File _patchinfo of Package patchinfo.26677
<patchinfo incident="26677">
<issue tracker="bnc" id="1204941">VUL-0: CVE-2022-41716: go1.18,go1.19: syscall, os/exec: unsanitized NUL in environment variables</issue>
<issue tracker="bnc" id="1200441">go1.19 release tracking</issue>
<issue tracker="cve" id="2022-41716"/>
<packager>jfkw</packager>
<rating>low</rating>
<category>security</category>
<summary>Security update for go1.19</summary>
<description>This update for go1.19 fixes the following issues:
Update to go 1.19.3 (released 2022-11-01) (bsc#1200441):
Security fixes:
- CVE-2022-41716: Fixed unsanitized NUL in environment variables in syscalls, os/exec (go#56327) (bsc#1204941).
Bugfixes:
- runtime: lock count" fatal error when cgo is enabled (go#56308).
- cmd/compile: libFuzzer instrumentation fakePC overflow on 386 arch (go#56168).
- internal/fuzz: array literal initialization causes ICE "unhandled stmt ASOP" while fuzzing (go#56106).
</description>
</patchinfo>