Message ID | 20221117165456.1029099-10-ralph.siemsen@linaro.org |
---|---|
State | Accepted, archived |
Commit | 54c40730bc54aa2b2c12b37decbcc99bbcafd07a |
Headers | show |
Series | [dunfell,01/11] golang: fix CVE-2021-33195 | expand |
diff --git a/meta/recipes-devtools/go/go-1.14.inc b/meta/recipes-devtools/go/go-1.14.inc index ef33bf5afb..4c10104aca 100644 --- a/meta/recipes-devtools/go/go-1.14.inc +++ b/meta/recipes-devtools/go/go-1.14.inc @@ -64,6 +64,7 @@ CVE_CHECK_WHITELIST += "CVE-2022-29526" # Issue only on windows CVE_CHECK_WHITELIST += "CVE-2022-29804" +CVE_CHECK_WHITELIST += "CVE-2022-30580" CVE_CHECK_WHITELIST += "CVE-2022-30634" # Issue is in golang.org/x/net/html/parse.go, not used in go compiler
Only affects Windows platform, as per the release announcement [1]: "If, on Windows, Cmd.Run, cmd.Start, cmd.Output, or cmd.CombinedOutput are executed when Cmd.Path is unset and, in the working directory, there are binaries named either "..com" or "..exe", they will be executed." [1] https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ Signed-off-by: Ralph Siemsen <ralph.siemsen@linaro.org> --- meta/recipes-devtools/go/go-1.14.inc | 1 + 1 file changed, 1 insertion(+)