Bugzilla – Bug 1204941
VUL-0: CVE-2022-41716: go1.18,go1.19: syscall, os/exec: unsanitized NUL in environment variables
Last modified: 2024-03-27 14:40:20 UTC
On Windows, syscall.StartProcess and os/exec.Cmd did not properly check for invalid environment variable values. A malicious environment variable value could exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" set the variables "A=B" and "C=D". Thanks to RyotaK (https://twitter.com/ryotkak) for reporting this issue. This is CVE-2022-41716 and Go issue https://go.dev/issue/56284.
This is an autogenerated message for OBS integration: This bug (1204941) was mentioned in https://build.opensuse.org/request/show/1032743 Factory / go1.18 https://build.opensuse.org/request/show/1032744 Factory / go1.19
SUSE-SU-2022:4054-1: An update that solves one vulnerability and has one errata is now available. Category: security (low) Bug References: 1200441,1204941 CVE References: CVE-2022-41716 JIRA References: Sources used: openSUSE Leap 15.4 (src): go1.19-1.19.3-150000.1.15.1 openSUSE Leap 15.3 (src): go1.19-1.19.3-150000.1.15.1 SUSE Linux Enterprise Module for Development Tools 15-SP4 (src): go1.19-1.19.3-150000.1.15.1 SUSE Linux Enterprise Module for Development Tools 15-SP3 (src): go1.19-1.19.3-150000.1.15.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:4055-1: An update that solves one vulnerability and has one errata is now available. Category: security (low) Bug References: 1193742,1204941 CVE References: CVE-2022-41716 JIRA References: Sources used: openSUSE Leap 15.4 (src): go1.18-1.18.8-150000.1.37.1 openSUSE Leap 15.3 (src): go1.18-1.18.8-150000.1.37.1 SUSE Linux Enterprise Module for Development Tools 15-SP4 (src): go1.18-1.18.8-150000.1.37.1 SUSE Linux Enterprise Module for Development Tools 15-SP3 (src): go1.18-1.18.8-150000.1.37.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
is done
SUSE-SU-2023:2312-1: An update that solves 28 vulnerabilities, contains one feature and has three fixes can now be installed. Category: security (important) Bug References: 1183043, 1193742, 1198423, 1198424, 1198427, 1199413, 1200134, 1200135, 1200136, 1200137, 1201434, 1201436, 1201437, 1201440, 1201443, 1201444, 1201445, 1201447, 1201448, 1202035, 1203185, 1204023, 1204024, 1204025, 1204941, 1206134, 1206135, 1208270, 1208271, 1208272, 1208491 CVE References: CVE-2022-1705, CVE-2022-1962, CVE-2022-24675, CVE-2022-27536, CVE-2022-27664, CVE-2022-28131, CVE-2022-28327, CVE-2022-2879, CVE-2022-2880, CVE-2022-29526, CVE-2022-29804, CVE-2022-30580, CVE-2022-30629, CVE-2022-30630, CVE-2022-30631, CVE-2022-30632, CVE-2022-30633, CVE-2022-30634, CVE-2022-30635, CVE-2022-32148, CVE-2022-32189, CVE-2022-41715, CVE-2022-41716, CVE-2022-41717, CVE-2022-41720, CVE-2022-41723, CVE-2022-41724, CVE-2022-41725 Jira References: PED-1962 Sources used: openSUSE Leap 15.4 (src): go1.18-openssl-1.18.10.1-150000.1.9.1 openSUSE Leap 15.5 (src): go1.18-openssl-1.18.10.1-150000.1.9.1 Development Tools Module 15-SP4 (src): go1.18-openssl-1.18.10.1-150000.1.9.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): go1.18-openssl-1.18.10.1-150000.1.9.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): go1.18-openssl-1.18.10.1-150000.1.9.1 SUSE Linux Enterprise Real Time 15 SP3 (src): go1.18-openssl-1.18.10.1-150000.1.9.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): go1.18-openssl-1.18.10.1-150000.1.9.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): go1.18-openssl-1.18.10.1-150000.1.9.1 SUSE Enterprise Storage 7.1 (src): go1.18-openssl-1.18.10.1-150000.1.9.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.