Upstream information

CVE-2019-9741 at MITRE


An issue was discovered in net/http in Go 1.11.5. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the second argument to http.NewRequest with \r\n followed by an HTTP header or a Redis command.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 4.3
Vector AV:N/AC:M/Au:N/C:N/I:P/A:N
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact None
Integrity Impact Partial
Availability Impact None
CVSS v3 Scores
  National Vulnerability Database SUSE
Base Score 6.1 5.3
Attack Vector Network Network
Attack Complexity Low Low
Privileges Required None None
User Interaction Required None
Scope Changed Unchanged
Confidentiality Impact Low Low
Integrity Impact Low None
Availability Impact None None
CVSSv3 Version 3.1 3
SUSE Bugzilla entry: 1129122 [RESOLVED / FIXED]

No SUSE Security Announcements cross referenced.

List of released packages

Product(s) Fixed package version(s) References
SUSE Liberty Linux 8
  • go-toolset >= 1.11.5-2.module+el8.0.0+3175+261ae921
  • golang >= 1.11.5-2.module+el8.0.0+3175+261ae921
  • golang-bin >= 1.11.5-2.module+el8.0.0+3175+261ae921
  • golang-docs >= 1.11.5-2.module+el8.0.0+3175+261ae921
  • golang-misc >= 1.11.5-2.module+el8.0.0+3175+261ae921
  • golang-race >= 1.11.5-2.module+el8.0.0+3175+261ae921
  • golang-src >= 1.11.5-2.module+el8.0.0+3175+261ae921
  • golang-tests >= 1.11.5-2.module+el8.0.0+3175+261ae921

SUSE Timeline for this CVE

CVE page created: Wed Mar 13 15:54:02 2019
CVE page last modified: Mon Oct 30 17:57:29 2023