<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for go1.12</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2019:2056-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-09-02T12:21:15Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-09-02T12:21:15Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-09-02T12:21:15Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for go1.12</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for go1.12 fixes the following issues:

Security issues fixed:

- CVE-2019-9512: Fixed HTTP/2 flood using PING frames that results in unbounded memory growth (bsc#1146111).
- CVE-2019-9514: Fixed HTTP/2 implementation that is vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146115).
- CVE-2019-14809: Fixed malformed hosts in URLs that leads to authorization bypass (bsc#1146123).

Bugfixes:

- Update to go version 1.12.9 (bsc#1141689).
- Adding Web Assembly stuff from misc/wasm (bsc#1139210).

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2019-2056</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html</URL>
      <Description>E-Mail link for openSUSE-SU-2019:2056-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1139210</URL>
      <Description>SUSE Bug 1139210</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1141689</URL>
      <Description>SUSE Bug 1141689</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1146111</URL>
      <Description>SUSE Bug 1146111</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1146115</URL>
      <Description>SUSE Bug 1146115</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1146123</URL>
      <Description>SUSE Bug 1146123</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-14809/</URL>
      <Description>SUSE CVE CVE-2019-14809 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-9512/</URL>
      <Description>SUSE CVE CVE-2019-9512 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-9514/</URL>
      <Description>SUSE CVE CVE-2019-9514 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.0">
      <Branch Type="Product Name" Name="openSUSE Leap 15.0">
        <FullProductName ProductID="openSUSE Leap 15.0" CPE="cpe:/o:opensuse:leap:15.0">openSUSE Leap 15.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.1">
      <Branch Type="Product Name" Name="openSUSE Leap 15.1">
        <FullProductName ProductID="openSUSE Leap 15.1" CPE="cpe:/o:opensuse:leap:15.1">openSUSE Leap 15.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="go1.12-1.12.9-lp151.2.13.1">
      <FullProductName ProductID="go1.12-1.12.9-lp151.2.13.1">go1.12-1.12.9-lp151.2.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="go1.12-doc-1.12.9-lp151.2.13.1">
      <FullProductName ProductID="go1.12-doc-1.12.9-lp151.2.13.1">go1.12-doc-1.12.9-lp151.2.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="go1.12-race-1.12.9-lp151.2.13.1">
      <FullProductName ProductID="go1.12-race-1.12.9-lp151.2.13.1">go1.12-race-1.12.9-lp151.2.13.1</FullProductName>
    </Branch>
    <Relationship ProductReference="go1.12-1.12.9-lp151.2.13.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:go1.12-1.12.9-lp151.2.13.1">go1.12-1.12.9-lp151.2.13.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.12-doc-1.12.9-lp151.2.13.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:go1.12-doc-1.12.9-lp151.2.13.1">go1.12-doc-1.12.9-lp151.2.13.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.12-race-1.12.9-lp151.2.13.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:go1.12-race-1.12.9-lp151.2.13.1">go1.12-race-1.12.9-lp151.2.13.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.12-1.12.9-lp151.2.13.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.13.1">go1.12-1.12.9-lp151.2.13.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.12-doc-1.12.9-lp151.2.13.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.13.1">go1.12-doc-1.12.9-lp151.2.13.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.12-race-1.12.9-lp151.2.13.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.13.1">go1.12-race-1.12.9-lp151.2.13.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">net/url in Go before 1.11.13 and 1.12.x before 1.12.8 mishandles malformed hosts in URLs, leading to an authorization bypass in some applications. This is related to a Host field with a suffix appearing in neither Hostname() nor Port(), and is related to a non-numeric port number. For example, an attacker can compose a crafted javascript:// URL that results in a hostname of google.com.</Note>
    </Notes>
    <CVE>CVE-2019-14809</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:go1.12-1.12.9-lp151.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.0:go1.12-doc-1.12.9-lp151.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.0:go1.12-race-1.12.9-lp151.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-14809.html</URL>
        <Description>CVE-2019-14809</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146123</URL>
        <Description>SUSE Bug 1146123</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.</Note>
    </Notes>
    <CVE>CVE-2019-9512</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:go1.12-1.12.9-lp151.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.0:go1.12-doc-1.12.9-lp151.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.0:go1.12-race-1.12.9-lp151.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-9512.html</URL>
        <Description>CVE-2019-9512</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1145663</URL>
        <Description>SUSE Bug 1145663</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146099</URL>
        <Description>SUSE Bug 1146099</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146111</URL>
        <Description>SUSE Bug 1146111</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1147142</URL>
        <Description>SUSE Bug 1147142</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.</Note>
    </Notes>
    <CVE>CVE-2019-9514</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:go1.12-1.12.9-lp151.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.0:go1.12-doc-1.12.9-lp151.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.0:go1.12-race-1.12.9-lp151.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.1:go1.12-1.12.9-lp151.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.1:go1.12-doc-1.12.9-lp151.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.1:go1.12-race-1.12.9-lp151.2.13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-9514.html</URL>
        <Description>CVE-2019-9514</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1145662</URL>
        <Description>SUSE Bug 1145662</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1145663</URL>
        <Description>SUSE Bug 1145663</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146095</URL>
        <Description>SUSE Bug 1146095</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146115</URL>
        <Description>SUSE Bug 1146115</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1147142</URL>
        <Description>SUSE Bug 1147142</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
