CVE Vulnerabilities

CVE-2022-41716

Published: Nov 02, 2022 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
NEGLIGIBLE
root.io logo minimus.io logo echo.ai logo

Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string A=Bx00C=D sets the variables A=B and C=D.

Affected Software

NameVendorStart VersionEnd Version
GoGolang*1.18.8 (excluding)
GoGolang1.19.0 (including)1.19.3 (excluding)
GolangUbuntutrusty*
GolangUbuntuxenial*
Golang-1.10Ubuntubionic*
Golang-1.10Ubuntutrusty*
Golang-1.10Ubuntutrusty/esm*
Golang-1.10Ubuntuxenial*
Golang-1.13Ubuntubionic*
Golang-1.13Ubuntufocal*
Golang-1.13Ubuntukinetic*
Golang-1.13Ubuntuxenial*
Golang-1.14Ubuntufocal*
Golang-1.16Ubuntubionic*
Golang-1.16Ubuntufocal*
Golang-1.16Ubuntutrusty*
Golang-1.16Ubuntuxenial*
Golang-1.17Ubuntutrusty*
Golang-1.17Ubuntuxenial*
Golang-1.18Ubuntubionic*
Golang-1.18Ubuntufocal*
Golang-1.18Ubuntutrusty*
Golang-1.18Ubuntuxenial*
Golang-1.19Ubuntukinetic*
Golang-1.19Ubuntulunar*
Golang-1.19Ubuntutrusty*
Golang-1.19Ubuntuxenial*
Golang-1.20Ubuntufocal*
Golang-1.20Ubuntulunar*
Golang-1.20Ubuntumantic*
Golang-1.20Ubuntutrusty*
Golang-1.20Ubuntuxenial*
Golang-1.6Ubuntutrusty*
Golang-1.6Ubuntuxenial*
Golang-1.8Ubuntubionic*
Golang-1.9Ubuntubionic*

References