openSUSE Security Update: Security update for go1.12
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:2085-1
Rating: moderate
References: #1139210 #1141689 #1146111 #1146115 #1146123
Cross-References: CVE-2019-14809 CVE-2019-9512 CVE-2019-9514
Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________
An update that solves three vulnerabilities and has two
fixes is now available.
Description:
This update for go1.12 fixes the following issues:
Security issues fixed:
– CVE-2019-9512: Fixed HTTP/2 flood using PING frames that results in
unbounded memory growth (bsc#1146111).
– CVE-2019-9514: Fixed HTTP/2 implementation that is vulnerable to a reset
flood, potentially leading to a denial of service (bsc#1146115).
– CVE-2019-14809: Fixed malformed hosts in URLs that leads to
authorization bypass (bsc#1146123).
Bugfixes:
– Update to go version 1.12.9 (bsc#1141689).
– Adding Web Assembly stuff from misc/wasm (bsc#1139210).
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– openSUSE Leap 15.1:
zypper in -t patch openSUSE-2019-2085=1
Package List:
– openSUSE Leap 15.1 (x86_64):
go1.12-1.12.9-lp151.2.17.1
go1.12-doc-1.12.9-lp151.2.17.1
go1.12-race-1.12.9-lp151.2.17.1
References:
https://www.suse.com/security/cve/CVE-2019-14809.html
https://www.suse.com/security/cve/CVE-2019-9512.html
https://www.suse.com/security/cve/CVE-2019-9514.html
https://bugzilla.suse.com/1139210
https://bugzilla.suse.com/1141689
https://bugzilla.suse.com/1146111
https://bugzilla.suse.com/1146115
https://bugzilla.suse.com/1146123
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org