elfutils-libelf-devel
|
||||||
@ -68,6 +67,7 @@ Provides: bundled(openssl) = %{openssl_vre}
|
|||||||
|
|
||||||
%package debuginfo
|
%package debuginfo
|
||||||
Summary: Debug information for shim-unsigned-%{efiarch}
|
Summary: Debug information for shim-unsigned-%{efiarch}
|
||||||
|
Requires: %{name}-debugsource = %{version}-%{release}
|
||||||
Group: Development/Debug
|
Group: Development/Debug
|
||||||
AutoReqProv: 0
|
AutoReqProv: 0
|
||||||
BuildArch: noarch
|
BuildArch: noarch
|
||||||
@ -78,6 +78,7 @@ BuildArch: noarch
|
|||||||
%package -n shim-unsigned-%{efialtarch}-debuginfo
|
%package -n shim-unsigned-%{efialtarch}-debuginfo
|
||||||
Summary: Debug information for shim-unsigned-%{efialtarch}
|
Summary: Debug information for shim-unsigned-%{efialtarch}
|
||||||
Group: Development/Debug
|
Group: Development/Debug
|
||||||
|
Requires: %{name}-debugsource = %{version}-%{release}
|
||||||
AutoReqProv: 0
|
AutoReqProv: 0
|
||||||
BuildArch: noarch
|
BuildArch: noarch
|
||||||
|
|
||||||
@ -94,7 +95,7 @@ BuildArch: noarch
|
|||||||
%debug_desc
|
%debug_desc
|
||||||
|
|
||||||
%prep
|
%prep
|
||||||
%autosetup -S git -n shim-%{version}
|
%autosetup -S git_am -n shim-%{version}
|
||||||
git config --unset user.email
|
git config --unset user.email
|
||||||
git config --unset user.name
|
git config --unset user.name
|
||||||
mkdir build-%{efiarch}
|
mkdir build-%{efiarch}
|
||||||
@ -107,14 +108,12 @@ MAKEFLAGS="TOPDIR=.. -f ../Makefile COMMITID=${COMMITID} "
|
|||||||
MAKEFLAGS+="EFIDIR=%{efidir} PKGNAME=shim RELEASE=%{release} "
|
MAKEFLAGS+="EFIDIR=%{efidir} PKGNAME=shim RELEASE=%{release} "
|
||||||
MAKEFLAGS+="ENABLE_SHIM_HASH=true "
|
MAKEFLAGS+="ENABLE_SHIM_HASH=true "
|
||||||
MAKEFLAGS+="%{_smp_mflags}"
|
MAKEFLAGS+="%{_smp_mflags}"
|
||||||
if [ -f "%{SOURCE1}" ]; then
|
if [ -s "%{SOURCE1}" ]; then
|
||||||
MAKEFLAGS="$MAKEFLAGS VENDOR_CERT_FILE=%{SOURCE1}"
|
MAKEFLAGS="$MAKEFLAGS VENDOR_CERT_FILE=%{SOURCE1}"
|
||||||
fi
|
fi
|
||||||
%if 0%{?dbxfile}
|
if [ -s "%{SOURCE2}" ]; then
|
||||||
if [ -f "%{SOURCE2}" ]; then
|
|
||||||
MAKEFLAGS="$MAKEFLAGS VENDOR_DBX_FILE=%{SOURCE2}"
|
MAKEFLAGS="$MAKEFLAGS VENDOR_DBX_FILE=%{SOURCE2}"
|
||||||
fi
|
fi
|
||||||
%endif
|
|
||||||
|
|
||||||
cd build-%{efiarch}
|
cd build-%{efiarch}
|
||||||
make ${MAKEFLAGS} \
|
make ${MAKEFLAGS} \
|
||||||
@ -123,8 +122,7 @@ make ${MAKEFLAGS} \
|
|||||||
cd ..
|
cd ..
|
||||||
|
|
||||||
cd build-%{efialtarch}
|
cd build-%{efialtarch}
|
||||||
setarch linux32 -B make ${MAKEFLAGS} \
|
setarch linux32 -B make ${MAKEFLAGS} ARCH=%{efialtarch} \
|
||||||
ARCH=%{efialtarch} \
|
|
||||||
DEFAULT_LOADER='\\\\grub%{efialtarch}.efi' \
|
DEFAULT_LOADER='\\\\grub%{efialtarch}.efi' \
|
||||||
all
|
all
|
||||||
cd ..
|
cd ..
|
||||||
@ -133,15 +131,13 @@ cd ..
|
|||||||
COMMITID=$(cat commit)
|
COMMITID=$(cat commit)
|
||||||
MAKEFLAGS="TOPDIR=.. -f ../Makefile COMMITID=${COMMITID} "
|
MAKEFLAGS="TOPDIR=.. -f ../Makefile COMMITID=${COMMITID} "
|
||||||
MAKEFLAGS+="EFIDIR=%{efidir} PKGNAME=shim RELEASE=%{release} "
|
MAKEFLAGS+="EFIDIR=%{efidir} PKGNAME=shim RELEASE=%{release} "
|
||||||
MAKEFLAGS+="ENABLE_SHIM_HASH=true "
|
MAKEFLAGS+="ENABLE_HTTPBOOT=true ENABLE_SHIM_HASH=true "
|
||||||
if [ -f "%{SOURCE1}" ]; then
|
if [ -s "%{SOURCE1}" ]; then
|
||||||
MAKEFLAGS="$MAKEFLAGS VENDOR_CERT_FILE=%{SOURCE1}"
|
MAKEFLAGS="$MAKEFLAGS VENDOR_CERT_FILE=%{SOURCE1}"
|
||||||
fi
|
fi
|
||||||
%if 0%{?dbxfile}
|
if [ -s "%{SOURCE2}" ]; then
|
||||||
if [ -f "%{SOURCE2}" ]; then
|
|
||||||
MAKEFLAGS="$MAKEFLAGS VENDOR_DBX_FILE=%{SOURCE2}"
|
MAKEFLAGS="$MAKEFLAGS VENDOR_DBX_FILE=%{SOURCE2}"
|
||||||
fi
|
fi
|
||||||
%endif
|
|
||||||
|
|
||||||
cd build-%{efiarch}
|
cd build-%{efiarch}
|
||||||
make ${MAKEFLAGS} \
|
make ${MAKEFLAGS} \
|
||||||
@ -151,8 +147,7 @@ make ${MAKEFLAGS} \
|
|||||||
cd ..
|
cd ..
|
||||||
|
|
||||||
cd build-%{efialtarch}
|
cd build-%{efialtarch}
|
||||||
setarch linux32 make ${MAKEFLAGS} \
|
setarch linux32 make ${MAKEFLAGS} ARCH=%{efialtarch} \
|
||||||
ARCH=%{efialtarch} \
|
|
||||||
DEFAULT_LOADER='\\\\grub%{efialtarch}.efi' \
|
DEFAULT_LOADER='\\\\grub%{efialtarch}.efi' \
|
||||||
DESTDIR=${RPM_BUILD_ROOT} \
|
DESTDIR=${RPM_BUILD_ROOT} \
|
||||||
install-as-data install-debuginfo install-debugsource
|
install-as-data install-debuginfo install-debugsource
|
||||||
@ -163,18 +158,18 @@ cd ..
|
|||||||
%dir %{shimrootdir}
|
%dir %{shimrootdir}
|
||||||
%dir %{shimversiondir}
|
%dir %{shimversiondir}
|
||||||
%dir %{shimdir}
|
%dir %{shimdir}
|
||||||
|
%{shimdir}/*.CSV
|
||||||
%{shimdir}/*.efi
|
%{shimdir}/*.efi
|
||||||
%{shimdir}/*.hash
|
%{shimdir}/*.hash
|
||||||
%{shimdir}/*.CSV
|
|
||||||
|
|
||||||
%files -n shim-unsigned-%{efialtarch}
|
%files -n shim-unsigned-%{efialtarch}
|
||||||
%license COPYRIGHT
|
%license COPYRIGHT
|
||||||
%dir %{shimrootdir}
|
%dir %{shimrootdir}
|
||||||
%dir %{shimversiondir}
|
%dir %{shimversiondir}
|
||||||
%dir %{shimaltdir}
|
%dir %{shimaltdir}
|
||||||
|
%{shimaltdir}/*.CSV
|
||||||
%{shimaltdir}/*.efi
|
%{shimaltdir}/*.efi
|
||||||
%{shimaltdir}/*.hash
|
%{shimaltdir}/*.hash
|
||||||
%{shimaltdir}/*.CSV
|
|
||||||
|
|
||||||
%files debuginfo -f build-%{efiarch}/debugfiles.list
|
%files debuginfo -f build-%{efiarch}/debugfiles.list
|
||||||
|
|
||||||
@ -183,66 +178,52 @@ cd ..
|
|||||||
%files debugsource -f build-%{efiarch}/debugsource.list
|
%files debugsource -f build-%{efiarch}/debugsource.list
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
* Fri Apr 02 2021 Andrew Lukoshko <alukoshko@almalinux.org> - 15.4-4.alma
|
* Fri Jun 17 2022 Eduard Abdullin <eabdullin@almalinux.org> - 15.6-1.el8.alma
|
||||||
- Use CloudLinux vendor cert and SBAT entry
|
- Use CloudLinux vendor cert and SBAT entry
|
||||||
|
|
||||||
* Thu Apr 01 2021 Peter Jones <pjones@redhat.com> - 15.4-4
|
* Wed Jun 01 2022 Peter Jones <pjones@redhat.com> - 15.6-1.el8
|
||||||
- Fix the sbat data to actually match /this/ product.
|
- Update to shim-15.6
|
||||||
Resolves: CVE-2020-14372
|
Resolves: CVE-2022-28737
|
||||||
Resolves: CVE-2020-25632
|
|
||||||
Resolves: CVE-2020-25647
|
|
||||||
Resolves: CVE-2020-27749
|
|
||||||
Resolves: CVE-2020-27779
|
|
||||||
Resolves: CVE-2021-20225
|
|
||||||
Resolves: CVE-2021-20233
|
|
||||||
|
|
||||||
* Wed Mar 31 2021 Peter Jones <pjones@redhat.com> - 15.4-3
|
* Thu Sep 17 2020 Peter Jones <pjones@redhat.com> - 15-9.el8
|
||||||
- Build with the correct certificate trust list for this OS.
|
- Fix an incorrect allocation size.
|
||||||
Resolves: CVE-2020-14372
|
Related: rhbz#1877253
|
||||||
Resolves: CVE-2020-25632
|
|
||||||
Resolves: CVE-2020-25647
|
|
||||||
Resolves: CVE-2020-27749
|
|
||||||
Resolves: CVE-2020-27779
|
|
||||||
Resolves: CVE-2021-20225
|
|
||||||
Resolves: CVE-2021-20233
|
|
||||||
|
|
||||||
* Wed Mar 31 2021 Peter Jones <pjones@redhat.com> - 15.4-2
|
* Thu Jul 30 2020 Peter Jones <pjones@redhat.com> - 15-8
|
||||||
- Fix the ia32 build.
|
- Fix a load-address-dependent forever loop.
|
||||||
Resolves: CVE-2020-14372
|
Resolves: rhbz#1861977
|
||||||
Resolves: CVE-2020-25632
|
Related: CVE-2020-10713
|
||||||
Resolves: CVE-2020-25647
|
Related: CVE-2020-14308
|
||||||
Resolves: CVE-2020-27749
|
Related: CVE-2020-14309
|
||||||
Resolves: CVE-2020-27779
|
Related: CVE-2020-14310
|
||||||
Resolves: CVE-2021-20225
|
Related: CVE-2020-14311
|
||||||
Resolves: CVE-2021-20233
|
Related: CVE-2020-15705
|
||||||
|
Related: CVE-2020-15706
|
||||||
|
Related: CVE-2020-15707
|
||||||
|
|
||||||
* Tue Mar 30 2021 Peter Jones <pjones@redhat.com> - 15.4-1
|
* Sat Jul 25 2020 Peter Jones <pjones@redhat.com> - 15-7
|
||||||
- Update to shim 15.4
|
- Implement Lenny's workaround
|
||||||
- Support for revocations via the ".sbat" section and SBAT EFI variable
|
Related: CVE-2020-10713
|
||||||
- A new unit test framework and a bunch of unit tests
|
Related: CVE-2020-14308
|
||||||
- No external gnu-efi dependency
|
Related: CVE-2020-14309
|
||||||
- Better CI
|
Related: CVE-2020-14310
|
||||||
Resolves: CVE-2020-14372
|
Related: CVE-2020-14311
|
||||||
Resolves: CVE-2020-25632
|
|
||||||
Resolves: CVE-2020-25647
|
|
||||||
Resolves: CVE-2020-27749
|
|
||||||
Resolves: CVE-2020-27779
|
|
||||||
Resolves: CVE-2021-20225
|
|
||||||
Resolves: CVE-2021-20233
|
|
||||||
|
|
||||||
* Wed Mar 24 2021 Peter Jones <pjones@redhat.com> - 15.3-0~1
|
* Fri Jul 24 2020 Peter Jones <pjones@redhat.com> - 15-5
|
||||||
- Update to shim 15.3
|
- Once more with the MokListRT config table patch added.
|
||||||
- Support for revocations via the ".sbat" section and SBAT EFI variable
|
Related: CVE-2020-10713
|
||||||
- A new unit test framework and a bunch of unit tests
|
Related: CVE-2020-14308
|
||||||
- No external gnu-efi dependency
|
Related: CVE-2020-14309
|
||||||
- Better CI
|
Related: CVE-2020-14310
|
||||||
Resolves: CVE-2020-14372
|
Related: CVE-2020-14311
|
||||||
Resolves: CVE-2020-25632
|
|
||||||
Resolves: CVE-2020-25647
|
* Thu Jul 23 2020 Peter Jones <pjones@redhat.com> - 15-4
|
||||||
Resolves: CVE-2020-27749
|
- Rebuild for bug fixes and new signing keys
|
||||||
Resolves: CVE-2020-27779
|
Related: CVE-2020-10713
|
||||||
Resolves: CVE-2021-20225
|
Related: CVE-2020-14308
|
||||||
Resolves: CVE-2021-20233
|
Related: CVE-2020-14309
|
||||||
|
Related: CVE-2020-14310
|
||||||
|
Related: CVE-2020-14311
|
||||||
|
|
||||||
* Wed Jun 05 2019 Javier Martinez Canillas <javierm@redhat.com> - 15-3
|
* Wed Jun 05 2019 Javier Martinez Canillas <javierm@redhat.com> - 15-3
|
||||||
- Make EFI variable copying fatal only on secureboot enabled systems
|
- Make EFI variable copying fatal only on secureboot enabled systems
|
||||||
|
Loading…
Reference in New Issue
Block a user