First published: Wed Dec 07 2022(Updated: )
The OpenStack Oslo Utility library.<br>Security Fix(es):<br><li> incorrect password masking in debug output (CVE-2022-0718)</li> For more details about the security issue(s), including the impact, a CVSS<br>score, acknowledgments, and other related information, refer to the CVE<br>page listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python-oslo-utils | <3.41.6-1.20220426095230.f4deaad.el8 | 3.41.6-1.20220426095230.f4deaad.el8 |
redhat/python-oslo-utils-lang | <3.41.6-1.20220426095230.f4deaad.el8 | 3.41.6-1.20220426095230.f4deaad.el8 |
redhat/python3-oslo-utils | <3.41.6-1.20220426095230.f4deaad.el8 | 3.41.6-1.20220426095230.f4deaad.el8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:8873 is classified as moderate.
To fix RHSA-2022:8873, upgrade the affected packages to versions 3.41.6-1.20220426095230.f4deaad.el8 or later.
RHSA-2022:8873 addresses a vulnerability related to incorrect password masking in debug output, identified as CVE-2022-0718.
The affected packages in RHSA-2022:8873 include python-oslo-utils, python-oslo-utils-lang, and python3-oslo-utils.
There are no documented workarounds for RHSA-2022:8873; the recommended action is to apply the updates.