RedHat: RHSA-2022-0998:01 Moderate: Red Hat OpenStack Platform 16.2...
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: Red Hat OpenStack Platform 16.2 (golang-github-vbatts-tar-split) security update
Advisory ID:       RHSA-2022:0998-01
Product:           Red Hat OpenStack Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2022:0998
Issue date:        2022-03-23
CVE Names:         CVE-2021-29923 CVE-2021-34558 
=====================================================================

1. Summary:

An update for golang-github-vbatts-tar-split is now available for Red Hat
OpenStack Platform 16.2 (Train).

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat OpenStack Platform 16.2 - ppc64le, x86_64

3. Description:

Security Fix(es):

* net: incorrect parsing of extraneous zero characters at the beginning of
an IP address octet (CVE-2021-29923)

* crypto/tls: certificate of wrong type is causing TLS client to panic
(CVE-2021-34558)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1983596 - CVE-2021-34558 golang: crypto/tls: certificate of wrong type is causing TLS client to panic
1992006 - CVE-2021-29923 golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet

6. Package List:

Red Hat OpenStack Platform 16.2:

Source:
golang-github-vbatts-tar-split-0.11.1-6.el8ost.src.rpm

ppc64le:
golang-github-vbatts-tar-split-0.11.1-6.el8ost.ppc64le.rpm

x86_64:
golang-github-vbatts-tar-split-0.11.1-6.el8ost.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2021-29923
https://access.redhat.com/security/cve/CVE-2021-34558
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=xkCV
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2022-0998:01 Moderate: Red Hat OpenStack Platform 16.2

An update for golang-github-vbatts-tar-split is now available for Red Hat OpenStack Platform 16.2 (Train)

Summary

Security Fix(es):
* net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)
* crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.

Solution

For details on how to apply this update, which includes the changesdescribed in this advisory, refer to:https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2021-29923 https://access.redhat.com/security/cve/CVE-2021-34558 https://access.redhat.com/security/updates/classification/#moderate

Package List

Red Hat OpenStack Platform 16.2:
Source: golang-github-vbatts-tar-split-0.11.1-6.el8ost.src.rpm
ppc64le: golang-github-vbatts-tar-split-0.11.1-6.el8ost.ppc64le.rpm
x86_64: golang-github-vbatts-tar-split-0.11.1-6.el8ost.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

Severity
Advisory ID: RHSA-2022:0998-01
Product: Red Hat OpenStack Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2022:0998
Issued Date: : 2022-03-23
CVE Names: CVE-2021-29923 CVE-2021-34558

Topic

An update for golang-github-vbatts-tar-split is now available for Red HatOpenStack Platform 16.2 (Train).Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.

Relevant Releases Architectures

Red Hat OpenStack Platform 16.2 - ppc64le, x86_64

Bugs Fixed

1983596 - CVE-2021-34558 golang: crypto/tls: certificate of wrong type is causing TLS client to panic

1992006 - CVE-2021-29923 golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.