<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update to go1.4</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:2536-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-10-14T09:45:15Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-10-14T09:45:15Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-10-14T09:45:15Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update to go1.4</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">go1.4 was updated to fix the following vulnerabilities:

- CVE-2016-5386: Remote attacker could have set the application's HTTP_PROXY environment variable via Proxy headers (boo#988487)</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2016-1190</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/988487</URL>
      <Description>SUSE Bug 988487</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5386/</URL>
      <Description>SUSE CVE CVE-2016-5386 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 12">
      <Branch Type="Product Name" Name="SUSE Package Hub 12">
        <FullProductName ProductID="SUSE Package Hub 12" CPE="cpe:/o:suse:packagehub:12">SUSE Package Hub 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="go1.4-1.4.3-6.1">
      <FullProductName ProductID="go1.4-1.4.3-6.1">go1.4-1.4.3-6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="go1.4-doc-1.4.3-6.1">
      <FullProductName ProductID="go1.4-doc-1.4.3-6.1">go1.4-doc-1.4.3-6.1</FullProductName>
    </Branch>
    <Relationship ProductReference="go1.4-1.4.3-6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:go1.4-1.4.3-6.1">go1.4-1.4.3-6.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="go1.4-doc-1.4.3-6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:go1.4-doc-1.4.3-6.1">go1.4-doc-1.4.3-6.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The net/http package in Go through 1.6 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.</Note>
    </Notes>
    <CVE>CVE-2016-5386</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:go1.4-1.4.3-6.1</ProductID>
        <ProductID>SUSE Package Hub 12:go1.4-doc-1.4.3-6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5386.html</URL>
        <Description>CVE-2016-5386</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/988484</URL>
        <Description>SUSE Bug 988484</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/988486</URL>
        <Description>SUSE Bug 988486</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/988487</URL>
        <Description>SUSE Bug 988487</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/988488</URL>
        <Description>SUSE Bug 988488</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/988489</URL>
        <Description>SUSE Bug 988489</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/988491</URL>
        <Description>SUSE Bug 988491</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/988492</URL>
        <Description>SUSE Bug 988492</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989125</URL>
        <Description>SUSE Bug 989125</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989174</URL>
        <Description>SUSE Bug 989174</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
