Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
{ "binaries": [ { "binary_name": "golang-1.8", "binary_version": "1.8.3-2ubuntu1.18.04.1" }, { "binary_name": "golang-1.8-go", "binary_version": "1.8.3-2ubuntu1.18.04.1" }, { "binary_name": "golang-1.8-go-shared-dev", "binary_version": "1.8.3-2ubuntu1.18.04.1" }, { "binary_name": "golang-1.8-src", "binary_version": "1.8.3-2ubuntu1.18.04.1" }, { "binary_name": "libgolang-1.8-std1", "binary_version": "1.8.3-2ubuntu1.18.04.1" } ] }