diff options
author | Ralph Siemsen <ralph.siemsen@linaro.org> | 2022-11-17 11:54:54 -0500 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2022-11-23 00:26:19 +0000 |
commit | 2329902f994b631d6b77e8bd501d5599db6d5306 (patch) | |
tree | d6eecaff12b24583de9459cd0da1e240679e403c | |
parent | b8a851faef9990ccb41ded875fc79cf28abd4a4e (diff) | |
download | openembedded-core-contrib-2329902f994b631d6b77e8bd501d5599db6d5306.tar.gz |
golang: ignore CVE-2021-41772
Dunfell uses golang 1.14 which does not contain the affected code (it
was introduced in golang 1.16). From the golang announcement [1]
"Reader.Open (the API implementing io/fs.FS introduced in Go 1.16) can
be made to panic by an attacker providing either a crafted ZIP archive
containing completely invalid names or an empty filename argument.
[1] https://groups.google.com/g/golang-announce/c/0fM21h43arc
Signed-off-by: Ralph Siemsen <ralph.siemsen@linaro.org>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
-rw-r--r-- | meta/recipes-devtools/go/go-1.14.inc | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/meta/recipes-devtools/go/go-1.14.inc b/meta/recipes-devtools/go/go-1.14.inc index ac4c4e9973..8c7df2dede 100644 --- a/meta/recipes-devtools/go/go-1.14.inc +++ b/meta/recipes-devtools/go/go-1.14.inc @@ -69,3 +69,6 @@ CVE_CHECK_WHITELIST += "CVE-2022-30634" # Issue is in golang.org/x/net/html/parse.go, not used in go compiler CVE_CHECK_WHITELIST += "CVE-2021-33194" + +# Issue introduced in go1.16, does not exist in 1.14 +CVE_CHECK_WHITELIST += "CVE-2021-41772" |