Search for packages
| purl | pkg:deb/debian/golang-1.19@1.19.3-1?distro=bookworm |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-6tuu-4j3g-37fh | Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D". |
CVE-2022-41716
|
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-16T11:37:11.090651+00:00 | Debian Importer | Fixing | VCID-6tuu-4j3g-37fh | https://security-tracker.debian.org/tracker/data/json | 38.4.0 |
| 2026-04-13T07:55:10.480174+00:00 | Debian Importer | Fixing | VCID-6tuu-4j3g-37fh | https://security-tracker.debian.org/tracker/data/json | 38.3.0 |
| 2026-04-03T07:25:38.020068+00:00 | Debian Importer | Fixing | VCID-6tuu-4j3g-37fh | https://security-tracker.debian.org/tracker/data/json | 38.1.0 |