SB2019082502 - OpenSUSE Linux update for go1.12



SB2019082502 - OpenSUSE Linux update for go1.12

Published: August 25, 2019

Security Bulletin ID SB2019082502
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 67% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2019-14809)

The vulnerability allows a remote attacker to bypass certain security restrictions.
The vulnerability exists due to incorrect processing of URLs in net/url, related to the Host field with a suffix appearing in neither Hostname() nor Port(), and is related to a non-numeric port number. A remote attacker can create a crafted javascript:// URL that in certain situations can be used to bypass authorization checks for some applications. 

2) Resource exhaustion (CVE-ID: CVE-2019-9512)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper validation of user-supplied input when processing HTTP/2 requests. A remote attacker can send specially crafted HTTP packets to the affected system trigger resource exhaustion and perform a denial of service (DoS) attack.



3) Resource exhaustion (CVE-ID: CVE-2019-9514)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper validation of user-supplied input when processing HTTP/2 requests. A remote attacker can send specially crafted HTTP packets to the affected system trigger resource exhaustion and perform a denial of service (DoS) attack.



Remediation

Install update from vendor's website.