]> git.ipfire.org Git - thirdparty/openembedded/openembedded-core-contrib.git/commitdiff
go: set status of CVE-2024-3566
authorPeter Marko <peter.marko@siemens.com>
Thu, 19 Jun 2025 16:50:18 +0000 (18:50 +0200)
committerSteve Sakoman <steve@sakoman.com>
Fri, 20 Jun 2025 15:49:28 +0000 (08:49 -0700)
NVD ([1]) tracks this as:
cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*
Running on/with
  cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Yocto cve-check ignores the "Running on/with", so it needs to be ignored
explicitly.

[1] https://nvd.nist.gov/vuln/detail/CVE-2024-3566

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
meta/recipes-devtools/go/go-binary-native_1.22.12.bb
meta/recipes-devtools/go/go-common.inc

index 747737ff94044d8ecc5425f7d5d9c1d68ac26416..b15b60a69165a005dfae52c182dd9607927b7fe4 100644 (file)
@@ -17,6 +17,7 @@ UPSTREAM_CHECK_URI = "https://golang.org/dl/"
 UPSTREAM_CHECK_REGEX = "go(?P<pver>\d+(\.\d+)+)\.linux"
 
 CVE_PRODUCT = "golang:go"
+CVE_STATUS[CVE-2024-3566] = "not-applicable-platform: Issue only applies on Windows"
 
 S = "${WORKDIR}/go"
 
index db165792dcb1d647d06f0b01553d1675a7c1e52f..a39dea6c1cb52fda5807259d5f0556eb11296e85 100644 (file)
@@ -21,6 +21,7 @@ UPSTREAM_CHECK_REGEX = "(?P<pver>\d+(\.\d+)+)\.src\.tar"
 
 # all recipe variants are created from the same product
 CVE_PRODUCT = "golang:go"
+CVE_STATUS[CVE-2024-3566] = "not-applicable-platform: Issue only applies on Windows"
 
 INHIBIT_PACKAGE_DEBUG_SPLIT = "1"
 SSTATE_SCAN_CMD = "true"