Описание
Security update for go1.12
This update for go1.12 fixes the following issues:
Security issues fixed:
- CVE-2019-9512: Fixed HTTP/2 flood using PING frames that results in unbounded memory growth. (bsc#1146111)
- CVE-2019-9514: Fixed HTTP/2 implementation is vulnerable to a reset flood, potentially leading to a denial of service. (bsc#1146115)
- CVE-2019-14809: Fixed authorization bypass due to malformed hosts in URLs. (bsc#1146123)
Список пакетов
openSUSE Leap 15.1
Ссылки
- E-Mail link for openSUSE-SU-2019:2000-1
- SUSE Security Ratings
- SUSE Bug 1139210
- SUSE Bug 1141689
- SUSE Bug 1146111
- SUSE Bug 1146115
- SUSE Bug 1146123
- SUSE CVE CVE-2019-14809 page
- SUSE CVE CVE-2019-9512 page
- SUSE CVE CVE-2019-9514 page
Описание
net/url in Go before 1.11.13 and 1.12.x before 1.12.8 mishandles malformed hosts in URLs, leading to an authorization bypass in some applications. This is related to a Host field with a suffix appearing in neither Hostname() nor Port(), and is related to a non-numeric port number. For example, an attacker can compose a crafted javascript:// URL that results in a hostname of google.com.
Затронутые продукты
Ссылки
- CVE-2019-14809
- SUSE Bug 1146123
Описание
Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
Затронутые продукты
Ссылки
- CVE-2019-9512
- SUSE Bug 1145663
- SUSE Bug 1146099
- SUSE Bug 1146111
- SUSE Bug 1147142
Описание
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.
Затронутые продукты
Ссылки
- CVE-2019-9514
- SUSE Bug 1145662
- SUSE Bug 1145663
- SUSE Bug 1146095
- SUSE Bug 1146115
- SUSE Bug 1147142