{"id":"AZL-37435","summary":"CVE-2022-41722 affecting package golang for versions less than 1.21.6-1","details":"A path traversal vulnerability exists in filepath.Clean on Windows. On Windows, the filepath.Clean function could transform an invalid path such as \"a/../c:/b\" into the valid path \"c:\\b\". This transformation of a relative (if invalid) path into an absolute path could enable a directory traversal attack. After fix, the filepath.Clean function transforms this path into the relative (but still invalid) path \".\\c:\\b\".","modified":"2026-04-21T04:28:19.934592Z","published":"2023-02-28T18:15:09Z","upstream":["CVE-2022-41722"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41722"}],"affected":[{"package":{"name":"golang","ecosystem":"Azure Linux:2","purl":"pkg:rpm/azure-linux/golang"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.21.6-1"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-37435.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}