-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: Red Hat OpenStack Platform 16.1 (golang-github-vbatts-tar-split) security update
Advisory ID:       RHSA-2022:0988-01
Product:           Red Hat OpenStack Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2022:0988
Issue date:        2022-03-24
CVE Names:         CVE-2021-29923 CVE-2021-34558 
====================================================================
1. Summary:

An update for golang-github-vbatts-tar-split is now available for Red Hat
OpenStack Platform 16.1 (Train).

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat OpenStack Platform 16.1 - ppc64le, x86_64

3. Description:

Security Fix(es):

* net: incorrect parsing of extraneous zero characters at the beginning of
an IP address octet (CVE-2021-29923)
* golang: crypto/tls: certificate of wrong type is causing TLS client to
panic (CVE-2021-34558)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1983596 - CVE-2021-34558 golang: crypto/tls: certificate of wrong type is causing TLS client to panic
1992006 - CVE-2021-29923 golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet
2020629 - Rebuild OSP16.1 golang dependencies on golang 1.15

6. Package List:

Red Hat OpenStack Platform 16.1:

Source:
golang-github-vbatts-tar-split-0.11.1-6.el8ost.src.rpm

ppc64le:
golang-github-vbatts-tar-split-0.11.1-6.el8ost.ppc64le.rpm

x86_64:
golang-github-vbatts-tar-split-0.11.1-6.el8ost.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2021-29923
https://access.redhat.com/security/cve/CVE-2021-34558
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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PomQ
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2022-0988:01 Moderate: Red Hat OpenStack Platform 16.1

An update for golang-github-vbatts-tar-split is now available for Red Hat OpenStack Platform 16.1 (Train)

Summary

Security Fix(es):
* net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923) * golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2021-29923 https://access.redhat.com/security/cve/CVE-2021-34558 https://access.redhat.com/security/updates/classification/#moderate

Package List

Red Hat OpenStack Platform 16.1:
Source: golang-github-vbatts-tar-split-0.11.1-6.el8ost.src.rpm
ppc64le: golang-github-vbatts-tar-split-0.11.1-6.el8ost.ppc64le.rpm
x86_64: golang-github-vbatts-tar-split-0.11.1-6.el8ost.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2022:0988-01
Product: Red Hat OpenStack Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2022:0988
Issued Date: : 2022-03-24
CVE Names: CVE-2021-29923 CVE-2021-34558

Topic

An update for golang-github-vbatts-tar-split is now available for Red HatOpenStack Platform 16.1 (Train).Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat OpenStack Platform 16.1 - ppc64le, x86_64


Bugs Fixed

1983596 - CVE-2021-34558 golang: crypto/tls: certificate of wrong type is causing TLS client to panic

1992006 - CVE-2021-29923 golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet

2020629 - Rebuild OSP16.1 golang dependencies on golang 1.15


Related News