Security update for go1.12

SUSE Security Update: Security update for go1.12
Announcement ID: SUSE-SU-2019:2214-1
Rating: moderate
References: #1139210 #1141689 #1146111 #1146115 #1146123
Cross-References: CVE-2019-14809 CVE-2019-9512 CVE-2019-9514
Affected Products:
  • SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1
  • SUSE Linux Enterprise Module for Open Buildservice Development Tools 15

An update that solves three vulnerabilities and has two fixes is now available.

Description:

This update for go1.12 fixes the following issues:
Security issues fixed:

  • CVE-2019-9512: Fixed HTTP/2 flood using PING frames that results in unbounded memory growth (bsc#1146111).
  • CVE-2019-9514: Fixed HTTP/2 implementation that is vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146115).
  • CVE-2019-14809: Fixed malformed hosts in URLs that leads to authorization bypass (bsc#1146123).

Bugfixes:
  • Update to go version 1.12.9 (bsc#1141689).
  • Adding Web Assembly stuff from misc/wasm (bsc#1139210).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1:
    zypper in -t patch SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2214=1
  • SUSE Linux Enterprise Module for Open Buildservice Development Tools 15:
    zypper in -t patch SUSE-SLE-Module-Development-Tools-OBS-15-2019-2214=1

Package List:

  • SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (aarch64 ppc64le s390x x86_64):
    • go1.12-1.12.9-1.15.1
    • go1.12-doc-1.12.9-1.15.1
  • SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (x86_64):
    • go1.12-race-1.12.9-1.15.1
  • SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (aarch64 ppc64le s390x x86_64):
    • go1.12-1.12.9-1.15.1
    • go1.12-doc-1.12.9-1.15.1

References: