{"id":"RHSA-2018:1593","summary":"Red Hat Security Advisory: Red Hat OpenStack Platform director security update","modified":"2026-05-13T10:36:54.822807Z","published":"2024-09-13T16:51:21Z","upstream":["CVE-2017-12155","CVE-2018-1000115"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1593"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414549"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1489360"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1503896"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1514532"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1514842"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1517302"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1533602"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1534540"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1538753"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1541528"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1543883"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1544211"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1544802"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1545666"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1547091"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1547957"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1551182"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1552980"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1559093"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1568596"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1568601"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1571840"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1576577"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1593.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-12155"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-12155"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-12155"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1000115"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1000115"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000115"}],"affected":[{"package":{"name":"openstack-tripleo-heat-templates","ecosystem":"Red Hat:openstack:10::el7","purl":"pkg:rpm/redhat/openstack-tripleo-heat-templates"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.3.10-1.el7ost"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:1593.json"}},{"package":{"name":"puppet-tripleo","ecosystem":"Red Hat:openstack:10::el7","purl":"pkg:rpm/redhat/puppet-tripleo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.6.8-6.el7ost"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:1593.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N"}]}