syscall

package standard library

Versions in this module

go1
Mar 7, 2023
Feb 14, 2023
Feb 1, 2023
Changes in this version
+ const CLONE_CLEAR_SIGHAND linux/amd64
+ const CLONE_INTO_CGROUP linux/amd64
+ const CLONE_NEWCGROUP linux/amd64
+ const CLONE_NEWTIME linux/amd64
+ const CLONE_PIDFD linux/amd64
type SysProcAttr linux/amd64
Jan 12, 2023
Jan 4, 2023
Dec 7, 2022
Mar 7, 2023
Feb 14, 2023
Jan 10, 2023
Dec 6, 2022
Nov 1, 2022
Oct 4, 2022 GO-2022-1095
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Sep 6, 2022 GO-2022-1095
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Aug 2, 2022 GO-2022-1095
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jul 12, 2022
Jul 6, 2022
Jun 9, 2022
Jan 10, 2023
Dec 6, 2022
Nov 1, 2022
Oct 4, 2022 GO-2022-1095
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Sep 6, 2022 GO-2022-1095
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Aug 1, 2022 GO-2022-1095
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jul 12, 2022 GO-2022-1095
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jun 1, 2022 GO-2022-1095
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
May 10, 2022 GO-2022-1095
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Apr 12, 2022 GO-2022-0493GO-2022-1095
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Mar 15, 2022 GO-2022-0493GO-2022-1095
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Changes in this version
Feb 16, 2022 GO-2022-1095
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jan 31, 2022 GO-2022-1095
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Dec 14, 2021 GO-2022-1095
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Aug 1, 2022 GO-2022-1095
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jul 12, 2022 GO-2022-1095
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jun 1, 2022 GO-2022-1095
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
May 10, 2022 GO-2022-1095
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Apr 12, 2022 GO-2022-0493GO-2022-1095
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Mar 3, 2022 GO-2022-0493GO-2022-1095
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Feb 9, 2022 GO-2022-0493GO-2022-1095
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jan 6, 2022 GO-2022-0493GO-2022-1095
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Dec 9, 2021 GO-2022-0493GO-2022-1095
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Dec 2, 2021 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Nov 4, 2021 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Oct 7, 2021 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Sep 9, 2021 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Aug 16, 2021 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Changes in this version
type SysProcAttr windows/amd64
Aug 2, 2021 GO-2022-0493GO-2022-1095
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jul 13, 2021 GO-2022-0493GO-2022-1095
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jun 10, 2021 GO-2022-0493GO-2022-1095
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Mar 3, 2022 GO-2022-0493GO-2022-1095
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Feb 9, 2022 GO-2022-0493GO-2022-1095
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jan 6, 2022 GO-2022-0493GO-2022-1095
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Dec 9, 2021 GO-2022-0493GO-2022-1095
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Dec 2, 2021 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Nov 4, 2021 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Oct 7, 2021 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Sep 9, 2021 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Aug 4, 2021 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jul 12, 2021 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jun 3, 2021 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
May 6, 2021 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Apr 1, 2021 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Mar 11, 2021 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Mar 10, 2021 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Feb 16, 2021 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jan 27, 2021 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Dec 17, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Aug 4, 2021 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jul 12, 2021 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jun 3, 2021 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
May 6, 2021 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Apr 1, 2021 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Mar 11, 2021 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Mar 10, 2021 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Feb 4, 2021 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jan 19, 2021 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Dec 3, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Nov 12, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Nov 5, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Oct 14, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Sep 9, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Sep 1, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Aug 11, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Aug 7, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jul 24, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jun 10, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Feb 4, 2021 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jan 19, 2021 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Dec 3, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Nov 12, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Nov 5, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Oct 14, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Sep 9, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Sep 1, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Aug 6, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jul 16, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jul 14, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jun 1, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
May 14, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Apr 8, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Mar 19, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Feb 25, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Changes in this version
+ const CTRL_CLOSE_EVENT windows/amd64
+ const CTRL_LOGOFF_EVENT windows/amd64
+ const CTRL_SHUTDOWN_EVENT windows/amd64
Feb 5, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Dec 17, 2019 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Aug 6, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jul 16, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jul 14, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jun 1, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
May 14, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Apr 8, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Mar 19, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Feb 12, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jan 27, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jan 9, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Dec 4, 2019 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Oct 31, 2019 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Oct 17, 2019 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Oct 17, 2019 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Sep 25, 2019 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Sep 3, 2019 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Aug 29, 2019 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Aug 21, 2019 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jun 26, 2019 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Feb 12, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jan 27, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jan 9, 2020 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Dec 4, 2019 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Oct 31, 2019 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Oct 17, 2019 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Oct 17, 2019 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Sep 25, 2019 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Aug 15, 2019 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Aug 13, 2019 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jul 8, 2019 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jun 11, 2019 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
May 6, 2019 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Apr 11, 2019 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Apr 8, 2019 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Apr 5, 2019 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Mar 14, 2019 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Feb 25, 2019 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Changes in this version
+ const UNIX_PATH_MAX windows/amd64
type Errno windows/amd64
type Signal js/wasm
Feb 11, 2019 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jan 10, 2019 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Dec 18, 2018 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Aug 13, 2019 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jul 8, 2019 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jun 11, 2019 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
May 6, 2019 GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Apr 11, 2019 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Apr 8, 2019 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Apr 5, 2019 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Mar 14, 2019 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jan 23, 2019 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Dec 14, 2018 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Dec 13, 2018 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Nov 2, 2018 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Oct 1, 2018 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Aug 24, 2018 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Changes in this version
+ const AF_INET js/wasm
+ const AF_INET6 js/wasm
+ const AF_UNIX js/wasm
+ const AF_UNSPEC js/wasm
+ const F_CNVT js/wasm
+ const F_DUPFD js/wasm
+ const F_DUPFD_CLOEXEC js/wasm
+ const F_GETFD js/wasm
+ const F_GETFL js/wasm
+ const F_GETLK js/wasm
+ const F_GETOWN js/wasm
+ const F_RDLCK js/wasm
+ const F_RGETLK js/wasm
+ const F_RSETLK js/wasm
+ const F_RSETLKW js/wasm
+ const F_SETFD js/wasm
+ const F_SETFL js/wasm
+ const F_SETLK js/wasm
+ const F_SETLKW js/wasm
+ const F_SETOWN js/wasm
+ const F_UNLCK js/wasm
+ const F_UNLKSYS js/wasm
+ const F_WRLCK js/wasm
+ const IPPROTO_IP js/wasm
+ const IPPROTO_IPV4 js/wasm
+ const IPPROTO_IPV6 js/wasm
+ const IPPROTO_TCP js/wasm
+ const IPPROTO_UDP js/wasm
+ const IPV6_V6ONLY js/wasm
+ const ImplementsGetwd js/wasm
+ const O_APPEND js/wasm
+ const O_CLOEXEC js/wasm
+ const O_CREAT js/wasm
+ const O_CREATE js/wasm
+ const O_EXCL js/wasm
+ const O_RDONLY js/wasm
+ const O_RDWR js/wasm
+ const O_SYNC js/wasm
+ const O_TRUNC js/wasm
+ const O_WRONLY js/wasm
+ const PathMax js/wasm
+ const SOCK_DGRAM js/wasm
+ const SOCK_RAW js/wasm
+ const SOCK_SEQPACKET js/wasm
+ const SOCK_STREAM js/wasm
+ const SOMAXCONN js/wasm
+ const SO_ERROR js/wasm
+ const SYS_FCNTL js/wasm
+ const S_IEXEC js/wasm
+ const S_IFBLK js/wasm
+ const S_IFBOUNDSOCK js/wasm
+ const S_IFCHR js/wasm
+ const S_IFCOND js/wasm
+ const S_IFDIR js/wasm
+ const S_IFDSOCK js/wasm
+ const S_IFIFO js/wasm
+ const S_IFLNK js/wasm
+ const S_IFMT js/wasm
+ const S_IFMUTEX js/wasm
+ const S_IFREG js/wasm
+ const S_IFSEMA js/wasm
+ const S_IFSHM js/wasm
+ const S_IFSHM_SYSV js/wasm
+ const S_IFSOCK js/wasm
+ const S_IFSOCKADDR js/wasm
+ const S_IREAD js/wasm
+ const S_IRGRP js/wasm
+ const S_IROTH js/wasm
+ const S_IRUSR js/wasm
+ const S_IRWXG js/wasm
+ const S_IRWXO js/wasm
+ const S_IRWXU js/wasm
+ const S_ISGID js/wasm
+ const S_ISUID js/wasm
+ const S_ISVTX js/wasm
+ const S_IWGRP js/wasm
+ const S_IWOTH js/wasm
+ const S_IWRITE js/wasm
+ const S_IWUSR js/wasm
+ const S_IXGRP js/wasm
+ const S_IXOTH js/wasm
+ const S_IXUSR js/wasm
+ const S_UNSUP js/wasm
+ const Stderr js/wasm
+ const Stdin js/wasm
+ const Stdout js/wasm
+ const TOKEN_ADJUST_SESSIONID windows/amd64
+ func Clearenv() js/wasm
+ func Close(fd int) error js/wasm
+ func CloseOnExec(fd int) js/wasm
+ func Environ() []string js/wasm
+ func Fsync(fd int) error js/wasm
+ func Getegid() int js/wasm
+ func Geteuid() int js/wasm
+ func Getgid() int js/wasm
+ func Getpid() int js/wasm
+ func Getppid() int js/wasm
+ func Getuid() int js/wasm
+ type CertInfo struct windows/amd64
+ type CertRevocationCrlInfo struct windows/amd64
+ type CertTrustListInfo struct windows/amd64
+ type Errno uintptr js/wasm
+ type Iovec struct js/wasm
+ type Pointer *struct windows/amd64
+ type SysProcAttr struct js/wasm
Aug 22, 2018 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Aug 13, 2018 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Aug 3, 2018 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jul 19, 2018 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jun 26, 2018 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jan 23, 2019 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Dec 14, 2018 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Dec 13, 2018 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Nov 2, 2018 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Aug 24, 2018 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jun 6, 2018 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Apr 30, 2018 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Mar 29, 2018 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Feb 16, 2018 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Changes in this version
type SysProcAttr windows/amd64
Feb 7, 2018 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jan 25, 2018 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jan 11, 2018 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Dec 7, 2017 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jun 6, 2018 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Apr 30, 2018 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Mar 29, 2018 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Feb 7, 2018 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jan 22, 2018 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Oct 25, 2017 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Oct 4, 2017 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Aug 24, 2017 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Aug 7, 2017 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jul 24, 2017 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jun 26, 2017 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jun 14, 2017 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Feb 7, 2018 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jan 23, 2018 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Oct 25, 2017 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Oct 25, 2017 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Oct 20, 2017 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Oct 4, 2017 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
May 24, 2017 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
May 23, 2017 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Apr 7, 2017 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Feb 16, 2017 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Changes in this version
+ func Getpagesize() int js/wasm
type Errno windows/amd64
Jan 26, 2017 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jan 19, 2017 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jan 10, 2017 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Dec 15, 2016 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Dec 1, 2016 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
May 23, 2017 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jan 26, 2017 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Dec 1, 2016 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Oct 19, 2016 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Oct 17, 2016 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Sep 7, 2016 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Aug 15, 2016 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Changes in this version
type SysProcAttr linux/amd64
Aug 8, 2016 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Aug 2, 2016 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Aug 2, 2016 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jul 21, 2016 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jul 18, 2016 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jul 8, 2016 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jun 16, 2016 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jun 2, 2016 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Dec 1, 2016 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jul 18, 2016 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Apr 19, 2016 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Apr 11, 2016 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Feb 17, 2016 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Feb 3, 2016 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jan 28, 2016 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jan 13, 2016 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Dec 17, 2015 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Apr 11, 2016 GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jan 13, 2016 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Dec 3, 2015 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Sep 9, 2015 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Aug 19, 2015 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Changes in this version
type SysProcAttr darwin/amd64
type SysProcAttr linux/amd64
Aug 6, 2015 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jul 29, 2015 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jul 17, 2015 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jul 7, 2015 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Sep 23, 2015 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Feb 18, 2015 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jan 15, 2015 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Dec 11, 2014 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Changes in this version
+ const DNS_INFO_NO_RECORDS windows/amd64
+ const DnsSectionAdditional windows/amd64
+ const DnsSectionAnswer windows/amd64
+ const DnsSectionAuthority windows/amd64
+ const DnsSectionQuestion windows/amd64
+ const FSCTL_GET_REPARSE_POINT windows/amd64
+ const IO_REPARSE_TAG_SYMLINK windows/amd64
+ const SIO_UDP_CONNRESET windows/amd64
+ const TH32CS_INHERIT windows/amd64
+ const TH32CS_SNAPALL windows/amd64
+ const TH32CS_SNAPHEAPLIST windows/amd64
+ const TH32CS_SNAPMODULE windows/amd64
+ const TH32CS_SNAPMODULE32 windows/amd64
+ const TH32CS_SNAPPROCESS windows/amd64
+ const TH32CS_SNAPTHREAD windows/amd64
Dec 2, 2014 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Nov 17, 2014 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Oct 30, 2014 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Oct 1, 2014 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Sep 25, 2014 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Aug 13, 2014 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jun 19, 2014 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jun 13, 2014 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jun 2, 2014 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
May 21, 2014 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Apr 22, 2014 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
May 5, 2014 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Mar 3, 2014 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Changes in this version
type Errno windows/amd64
Nov 28, 2013 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Changes in this version
+ const BASE_PROTOCOL windows/amd64
+ const CLONE_CHILD_CLEARTID linux/amd64
+ const CLONE_CHILD_SETTID linux/amd64
+ const CLONE_DETACHED linux/amd64
+ const CLONE_FILES linux/amd64
+ const CLONE_FS linux/amd64
+ const CLONE_IO linux/amd64
+ const CLONE_NEWIPC linux/amd64
+ const CLONE_NEWNET linux/amd64
+ const CLONE_NEWNS linux/amd64
+ const CLONE_NEWPID linux/amd64
+ const CLONE_NEWUSER linux/amd64
+ const CLONE_NEWUTS linux/amd64
+ const CLONE_PARENT linux/amd64
+ const CLONE_PARENT_SETTID linux/amd64
+ const CLONE_PTRACE linux/amd64
+ const CLONE_SETTLS linux/amd64
+ const CLONE_SIGHAND linux/amd64
+ const CLONE_SYSVSEM linux/amd64
+ const CLONE_THREAD linux/amd64
+ const CLONE_UNTRACED linux/amd64
+ const CLONE_VFORK linux/amd64
+ const CLONE_VM linux/amd64
+ const ICMP6_FILTER darwin/amd64
+ const ICMPV6_FILTER linux/amd64
+ const LAYERED_PROTOCOL windows/amd64
+ const MAX_PROTOCOL_CHAIN windows/amd64
+ const NetSetupDomainName windows/amd64
+ const NetSetupUnjoined windows/amd64
+ const NetSetupUnknownStatus windows/amd64
+ const NetSetupWorkgroupName windows/amd64
+ const PFL_HIDDEN windows/amd64
+ const PFL_MATCHES_PROTOCOL_ZERO windows/amd64
+ const PFL_MULTIPLE_PROTO_ENTRIES windows/amd64
+ const PFL_NETWORKDIRECT_PROVIDER windows/amd64
+ const PFL_RECOMMENDED_PROTO_ENTRY windows/amd64
+ const PRIO_PGRP darwin/amd64, linux/amd64
+ const PRIO_PROCESS darwin/amd64, linux/amd64
+ const PRIO_USER darwin/amd64, linux/amd64
+ const PROCESS_TERMINATE windows/amd64
+ const SizeofICMPv6Filter darwin/amd64, linux/amd64
+ const SizeofIPv6MTUInfo darwin/amd64, linux/amd64
+ const TCIFLUSH linux/amd64
+ const TCIOFLUSH linux/amd64
+ const TCOFLUSH linux/amd64
+ const WSAPROTOCOL_LEN windows/amd64
+ const XP1_CONNECTIONLESS windows/amd64
+ const XP1_CONNECT_DATA windows/amd64
+ const XP1_DISCONNECT_DATA windows/amd64
+ const XP1_EXPEDITED_DATA windows/amd64
+ const XP1_GRACEFUL_CLOSE windows/amd64
+ const XP1_GUARANTEED_DELIVERY windows/amd64
+ const XP1_GUARANTEED_ORDER windows/amd64
+ const XP1_IFS_HANDLES windows/amd64
+ const XP1_MESSAGE_ORIENTED windows/amd64
+ const XP1_MULTIPOINT_DATA_PLANE windows/amd64
+ const XP1_PARTIAL_MESSAGE windows/amd64
+ const XP1_PSEUDO_STREAM windows/amd64
+ const XP1_QOS_SUPPORTED windows/amd64
+ const XP1_SAN_SUPPORT_SDP windows/amd64
+ const XP1_SUPPORT_BROADCAST windows/amd64
+ const XP1_SUPPORT_MULTIPOINT windows/amd64
+ const XP1_UNI_RECV windows/amd64
+ const XP1_UNI_SEND windows/amd64
Nov 18, 2013 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Nov 13, 2013 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Nov 1, 2013 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Oct 18, 2013 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Aug 13, 2013 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jun 13, 2013 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
May 13, 2013 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Changes in this version
+ const AI_CANONNAME windows/amd64
+ const AI_NUMERICHOST windows/amd64
+ const AI_PASSIVE windows/amd64
+ const B0 darwin/amd64
+ const B110 darwin/amd64
+ const B115200 darwin/amd64
+ const B1200 darwin/amd64
+ const B134 darwin/amd64
+ const B14400 darwin/amd64
+ const B150 darwin/amd64
+ const B1800 darwin/amd64
+ const B19200 darwin/amd64
+ const B200 darwin/amd64
+ const B230400 darwin/amd64
+ const B2400 darwin/amd64
+ const B28800 darwin/amd64
+ const B300 darwin/amd64
+ const B38400 darwin/amd64
+ const B4800 darwin/amd64
+ const B50 darwin/amd64
+ const B57600 darwin/amd64
+ const B600 darwin/amd64
+ const B7200 darwin/amd64
+ const B75 darwin/amd64
+ const B76800 darwin/amd64
+ const B9600 darwin/amd64
+ const BRKINT darwin/amd64
+ const CFLUSH darwin/amd64
+ const CLOCAL darwin/amd64
+ const CREAD darwin/amd64
+ const CREATE_NEW_PROCESS_GROUP windows/amd64
+ const CS5 darwin/amd64
+ const CS6 darwin/amd64
+ const CS7 darwin/amd64
+ const CS8 darwin/amd64
+ const CSIZE darwin/amd64
+ const CSTART darwin/amd64
+ const CSTATUS darwin/amd64
+ const CSTOP darwin/amd64
+ const CSTOPB darwin/amd64
+ const CSUSP darwin/amd64
+ const CTRL_BREAK_EVENT windows/amd64
+ const CTRL_C_EVENT windows/amd64
+ const FLUSHO darwin/amd64
+ const HUPCL darwin/amd64
+ const ICANON darwin/amd64
+ const ICRNL darwin/amd64
+ const IEXTEN darwin/amd64
+ const IGNBRK darwin/amd64
+ const IGNCR darwin/amd64
+ const IGNPAR darwin/amd64
+ const IMAXBEL darwin/amd64
+ const INLCR darwin/amd64
+ const INPCK darwin/amd64
+ const IOC_IN windows/amd64
+ const IOC_INOUT windows/amd64
+ const IOC_OUT windows/amd64
+ const IOC_WS2 windows/amd64
+ const ISIG darwin/amd64
+ const ISTRIP darwin/amd64
+ const IUTF8 darwin/amd64
+ const IXANY darwin/amd64
+ const IXOFF darwin/amd64
+ const IXON darwin/amd64
+ const MSG_FASTOPEN linux/amd64
+ const NOFLSH darwin/amd64
+ const OCRNL darwin/amd64
+ const OFDEL darwin/amd64
+ const OFILL darwin/amd64
+ const ONLCR darwin/amd64
+ const ONLRET darwin/amd64
+ const ONOCR darwin/amd64
+ const ONOEOT darwin/amd64
+ const OPOST darwin/amd64
+ const PARENB darwin/amd64
+ const PARMRK darwin/amd64
+ const PARODD darwin/amd64
+ const PENDIN darwin/amd64
+ const RTNLGRP_IPV4_IFADDR linux/amd64
+ const RTNLGRP_IPV4_MROUTE linux/amd64
+ const RTNLGRP_IPV4_ROUTE linux/amd64
+ const RTNLGRP_IPV4_RULE linux/amd64
+ const RTNLGRP_IPV6_IFADDR linux/amd64
+ const RTNLGRP_IPV6_IFINFO linux/amd64
+ const RTNLGRP_IPV6_MROUTE linux/amd64
+ const RTNLGRP_IPV6_PREFIX linux/amd64
+ const RTNLGRP_IPV6_ROUTE linux/amd64
+ const RTNLGRP_IPV6_RULE linux/amd64
+ const RTNLGRP_LINK linux/amd64
+ const RTNLGRP_ND_USEROPT linux/amd64
+ const RTNLGRP_NEIGH linux/amd64
+ const RTNLGRP_NONE linux/amd64
+ const RTNLGRP_NOTIFY linux/amd64
+ const RTNLGRP_TC linux/amd64
+ const SO_UPDATE_CONNECT_CONTEXT windows/amd64
+ const SizeofInet4Pktinfo darwin/amd64
+ const SizeofTCPInfo linux/amd64
+ const TCIFLUSH darwin/amd64
+ const TCIOFLUSH darwin/amd64
+ const TCOFLUSH darwin/amd64
+ const TCSAFLUSH darwin/amd64
+ const TOSTOP darwin/amd64
+ const VDISCARD darwin/amd64
+ const VDSUSP darwin/amd64
+ const VEOF darwin/amd64
+ const VEOL darwin/amd64
+ const VEOL2 darwin/amd64
+ const VERASE darwin/amd64
+ const VINTR darwin/amd64
+ const VKILL darwin/amd64
+ const VLNEXT darwin/amd64
+ const VMIN darwin/amd64
+ const VQUIT darwin/amd64
+ const VREPRINT darwin/amd64
+ const VSTART darwin/amd64
+ const VSTATUS darwin/amd64
+ const VSTOP darwin/amd64
+ const VSUSP darwin/amd64
+ const VT0 darwin/amd64
+ const VT1 darwin/amd64
+ const VTDLY darwin/amd64
+ const VTIME darwin/amd64
+ const VWERASE darwin/amd64
+ var WSAID_CONNECTEX = GUID windows/amd64
+ func LoadCancelIoEx() error windows/amd64
+ func LoadConnectEx() error windows/amd64
+ func LoadGetAddrInfo() error windows/amd64
type Errno windows/amd64
type SysProcAttr linux/amd64
type SysProcAttr windows/amd64
type Timespec windows/amd64
May 8, 2013 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
May 7, 2013 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Sep 21, 2012 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Jun 14, 2012 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Apr 26, 2012 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
go1
Mar 28, 2012 GO-2021-0163GO-2022-0220GO-2022-0289GO-2022-0493GO-2022-1095
Alert  GO-2021-0163: Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.
Alert  GO-2022-0220: Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.
Alert  GO-2022-0289: When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. For users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.
Alert  GO-2022-0493: When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.
Alert  GO-2022-1095: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
Changes in this version
+ const AF_ALG linux/amd64
+ const AF_APPLETALK darwin/amd64, linux/amd64
+ const AF_ASH linux/amd64
+ const AF_ATMPVC linux/amd64
+ const AF_ATMSVC linux/amd64
+ const AF_AX25 linux/amd64
+ const AF_BLUETOOTH linux/amd64
+ const AF_BRIDGE linux/amd64
+ const AF_CAIF linux/amd64
+ const AF_CAN linux/amd64
+ const AF_CCITT darwin/amd64
+ const AF_CHAOS darwin/amd64
+ const AF_CNT darwin/amd64
+ const AF_COIP darwin/amd64
+ const AF_DATAKIT darwin/amd64
+ const AF_DECnet darwin/amd64, linux/amd64
+ const AF_DLI darwin/amd64
+ const AF_E164 darwin/amd64
+ const AF_ECMA darwin/amd64
+ const AF_ECONET linux/amd64
+ const AF_FILE linux/amd64
+ const AF_HYLINK darwin/amd64
+ const AF_IEEE80211 darwin/amd64
+ const AF_IEEE802154 linux/amd64
+ const AF_IMPLINK darwin/amd64
+ const AF_INET darwin/amd64, linux/amd64, windows/amd64
+ const AF_INET6 darwin/amd64, linux/amd64, windows/amd64
+ const AF_IPX darwin/amd64, linux/amd64
+ const AF_IRDA linux/amd64
+ const AF_ISDN darwin/amd64, linux/amd64
+ const AF_ISO darwin/amd64
+ const AF_IUCV linux/amd64
+ const AF_KEY linux/amd64
+ const AF_LAT darwin/amd64
+ const AF_LINK darwin/amd64
+ const AF_LLC linux/amd64
+ const AF_LOCAL darwin/amd64, linux/amd64
+ const AF_MAX darwin/amd64, linux/amd64
+ const AF_NATM darwin/amd64
+ const AF_NDRV darwin/amd64
+ const AF_NETBEUI linux/amd64
+ const AF_NETBIOS darwin/amd64, windows/amd64
+ const AF_NETLINK linux/amd64
+ const AF_NETROM linux/amd64
+ const AF_NS darwin/amd64
+ const AF_OSI darwin/amd64
+ const AF_PACKET linux/amd64
+ const AF_PHONET linux/amd64
+ const AF_PPP darwin/amd64
+ const AF_PPPOX linux/amd64
+