[MIR] tboot
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
intel |
Invalid
|
Undecided
|
Unassigned | ||
tboot (Ubuntu) |
Won't Fix
|
Undecided
|
Unassigned |
Bug Description
[Background information]:
Trusted Boot (tboot) is an open source, pre-kernel/VMM module that uses Intel Trusted Execution Technology (Intel TXT) to perform a measured and verified launch of an OS kernel/VMM.
[Availability]: In the Ubuntu universe since 11.10.
[Rationale]: This package is required to take advantage of Intel Trusted Execution Technology.
[Security]:
CVE(http://
Secunia Advisory(http://
All tools are installed into /usr/sbin/.
[Quality assurance]: No obvious issues with the MIR requirements
[UI standard]: Not applicable
[Dependencies]: Build dependencies: libtspi-dev, libssl-dev. Binary dependencie: libc6 (>= 2.14) libssl1.0.0 (>= 1.0.0) libtspi1 (>= 0.3.1) zlib1g (>= 1:1.1.4) .
[Standards compliance]: No issues identified
[Maintenance]: TBD.
description: | updated |
visibility: | private → public |
Changed in tboot (Ubuntu): | |
assignee: | nobody → Jamie Strandboge (jdstrand) |
Changed in intel: | |
status: | New → Invalid |
Based on conversations outside of this bug, I am unassigning myself for now. When it is clear that this is something that Foundations or Server wants, please feel free to assign back to me.