Bug 1180024 - (CVE-2020-29511) VUL-0: CVE-2020-29511: go1.14,go1.15: The encoding/xml package in Go (all versions) does not correctly preserve the semantics of element namespace prefixes during tokenization round-trips, which allows an attacker to craft inputs that behav
(CVE-2020-29511)
VUL-0: CVE-2020-29511: go1.14,go1.15: The encoding/xml package in Go (all ver...
Status: RESOLVED WONTFIX
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Minor
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/273375/
CVSSv3.1:SUSE:CVE-2020-29511:7.5:(AV:...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2020-12-15 06:48 UTC by Marcus Meissner
Modified: 2021-01-20 09:49 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2020-12-15 06:48:18 UTC
CVE-2020-29511

The encoding/xml package in Go (all versions) does not correctly preserve the
semantics of element namespace prefixes during tokenization round-trips, which
allows an attacker to craft inputs that behave in conflicting ways during
different stages of processing in affected downstream applications.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-29511
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29511
https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-elements.md
Comment 1 Wolfgang Frisch 2021-01-20 09:49:18 UTC
Upstream golang declared this bug as WONTFIX [1].
Affected users can workaround the vulnerability by using Mattermost's xml-roundtrip-validator [2].

[1] https://github.com/golang/go/issues/43168
[2] https://github.com/mattermost/xml-roundtrip-validator