openSUSE Security Update: Security update for go1.11
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2019:2072-1
Rating:             moderate
References:         #1141688 #1146111 #1146115 #1146123 
Cross-References:   CVE-2019-14809 CVE-2019-9512 CVE-2019-9514
                   
Affected Products:
                    openSUSE Leap 15.1
                    openSUSE Leap 15.0
______________________________________________________________________________

   An update that solves three vulnerabilities and has one
   errata is now available.

Description:

   This update for go1.11 fixes the following issues:

   Security issues fixed:

   - CVE-2019-9512: Fixed HTTP/2 flood using PING frames that results in
     unbounded memory growth (bsc#1146111).
   - CVE-2019-9514: Fixed HTTP/2 implementation that is vulnerable to a reset
     flood, potentially leading to a denial of service (bsc#1146115).
   - CVE-2019-14809: Fixed malformed hosts in URLs that leads to
     authorization bypass (bsc#1146123).

   Bugfixes:

   - Update to go version 1.11.13 (bsc#1141688).

   This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 15.1:

      zypper in -t patch openSUSE-2019-2072=1

   - openSUSE Leap 15.0:

      zypper in -t patch openSUSE-2019-2072=1



Package List:

   - openSUSE Leap 15.1 (x86_64):

      go1.11-1.11.13-lp151.2.9.1
      go1.11-doc-1.11.13-lp151.2.9.1
      go1.11-race-1.11.13-lp151.2.9.1

   - openSUSE Leap 15.0 (x86_64):

      go1.11-1.11.13-lp150.18.1
      go1.11-doc-1.11.13-lp150.18.1
      go1.11-race-1.11.13-lp150.18.1


References:

   https://www.suse.com/security/cve/CVE-2019-14809.html
   https://www.suse.com/security/cve/CVE-2019-9512.html
   https://www.suse.com/security/cve/CVE-2019-9514.html
   https://bugzilla.suse.com/1141688
   https://bugzilla.suse.com/1146111
   https://bugzilla.suse.com/1146115
   https://bugzilla.suse.com/1146123

-- 

openSUSE: 2019:2072-1: moderate: go1.11

September 5, 2019
An update that solves three vulnerabilities and has one errata is now available.

Description

This update for go1.11 fixes the following issues: Security issues fixed: - CVE-2019-9512: Fixed HTTP/2 flood using PING frames that results in unbounded memory growth (bsc#1146111). - CVE-2019-9514: Fixed HTTP/2 implementation that is vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146115). - CVE-2019-14809: Fixed malformed hosts in URLs that leads to authorization bypass (bsc#1146123). Bugfixes: - Update to go version 1.11.13 (bsc#1141688). This update was imported from the SUSE:SLE-15:Update update project.

 

Patch

Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.1: zypper in -t patch openSUSE-2019-2072=1 - openSUSE Leap 15.0: zypper in -t patch openSUSE-2019-2072=1


Package List

- openSUSE Leap 15.1 (x86_64): go1.11-1.11.13-lp151.2.9.1 go1.11-doc-1.11.13-lp151.2.9.1 go1.11-race-1.11.13-lp151.2.9.1 - openSUSE Leap 15.0 (x86_64): go1.11-1.11.13-lp150.18.1 go1.11-doc-1.11.13-lp150.18.1 go1.11-race-1.11.13-lp150.18.1


References

https://www.suse.com/security/cve/CVE-2019-14809.html https://www.suse.com/security/cve/CVE-2019-9512.html https://www.suse.com/security/cve/CVE-2019-9514.html https://bugzilla.suse.com/1141688 https://bugzilla.suse.com/1146111 https://bugzilla.suse.com/1146115 https://bugzilla.suse.com/1146123--


Severity
Announcement ID: openSUSE-SU-2019:2072-1
Rating: moderate
Affected Products: openSUSE Leap 15.1 openSUSE Leap 15.0 le.

Related News