The examples only show this happening at DEBUG log level. Does it happen at any non-DEBUG levels as well? Otherwise this is a class B3 report (A vulnerability in experimental or debugging features not intended for production use) and so would not warrant an advisory nor embargo: https://security.openstack.org/vmt-process.html#incident-report-taxonomy
The examples only show this happening at DEBUG log level. Does it happen at any non-DEBUG levels as well? Otherwise this is a class B3 report (A vulnerability in experimental or debugging features not intended for production use) and so would not warrant an advisory nor embargo: https:/ /security. openstack. org/vmt- process. html#incident- report- taxonomy