First published: Wed Mar 23 2022(Updated: )
The OpenStack Oslo Utility library.<br>Security Fix(es):<br><li> incorrect password masking in debug output (CVE-2022-0718)</li> For more details about the security issue(s), including the impact, a CVSS<br>score, acknowledgments, and other related information, refer to the CVE<br>page listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python-oslo-utils | <3.41.6-2.20220111011750.el8 | 3.41.6-2.20220111011750.el8 |
redhat/python-oslo-utils-lang | <3.41.6-2.20220111011750.el8 | 3.41.6-2.20220111011750.el8 |
redhat/python3-oslo-utils | <3.41.6-2.20220111011750.el8 | 3.41.6-2.20220111011750.el8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:0993 is classified as moderate due to incorrect password masking in debug output.
To fix RHSA-2022:0993, upgrade the affected packages to version 3.41.6-2.20220111011750.el8.
The potential impacts of RHSA-2022:0993 include exposure of sensitive password information in debug output.
The affected packages in RHSA-2022:0993 include python-oslo-utils, python-oslo-utils-lang, and python3-oslo-utils.
Yes, the known CVE associated with RHSA-2022:0993 is CVE-2022-0718 which concerns incorrect password masking.