Permalink
CVE-2022-41716
6.3 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): LOW
Unsanitized NUL in environment variables on Windows in syscall and os/exec
Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
References
- https://go.dev/issue/56284
- https://go.dev/cl/446916
- https://groups.google.com/g/golang-announce/c/mbHY1UY3BaM/m/hSpmRzk-AgAJ
- https://pkg.go.dev/vuln/GO-2022-1095
- https://security.netapp.com/advisory/ntap-20230120-0007/
- https://go.dev/issue/56284
- https://go.dev/cl/446916
- https://groups.google.com/g/golang-announce/c/mbHY1UY3BaM/m/hSpmRzk-AgAJ
- https://pkg.go.dev/vuln/GO-2022-1095
- https://security.netapp.com/advisory/ntap-20230120-0007/
- https://go.dev/issue/56284
- https://go.dev/cl/446916
- https://groups.google.com/g/golang-announce/c/mbHY1UY3BaM/m/hSpmRzk-AgAJ
- https://pkg.go.dev/vuln/GO-2022-1095
- https://security.netapp.com/advisory/ntap-20230120-0007/
- https://go.dev/issue/56284 x_transferred
- https://go.dev/cl/446916 x_transferred
- https://groups.google.com/g/golang-announce/c/mbHY1UY3BaM/m/hSpmRzk-AgAJ x_transferred
- https://pkg.go.dev/vuln/GO-2022-1095 x_transferred
- https://pkg.go.dev/vuln/GO-2022-1095
- https://go.dev/issue/56284
- https://go.dev/cl/446916
- https://groups.google.com/g/golang-announce/c/mbHY1UY3BaM/m/hSpmRzk-AgAJ
- https://security.netapp.com/advisory/ntap-20230120-0007/
- https://go.dev/issue/56284 x_transferred
- https://go.dev/cl/446916 x_transferred
- https://groups.google.com/g/golang-announce/c/mbHY1UY3BaM/m/hSpmRzk-AgAJ x_transferred
- https://pkg.go.dev/vuln/GO-2022-1095 x_transferred
Affected products
os/exec
- <1.19.3
- <1.18.8
syscall
- <1.19.3
- <1.18.8
Matching in nixpkgs
pkgs.syscall_limiter
Start Linux programs with only selected syscalls enabled
-
nixos-unstable -
- nixpkgs-unstable 2017-01-23
pkgs.luaPackages.ljsyscall
None
-
nixos-unstable -
- nixpkgs-unstable 20180515
pkgs.lua51Packages.ljsyscall
None
-
nixos-unstable -
- nixpkgs-unstable 20180515
pkgs.lua52Packages.ljsyscall
None
-
nixos-unstable -
- nixpkgs-unstable 20180515
pkgs.luajitPackages.ljsyscall
None
-
nixos-unstable -
- nixpkgs-unstable 20180515
Package maintainers
-
@obadz obadz <obadz-nixos@obadz.com>