<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvssv2="http://scap.nist.gov/schema/cvss-v2/1.0" xmlns:cvssv3="https://www.first.org/cvss/cvss-v3.0.xsd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ns0="http://purl.org/dc/elements/1.1/" xmlns:prod="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/1.0" xmlns:sch="http://purl.oclc.org/dsdl/schematron" xmlns:vuln="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
  <DocumentTitle xml:lang="en">CVE-2019-18801</DocumentTitle>
  <DocumentType>SUSE CVE</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE CVE-2019-18801</ID>
    </Identification>
    <Status>Interim</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>12</Number>
        <Date>2023-06-25T23:47:48Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-05-30T14:32:57Z</InitialReleaseDate>
    <CurrentReleaseDate>2023-06-25T23:47:48Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf-cve.pl</Engine>
      <Date>2020-12-27T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="CVE" Type="Summary" Ordinal="1" xml:lang="en">CVE-2019-18801</Note>
    <Note Title="Mitre CVE Description" Type="Description" Ordinal="2" xml:lang="en">An issue was discovered in Envoy 1.12.0. An untrusted remote client may send HTTP/2 requests that write to the heap outside of the request buffers when the upstream is HTTP/1. This may be used to corrupt nearby heap contents (leading to a query-of-death scenario) or may be used to bypass Envoy's access control mechanisms such as path based routing. An attacker can also modify requests from other users that happen to be proximal temporally and spatially.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="4" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html</URL>
      <Description>E-Mail link for SUSE-CU-2020:196-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html</URL>
      <Description>E-Mail link for SUSE-CU-2020:198-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html</URL>
      <Description>E-Mail link for SUSE-CU-2020:200-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html</URL>
      <Description>E-Mail link for SUSE-CU-2020:201-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html</URL>
      <Description>E-Mail link for SUSE-CU-2020:789-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html</URL>
      <Description>E-Mail link for SUSE-CU-2020:793-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2020-June/006902.html</URL>
      <Description>E-Mail link for SUSE-SU-2020:1573-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod">
    <Branch Type="Product Family" Name="Container caasp/v4/cert-exporter:2.3.0">
      <Branch Type="Product Name" Name="Container caasp/v4/cert-exporter:2.3.0">
        <FullProductName ProductID="Container caasp/v4/cert-exporter:2.3.0">Container caasp/v4/cert-exporter:2.3.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Container caasp/v4/cilium-operator:1.6.6">
      <Branch Type="Product Name" Name="Container caasp/v4/cilium-operator:1.6.6">
        <FullProductName ProductID="Container caasp/v4/cilium-operator:1.6.6">Container caasp/v4/cilium-operator:1.6.6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Container caasp/v4/cilium:1.6.6">
      <Branch Type="Product Name" Name="Container caasp/v4/cilium:1.6.6">
        <FullProductName ProductID="Container caasp/v4/cilium:1.6.6">Container caasp/v4/cilium:1.6.6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Container caasp/v4/hyperkube:v1.17.17">
      <Branch Type="Product Name" Name="Container caasp/v4/hyperkube:v1.17.17">
        <FullProductName ProductID="Container caasp/v4/hyperkube:v1.17.17">Container caasp/v4/hyperkube:v1.17.17</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Container caasp/v4/kured:1.3.0">
      <Branch Type="Product Name" Name="Container caasp/v4/kured:1.3.0">
        <FullProductName ProductID="Container caasp/v4/kured:1.3.0">Container caasp/v4/kured:1.3.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Container caasp/v4/metrics-server:0.3.6">
      <Branch Type="Product Name" Name="Container caasp/v4/metrics-server:0.3.6">
        <FullProductName ProductID="Container caasp/v4/metrics-server:0.3.6">Container caasp/v4/metrics-server:0.3.6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE CaaS Platform 4.0">
      <Branch Type="Product Name" Name="SUSE CaaS Platform 4.0">
        <FullProductName ProductID="SUSE CaaS Platform 4.0" CPE="cpe:/o:suse:caasp:4.0">SUSE CaaS Platform 4.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="bpftool-4.12.14-1.3.8.3">
      <FullProductName ProductID="bpftool-4.12.14-1.3.8.3">bpftool-4.12.14-1.3.8.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="caasp-release-4.2.1-24.23.4">
      <FullProductName ProductID="caasp-release-4.2.1-24.23.4">caasp-release-4.2.1-24.23.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cert-exporter-2.3.0-1.3.4">
      <FullProductName ProductID="cert-exporter-2.3.0-1.3.4">cert-exporter-2.3.0-1.3.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cilium-1.6.6-3.3.8">
      <FullProductName ProductID="cilium-1.6.6-3.3.8">cilium-1.6.6-3.3.8</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cilium-cni-1.6.6-3.3.8">
      <FullProductName ProductID="cilium-cni-1.6.6-3.3.8">cilium-cni-1.6.6-3.3.8</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cilium-operator-1.6.6-3.3.8">
      <FullProductName ProductID="cilium-operator-1.6.6-3.3.8">cilium-operator-1.6.6-3.3.8</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cilium-proxy-20200109-3.3.11.1">
      <FullProductName ProductID="cilium-proxy-20200109-3.3.11.1">cilium-proxy-20200109-3.3.11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="iproute2-5.3-3.3.5">
      <FullProductName ProductID="iproute2-5.3-3.3.5" CPE="cpe:2.3:a:iproute2_project:iproute2:5.3:*:*:*:*:*:*:*">iproute2-5.3-3.3.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kured-1.3.0-4.17.5">
      <FullProductName ProductID="kured-1.3.0-4.17.5">kured-1.3.0-4.17.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libdd_opentracing0-1.0.1-3.7.3">
      <FullProductName ProductID="libdd_opentracing0-1.0.1-3.7.3">libdd_opentracing0-1.0.1-3.7.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfmt6-6.1.2-3.3.5">
      <FullProductName ProductID="libfmt6-6.1.2-3.3.5">libfmt6-6.1.2-3.3.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsqlparser1-1.5+git20181206-1.6.6">
      <FullProductName ProductID="libsqlparser1-1.5+git20181206-1.6.6">libsqlparser1-1.5+git20181206-1.6.6</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libxxhash0-0.7.1-3.3.4">
      <FullProductName ProductID="libxxhash0-0.7.1-3.3.4">libxxhash0-0.7.1-3.3.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="metrics-server-0.3.6-1.3.4">
      <FullProductName ProductID="metrics-server-0.3.6-1.3.4">metrics-server-0.3.6-1.3.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="skuba-1.3.5-3.39.1">
      <FullProductName ProductID="skuba-1.3.5-3.39.1">skuba-1.3.5-3.39.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="skuba-update-1.3.5-3.39.1">
      <FullProductName ProductID="skuba-update-1.3.5-3.39.1">skuba-update-1.3.5-3.39.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="terraform-provider-vsphere-1.17.3-3.3.4">
      <FullProductName ProductID="terraform-provider-vsphere-1.17.3-3.3.4">terraform-provider-vsphere-1.17.3-3.3.4</FullProductName>
    </Branch>
    <Relationship ProductReference="cert-exporter-2.3.0-1.3.4" RelationType="Default Component Of" RelatesToProductReference="Container caasp/v4/cert-exporter:2.3.0">
      <FullProductName ProductID="Container caasp/v4/cert-exporter:2.3.0:cert-exporter-2.3.0-1.3.4">cert-exporter-2.3.0-1.3.4 as a component of Container caasp/v4/cert-exporter:2.3.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="cilium-operator-1.6.6-3.3.8" RelationType="Default Component Of" RelatesToProductReference="Container caasp/v4/cilium-operator:1.6.6">
      <FullProductName ProductID="Container caasp/v4/cilium-operator:1.6.6:cilium-operator-1.6.6-3.3.8">cilium-operator-1.6.6-3.3.8 as a component of Container caasp/v4/cilium-operator:1.6.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="bpftool-4.12.14-1.3.8.3" RelationType="Default Component Of" RelatesToProductReference="Container caasp/v4/cilium:1.6.6">
      <FullProductName ProductID="Container caasp/v4/cilium:1.6.6:bpftool-4.12.14-1.3.8.3">bpftool-4.12.14-1.3.8.3 as a component of Container caasp/v4/cilium:1.6.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="cilium-1.6.6-3.3.8" RelationType="Default Component Of" RelatesToProductReference="Container caasp/v4/cilium:1.6.6">
      <FullProductName ProductID="Container caasp/v4/cilium:1.6.6:cilium-1.6.6-3.3.8">cilium-1.6.6-3.3.8 as a component of Container caasp/v4/cilium:1.6.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="cilium-cni-1.6.6-3.3.8" RelationType="Default Component Of" RelatesToProductReference="Container caasp/v4/cilium:1.6.6">
      <FullProductName ProductID="Container caasp/v4/cilium:1.6.6:cilium-cni-1.6.6-3.3.8">cilium-cni-1.6.6-3.3.8 as a component of Container caasp/v4/cilium:1.6.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="cilium-proxy-20200109-3.3.11.1" RelationType="Default Component Of" RelatesToProductReference="Container caasp/v4/cilium:1.6.6">
      <FullProductName ProductID="Container caasp/v4/cilium:1.6.6:cilium-proxy-20200109-3.3.11.1">cilium-proxy-20200109-3.3.11.1 as a component of Container caasp/v4/cilium:1.6.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="iproute2-5.3-3.3.5" RelationType="Default Component Of" RelatesToProductReference="Container caasp/v4/cilium:1.6.6">
      <FullProductName ProductID="Container caasp/v4/cilium:1.6.6:iproute2-5.3-3.3.5">iproute2-5.3-3.3.5 as a component of Container caasp/v4/cilium:1.6.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="libdd_opentracing0-1.0.1-3.7.3" RelationType="Default Component Of" RelatesToProductReference="Container caasp/v4/cilium:1.6.6">
      <FullProductName ProductID="Container caasp/v4/cilium:1.6.6:libdd_opentracing0-1.0.1-3.7.3">libdd_opentracing0-1.0.1-3.7.3 as a component of Container caasp/v4/cilium:1.6.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="libfmt6-6.1.2-3.3.5" RelationType="Default Component Of" RelatesToProductReference="Container caasp/v4/cilium:1.6.6">
      <FullProductName ProductID="Container caasp/v4/cilium:1.6.6:libfmt6-6.1.2-3.3.5">libfmt6-6.1.2-3.3.5 as a component of Container caasp/v4/cilium:1.6.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsqlparser1-1.5+git20181206-1.6.6" RelationType="Default Component Of" RelatesToProductReference="Container caasp/v4/cilium:1.6.6">
      <FullProductName ProductID="Container caasp/v4/cilium:1.6.6:libsqlparser1-1.5+git20181206-1.6.6">libsqlparser1-1.5+git20181206-1.6.6 as a component of Container caasp/v4/cilium:1.6.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="libxxhash0-0.7.1-3.3.4" RelationType="Default Component Of" RelatesToProductReference="Container caasp/v4/cilium:1.6.6">
      <FullProductName ProductID="Container caasp/v4/cilium:1.6.6:libxxhash0-0.7.1-3.3.4">libxxhash0-0.7.1-3.3.4 as a component of Container caasp/v4/cilium:1.6.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="iproute2-5.3-3.3.5" RelationType="Default Component Of" RelatesToProductReference="Container caasp/v4/hyperkube:v1.17.17">
      <FullProductName ProductID="Container caasp/v4/hyperkube:v1.17.17:iproute2-5.3-3.3.5">iproute2-5.3-3.3.5 as a component of Container caasp/v4/hyperkube:v1.17.17</FullProductName>
    </Relationship>
    <Relationship ProductReference="kured-1.3.0-4.17.5" RelationType="Default Component Of" RelatesToProductReference="Container caasp/v4/kured:1.3.0">
      <FullProductName ProductID="Container caasp/v4/kured:1.3.0:kured-1.3.0-4.17.5">kured-1.3.0-4.17.5 as a component of Container caasp/v4/kured:1.3.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="metrics-server-0.3.6-1.3.4" RelationType="Default Component Of" RelatesToProductReference="Container caasp/v4/metrics-server:0.3.6">
      <FullProductName ProductID="Container caasp/v4/metrics-server:0.3.6:metrics-server-0.3.6-1.3.4">metrics-server-0.3.6-1.3.4 as a component of Container caasp/v4/metrics-server:0.3.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="caasp-release-4.2.1-24.23.4" RelationType="Default Component Of" RelatesToProductReference="SUSE CaaS Platform 4.0">
      <FullProductName ProductID="SUSE CaaS Platform 4.0:caasp-release-4.2.1-24.23.4">caasp-release-4.2.1-24.23.4 as a component of SUSE CaaS Platform 4.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="skuba-1.3.5-3.39.1" RelationType="Default Component Of" RelatesToProductReference="SUSE CaaS Platform 4.0">
      <FullProductName ProductID="SUSE CaaS Platform 4.0:skuba-1.3.5-3.39.1">skuba-1.3.5-3.39.1 as a component of SUSE CaaS Platform 4.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="skuba-update-1.3.5-3.39.1" RelationType="Default Component Of" RelatesToProductReference="SUSE CaaS Platform 4.0">
      <FullProductName ProductID="SUSE CaaS Platform 4.0:skuba-update-1.3.5-3.39.1">skuba-update-1.3.5-3.39.1 as a component of SUSE CaaS Platform 4.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="terraform-provider-vsphere-1.17.3-3.3.4" RelationType="Default Component Of" RelatesToProductReference="SUSE CaaS Platform 4.0">
      <FullProductName ProductID="SUSE CaaS Platform 4.0:terraform-provider-vsphere-1.17.3-3.3.4">terraform-provider-vsphere-1.17.3-3.3.4 as a component of SUSE CaaS Platform 4.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Envoy 1.12.0. An untrusted remote client may send HTTP/2 requests that write to the heap outside of the request buffers when the upstream is HTTP/1. This may be used to corrupt nearby heap contents (leading to a query-of-death scenario) or may be used to bypass Envoy's access control mechanisms such as path based routing. An attacker can also modify requests from other users that happen to be proximal temporally and spatially.</Note>
    </Notes>
    <CVE>CVE-2019-18801</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container caasp/v4/cert-exporter:2.3.0:cert-exporter-2.3.0-1.3.4</ProductID>
        <ProductID>Container caasp/v4/cilium-operator:1.6.6:cilium-operator-1.6.6-3.3.8</ProductID>
        <ProductID>Container caasp/v4/cilium:1.6.6:bpftool-4.12.14-1.3.8.3</ProductID>
        <ProductID>Container caasp/v4/cilium:1.6.6:cilium-1.6.6-3.3.8</ProductID>
        <ProductID>Container caasp/v4/cilium:1.6.6:cilium-cni-1.6.6-3.3.8</ProductID>
        <ProductID>Container caasp/v4/cilium:1.6.6:cilium-proxy-20200109-3.3.11.1</ProductID>
        <ProductID>Container caasp/v4/cilium:1.6.6:iproute2-5.3-3.3.5</ProductID>
        <ProductID>Container caasp/v4/cilium:1.6.6:libdd_opentracing0-1.0.1-3.7.3</ProductID>
        <ProductID>Container caasp/v4/cilium:1.6.6:libfmt6-6.1.2-3.3.5</ProductID>
        <ProductID>Container caasp/v4/cilium:1.6.6:libsqlparser1-1.5+git20181206-1.6.6</ProductID>
        <ProductID>Container caasp/v4/cilium:1.6.6:libxxhash0-0.7.1-3.3.4</ProductID>
        <ProductID>Container caasp/v4/hyperkube:v1.17.17:iproute2-5.3-3.3.5</ProductID>
        <ProductID>Container caasp/v4/kured:1.3.0:kured-1.3.0-4.17.5</ProductID>
        <ProductID>Container caasp/v4/metrics-server:0.3.6:metrics-server-0.3.6-1.3.4</ProductID>
        <ProductID>SUSE CaaS Platform 4.0:caasp-release-4.2.1-24.23.4</ProductID>
        <ProductID>SUSE CaaS Platform 4.0:skuba-1.3.5-3.39.1</ProductID>
        <ProductID>SUSE CaaS Platform 4.0:skuba-update-1.3.5-3.39.1</ProductID>
        <ProductID>SUSE CaaS Platform 4.0:terraform-provider-vsphere-1.17.3-3.3.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>7.5</BaseScoreV2>
        <VectorV2>AV:N/AC:L/Au:N/C:P/I:P/A:P</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>9.8</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
  </Vulnerability>
</cvrfdoc>
