summaryrefslogtreecommitdiffstats
path: root/meta/recipes-devtools/go
diff options
context:
space:
mode:
authorRalph Siemsen <ralph.siemsen@linaro.org>2022-11-17 11:54:54 -0500
committerRichard Purdie <richard.purdie@linuxfoundation.org>2022-12-07 15:06:37 +0000
commitd9cfb16b8be00e62148f8fc08f953b088364ce9f (patch)
tree5354ae725bd1bd691825db69620ea9426e42ca5f /meta/recipes-devtools/go
parent122b22b36622ac416da64425bbf25df9625c84db (diff)
downloadpoky-d9cfb16b8be00e62148f8fc08f953b088364ce9f.tar.gz
golang: ignore CVE-2021-41772
Dunfell uses golang 1.14 which does not contain the affected code (it was introduced in golang 1.16). From the golang announcement [1] "Reader.Open (the API implementing io/fs.FS introduced in Go 1.16) can be made to panic by an attacker providing either a crafted ZIP archive containing completely invalid names or an empty filename argument. [1] https://groups.google.com/g/golang-announce/c/0fM21h43arc (From OE-Core rev: 2329902f994b631d6b77e8bd501d5599db6d5306) Signed-off-by: Ralph Siemsen <ralph.siemsen@linaro.org> Signed-off-by: Steve Sakoman <steve@sakoman.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-devtools/go')
-rw-r--r--meta/recipes-devtools/go/go-1.14.inc3
1 files changed, 3 insertions, 0 deletions
diff --git a/meta/recipes-devtools/go/go-1.14.inc b/meta/recipes-devtools/go/go-1.14.inc
index ac4c4e9973..8c7df2dede 100644
--- a/meta/recipes-devtools/go/go-1.14.inc
+++ b/meta/recipes-devtools/go/go-1.14.inc
@@ -69,3 +69,6 @@ CVE_CHECK_WHITELIST += "CVE-2022-30634"
69 69
70# Issue is in golang.org/x/net/html/parse.go, not used in go compiler 70# Issue is in golang.org/x/net/html/parse.go, not used in go compiler
71CVE_CHECK_WHITELIST += "CVE-2021-33194" 71CVE_CHECK_WHITELIST += "CVE-2021-33194"
72
73# Issue introduced in go1.16, does not exist in 1.14
74CVE_CHECK_WHITELIST += "CVE-2021-41772"