mirror of
https://git.yoctoproject.org/poky
synced 2026-04-20 09:32:13 +02:00
golang: ignore CVE-2021-41772
Dunfell uses golang 1.14 which does not contain the affected code (it was introduced in golang 1.16). From the golang announcement [1] "Reader.Open (the API implementing io/fs.FS introduced in Go 1.16) can be made to panic by an attacker providing either a crafted ZIP archive containing completely invalid names or an empty filename argument. [1] https://groups.google.com/g/golang-announce/c/0fM21h43arc (From OE-Core rev: 2329902f994b631d6b77e8bd501d5599db6d5306) Signed-off-by: Ralph Siemsen <ralph.siemsen@linaro.org> Signed-off-by: Steve Sakoman <steve@sakoman.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
This commit is contained in:
committed by
Richard Purdie
parent
122b22b366
commit
d9cfb16b8b
@@ -69,3 +69,6 @@ CVE_CHECK_WHITELIST += "CVE-2022-30634"
|
||||
|
||||
# Issue is in golang.org/x/net/html/parse.go, not used in go compiler
|
||||
CVE_CHECK_WHITELIST += "CVE-2021-33194"
|
||||
|
||||
# Issue introduced in go1.16, does not exist in 1.14
|
||||
CVE_CHECK_WHITELIST += "CVE-2021-41772"
|
||||
|
||||
Reference in New Issue
Block a user