Hi Thomas,

On Fri, Dec 20, 2019 at 01:46:22PM +0100, Thomas Goirand wrote:
> Hi,
> 
> As I understand it, this bug concerns TripleO, which is a Red Hat
> product. Please clear this CVE from the Debian security tracker.

whilst it was reported initially for a TripleO issue, the changes
applied are affecting the python-mistral-lib/mistral and needs changes
in python-oslo.utils as pre-requisite.

See: https://bugs.launchpad.net/tripleo/+bug/1850843

and the fix in the python-oslo.utils part is

https://opendev.org/openstack/oslo.utils/commit/b41268417cecb12d1d5955ee3107067edf050221

while the patches for mistral/python-mistral-lib are as follows:

Patch for Pike and newer: 
https://launchpadlibrarian.net/449473654/0001-Ensure-we-mask-sensitive-data-from-Mistral-Action-lo.patch
Patch for Pike and newer: 
https://launchpadlibrarian.net/449472809/0001-Ensure-we-mask-sensitive-data-from-Mistral-Action-lo.patch

My point here was, it might have impact outside TripleO, there are
changes done defintively in the scope of the respective above
mentioned source packages in Debian. One might on the other side
defintively argue this all might not warrant any DSA handling (which I
might tend to agree).

What am I'm missing in the context?

Regards,
Salvatore

Reply via email to