From this webpage screenshot, the following key information about the vulnerability can be obtained: 1. Vulnerability ID: RHSA-2024:2737 2. Release Date: May 22, 2024 3. Update Date: May 22, 2024 4. Type/Severity: Security Advisory, Severity: Moderate 5. Subject: Updates for python-openstackclient, applicable to Red Hat OpenStack Platform 17.1 (Wallaby). 6. Description: python-openstackclient is a unified command-line client for OpenStack APIs. It is a thin wrapper around stock python-client modules, which implement the actual REST API client actions. 7. Security Fix: - Deleting a non-existent access rule would inadvertently delete another existing access rule within its scope (CVE-2023-6110) 8. Affected Products: - Red Hat OpenStack Platform 17.1 for RHEL 9 x86_64 - Red Hat Enterprise Linux for x86_64 9 x86_64 9. Patches: - BZ-2209607 - CVE-2023-6110 openstack-keystone: When a user attempts to delete a non-existent access rule, another existing access rule within its scope is accidentally deleted. - BZ-2212960 - CVE-2023-6110 openstack: Deleting a non-existent access rule deletes another existing access rule within its scope. 10. CVE ID: CVE-2023-6110 11. Contact Information**: Red Hat Security contact is secalert@redhat.com; more information is available at https://access.redhat.com/security/team/contact/. This information provides a detailed description of the vulnerability, affected products, and patch details.