golang: ignore CVE-2021-41772

Dunfell uses golang 1.14 which does not contain the affected code (it
was introduced in golang 1.16). From the golang announcement [1]

"Reader.Open (the API implementing io/fs.FS introduced in Go 1.16) can
be made to panic by an attacker providing either a crafted ZIP archive
containing completely invalid names or an empty filename argument.

[1] https://groups.google.com/g/golang-announce/c/0fM21h43arc

(From OE-Core rev: 2329902f994b631d6b77e8bd501d5599db6d5306)

Signed-off-by: Ralph Siemsen <ralph.siemsen@linaro.org>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
This commit is contained in:
Ralph Siemsen
2022-11-17 11:54:54 -05:00
committed by Richard Purdie
parent 122b22b366
commit d9cfb16b8b

View File

@@ -69,3 +69,6 @@ CVE_CHECK_WHITELIST += "CVE-2022-30634"
# Issue is in golang.org/x/net/html/parse.go, not used in go compiler
CVE_CHECK_WHITELIST += "CVE-2021-33194"
# Issue introduced in go1.16, does not exist in 1.14
CVE_CHECK_WHITELIST += "CVE-2021-41772"