Bug 1129122 - (CVE-2019-9741) VUL-0: CVE-2019-9741: golang: CRLF injection in net/http
(CVE-2019-9741)
VUL-0: CVE-2019-9741: golang: CRLF injection in net/http
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Normal
: ---
Assigned To: Jeff Kowalczyk
Security Team bot
https://smash.suse.de/issue/226055/
CVSSv3:SUSE:CVE-2019-9741:5.3:(AV:N/...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2019-03-13 19:21 UTC by Marcus Meissner
Modified: 2020-07-29 14:09 UTC (History)
5 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2019-03-13 19:21:48 UTC
rh#1688230

An issue was discovered in net/http in Go 1.11.5. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the second argument to http.NewRequest with \r\n followed by an HTTP header or a Redis command.

Reference:
https://github.com/golang/go/issues/30794

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1688230
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9741
Comment 1 Flavio Castelli 2019-09-24 07:51:49 UTC
Assigned to Jeff, he's the maintainer of Go at SUSE now.
Comment 2 Alexandros Toptsoglou 2020-07-29 14:09:16 UTC
Our go1.11 packages are already in a fixed version in all codestreams closing