QID 240986

Date Published: 2022-12-12

QID 240986: Red Hat Update for OpenStack Platform 16.2.4 (RHSA-2022:8847)

Protocol buffers are a way of encoding structured data in an efficient.yet extensible format.
Google uses protocol buffers for almost all of.its internal rpc protocols and file formats...Security Fix(es):

    incorrect parsing of nullchar in the proto symbol leads to nullptr dereference (cve-2021-22570).
Affected Products:
    Red Hat openstack for ibm power 16.2 ppc64le.
    Red hat openstack 16.2 x86_64.
    Red hat openstack director deployment tools 16.2 x86_64.
    Red hat openstack director deployment tools for ibm power le 16.2 ppc64le.
.

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Medium - 5.5 severity.
  • CVSS V2 rated as Low - 2.1 severity.
  • Solution
    Refer to Red Hat security advisory RHSA-2022:8847 for updates and patch information.
    Vendor References

    CVEs related to QID 240986

    Software Advisories
    Advisory ID Software Component Link
    RHSA-2022:8847 Red Hat Enterprise Linux URL Logo access.redhat.com/errata/RHSA-2022:8847