Skip to content

[Medium] Patch opensc for CVE-2023-40660 and CVE-2024-1454#12617

Merged
jslobodzian merged 1 commit intomicrosoft:fasttrack/2.0from
v-smalavathu:v-smalavathu/opensc/CVE-2023-40660
Feb 27, 2025
Merged

[Medium] Patch opensc for CVE-2023-40660 and CVE-2024-1454#12617
jslobodzian merged 1 commit intomicrosoft:fasttrack/2.0from
v-smalavathu:v-smalavathu/opensc/CVE-2023-40660

Conversation

@v-smalavathu
Copy link
Copy Markdown
Contributor

@v-smalavathu v-smalavathu commented Feb 25, 2025

Merge Checklist

All boxes should be checked before merging the PR (just tick any boxes which don't apply to this PR)

  • The toolchain has been rebuilt successfully (or no changes were made to it)
  • The toolchain/worker package manifests are up-to-date
  • Any updated packages successfully build (or no packages were changed)
  • Packages depending on static components modified in this PR (Golang, *-static subpackages, etc.) have had their Release tag incremented.
  • Package tests (%check section) have been verified with RUN_CHECK=y for existing SPEC files, or added to new SPEC files
  • All package sources are available
  • cgmanifest files are up-to-date and sorted (./cgmanifest.json, ./toolkit/scripts/toolchain/cgmanifest.json, .github/workflows/cgmanifest.json)
  • LICENSE-MAP files are up-to-date (./LICENSES-AND-NOTICES/SPECS/data/licenses.json, ./LICENSES-AND-NOTICES/SPECS/LICENSES-MAP.md, ./LICENSES-AND-NOTICES/SPECS/LICENSE-EXCEPTIONS.PHOTON)
  • All source files have up-to-date hashes in the *.signatures.json files
  • sudo make go-tidy-all and sudo make go-test-coverage pass
  • Documentation has been updated to match any changes to the build system
  • Ready to merge

Summary

opensc: Patch for CVE-2023-40660 and CVE-2024-1454

Change Log
Does this affect the toolchain?

NO

Associated issues
  • #xxxx
Links to CVEs
Test Methodology
  • Pipeline build id: xxxx

Signed-off-by: Sreenivasulu Malavathula <v-smalavathu@microsoft.com>
@v-smalavathu v-smalavathu requested a review from a team as a code owner February 25, 2025 22:24
@microsoft-github-policy-service microsoft-github-policy-service Bot added Packaging fasttrack/2.0 PRs Destined for Azure Linux 2.0 labels Feb 25, 2025
Copy link
Copy Markdown
Contributor

@Kanishk-Bansal Kanishk-Bansal left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

CVE number is wrong in the title.

@v-smalavathu v-smalavathu changed the title [Medium] opensc: Fix CVE-2023-40660 and CVE-2024-1453 opensc: Fix CVE-2023-40660 [Medium] and CVE-2024-1453 [Low] Feb 26, 2025
@v-smalavathu v-smalavathu changed the title opensc: Fix CVE-2023-40660 [Medium] and CVE-2024-1453 [Low] [Medium] opensc: Fix CVE-2023-40660 and CVE-2024-1454 Feb 26, 2025
@v-smalavathu
Copy link
Copy Markdown
Contributor Author

CVE number is wrong in the title.

Corrected..
-Thanks

@dmcilvaney
Copy link
Copy Markdown
Contributor

/AzurePipelines run

@azure-pipelines
Copy link
Copy Markdown

Azure Pipelines successfully started running 1 pipeline(s).

Copy link
Copy Markdown
Contributor

@dmcilvaney dmcilvaney left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@Kanishk-Bansal I think this looks good now?

@jslobodzian jslobodzian merged commit 994509c into microsoft:fasttrack/2.0 Feb 27, 2025
CBL-Mariner-Bot pushed a commit that referenced this pull request Feb 27, 2025
Signed-off-by: Sreenivasulu Malavathula <v-smalavathu@microsoft.com>
(cherry picked from commit 994509c)
@CBL-Mariner-Bot
Copy link
Copy Markdown
Collaborator

@v-smalavathu v-smalavathu changed the title [Medium] opensc: Fix CVE-2023-40660 and CVE-2024-1454 [Medium] Patch opensc for CVE-2023-40660 and CVE-2024-1454 Mar 14, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

fasttrack/2.0 PRs Destined for Azure Linux 2.0 Packaging

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants