First published: Thu Mar 24 2022(Updated: )
Golang binding library for qpid-proton<br>Security Fix(es):<br><li> net: incorrect parsing of extraneous zero characters at the beginning of</li> an IP address octet (CVE-2021-29923)<br>For more details about the security issue(s), including the impact, a CVSS<br>score, acknowledgments, and other related information, refer to the CVE<br>page listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/golang-qpid-apache | <0.32.0-rc1.9.el8 | 0.32.0-rc1.9.el8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:0989 is determined to be moderate due to the incorrect parsing of extraneous zero characters in IP address octets.
RHSA-2022:0989 addresses the vulnerability CVE-2021-29923 related to the Golang binding library for qpid-proton.
To fix RHSA-2022:0989, upgrade the golang-qpid-apache package to version 0.32.0-rc1.9.el8 or later.
The affected software for RHSA-2022:0989 is the golang-qpid-apache package specifically the version below 0.32.0-rc1.9.el8.
There is no officially recommended workaround for RHSA-2022:0989; the advised action is to apply the software upgrade.