Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/golang-1.19@1.19.3-1?distro=bookworm
purl pkg:deb/debian/golang-1.19@1.19.3-1?distro=bookworm
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-6tuu-4j3g-37fh Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D". CVE-2022-41716

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T11:37:11.090651+00:00 Debian Importer Fixing VCID-6tuu-4j3g-37fh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T07:55:10.480174+00:00 Debian Importer Fixing VCID-6tuu-4j3g-37fh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:25:38.020068+00:00 Debian Importer Fixing VCID-6tuu-4j3g-37fh https://security-tracker.debian.org/tracker/data/json 38.1.0