Back to edk2 PTS page

Accepted edk2 2024.02-1 (source) into unstable



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 25 Feb 2024 15:34:27 -0700
Source: edk2
Architecture: source
Version: 2024.02-1
Distribution: unstable
Urgency: medium
Maintainer: Debian QEMU Team <pkg-qemu-devel@lists.alioth.debian.org>
Changed-By: dann frazier <dannf@debian.org>
Changes:
 edk2 (2024.02-1) unstable; urgency=medium
 .
   * New upstream release, based on edk2-stable202402 tag:
     - Stop including unused mbedtls source to avoid unnecessary
       security triage:
       + d/p/mbedtls-disable.diff
     - Drop patches merged upstream:
       + d/p/0001-SecurityPkg-DxeTpm2MeasureBootLib-SECURITY-PATCH-411.patch
       + d/p/0002-SecurityPkg-DxeTpmMeasureBootLib-SECURITY-PATCH-4117.patch
       + d/p/0003-SecurityPkg-Adding-CVE-2022-36763-to-SecurityFixes.y.patch
       + d/p/0001-SecurityPkg-DxeTpm2MeasureBootLib-SECURITY-PATCH-411-2.patch
       + d/p/0002-SecurityPkg-DxeTpmMeasureBootLib-SECURITY-PATCH-4118.patch
       + d/p/0003-SecurityPkg-Adding-CVE-2022-36764-to-SecurityFixes.y.patch
       + d/p/0001-SecurityPkg-DxeTpm2MeasureBootLib-SECURITY-PATCH-411-3.patch
       + d/p/0002-SecurityPkg-DxeTpmMeasureBootLib-SECURITY-PATCH-4117-2.patch
       + d/p/0003-SecurityPkg-Updating-SecurityFixes.yaml-after-symbol.patch
       + d/p/0001-UefiPayloadPkg-Hob-Integer-Overflow-in-CreateHob.patch
       + d/p/0001-NetworkPkg-Dhcp6Dxe-SECURITY-PATCH-CVE-2023-45230-Pa.patch
       + d/p/0002-NetworkPkg-Add-Unit-tests-to-CI-and-create-Host-Test.patch
       + d/p/0003-NetworkPkg-Dhcp6Dxe-SECURITY-PATCH-CVE-2023-45230-Un.patch
       + d/p/0004-NetworkPkg-Dhcp6Dxe-SECURITY-PATCH-CVE-2023-45229-Pa.patch
       + d/p/0005-NetworkPkg-Dhcp6Dxe-SECURITY-PATCH-CVE-2023-45229-Un.patch
       + d/p/0006-NetworkPkg-Ip6Dxe-SECURITY-PATCH-CVE-2023-45231-Patc.patch
       + d/p/0007-NetworkPkg-Ip6Dxe-SECURITY-PATCH-CVE-2023-45231-Unit.patch
       + d/p/0008-NetworkPkg-Ip6Dxe-SECURITY-PATCH-CVE-2023-45232-Patc.patch
       + d/p/0009-NetworkPkg-Ip6Dxe-SECURITY-PATCH-CVE-2023-45232-Unit.patch
       + d/p/0010-NetworkPkg-UefiPxeBcDxe-SECURITY-PATCH-CVE-2023-4523.patch
       + d/p/0011-NetworkPkg-UefiPxeBcDxe-SECURITY-PATCH-CVE-2023-4523.patch
       + d/p/0012-MdePkg-Test-Add-gRT_GetTime-Google-Test-Mock.patch
       + d/p/0013-NetworkPkg-UefiPxeBcDxe-SECURITY-PATCH-CVE-2023-4523.patch
       + d/p/0014-NetworkPkg-UefiPxeBcDxe-SECURITY-PATCH-CVE-2023-4523.patch
       + d/p/0015-NetworkPkg-Adds-a-SecurityFix.yaml-file.patch
    * d/binary-check.ignore: Remove globs that no longer match anything.
Checksums-Sha1:
 b881bad7bbb96e06b53a2482eab26624f6a01afc 3053 edk2_2024.02-1.dsc
 79eb3498977a8f22e03958314d0a8687acf0f60f 21761992 edk2_2024.02.orig.tar.xz
 f0785d84f832ff9fff8529e86d02db075008d726 42300 edk2_2024.02-1.debian.tar.xz
 0e8d30f330fd0341fc9140fe466c5026d56e42bd 12030 edk2_2024.02-1_source.buildinfo
Checksums-Sha256:
 4a0e5bf9e19250d78a5e1d3df5a9796c9d5255a55ff2ced948f10a2be77c0cb8 3053 edk2_2024.02-1.dsc
 3986e42620845cf799ed2cc863fe97603a433e64842e335fe8f4746d9b3b5b21 21761992 edk2_2024.02.orig.tar.xz
 6de0181a09789003357ec7ec15a439e484c19ae72cf57a4eda27d6c65d41cc09 42300 edk2_2024.02-1.debian.tar.xz
 78d40d2d2e0a7fcefb8c7332161ab8985421ef9544c2328f806d7d7b5579495f 12030 edk2_2024.02-1_source.buildinfo
Files:
 96d00db03e0d19be2f6298c58e65a052 3053 misc optional edk2_2024.02-1.dsc
 ad9d5654f65fa6dddf40846d3275ca5b 21761992 misc optional edk2_2024.02.orig.tar.xz
 1ad194438dd85061a9d11f82521c4863 42300 misc optional edk2_2024.02-1.debian.tar.xz
 3b01521e6ecad866cb45e09592233b53 12030 misc optional edk2_2024.02-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=RADP
-----END PGP SIGNATURE-----

Attachment: pgpUAyc1teT6I.pgp
Description: PGP signature