QID 240986
Date Published: 2022-12-12
QID 240986: Red Hat Update for OpenStack Platform 16.2.4 (RHSA-2022:8847)
Protocol buffers are a way of encoding structured data in an efficient.yet extensible format.
Google uses protocol buffers for almost all of.its internal rpc protocols and file formats...Security Fix(es):
- incorrect parsing of nullchar in the proto symbol leads to nullptr dereference (cve-2021-22570).
- Red Hat openstack for ibm power 16.2 ppc64le.
Red hat openstack 16.2 x86_64.
Red hat openstack director deployment tools 16.2 x86_64.
Red hat openstack director deployment tools for ibm power le 16.2 ppc64le.
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
Solution
Refer to Red Hat security advisory RHSA-2022:8847 for updates and patch information.
Vendor References
- RHSA-2022:8847 -
access.redhat.com/errata/RHSA-2022:8847
CVEs related to QID 240986
Software Advisories
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| RHSA-2022:8847 | Red Hat Enterprise Linux |
|