Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: luaPackages.ljsyscall

Found 1 matching suggestions

View:
Compact
Detailed
Untriaged
Permalink CVE-2022-41716
6.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 6 months ago
Unsanitized NUL in environment variables on Windows in syscall and os/exec

Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".

Affected products

os/exec
  • <1.19.3
  • <1.18.8
syscall
  • <1.19.3
  • <1.18.8

Matching in nixpkgs

Package maintainers