oslo.middleware is vulnerable to sensitive information leaks. This happens when catch errors are thrown, sensitive information such as the authentication token X-Auth-Token
which is used to place the rest call to neutron is logged as part of the stack trace.
lists.openstack.org/pipermail/openstack-announce/2017-January/002002.html
rhn.redhat.com/errata/RHSA-2017-0300.html
rhn.redhat.com/errata/RHSA-2017-0435.html
www.securityfocus.com/bid/95827
access.redhat.com/errata/RHSA-2017:0300
access.redhat.com/errata/RHSA-2017:0435
access.redhat.com/security/updates/classification/#moderate
bugs.launchpad.net/keystonemiddleware/+bug/1628031
bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2592
review.openstack.org/#/c/425730/
review.openstack.org/#/c/425732/
review.openstack.org/#/c/425734/
usn.ubuntu.com/3666-1/