Security
Headlines
HeadlinesLatestCVEs

Headline

Red Hat Security Advisory 2022-7398-02

Red Hat Security Advisory 2022-7398-02 - Red Hat OpenShift Container Platform is Red Hat’s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.12.0. Issues addressed include a denial of service vulnerability.

Packet Storm
#sql#vulnerability#web#ios#mac#linux#red_hat#dos#redis#memcached#js#git#kubernetes#perl#ssrf#auth#rpm#postgres#docker#wifi#ssl

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: OpenShift Container Platform 4.12.0 packages and security update
Advisory ID: RHSA-2022:7398-02
Product: Red Hat OpenShift Enterprise
Advisory URL: https://access.redhat.com/errata/RHSA-2022:7398
Issue date: 2023-01-17
CVE Names: CVE-2021-4235 CVE-2022-2880 CVE-2022-2995
CVE-2022-3162 CVE-2022-3172 CVE-2022-3259
CVE-2022-3466 CVE-2022-27664 CVE-2022-30631
CVE-2022-32148 CVE-2022-32189 CVE-2022-41715
=====================================================================

  1. Summary:

Red Hat OpenShift Container Platform release 4.12.0 is now available with
updates to packages and images that fix several bugs and add enhancements.

This release includes a security update for Red Hat OpenShift Container
Platform 4.12.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Ironic content for Red Hat OpenShift Container Platform 4.12 - aarch64, noarch, ppc64le, s390x, x86_64
Red Hat OpenShift Container Platform 4.12 - aarch64, noarch, ppc64le, s390x, x86_64

  1. Description:

Red Hat OpenShift Container Platform is Red Hat’s cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.

This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 4.12.0. See the following advisory for the container images for
this release:

https://access.redhat.com/errata/RHSA-2022:7399

Security Fix(es):

  • go-yaml: Denial of Service in go-yaml (CVE-2021-4235)
  • golang: net/http/httputil: ReverseProxy should not forward unparseable
    query parameters (CVE-2022-2880)
  • kubernetes: Unauthorized read of Custom Resources (CVE-2022-3162)
  • kube-apiserver: Aggregated API server can cause clients to be redirected
    (SSRF) (CVE-2022-3172)
  • golang: net/http: handle server errors after sending GOAWAY
    (CVE-2022-27664)
  • golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
  • golang: net/http/httputil: NewSingleHostReverseProxy - omit
    X-Forwarded-For not working (CVE-2022-32148)
  • golang: regexp/syntax: limit memory used by parsing regexps
    (CVE-2022-41715)
  • cri-o: incorrect handling of the supplementary groups (CVE-2022-2995)
  • OpenShift: Missing HTTP Strict Transport Security (CVE-2022-3259)
  • cri-o: Security regression of CVE-2022-27652 (CVE-2022-3466)
  • golang: math/big: decoding big.Float and big.Rat types can panic if the
    encoded message is too short, potentially allowing a denial of service
    (CVE-2022-32189)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

All OpenShift Container Platform 4.12 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift Console
or the CLI oc command. Instructions for upgrading a cluster are available
at
https://docs.openshift.com/container-platform/4.12/updating/updating-cluster-cli.html

  1. Solution:

See the following documentation, which will be updated shortly for this
release, for important instructions on how to upgrade your cluster and
fully apply this asynchronous errata update:

https://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html

Details on how to access this content are available at
https://docs.openshift.com/container-platform/4.12/updating/updating-cluster-cli.html

  1. Bugs fixed (https://bugzilla.redhat.com/):

2103220 - CVE-2022-3259 OpenShift: Missing HTTP Strict Transport Security
2107342 - CVE-2022-30631 golang: compress/gzip: stack exhaustion in Reader.Read
2107383 - CVE-2022-32148 golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
2113814 - CVE-2022-32189 golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service
2121632 - CVE-2022-2995 cri-o: incorrect handling of the supplementary groups
2124669 - CVE-2022-27664 golang: net/http: handle server errors after sending GOAWAY
2127804 - CVE-2022-3172 kube-apiserver: Aggregated API server can cause clients to be redirected (SSRF)
2132868 - CVE-2022-2880 golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters
2132872 - CVE-2022-41715 golang: regexp/syntax: limit memory used by parsing regexps
2134063 - CVE-2022-3466 cri-o: Security regression of CVE-2022-27652
2136673 - CVE-2022-3162 kubernetes: Unauthorized read of Custom Resources
2156727 - CVE-2021-4235 go-yaml: Denial of Service in go-yaml

  1. Package List:

Red Hat OpenShift Container Platform 4.12:

Source:
NetworkManager-1.36.0-8.el8_6.src.rpm
ansible-runner-1.4.6-2.el8ar.src.rpm
ansible-runner-http-1.0.0-2.el8ar.src.rpm
atomic-openshift-service-idler-4.12.0-202210141624.p0.ga0f9090.assembly.stream.el8.src.rpm
buildah-1.23.4-2.el8.src.rpm
butane-0.16.0-2.rhaos4.12.el8.src.rpm
conmon-2.1.2-2.rhaos4.11.el8.src.rpm
conmon-rs-0.4.0-2.rhaos4.12.git.el8.src.rpm
console-login-helper-messages-0.20.4-1.rhaos4.12.el8.src.rpm
container-selinux-2.188.0-1.rhaos4.12.el8.src.rpm
containernetworking-plugins-1.0.1-5.rhaos4.11.el8.src.rpm
coreos-installer-0.16.1-1.rhaos4.12.el8.src.rpm
cri-o-1.25.1-5.rhaos4.12.git6005903.el8.src.rpm
cri-tools-1.25.0-2.el8.src.rpm
criu-3.15-4.rhaos4.11.el8.src.rpm
crudini-0.9-11.el8ost.1.src.rpm
crun-1.4.2-1.rhaos4.11.el8.src.rpm
fuse-overlayfs-1.9-1.rhaos4.11.el8.src.rpm
grpc-1.18.0-4.el8ost.src.rpm
haproxy-2.2.24-1.el8.src.rpm
ignition-2.14.0-5.rhaos4.12.el8.src.rpm
kata-containers-2.5.2-1.el8.src.rpm
kernel-rt-4.18.0-372.40.1.rt7.197.el8_6.src.rpm
libslirp-4.4.0-2.rhaos4.11.el8.src.rpm
nmstate-1.3.3-1.el8.src.rpm
openshift-4.12.0-202301042257.p0.g77bec7a.assembly.stream.el8.src.rpm
openshift-ansible-4.12.0-202211071957.p0.g3a9d20e.assembly.stream.el8.src.rpm
openshift-clients-4.12.0-202301042257.p0.g854f807.assembly.stream.el8.src.rpm
openshift-kuryr-4.12.0-202210261235.p0.g92b9be2.assembly.stream.el8.src.rpm
openvswitch2.17-2.17.0-62.el8fdp.src.rpm
ostree-2022.2-5.el8.src.rpm
ovn22.06-22.06.0-27.el8fdp.src.rpm
ovn22.09-22.09.0-25.el8fdp.src.rpm
podman-4.2.0-1.rhaos4.12.el8.src.rpm
python-alembic-1.4.2-5.el8ost.src.rpm
python-amqp-2.5.2-7.el8ost.1.src.rpm
python-cmd2-1.4.0-1.1.el8.src.rpm
python-construct-2.10.56-1.el8ost.src.rpm
python-dogpile-cache-1.1.2-1.el8ost.1.src.rpm
python-eventlet-0.30.2-1.el8.src.rpm
python-flask-1.1.1-1.el8ost.src.rpm
python-funcsigs-1.0.2-8.el8ost.1.src.rpm
python-gunicorn-19.9.0-10.el8ost.1.src.rpm
python-ifaddr-0.1.6-5.el8ost.src.rpm
python-importlib-metadata-1.7.0-1.el8ost.src.rpm
python-iso8601-0.1.12-8.el8ost.1.src.rpm
python-jsonschema-3.2.0-5.el8ost.src.rpm
python-kombu-4.6.6-7.el8ost.1.src.rpm
python-kubernetes-25.3.0-1.el8.src.rpm
python-lockfile-0.11.0-8.el8ar.src.rpm
python-msgpack-0.6.2-1.el8ost.src.rpm
python-oslo-config-8.7.1-0.20211012155707.1a7bd66.el8.src.rpm
python-oslo-context-3.3.1-0.20211012152439.641a1e0.el8.src.rpm
python-oslo-db-9.1.0-0.20211020204148.be2cc6a.el8.src.rpm
python-oslo-i18n-5.1.0-0.20211012165753.b031d17.el8.src.rpm
python-oslo-log-4.6.0-0.20211012154701.41c8807.el8.src.rpm
python-oslo-messaging-12.9.1-0.20211020204149.f9de265.el8.src.rpm
python-oslo-metrics-0.3.0-0.20211020174122.43eee50.el8.src.rpm
python-oslo-policy-3.8.2-0.20211012161944.c7fd9f4.el8.src.rpm
python-oslo-serialization-4.2.0-0.20211012151454.2b94a4f.el8.src.rpm
python-packaging-20.4-1.el8ost.src.rpm
python-paste-3.2.4-1.el8ost.src.rpm
python-paste-deploy-2.0.1-4.el8ost.src.rpm
python-pexpect-4.6-2.el8ar.src.rpm
python-pint-0.10.1-1.el8ost.src.rpm
python-pycdlib-1.11.0-3.el8.src.rpm
python-pyghmi-1.5.14-2.1.el8ost.src.rpm
python-pyperclip-1.6.4-6.el8ost.src.rpm
python-pyroute2-0.5.13-1.el8ost.src.rpm
python-pyrsistent-0.16.0-3.el8ost.src.rpm
python-requests-unixsocket-0.1.5-5.el8ar.src.rpm
python-rsa-4.7-1.el8.src.rpm
python-tenacity-6.2.0-1.el8ost.src.rpm
python-wcwidth-0.1.7-14.el8ost.src.rpm
python-werkzeug-1.0.1-3.el8ost.src.rpm
python-zeroconf-0.24.4-1.el8ost.src.rpm
python-zipp-0.5.1-2.el8ost.src.rpm
rpm-ostree-2022.10.99.g0049dbdd-3.el8.src.rpm
runc-1.1.2-2.rhaos4.12.el8.src.rpm
rust-afterburn-5.3.0-1.rhaos4.12.el8.src.rpm
rust-bootupd-0.2.5-3.rhaos4.12.el8.src.rpm
skopeo-1.8.0-1.rhaos4.12.el8.src.rpm
slirp4netns-1.1.8-1.rhaos4.11.el8.src.rpm
tini-0.16.1-1.el8ar.src.rpm
toolbox-0.1.0-1.rhaos4.12.el8.src.rpm

aarch64:
NetworkManager-1.36.0-8.el8_6.aarch64.rpm
NetworkManager-adsl-1.36.0-8.el8_6.aarch64.rpm
NetworkManager-adsl-debuginfo-1.36.0-8.el8_6.aarch64.rpm
NetworkManager-bluetooth-1.36.0-8.el8_6.aarch64.rpm
NetworkManager-bluetooth-debuginfo-1.36.0-8.el8_6.aarch64.rpm
NetworkManager-cloud-setup-1.36.0-8.el8_6.aarch64.rpm
NetworkManager-cloud-setup-debuginfo-1.36.0-8.el8_6.aarch64.rpm
NetworkManager-debuginfo-1.36.0-8.el8_6.aarch64.rpm
NetworkManager-debugsource-1.36.0-8.el8_6.aarch64.rpm
NetworkManager-libnm-1.36.0-8.el8_6.aarch64.rpm
NetworkManager-libnm-debuginfo-1.36.0-8.el8_6.aarch64.rpm
NetworkManager-libnm-devel-1.36.0-8.el8_6.aarch64.rpm
NetworkManager-ovs-1.36.0-8.el8_6.aarch64.rpm
NetworkManager-ovs-debuginfo-1.36.0-8.el8_6.aarch64.rpm
NetworkManager-ppp-1.36.0-8.el8_6.aarch64.rpm
NetworkManager-ppp-debuginfo-1.36.0-8.el8_6.aarch64.rpm
NetworkManager-team-1.36.0-8.el8_6.aarch64.rpm
NetworkManager-team-debuginfo-1.36.0-8.el8_6.aarch64.rpm
NetworkManager-tui-1.36.0-8.el8_6.aarch64.rpm
NetworkManager-tui-debuginfo-1.36.0-8.el8_6.aarch64.rpm
NetworkManager-wifi-1.36.0-8.el8_6.aarch64.rpm
NetworkManager-wifi-debuginfo-1.36.0-8.el8_6.aarch64.rpm
NetworkManager-wwan-1.36.0-8.el8_6.aarch64.rpm
NetworkManager-wwan-debuginfo-1.36.0-8.el8_6.aarch64.rpm
afterburn-5.3.0-1.rhaos4.12.el8.aarch64.rpm
afterburn-debuginfo-5.3.0-1.rhaos4.12.el8.aarch64.rpm
atomic-openshift-service-idler-4.12.0-202210141624.p0.ga0f9090.assembly.stream.el8.aarch64.rpm
bootupd-0.2.5-3.rhaos4.12.el8.aarch64.rpm
bootupd-debuginfo-0.2.5-3.rhaos4.12.el8.aarch64.rpm
buildah-1.23.4-2.el8.aarch64.rpm
buildah-debuginfo-1.23.4-2.el8.aarch64.rpm
buildah-debugsource-1.23.4-2.el8.aarch64.rpm
buildah-tests-1.23.4-2.el8.aarch64.rpm
buildah-tests-debuginfo-1.23.4-2.el8.aarch64.rpm
butane-0.16.0-2.rhaos4.12.el8.aarch64.rpm
butane-debuginfo-0.16.0-2.rhaos4.12.el8.aarch64.rpm
butane-debugsource-0.16.0-2.rhaos4.12.el8.aarch64.rpm
conmon-2.1.2-2.rhaos4.11.el8.aarch64.rpm
conmon-debuginfo-2.1.2-2.rhaos4.11.el8.aarch64.rpm
conmon-debugsource-2.1.2-2.rhaos4.11.el8.aarch64.rpm
conmon-rs-0.4.0-2.rhaos4.12.git.el8.aarch64.rpm
containernetworking-plugins-1.0.1-5.rhaos4.11.el8.aarch64.rpm
containernetworking-plugins-debuginfo-1.0.1-5.rhaos4.11.el8.aarch64.rpm
containernetworking-plugins-debugsource-1.0.1-5.rhaos4.11.el8.aarch64.rpm
containers-common-1-27.rhaos4.12.el8.aarch64.rpm
coreos-installer-0.16.1-1.rhaos4.12.el8.aarch64.rpm
coreos-installer-bootinfra-debuginfo-0.16.1-1.rhaos4.12.el8.aarch64.rpm
coreos-installer-debuginfo-0.16.1-1.rhaos4.12.el8.aarch64.rpm
coreos-installer-debugsource-0.16.1-1.rhaos4.12.el8.aarch64.rpm
cri-o-1.25.1-5.rhaos4.12.git6005903.el8.aarch64.rpm
cri-o-debuginfo-1.25.1-5.rhaos4.12.git6005903.el8.aarch64.rpm
cri-o-debugsource-1.25.1-5.rhaos4.12.git6005903.el8.aarch64.rpm
cri-tools-1.25.0-2.el8.aarch64.rpm
cri-tools-debuginfo-1.25.0-2.el8.aarch64.rpm
cri-tools-debugsource-1.25.0-2.el8.aarch64.rpm
crit-3.15-4.rhaos4.11.el8.aarch64.rpm
criu-3.15-4.rhaos4.11.el8.aarch64.rpm
criu-debuginfo-3.15-4.rhaos4.11.el8.aarch64.rpm
criu-debugsource-3.15-4.rhaos4.11.el8.aarch64.rpm
criu-devel-3.15-4.rhaos4.11.el8.aarch64.rpm
criu-libs-3.15-4.rhaos4.11.el8.aarch64.rpm
criu-libs-debuginfo-3.15-4.rhaos4.11.el8.aarch64.rpm
crun-1.4.2-1.rhaos4.11.el8.aarch64.rpm
crun-debuginfo-1.4.2-1.rhaos4.11.el8.aarch64.rpm
crun-debugsource-1.4.2-1.rhaos4.11.el8.aarch64.rpm
fuse-overlayfs-1.9-1.rhaos4.11.el8.aarch64.rpm
fuse-overlayfs-debuginfo-1.9-1.rhaos4.11.el8.aarch64.rpm
fuse-overlayfs-debugsource-1.9-1.rhaos4.11.el8.aarch64.rpm
grpc-1.18.0-4.el8ost.aarch64.rpm
grpc-cli-1.18.0-4.el8ost.aarch64.rpm
grpc-cli-debuginfo-1.18.0-4.el8ost.aarch64.rpm
grpc-debuginfo-1.18.0-4.el8ost.aarch64.rpm
grpc-debugsource-1.18.0-4.el8ost.aarch64.rpm
grpc-devel-1.18.0-4.el8ost.aarch64.rpm
grpc-plugins-1.18.0-4.el8ost.aarch64.rpm
grpc-plugins-debuginfo-1.18.0-4.el8ost.aarch64.rpm
haproxy-debugsource-2.2.24-1.el8.aarch64.rpm
haproxy22-2.2.24-1.el8.aarch64.rpm
haproxy22-debuginfo-2.2.24-1.el8.aarch64.rpm
ignition-2.14.0-5.rhaos4.12.el8.aarch64.rpm
ignition-debuginfo-2.14.0-5.rhaos4.12.el8.aarch64.rpm
ignition-debugsource-2.14.0-5.rhaos4.12.el8.aarch64.rpm
ignition-validate-2.14.0-5.rhaos4.12.el8.aarch64.rpm
ignition-validate-debuginfo-2.14.0-5.rhaos4.12.el8.aarch64.rpm
kata-containers-2.5.2-1.el8.aarch64.rpm
libslirp-4.4.0-2.rhaos4.11.el8.aarch64.rpm
libslirp-debuginfo-4.4.0-2.rhaos4.11.el8.aarch64.rpm
libslirp-debugsource-4.4.0-2.rhaos4.11.el8.aarch64.rpm
libslirp-devel-4.4.0-2.rhaos4.11.el8.aarch64.rpm
network-scripts-openvswitch2.17-2.17.0-62.el8fdp.aarch64.rpm
nmstate-1.3.3-1.el8.aarch64.rpm
nmstate-debuginfo-1.3.3-1.el8.aarch64.rpm
nmstate-debugsource-1.3.3-1.el8.aarch64.rpm
nmstate-devel-1.3.3-1.el8.aarch64.rpm
nmstate-libs-1.3.3-1.el8.aarch64.rpm
nmstate-libs-debuginfo-1.3.3-1.el8.aarch64.rpm
openshift-clients-4.12.0-202301042257.p0.g854f807.assembly.stream.el8.aarch64.rpm
openshift-hyperkube-4.12.0-202301042257.p0.g77bec7a.assembly.stream.el8.aarch64.rpm
openvswitch2.17-2.17.0-62.el8fdp.aarch64.rpm
openvswitch2.17-debuginfo-2.17.0-62.el8fdp.aarch64.rpm
openvswitch2.17-debugsource-2.17.0-62.el8fdp.aarch64.rpm
openvswitch2.17-devel-2.17.0-62.el8fdp.aarch64.rpm
openvswitch2.17-ipsec-2.17.0-62.el8fdp.aarch64.rpm
ostree-2022.2-5.el8.aarch64.rpm
ostree-debuginfo-2022.2-5.el8.aarch64.rpm
ostree-debugsource-2022.2-5.el8.aarch64.rpm
ostree-devel-2022.2-5.el8.aarch64.rpm
ostree-grub2-2022.2-5.el8.aarch64.rpm
ostree-libs-2022.2-5.el8.aarch64.rpm
ostree-libs-debuginfo-2022.2-5.el8.aarch64.rpm
ovn22.06-22.06.0-27.el8fdp.aarch64.rpm
ovn22.06-central-22.06.0-27.el8fdp.aarch64.rpm
ovn22.06-central-debuginfo-22.06.0-27.el8fdp.aarch64.rpm
ovn22.06-debuginfo-22.06.0-27.el8fdp.aarch64.rpm
ovn22.06-debugsource-22.06.0-27.el8fdp.aarch64.rpm
ovn22.06-host-22.06.0-27.el8fdp.aarch64.rpm
ovn22.06-host-debuginfo-22.06.0-27.el8fdp.aarch64.rpm
ovn22.06-vtep-22.06.0-27.el8fdp.aarch64.rpm
ovn22.06-vtep-debuginfo-22.06.0-27.el8fdp.aarch64.rpm
ovn22.09-22.09.0-25.el8fdp.aarch64.rpm
ovn22.09-central-22.09.0-25.el8fdp.aarch64.rpm
ovn22.09-central-debuginfo-22.09.0-25.el8fdp.aarch64.rpm
ovn22.09-debuginfo-22.09.0-25.el8fdp.aarch64.rpm
ovn22.09-debugsource-22.09.0-25.el8fdp.aarch64.rpm
ovn22.09-host-22.09.0-25.el8fdp.aarch64.rpm
ovn22.09-host-debuginfo-22.09.0-25.el8fdp.aarch64.rpm
ovn22.09-vtep-22.09.0-25.el8fdp.aarch64.rpm
ovn22.09-vtep-debuginfo-22.09.0-25.el8fdp.aarch64.rpm
podman-4.2.0-1.rhaos4.12.el8.aarch64.rpm
podman-catatonit-4.2.0-1.rhaos4.12.el8.aarch64.rpm
podman-catatonit-debuginfo-4.2.0-1.rhaos4.12.el8.aarch64.rpm
podman-debuginfo-4.2.0-1.rhaos4.12.el8.aarch64.rpm
podman-debugsource-4.2.0-1.rhaos4.12.el8.aarch64.rpm
podman-gvproxy-debuginfo-4.2.0-1.rhaos4.12.el8.aarch64.rpm
podman-plugins-4.2.0-1.rhaos4.12.el8.aarch64.rpm
podman-plugins-debuginfo-4.2.0-1.rhaos4.12.el8.aarch64.rpm
podman-remote-4.2.0-1.rhaos4.12.el8.aarch64.rpm
podman-remote-debuginfo-4.2.0-1.rhaos4.12.el8.aarch64.rpm
podman-tests-4.2.0-1.rhaos4.12.el8.aarch64.rpm
python-msgpack-debugsource-0.6.2-1.el8ost.aarch64.rpm
python-pyrsistent-debugsource-0.16.0-3.el8ost.aarch64.rpm
python3-criu-3.15-4.rhaos4.11.el8.aarch64.rpm
python3-grpcio-1.18.0-4.el8ost.aarch64.rpm
python3-grpcio-debuginfo-1.18.0-4.el8ost.aarch64.rpm
python3-msgpack-0.6.2-1.el8ost.aarch64.rpm
python3-msgpack-debuginfo-0.6.2-1.el8ost.aarch64.rpm
python3-openvswitch2.17-2.17.0-62.el8fdp.aarch64.rpm
python3-openvswitch2.17-debuginfo-2.17.0-62.el8fdp.aarch64.rpm
python3-pyrsistent-0.16.0-3.el8ost.aarch64.rpm
python3-pyrsistent-debuginfo-0.16.0-3.el8ost.aarch64.rpm
rpm-ostree-2022.10.99.g0049dbdd-3.el8.aarch64.rpm
rpm-ostree-debuginfo-2022.10.99.g0049dbdd-3.el8.aarch64.rpm
rpm-ostree-debugsource-2022.10.99.g0049dbdd-3.el8.aarch64.rpm
rpm-ostree-devel-2022.10.99.g0049dbdd-3.el8.aarch64.rpm
rpm-ostree-libs-2022.10.99.g0049dbdd-3.el8.aarch64.rpm
rpm-ostree-libs-debuginfo-2022.10.99.g0049dbdd-3.el8.aarch64.rpm
runc-1.1.2-2.rhaos4.12.el8.aarch64.rpm
runc-debuginfo-1.1.2-2.rhaos4.12.el8.aarch64.rpm
runc-debugsource-1.1.2-2.rhaos4.12.el8.aarch64.rpm
rust-afterburn-debugsource-5.3.0-1.rhaos4.12.el8.aarch64.rpm
rust-bootupd-debugsource-0.2.5-3.rhaos4.12.el8.aarch64.rpm
skopeo-1.8.0-1.rhaos4.12.el8.aarch64.rpm
skopeo-tests-1.8.0-1.rhaos4.12.el8.aarch64.rpm
slirp4netns-1.1.8-1.rhaos4.11.el8.aarch64.rpm
slirp4netns-debuginfo-1.1.8-1.rhaos4.11.el8.aarch64.rpm
slirp4netns-debugsource-1.1.8-1.rhaos4.11.el8.aarch64.rpm
tini-0.16.1-1.el8ar.aarch64.rpm

noarch:
NetworkManager-config-connectivity-redhat-1.36.0-8.el8_6.noarch.rpm
NetworkManager-config-server-1.36.0-8.el8_6.noarch.rpm
NetworkManager-dispatcher-routing-rules-1.36.0-8.el8_6.noarch.rpm
ansible-runner-1.4.6-2.el8ar.noarch.rpm
ansible-runner-http-1.0.0-2.el8ar.noarch.rpm
butane-redistributable-0.16.0-2.rhaos4.12.el8.noarch.rpm
console-login-helper-messages-0.20.4-1.rhaos4.12.el8.noarch.rpm
console-login-helper-messages-issuegen-0.20.4-1.rhaos4.12.el8.noarch.rpm
console-login-helper-messages-profile-0.20.4-1.rhaos4.12.el8.noarch.rpm
container-selinux-2.188.0-1.rhaos4.12.el8.noarch.rpm
crudini-0.9-11.el8ost.1.noarch.rpm
nmstate-plugin-ovsdb-1.3.3-1.el8.noarch.rpm
openshift-ansible-4.12.0-202211071957.p0.g3a9d20e.assembly.stream.el8.noarch.rpm
openshift-ansible-test-4.12.0-202211071957.p0.g3a9d20e.assembly.stream.el8.noarch.rpm
openshift-kuryr-cni-4.12.0-202210261235.p0.g92b9be2.assembly.stream.el8.noarch.rpm
openshift-kuryr-common-4.12.0-202210261235.p0.g92b9be2.assembly.stream.el8.noarch.rpm
openshift-kuryr-controller-4.12.0-202210261235.p0.g92b9be2.assembly.stream.el8.noarch.rpm
openvswitch2.17-test-2.17.0-62.el8fdp.noarch.rpm
podman-docker-4.2.0-1.rhaos4.12.el8.noarch.rpm
pycdlib-tools-1.11.0-3.el8.noarch.rpm
python-amqp-doc-2.5.2-7.el8ost.1.noarch.rpm
python-flask-doc-1.1.1-1.el8ost.noarch.rpm
python-oslo-db-lang-9.1.0-0.20211020204148.be2cc6a.el8.noarch.rpm
python-oslo-i18n-lang-5.1.0-0.20211012165753.b031d17.el8.noarch.rpm
python-oslo-log-lang-4.6.0-0.20211012154701.41c8807.el8.noarch.rpm
python-oslo-policy-lang-3.8.2-0.20211012161944.c7fd9f4.el8.noarch.rpm
python-packaging-doc-20.4-1.el8ost.noarch.rpm
python-pyperclip-doc-1.6.4-6.el8ost.noarch.rpm
python2-funcsigs-1.0.2-8.el8ost.1.noarch.rpm
python3-alembic-1.4.2-5.el8ost.noarch.rpm
python3-amqp-2.5.2-7.el8ost.1.noarch.rpm
python3-ansible-runner-1.4.6-2.el8ar.noarch.rpm
python3-cmd2-1.4.0-1.1.el8.noarch.rpm
python3-construct-2.10.56-1.el8ost.noarch.rpm
python3-dogpile-cache-1.1.2-1.el8ost.1.noarch.rpm
python3-eventlet-0.30.2-1.el8.noarch.rpm
python3-flask-1.1.1-1.el8ost.noarch.rpm
python3-funcsigs-1.0.2-8.el8ost.1.noarch.rpm
python3-gunicorn-19.9.0-10.el8ost.1.noarch.rpm
python3-ifaddr-0.1.6-5.el8ost.noarch.rpm
python3-importlib-metadata-1.7.0-1.el8ost.noarch.rpm
python3-iso8601-0.1.12-8.el8ost.1.noarch.rpm
python3-jsonschema-3.2.0-5.el8ost.noarch.rpm
python3-kombu-4.6.6-7.el8ost.1.noarch.rpm
python3-kubernetes-25.3.0-1.el8.noarch.rpm
python3-kubernetes-tests-25.3.0-1.el8.noarch.rpm
python3-kuryr-kubernetes-4.12.0-202210261235.p0.g92b9be2.assembly.stream.el8.noarch.rpm
python3-libnmstate-1.3.3-1.el8.noarch.rpm
python3-lockfile-0.11.0-8.el8ar.noarch.rpm
python3-oslo-config-8.7.1-0.20211012155707.1a7bd66.el8.noarch.rpm
python3-oslo-context-3.3.1-0.20211012152439.641a1e0.el8.noarch.rpm
python3-oslo-context-tests-3.3.1-0.20211012152439.641a1e0.el8.noarch.rpm
python3-oslo-db-9.1.0-0.20211020204148.be2cc6a.el8.noarch.rpm
python3-oslo-db-tests-9.1.0-0.20211020204148.be2cc6a.el8.noarch.rpm
python3-oslo-i18n-5.1.0-0.20211012165753.b031d17.el8.noarch.rpm
python3-oslo-log-4.6.0-0.20211012154701.41c8807.el8.noarch.rpm
python3-oslo-log-tests-4.6.0-0.20211012154701.41c8807.el8.noarch.rpm
python3-oslo-messaging-12.9.1-0.20211020204149.f9de265.el8.noarch.rpm
python3-oslo-messaging-tests-12.9.1-0.20211020204149.f9de265.el8.noarch.rpm
python3-oslo-metrics-0.3.0-0.20211020174122.43eee50.el8.noarch.rpm
python3-oslo-metrics-tests-0.3.0-0.20211020174122.43eee50.el8.noarch.rpm
python3-oslo-policy-3.8.2-0.20211012161944.c7fd9f4.el8.noarch.rpm
python3-oslo-policy-tests-3.8.2-0.20211012161944.c7fd9f4.el8.noarch.rpm
python3-oslo-serialization-4.2.0-0.20211012151454.2b94a4f.el8.noarch.rpm
python3-oslo-serialization-tests-4.2.0-0.20211012151454.2b94a4f.el8.noarch.rpm
python3-packaging-20.4-1.el8ost.noarch.rpm
python3-paste-3.2.4-1.el8ost.noarch.rpm
python3-paste-deploy-2.0.1-4.el8ost.noarch.rpm
python3-pexpect-4.6-2.el8ar.noarch.rpm
python3-pint-0.10.1-1.el8ost.noarch.rpm
python3-pycdlib-1.11.0-3.el8.noarch.rpm
python3-pyghmi-1.5.14-2.1.el8ost.noarch.rpm
python3-pyperclip-1.6.4-6.el8ost.noarch.rpm
python3-pyroute2-0.5.13-1.el8ost.noarch.rpm
python3-requests-unixsocket-0.1.5-5.el8ar.noarch.rpm
python3-rsa-4.7-1.el8.noarch.rpm
python3-tenacity-6.2.0-1.el8ost.noarch.rpm
python3-wcwidth-0.1.7-14.el8ost.noarch.rpm
python3-werkzeug-1.0.1-3.el8ost.noarch.rpm
python3-zeroconf-0.24.4-1.el8ost.noarch.rpm
python3-zipp-0.5.1-2.el8ost.noarch.rpm
toolbox-0.1.0-1.rhaos4.12.el8.noarch.rpm

ppc64le:
NetworkManager-1.36.0-8.el8_6.ppc64le.rpm
NetworkManager-adsl-1.36.0-8.el8_6.ppc64le.rpm
NetworkManager-adsl-debuginfo-1.36.0-8.el8_6.ppc64le.rpm
NetworkManager-bluetooth-1.36.0-8.el8_6.ppc64le.rpm
NetworkManager-bluetooth-debuginfo-1.36.0-8.el8_6.ppc64le.rpm
NetworkManager-cloud-setup-1.36.0-8.el8_6.ppc64le.rpm
NetworkManager-cloud-setup-debuginfo-1.36.0-8.el8_6.ppc64le.rpm
NetworkManager-debuginfo-1.36.0-8.el8_6.ppc64le.rpm
NetworkManager-debugsource-1.36.0-8.el8_6.ppc64le.rpm
NetworkManager-libnm-1.36.0-8.el8_6.ppc64le.rpm
NetworkManager-libnm-debuginfo-1.36.0-8.el8_6.ppc64le.rpm
NetworkManager-libnm-devel-1.36.0-8.el8_6.ppc64le.rpm
NetworkManager-ovs-1.36.0-8.el8_6.ppc64le.rpm
NetworkManager-ovs-debuginfo-1.36.0-8.el8_6.ppc64le.rpm
NetworkManager-ppp-1.36.0-8.el8_6.ppc64le.rpm
NetworkManager-ppp-debuginfo-1.36.0-8.el8_6.ppc64le.rpm
NetworkManager-team-1.36.0-8.el8_6.ppc64le.rpm
NetworkManager-team-debuginfo-1.36.0-8.el8_6.ppc64le.rpm
NetworkManager-tui-1.36.0-8.el8_6.ppc64le.rpm
NetworkManager-tui-debuginfo-1.36.0-8.el8_6.ppc64le.rpm
NetworkManager-wifi-1.36.0-8.el8_6.ppc64le.rpm
NetworkManager-wifi-debuginfo-1.36.0-8.el8_6.ppc64le.rpm
NetworkManager-wwan-1.36.0-8.el8_6.ppc64le.rpm
NetworkManager-wwan-debuginfo-1.36.0-8.el8_6.ppc64le.rpm
afterburn-5.3.0-1.rhaos4.12.el8.ppc64le.rpm
afterburn-debuginfo-5.3.0-1.rhaos4.12.el8.ppc64le.rpm
atomic-openshift-service-idler-4.12.0-202210141624.p0.ga0f9090.assembly.stream.el8.ppc64le.rpm
buildah-1.23.4-2.el8.ppc64le.rpm
buildah-debuginfo-1.23.4-2.el8.ppc64le.rpm
buildah-debugsource-1.23.4-2.el8.ppc64le.rpm
buildah-tests-1.23.4-2.el8.ppc64le.rpm
buildah-tests-debuginfo-1.23.4-2.el8.ppc64le.rpm
butane-0.16.0-2.rhaos4.12.el8.ppc64le.rpm
butane-debuginfo-0.16.0-2.rhaos4.12.el8.ppc64le.rpm
butane-debugsource-0.16.0-2.rhaos4.12.el8.ppc64le.rpm
conmon-2.1.2-2.rhaos4.11.el8.ppc64le.rpm
conmon-debuginfo-2.1.2-2.rhaos4.11.el8.ppc64le.rpm
conmon-debugsource-2.1.2-2.rhaos4.11.el8.ppc64le.rpm
conmon-rs-0.4.0-2.rhaos4.12.git.el8.ppc64le.rpm
containernetworking-plugins-1.0.1-5.rhaos4.11.el8.ppc64le.rpm
containernetworking-plugins-debuginfo-1.0.1-5.rhaos4.11.el8.ppc64le.rpm
containernetworking-plugins-debugsource-1.0.1-5.rhaos4.11.el8.ppc64le.rpm
containers-common-1-27.rhaos4.12.el8.ppc64le.rpm
coreos-installer-0.16.1-1.rhaos4.12.el8.ppc64le.rpm
coreos-installer-bootinfra-0.16.1-1.rhaos4.12.el8.ppc64le.rpm
coreos-installer-bootinfra-debuginfo-0.16.1-1.rhaos4.12.el8.ppc64le.rpm
coreos-installer-debuginfo-0.16.1-1.rhaos4.12.el8.ppc64le.rpm
coreos-installer-debugsource-0.16.1-1.rhaos4.12.el8.ppc64le.rpm
cri-o-1.25.1-5.rhaos4.12.git6005903.el8.ppc64le.rpm
cri-o-debuginfo-1.25.1-5.rhaos4.12.git6005903.el8.ppc64le.rpm
cri-o-debugsource-1.25.1-5.rhaos4.12.git6005903.el8.ppc64le.rpm
cri-tools-1.25.0-2.el8.ppc64le.rpm
cri-tools-debuginfo-1.25.0-2.el8.ppc64le.rpm
cri-tools-debugsource-1.25.0-2.el8.ppc64le.rpm
crit-3.15-4.rhaos4.11.el8.ppc64le.rpm
criu-3.15-4.rhaos4.11.el8.ppc64le.rpm
criu-debuginfo-3.15-4.rhaos4.11.el8.ppc64le.rpm
criu-debugsource-3.15-4.rhaos4.11.el8.ppc64le.rpm
criu-devel-3.15-4.rhaos4.11.el8.ppc64le.rpm
criu-libs-3.15-4.rhaos4.11.el8.ppc64le.rpm
criu-libs-debuginfo-3.15-4.rhaos4.11.el8.ppc64le.rpm
crun-1.4.2-1.rhaos4.11.el8.ppc64le.rpm
crun-debuginfo-1.4.2-1.rhaos4.11.el8.ppc64le.rpm
crun-debugsource-1.4.2-1.rhaos4.11.el8.ppc64le.rpm
fuse-overlayfs-1.9-1.rhaos4.11.el8.ppc64le.rpm
fuse-overlayfs-debuginfo-1.9-1.rhaos4.11.el8.ppc64le.rpm
fuse-overlayfs-debugsource-1.9-1.rhaos4.11.el8.ppc64le.rpm
grpc-1.18.0-4.el8ost.ppc64le.rpm
grpc-cli-1.18.0-4.el8ost.ppc64le.rpm
grpc-cli-debuginfo-1.18.0-4.el8ost.ppc64le.rpm
grpc-debuginfo-1.18.0-4.el8ost.ppc64le.rpm
grpc-debugsource-1.18.0-4.el8ost.ppc64le.rpm
grpc-devel-1.18.0-4.el8ost.ppc64le.rpm
grpc-plugins-1.18.0-4.el8ost.ppc64le.rpm
grpc-plugins-debuginfo-1.18.0-4.el8ost.ppc64le.rpm
haproxy-debugsource-2.2.24-1.el8.ppc64le.rpm
haproxy22-2.2.24-1.el8.ppc64le.rpm
haproxy22-debuginfo-2.2.24-1.el8.ppc64le.rpm
ignition-2.14.0-5.rhaos4.12.el8.ppc64le.rpm
ignition-debuginfo-2.14.0-5.rhaos4.12.el8.ppc64le.rpm
ignition-debugsource-2.14.0-5.rhaos4.12.el8.ppc64le.rpm
ignition-validate-2.14.0-5.rhaos4.12.el8.ppc64le.rpm
ignition-validate-debuginfo-2.14.0-5.rhaos4.12.el8.ppc64le.rpm
kata-containers-2.5.2-1.el8.ppc64le.rpm
libslirp-4.4.0-2.rhaos4.11.el8.ppc64le.rpm
libslirp-debuginfo-4.4.0-2.rhaos4.11.el8.ppc64le.rpm
libslirp-debugsource-4.4.0-2.rhaos4.11.el8.ppc64le.rpm
libslirp-devel-4.4.0-2.rhaos4.11.el8.ppc64le.rpm
network-scripts-openvswitch2.17-2.17.0-62.el8fdp.ppc64le.rpm
nmstate-1.3.3-1.el8.ppc64le.rpm
nmstate-debuginfo-1.3.3-1.el8.ppc64le.rpm
nmstate-debugsource-1.3.3-1.el8.ppc64le.rpm
nmstate-devel-1.3.3-1.el8.ppc64le.rpm
nmstate-libs-1.3.3-1.el8.ppc64le.rpm
nmstate-libs-debuginfo-1.3.3-1.el8.ppc64le.rpm
openshift-clients-4.12.0-202301042257.p0.g854f807.assembly.stream.el8.ppc64le.rpm
openshift-hyperkube-4.12.0-202301042257.p0.g77bec7a.assembly.stream.el8.ppc64le.rpm
openvswitch2.17-2.17.0-62.el8fdp.ppc64le.rpm
openvswitch2.17-debuginfo-2.17.0-62.el8fdp.ppc64le.rpm
openvswitch2.17-debugsource-2.17.0-62.el8fdp.ppc64le.rpm
openvswitch2.17-devel-2.17.0-62.el8fdp.ppc64le.rpm
openvswitch2.17-ipsec-2.17.0-62.el8fdp.ppc64le.rpm
ostree-2022.2-5.el8.ppc64le.rpm
ostree-debuginfo-2022.2-5.el8.ppc64le.rpm
ostree-debugsource-2022.2-5.el8.ppc64le.rpm
ostree-devel-2022.2-5.el8.ppc64le.rpm
ostree-grub2-2022.2-5.el8.ppc64le.rpm
ostree-libs-2022.2-5.el8.ppc64le.rpm
ostree-libs-debuginfo-2022.2-5.el8.ppc64le.rpm
ovn22.06-22.06.0-27.el8fdp.ppc64le.rpm
ovn22.06-central-22.06.0-27.el8fdp.ppc64le.rpm
ovn22.06-central-debuginfo-22.06.0-27.el8fdp.ppc64le.rpm
ovn22.06-debuginfo-22.06.0-27.el8fdp.ppc64le.rpm
ovn22.06-debugsource-22.06.0-27.el8fdp.ppc64le.rpm
ovn22.06-host-22.06.0-27.el8fdp.ppc64le.rpm
ovn22.06-host-debuginfo-22.06.0-27.el8fdp.ppc64le.rpm
ovn22.06-vtep-22.06.0-27.el8fdp.ppc64le.rpm
ovn22.06-vtep-debuginfo-22.06.0-27.el8fdp.ppc64le.rpm
ovn22.09-22.09.0-25.el8fdp.ppc64le.rpm
ovn22.09-central-22.09.0-25.el8fdp.ppc64le.rpm
ovn22.09-central-debuginfo-22.09.0-25.el8fdp.ppc64le.rpm
ovn22.09-debuginfo-22.09.0-25.el8fdp.ppc64le.rpm
ovn22.09-debugsource-22.09.0-25.el8fdp.ppc64le.rpm
ovn22.09-host-22.09.0-25.el8fdp.ppc64le.rpm
ovn22.09-host-debuginfo-22.09.0-25.el8fdp.ppc64le.rpm
ovn22.09-vtep-22.09.0-25.el8fdp.ppc64le.rpm
ovn22.09-vtep-debuginfo-22.09.0-25.el8fdp.ppc64le.rpm
podman-4.2.0-1.rhaos4.12.el8.ppc64le.rpm
podman-catatonit-4.2.0-1.rhaos4.12.el8.ppc64le.rpm
podman-catatonit-debuginfo-4.2.0-1.rhaos4.12.el8.ppc64le.rpm
podman-debuginfo-4.2.0-1.rhaos4.12.el8.ppc64le.rpm
podman-debugsource-4.2.0-1.rhaos4.12.el8.ppc64le.rpm
podman-gvproxy-debuginfo-4.2.0-1.rhaos4.12.el8.ppc64le.rpm
podman-plugins-4.2.0-1.rhaos4.12.el8.ppc64le.rpm
podman-plugins-debuginfo-4.2.0-1.rhaos4.12.el8.ppc64le.rpm
podman-remote-4.2.0-1.rhaos4.12.el8.ppc64le.rpm
podman-remote-debuginfo-4.2.0-1.rhaos4.12.el8.ppc64le.rpm
podman-tests-4.2.0-1.rhaos4.12.el8.ppc64le.rpm
python-pyrsistent-debugsource-0.16.0-3.el8ost.ppc64le.rpm
python3-criu-3.15-4.rhaos4.11.el8.ppc64le.rpm
python3-grpcio-1.18.0-4.el8ost.ppc64le.rpm
python3-grpcio-debuginfo-1.18.0-4.el8ost.ppc64le.rpm
python3-openvswitch2.17-2.17.0-62.el8fdp.ppc64le.rpm
python3-openvswitch2.17-debuginfo-2.17.0-62.el8fdp.ppc64le.rpm
python3-pyrsistent-0.16.0-3.el8ost.ppc64le.rpm
python3-pyrsistent-debuginfo-0.16.0-3.el8ost.ppc64le.rpm
rpm-ostree-2022.10.99.g0049dbdd-3.el8.ppc64le.rpm
rpm-ostree-debuginfo-2022.10.99.g0049dbdd-3.el8.ppc64le.rpm
rpm-ostree-debugsource-2022.10.99.g0049dbdd-3.el8.ppc64le.rpm
rpm-ostree-devel-2022.10.99.g0049dbdd-3.el8.ppc64le.rpm
rpm-ostree-libs-2022.10.99.g0049dbdd-3.el8.ppc64le.rpm
rpm-ostree-libs-debuginfo-2022.10.99.g0049dbdd-3.el8.ppc64le.rpm
runc-1.1.2-2.rhaos4.12.el8.ppc64le.rpm
runc-debuginfo-1.1.2-2.rhaos4.12.el8.ppc64le.rpm
runc-debugsource-1.1.2-2.rhaos4.12.el8.ppc64le.rpm
rust-afterburn-debugsource-5.3.0-1.rhaos4.12.el8.ppc64le.rpm
skopeo-1.8.0-1.rhaos4.12.el8.ppc64le.rpm
skopeo-tests-1.8.0-1.rhaos4.12.el8.ppc64le.rpm
slirp4netns-1.1.8-1.rhaos4.11.el8.ppc64le.rpm
slirp4netns-debuginfo-1.1.8-1.rhaos4.11.el8.ppc64le.rpm
slirp4netns-debugsource-1.1.8-1.rhaos4.11.el8.ppc64le.rpm
tini-0.16.1-1.el8ar.ppc64le.rpm

s390x:
NetworkManager-1.36.0-8.el8_6.s390x.rpm
NetworkManager-adsl-1.36.0-8.el8_6.s390x.rpm
NetworkManager-adsl-debuginfo-1.36.0-8.el8_6.s390x.rpm
NetworkManager-bluetooth-1.36.0-8.el8_6.s390x.rpm
NetworkManager-bluetooth-debuginfo-1.36.0-8.el8_6.s390x.rpm
NetworkManager-cloud-setup-1.36.0-8.el8_6.s390x.rpm
NetworkManager-cloud-setup-debuginfo-1.36.0-8.el8_6.s390x.rpm
NetworkManager-debuginfo-1.36.0-8.el8_6.s390x.rpm
NetworkManager-debugsource-1.36.0-8.el8_6.s390x.rpm
NetworkManager-libnm-1.36.0-8.el8_6.s390x.rpm
NetworkManager-libnm-debuginfo-1.36.0-8.el8_6.s390x.rpm
NetworkManager-libnm-devel-1.36.0-8.el8_6.s390x.rpm
NetworkManager-ovs-1.36.0-8.el8_6.s390x.rpm
NetworkManager-ovs-debuginfo-1.36.0-8.el8_6.s390x.rpm
NetworkManager-ppp-1.36.0-8.el8_6.s390x.rpm
NetworkManager-ppp-debuginfo-1.36.0-8.el8_6.s390x.rpm
NetworkManager-team-1.36.0-8.el8_6.s390x.rpm
NetworkManager-team-debuginfo-1.36.0-8.el8_6.s390x.rpm
NetworkManager-tui-1.36.0-8.el8_6.s390x.rpm
NetworkManager-tui-debuginfo-1.36.0-8.el8_6.s390x.rpm
NetworkManager-wifi-1.36.0-8.el8_6.s390x.rpm
NetworkManager-wifi-debuginfo-1.36.0-8.el8_6.s390x.rpm
NetworkManager-wwan-1.36.0-8.el8_6.s390x.rpm
NetworkManager-wwan-debuginfo-1.36.0-8.el8_6.s390x.rpm
afterburn-5.3.0-1.rhaos4.12.el8.s390x.rpm
afterburn-debuginfo-5.3.0-1.rhaos4.12.el8.s390x.rpm
atomic-openshift-service-idler-4.12.0-202210141624.p0.ga0f9090.assembly.stream.el8.s390x.rpm
buildah-1.23.4-2.el8.s390x.rpm
buildah-debuginfo-1.23.4-2.el8.s390x.rpm
buildah-debugsource-1.23.4-2.el8.s390x.rpm
buildah-tests-1.23.4-2.el8.s390x.rpm
buildah-tests-debuginfo-1.23.4-2.el8.s390x.rpm
butane-0.16.0-2.rhaos4.12.el8.s390x.rpm
butane-debuginfo-0.16.0-2.rhaos4.12.el8.s390x.rpm
butane-debugsource-0.16.0-2.rhaos4.12.el8.s390x.rpm
conmon-2.1.2-2.rhaos4.11.el8.s390x.rpm
conmon-debuginfo-2.1.2-2.rhaos4.11.el8.s390x.rpm
conmon-debugsource-2.1.2-2.rhaos4.11.el8.s390x.rpm
conmon-rs-0.4.0-2.rhaos4.12.git.el8.s390x.rpm
containernetworking-plugins-1.0.1-5.rhaos4.11.el8.s390x.rpm
containernetworking-plugins-debuginfo-1.0.1-5.rhaos4.11.el8.s390x.rpm
containernetworking-plugins-debugsource-1.0.1-5.rhaos4.11.el8.s390x.rpm
containers-common-1-27.rhaos4.12.el8.s390x.rpm
coreos-installer-0.16.1-1.rhaos4.12.el8.s390x.rpm
coreos-installer-bootinfra-0.16.1-1.rhaos4.12.el8.s390x.rpm
coreos-installer-bootinfra-debuginfo-0.16.1-1.rhaos4.12.el8.s390x.rpm
coreos-installer-debuginfo-0.16.1-1.rhaos4.12.el8.s390x.rpm
coreos-installer-debugsource-0.16.1-1.rhaos4.12.el8.s390x.rpm
cri-o-1.25.1-5.rhaos4.12.git6005903.el8.s390x.rpm
cri-o-debuginfo-1.25.1-5.rhaos4.12.git6005903.el8.s390x.rpm
cri-o-debugsource-1.25.1-5.rhaos4.12.git6005903.el8.s390x.rpm
cri-tools-1.25.0-2.el8.s390x.rpm
cri-tools-debuginfo-1.25.0-2.el8.s390x.rpm
cri-tools-debugsource-1.25.0-2.el8.s390x.rpm
crit-3.15-4.rhaos4.11.el8.s390x.rpm
criu-3.15-4.rhaos4.11.el8.s390x.rpm
criu-debuginfo-3.15-4.rhaos4.11.el8.s390x.rpm
criu-debugsource-3.15-4.rhaos4.11.el8.s390x.rpm
criu-devel-3.15-4.rhaos4.11.el8.s390x.rpm
criu-libs-3.15-4.rhaos4.11.el8.s390x.rpm
criu-libs-debuginfo-3.15-4.rhaos4.11.el8.s390x.rpm
crun-1.4.2-1.rhaos4.11.el8.s390x.rpm
crun-debuginfo-1.4.2-1.rhaos4.11.el8.s390x.rpm
crun-debugsource-1.4.2-1.rhaos4.11.el8.s390x.rpm
fuse-overlayfs-1.9-1.rhaos4.11.el8.s390x.rpm
fuse-overlayfs-debuginfo-1.9-1.rhaos4.11.el8.s390x.rpm
fuse-overlayfs-debugsource-1.9-1.rhaos4.11.el8.s390x.rpm
grpc-1.18.0-4.el8ost.s390x.rpm
grpc-cli-1.18.0-4.el8ost.s390x.rpm
grpc-cli-debuginfo-1.18.0-4.el8ost.s390x.rpm
grpc-debuginfo-1.18.0-4.el8ost.s390x.rpm
grpc-debugsource-1.18.0-4.el8ost.s390x.rpm
grpc-devel-1.18.0-4.el8ost.s390x.rpm
grpc-plugins-1.18.0-4.el8ost.s390x.rpm
grpc-plugins-debuginfo-1.18.0-4.el8ost.s390x.rpm
haproxy-debugsource-2.2.24-1.el8.s390x.rpm
haproxy22-2.2.24-1.el8.s390x.rpm
haproxy22-debuginfo-2.2.24-1.el8.s390x.rpm
ignition-2.14.0-5.rhaos4.12.el8.s390x.rpm
ignition-debuginfo-2.14.0-5.rhaos4.12.el8.s390x.rpm
ignition-debugsource-2.14.0-5.rhaos4.12.el8.s390x.rpm
ignition-validate-2.14.0-5.rhaos4.12.el8.s390x.rpm
ignition-validate-debuginfo-2.14.0-5.rhaos4.12.el8.s390x.rpm
libslirp-4.4.0-2.rhaos4.11.el8.s390x.rpm
libslirp-debuginfo-4.4.0-2.rhaos4.11.el8.s390x.rpm
libslirp-debugsource-4.4.0-2.rhaos4.11.el8.s390x.rpm
libslirp-devel-4.4.0-2.rhaos4.11.el8.s390x.rpm
network-scripts-openvswitch2.17-2.17.0-62.el8fdp.s390x.rpm
nmstate-1.3.3-1.el8.s390x.rpm
nmstate-debuginfo-1.3.3-1.el8.s390x.rpm
nmstate-debugsource-1.3.3-1.el8.s390x.rpm
nmstate-devel-1.3.3-1.el8.s390x.rpm
nmstate-libs-1.3.3-1.el8.s390x.rpm
nmstate-libs-debuginfo-1.3.3-1.el8.s390x.rpm
openshift-clients-4.12.0-202301042257.p0.g854f807.assembly.stream.el8.s390x.rpm
openshift-hyperkube-4.12.0-202301042257.p0.g77bec7a.assembly.stream.el8.s390x.rpm
openvswitch2.17-2.17.0-62.el8fdp.s390x.rpm
openvswitch2.17-debuginfo-2.17.0-62.el8fdp.s390x.rpm
openvswitch2.17-debugsource-2.17.0-62.el8fdp.s390x.rpm
openvswitch2.17-devel-2.17.0-62.el8fdp.s390x.rpm
openvswitch2.17-ipsec-2.17.0-62.el8fdp.s390x.rpm
ostree-2022.2-5.el8.s390x.rpm
ostree-debuginfo-2022.2-5.el8.s390x.rpm
ostree-debugsource-2022.2-5.el8.s390x.rpm
ostree-devel-2022.2-5.el8.s390x.rpm
ostree-libs-2022.2-5.el8.s390x.rpm
ostree-libs-debuginfo-2022.2-5.el8.s390x.rpm
ovn22.06-22.06.0-27.el8fdp.s390x.rpm
ovn22.06-central-22.06.0-27.el8fdp.s390x.rpm
ovn22.06-central-debuginfo-22.06.0-27.el8fdp.s390x.rpm
ovn22.06-debuginfo-22.06.0-27.el8fdp.s390x.rpm
ovn22.06-debugsource-22.06.0-27.el8fdp.s390x.rpm
ovn22.06-host-22.06.0-27.el8fdp.s390x.rpm
ovn22.06-host-debuginfo-22.06.0-27.el8fdp.s390x.rpm
ovn22.06-vtep-22.06.0-27.el8fdp.s390x.rpm
ovn22.06-vtep-debuginfo-22.06.0-27.el8fdp.s390x.rpm
ovn22.09-22.09.0-25.el8fdp.s390x.rpm
ovn22.09-central-22.09.0-25.el8fdp.s390x.rpm
ovn22.09-central-debuginfo-22.09.0-25.el8fdp.s390x.rpm
ovn22.09-debuginfo-22.09.0-25.el8fdp.s390x.rpm
ovn22.09-debugsource-22.09.0-25.el8fdp.s390x.rpm
ovn22.09-host-22.09.0-25.el8fdp.s390x.rpm
ovn22.09-host-debuginfo-22.09.0-25.el8fdp.s390x.rpm
ovn22.09-vtep-22.09.0-25.el8fdp.s390x.rpm
ovn22.09-vtep-debuginfo-22.09.0-25.el8fdp.s390x.rpm
podman-4.2.0-1.rhaos4.12.el8.s390x.rpm
podman-catatonit-4.2.0-1.rhaos4.12.el8.s390x.rpm
podman-catatonit-debuginfo-4.2.0-1.rhaos4.12.el8.s390x.rpm
podman-debuginfo-4.2.0-1.rhaos4.12.el8.s390x.rpm
podman-debugsource-4.2.0-1.rhaos4.12.el8.s390x.rpm
podman-gvproxy-debuginfo-4.2.0-1.rhaos4.12.el8.s390x.rpm
podman-plugins-4.2.0-1.rhaos4.12.el8.s390x.rpm
podman-plugins-debuginfo-4.2.0-1.rhaos4.12.el8.s390x.rpm
podman-remote-4.2.0-1.rhaos4.12.el8.s390x.rpm
podman-remote-debuginfo-4.2.0-1.rhaos4.12.el8.s390x.rpm
podman-tests-4.2.0-1.rhaos4.12.el8.s390x.rpm
python-pyrsistent-debugsource-0.16.0-3.el8ost.s390x.rpm
python3-criu-3.15-4.rhaos4.11.el8.s390x.rpm
python3-grpcio-1.18.0-4.el8ost.s390x.rpm
python3-grpcio-debuginfo-1.18.0-4.el8ost.s390x.rpm
python3-openvswitch2.17-2.17.0-62.el8fdp.s390x.rpm
python3-openvswitch2.17-debuginfo-2.17.0-62.el8fdp.s390x.rpm
python3-pyrsistent-0.16.0-3.el8ost.s390x.rpm
python3-pyrsistent-debuginfo-0.16.0-3.el8ost.s390x.rpm
rpm-ostree-2022.10.99.g0049dbdd-3.el8.s390x.rpm
rpm-ostree-debuginfo-2022.10.99.g0049dbdd-3.el8.s390x.rpm
rpm-ostree-debugsource-2022.10.99.g0049dbdd-3.el8.s390x.rpm
rpm-ostree-devel-2022.10.99.g0049dbdd-3.el8.s390x.rpm
rpm-ostree-libs-2022.10.99.g0049dbdd-3.el8.s390x.rpm
rpm-ostree-libs-debuginfo-2022.10.99.g0049dbdd-3.el8.s390x.rpm
runc-1.1.2-2.rhaos4.12.el8.s390x.rpm
runc-debuginfo-1.1.2-2.rhaos4.12.el8.s390x.rpm
runc-debugsource-1.1.2-2.rhaos4.12.el8.s390x.rpm
rust-afterburn-debugsource-5.3.0-1.rhaos4.12.el8.s390x.rpm
skopeo-1.8.0-1.rhaos4.12.el8.s390x.rpm
skopeo-tests-1.8.0-1.rhaos4.12.el8.s390x.rpm
slirp4netns-1.1.8-1.rhaos4.11.el8.s390x.rpm
slirp4netns-debuginfo-1.1.8-1.rhaos4.11.el8.s390x.rpm
slirp4netns-debugsource-1.1.8-1.rhaos4.11.el8.s390x.rpm
tini-0.16.1-1.el8ar.s390x.rpm

x86_64:
NetworkManager-1.36.0-8.el8_6.x86_64.rpm
NetworkManager-adsl-1.36.0-8.el8_6.x86_64.rpm
NetworkManager-adsl-debuginfo-1.36.0-8.el8_6.x86_64.rpm
NetworkManager-bluetooth-1.36.0-8.el8_6.x86_64.rpm
NetworkManager-bluetooth-debuginfo-1.36.0-8.el8_6.x86_64.rpm
NetworkManager-cloud-setup-1.36.0-8.el8_6.x86_64.rpm
NetworkManager-cloud-setup-debuginfo-1.36.0-8.el8_6.x86_64.rpm
NetworkManager-debuginfo-1.36.0-8.el8_6.x86_64.rpm
NetworkManager-debugsource-1.36.0-8.el8_6.x86_64.rpm
NetworkManager-libnm-1.36.0-8.el8_6.x86_64.rpm
NetworkManager-libnm-debuginfo-1.36.0-8.el8_6.x86_64.rpm
NetworkManager-libnm-devel-1.36.0-8.el8_6.x86_64.rpm
NetworkManager-ovs-1.36.0-8.el8_6.x86_64.rpm
NetworkManager-ovs-debuginfo-1.36.0-8.el8_6.x86_64.rpm
NetworkManager-ppp-1.36.0-8.el8_6.x86_64.rpm
NetworkManager-ppp-debuginfo-1.36.0-8.el8_6.x86_64.rpm
NetworkManager-team-1.36.0-8.el8_6.x86_64.rpm
NetworkManager-team-debuginfo-1.36.0-8.el8_6.x86_64.rpm
NetworkManager-tui-1.36.0-8.el8_6.x86_64.rpm
NetworkManager-tui-debuginfo-1.36.0-8.el8_6.x86_64.rpm
NetworkManager-wifi-1.36.0-8.el8_6.x86_64.rpm
NetworkManager-wifi-debuginfo-1.36.0-8.el8_6.x86_64.rpm
NetworkManager-wwan-1.36.0-8.el8_6.x86_64.rpm
NetworkManager-wwan-debuginfo-1.36.0-8.el8_6.x86_64.rpm
afterburn-5.3.0-1.rhaos4.12.el8.x86_64.rpm
afterburn-debuginfo-5.3.0-1.rhaos4.12.el8.x86_64.rpm
atomic-openshift-service-idler-4.12.0-202210141624.p0.ga0f9090.assembly.stream.el8.x86_64.rpm
bootupd-0.2.5-3.rhaos4.12.el8.x86_64.rpm
bootupd-debuginfo-0.2.5-3.rhaos4.12.el8.x86_64.rpm
buildah-1.23.4-2.el8.x86_64.rpm
buildah-debuginfo-1.23.4-2.el8.x86_64.rpm
buildah-debugsource-1.23.4-2.el8.x86_64.rpm
buildah-tests-1.23.4-2.el8.x86_64.rpm
buildah-tests-debuginfo-1.23.4-2.el8.x86_64.rpm
butane-0.16.0-2.rhaos4.12.el8.x86_64.rpm
butane-debuginfo-0.16.0-2.rhaos4.12.el8.x86_64.rpm
butane-debugsource-0.16.0-2.rhaos4.12.el8.x86_64.rpm
conmon-2.1.2-2.rhaos4.11.el8.x86_64.rpm
conmon-debuginfo-2.1.2-2.rhaos4.11.el8.x86_64.rpm
conmon-debugsource-2.1.2-2.rhaos4.11.el8.x86_64.rpm
conmon-rs-0.4.0-2.rhaos4.12.git.el8.x86_64.rpm
containernetworking-plugins-1.0.1-5.rhaos4.11.el8.x86_64.rpm
containernetworking-plugins-debuginfo-1.0.1-5.rhaos4.11.el8.x86_64.rpm
containernetworking-plugins-debugsource-1.0.1-5.rhaos4.11.el8.x86_64.rpm
containers-common-1-27.rhaos4.12.el8.x86_64.rpm
coreos-installer-0.16.1-1.rhaos4.12.el8.x86_64.rpm
coreos-installer-bootinfra-debuginfo-0.16.1-1.rhaos4.12.el8.x86_64.rpm
coreos-installer-debuginfo-0.16.1-1.rhaos4.12.el8.x86_64.rpm
coreos-installer-debugsource-0.16.1-1.rhaos4.12.el8.x86_64.rpm
cri-o-1.25.1-5.rhaos4.12.git6005903.el8.x86_64.rpm
cri-o-debuginfo-1.25.1-5.rhaos4.12.git6005903.el8.x86_64.rpm
cri-o-debugsource-1.25.1-5.rhaos4.12.git6005903.el8.x86_64.rpm
cri-tools-1.25.0-2.el8.x86_64.rpm
cri-tools-debuginfo-1.25.0-2.el8.x86_64.rpm
cri-tools-debugsource-1.25.0-2.el8.x86_64.rpm
crit-3.15-4.rhaos4.11.el8.x86_64.rpm
criu-3.15-4.rhaos4.11.el8.x86_64.rpm
criu-debuginfo-3.15-4.rhaos4.11.el8.x86_64.rpm
criu-debugsource-3.15-4.rhaos4.11.el8.x86_64.rpm
criu-devel-3.15-4.rhaos4.11.el8.x86_64.rpm
criu-libs-3.15-4.rhaos4.11.el8.x86_64.rpm
criu-libs-debuginfo-3.15-4.rhaos4.11.el8.x86_64.rpm
crun-1.4.2-1.rhaos4.11.el8.x86_64.rpm
crun-debuginfo-1.4.2-1.rhaos4.11.el8.x86_64.rpm
crun-debugsource-1.4.2-1.rhaos4.11.el8.x86_64.rpm
fuse-overlayfs-1.9-1.rhaos4.11.el8.x86_64.rpm
fuse-overlayfs-debuginfo-1.9-1.rhaos4.11.el8.x86_64.rpm
fuse-overlayfs-debugsource-1.9-1.rhaos4.11.el8.x86_64.rpm
grpc-1.18.0-4.el8ost.x86_64.rpm
grpc-cli-1.18.0-4.el8ost.x86_64.rpm
grpc-cli-debuginfo-1.18.0-4.el8ost.x86_64.rpm
grpc-debuginfo-1.18.0-4.el8ost.x86_64.rpm
grpc-debugsource-1.18.0-4.el8ost.x86_64.rpm
grpc-devel-1.18.0-4.el8ost.x86_64.rpm
grpc-plugins-1.18.0-4.el8ost.x86_64.rpm
grpc-plugins-debuginfo-1.18.0-4.el8ost.x86_64.rpm
haproxy-debugsource-2.2.24-1.el8.x86_64.rpm
haproxy22-2.2.24-1.el8.x86_64.rpm
haproxy22-debuginfo-2.2.24-1.el8.x86_64.rpm
ignition-2.14.0-5.rhaos4.12.el8.x86_64.rpm
ignition-debuginfo-2.14.0-5.rhaos4.12.el8.x86_64.rpm
ignition-debugsource-2.14.0-5.rhaos4.12.el8.x86_64.rpm
ignition-validate-2.14.0-5.rhaos4.12.el8.x86_64.rpm
ignition-validate-debuginfo-2.14.0-5.rhaos4.12.el8.x86_64.rpm
kata-containers-2.5.2-1.el8.x86_64.rpm
kernel-rt-4.18.0-372.40.1.rt7.197.el8_6.x86_64.rpm
kernel-rt-core-4.18.0-372.40.1.rt7.197.el8_6.x86_64.rpm
kernel-rt-debug-4.18.0-372.40.1.rt7.197.el8_6.x86_64.rpm
kernel-rt-debug-core-4.18.0-372.40.1.rt7.197.el8_6.x86_64.rpm
kernel-rt-debug-debuginfo-4.18.0-372.40.1.rt7.197.el8_6.x86_64.rpm
kernel-rt-debug-devel-4.18.0-372.40.1.rt7.197.el8_6.x86_64.rpm
kernel-rt-debug-kvm-4.18.0-372.40.1.rt7.197.el8_6.x86_64.rpm
kernel-rt-debug-modules-4.18.0-372.40.1.rt7.197.el8_6.x86_64.rpm
kernel-rt-debug-modules-extra-4.18.0-372.40.1.rt7.197.el8_6.x86_64.rpm
kernel-rt-debug-modules-internal-4.18.0-372.40.1.rt7.197.el8_6.x86_64.rpm
kernel-rt-debuginfo-4.18.0-372.40.1.rt7.197.el8_6.x86_64.rpm
kernel-rt-debuginfo-common-x86_64-4.18.0-372.40.1.rt7.197.el8_6.x86_64.rpm
kernel-rt-devel-4.18.0-372.40.1.rt7.197.el8_6.x86_64.rpm
kernel-rt-kvm-4.18.0-372.40.1.rt7.197.el8_6.x86_64.rpm
kernel-rt-modules-4.18.0-372.40.1.rt7.197.el8_6.x86_64.rpm
kernel-rt-modules-extra-4.18.0-372.40.1.rt7.197.el8_6.x86_64.rpm
kernel-rt-modules-internal-4.18.0-372.40.1.rt7.197.el8_6.x86_64.rpm
kernel-rt-selftests-internal-4.18.0-372.40.1.rt7.197.el8_6.x86_64.rpm
libslirp-4.4.0-2.rhaos4.11.el8.x86_64.rpm
libslirp-debuginfo-4.4.0-2.rhaos4.11.el8.x86_64.rpm
libslirp-debugsource-4.4.0-2.rhaos4.11.el8.x86_64.rpm
libslirp-devel-4.4.0-2.rhaos4.11.el8.x86_64.rpm
network-scripts-openvswitch2.17-2.17.0-62.el8fdp.x86_64.rpm
nmstate-1.3.3-1.el8.x86_64.rpm
nmstate-debuginfo-1.3.3-1.el8.x86_64.rpm
nmstate-debugsource-1.3.3-1.el8.x86_64.rpm
nmstate-devel-1.3.3-1.el8.x86_64.rpm
nmstate-libs-1.3.3-1.el8.x86_64.rpm
nmstate-libs-debuginfo-1.3.3-1.el8.x86_64.rpm
openshift-clients-4.12.0-202301042257.p0.g854f807.assembly.stream.el8.x86_64.rpm
openshift-clients-redistributable-4.12.0-202301042257.p0.g854f807.assembly.stream.el8.x86_64.rpm
openshift-hyperkube-4.12.0-202301042257.p0.g77bec7a.assembly.stream.el8.x86_64.rpm
openvswitch2.17-2.17.0-62.el8fdp.x86_64.rpm
openvswitch2.17-debuginfo-2.17.0-62.el8fdp.x86_64.rpm
openvswitch2.17-debugsource-2.17.0-62.el8fdp.x86_64.rpm
openvswitch2.17-devel-2.17.0-62.el8fdp.x86_64.rpm
openvswitch2.17-ipsec-2.17.0-62.el8fdp.x86_64.rpm
ostree-2022.2-5.el8.x86_64.rpm
ostree-debuginfo-2022.2-5.el8.x86_64.rpm
ostree-debugsource-2022.2-5.el8.x86_64.rpm
ostree-devel-2022.2-5.el8.x86_64.rpm
ostree-grub2-2022.2-5.el8.x86_64.rpm
ostree-libs-2022.2-5.el8.x86_64.rpm
ostree-libs-debuginfo-2022.2-5.el8.x86_64.rpm
ovn22.06-22.06.0-27.el8fdp.x86_64.rpm
ovn22.06-central-22.06.0-27.el8fdp.x86_64.rpm
ovn22.06-central-debuginfo-22.06.0-27.el8fdp.x86_64.rpm
ovn22.06-debuginfo-22.06.0-27.el8fdp.x86_64.rpm
ovn22.06-debugsource-22.06.0-27.el8fdp.x86_64.rpm
ovn22.06-host-22.06.0-27.el8fdp.x86_64.rpm
ovn22.06-host-debuginfo-22.06.0-27.el8fdp.x86_64.rpm
ovn22.06-vtep-22.06.0-27.el8fdp.x86_64.rpm
ovn22.06-vtep-debuginfo-22.06.0-27.el8fdp.x86_64.rpm
ovn22.09-22.09.0-25.el8fdp.x86_64.rpm
ovn22.09-central-22.09.0-25.el8fdp.x86_64.rpm
ovn22.09-central-debuginfo-22.09.0-25.el8fdp.x86_64.rpm
ovn22.09-debuginfo-22.09.0-25.el8fdp.x86_64.rpm
ovn22.09-debugsource-22.09.0-25.el8fdp.x86_64.rpm
ovn22.09-host-22.09.0-25.el8fdp.x86_64.rpm
ovn22.09-host-debuginfo-22.09.0-25.el8fdp.x86_64.rpm
ovn22.09-vtep-22.09.0-25.el8fdp.x86_64.rpm
ovn22.09-vtep-debuginfo-22.09.0-25.el8fdp.x86_64.rpm
podman-4.2.0-1.rhaos4.12.el8.x86_64.rpm
podman-catatonit-4.2.0-1.rhaos4.12.el8.x86_64.rpm
podman-catatonit-debuginfo-4.2.0-1.rhaos4.12.el8.x86_64.rpm
podman-debuginfo-4.2.0-1.rhaos4.12.el8.x86_64.rpm
podman-debugsource-4.2.0-1.rhaos4.12.el8.x86_64.rpm
podman-gvproxy-debuginfo-4.2.0-1.rhaos4.12.el8.x86_64.rpm
podman-plugins-4.2.0-1.rhaos4.12.el8.x86_64.rpm
podman-plugins-debuginfo-4.2.0-1.rhaos4.12.el8.x86_64.rpm
podman-remote-4.2.0-1.rhaos4.12.el8.x86_64.rpm
podman-remote-debuginfo-4.2.0-1.rhaos4.12.el8.x86_64.rpm
podman-tests-4.2.0-1.rhaos4.12.el8.x86_64.rpm
python-msgpack-debugsource-0.6.2-1.el8ost.x86_64.rpm
python-pyrsistent-debugsource-0.16.0-3.el8ost.x86_64.rpm
python3-criu-3.15-4.rhaos4.11.el8.x86_64.rpm
python3-grpcio-1.18.0-4.el8ost.x86_64.rpm
python3-grpcio-debuginfo-1.18.0-4.el8ost.x86_64.rpm
python3-msgpack-0.6.2-1.el8ost.x86_64.rpm
python3-msgpack-debuginfo-0.6.2-1.el8ost.x86_64.rpm
python3-openvswitch2.17-2.17.0-62.el8fdp.x86_64.rpm
python3-openvswitch2.17-debuginfo-2.17.0-62.el8fdp.x86_64.rpm
python3-pyrsistent-0.16.0-3.el8ost.x86_64.rpm
python3-pyrsistent-debuginfo-0.16.0-3.el8ost.x86_64.rpm
rpm-ostree-2022.10.99.g0049dbdd-3.el8.x86_64.rpm
rpm-ostree-debuginfo-2022.10.99.g0049dbdd-3.el8.x86_64.rpm
rpm-ostree-debugsource-2022.10.99.g0049dbdd-3.el8.x86_64.rpm
rpm-ostree-devel-2022.10.99.g0049dbdd-3.el8.x86_64.rpm
rpm-ostree-libs-2022.10.99.g0049dbdd-3.el8.x86_64.rpm
rpm-ostree-libs-debuginfo-2022.10.99.g0049dbdd-3.el8.x86_64.rpm
runc-1.1.2-2.rhaos4.12.el8.x86_64.rpm
runc-debuginfo-1.1.2-2.rhaos4.12.el8.x86_64.rpm
runc-debugsource-1.1.2-2.rhaos4.12.el8.x86_64.rpm
rust-afterburn-debugsource-5.3.0-1.rhaos4.12.el8.x86_64.rpm
rust-bootupd-debugsource-0.2.5-3.rhaos4.12.el8.x86_64.rpm
skopeo-1.8.0-1.rhaos4.12.el8.x86_64.rpm
skopeo-tests-1.8.0-1.rhaos4.12.el8.x86_64.rpm
slirp4netns-1.1.8-1.rhaos4.11.el8.x86_64.rpm
slirp4netns-debuginfo-1.1.8-1.rhaos4.11.el8.x86_64.rpm
slirp4netns-debugsource-1.1.8-1.rhaos4.11.el8.x86_64.rpm
tini-0.16.1-1.el8ar.x86_64.rpm

Red Hat OpenShift Container Platform 4.12:

Source:
buildah-1.23.4-3.rhaos4.12.el9.src.rpm
conmon-2.1.2-3.rhaos4.12.el9.src.rpm
conmon-rs-0.4.0-2.rhaos4.12.git.el9.src.rpm
coreos-installer-0.16.1-1.rhaos4.12.el9.src.rpm
cri-o-1.25.1-5.rhaos4.12.git6005903.el9.src.rpm
cri-tools-1.25.0-2.el9.src.rpm
crun-1.4.2-2.rhaos4.12.el9.src.rpm
ignition-2.14.0-5.rhaos4.12.el9.src.rpm
kata-containers-2.5.2-1.el9.src.rpm
openshift-4.12.0-202301042257.p0.g77bec7a.assembly.stream.el9.src.rpm
openshift-clients-4.12.0-202301042257.p0.g854f807.assembly.stream.el9.src.rpm
podman-4.2.0-4.rhaos4.12.el9.src.rpm
rpm-ostree-2022.10.99.g0049dbdd-3.rhaos4.12.el9.src.rpm
rust-afterburn-5.3.0-1.rhaos4.12.el9.src.rpm
skopeo-1.8.0-5.rhaos4.12.el9.src.rpm

aarch64:
afterburn-5.3.0-1.rhaos4.12.el9.aarch64.rpm
afterburn-debuginfo-5.3.0-1.rhaos4.12.el9.aarch64.rpm
afterburn-dracut-5.3.0-1.rhaos4.12.el9.aarch64.rpm
buildah-1.23.4-3.rhaos4.12.el9.aarch64.rpm
buildah-debuginfo-1.23.4-3.rhaos4.12.el9.aarch64.rpm
buildah-debugsource-1.23.4-3.rhaos4.12.el9.aarch64.rpm
buildah-tests-1.23.4-3.rhaos4.12.el9.aarch64.rpm
buildah-tests-debuginfo-1.23.4-3.rhaos4.12.el9.aarch64.rpm
conmon-2.1.2-3.rhaos4.12.el9.aarch64.rpm
conmon-debuginfo-2.1.2-3.rhaos4.12.el9.aarch64.rpm
conmon-debugsource-2.1.2-3.rhaos4.12.el9.aarch64.rpm
conmon-rs-0.4.0-2.rhaos4.12.git.el9.aarch64.rpm
coreos-installer-0.16.1-1.rhaos4.12.el9.aarch64.rpm
coreos-installer-bootinfra-0.16.1-1.rhaos4.12.el9.aarch64.rpm
coreos-installer-bootinfra-debuginfo-0.16.1-1.rhaos4.12.el9.aarch64.rpm
coreos-installer-debuginfo-0.16.1-1.rhaos4.12.el9.aarch64.rpm
coreos-installer-debugsource-0.16.1-1.rhaos4.12.el9.aarch64.rpm
coreos-installer-dracut-0.16.1-1.rhaos4.12.el9.aarch64.rpm
cri-o-1.25.1-5.rhaos4.12.git6005903.el9.aarch64.rpm
cri-o-debuginfo-1.25.1-5.rhaos4.12.git6005903.el9.aarch64.rpm
cri-o-debugsource-1.25.1-5.rhaos4.12.git6005903.el9.aarch64.rpm
cri-tools-1.25.0-2.el9.aarch64.rpm
cri-tools-debuginfo-1.25.0-2.el9.aarch64.rpm
cri-tools-debugsource-1.25.0-2.el9.aarch64.rpm
crun-1.4.2-2.rhaos4.12.el9.aarch64.rpm
crun-debuginfo-1.4.2-2.rhaos4.12.el9.aarch64.rpm
crun-debugsource-1.4.2-2.rhaos4.12.el9.aarch64.rpm
ignition-2.14.0-5.rhaos4.12.el9.aarch64.rpm
ignition-debuginfo-2.14.0-5.rhaos4.12.el9.aarch64.rpm
ignition-debugsource-2.14.0-5.rhaos4.12.el9.aarch64.rpm
ignition-validate-2.14.0-5.rhaos4.12.el9.aarch64.rpm
ignition-validate-debuginfo-2.14.0-5.rhaos4.12.el9.aarch64.rpm
kata-containers-2.5.2-1.el9.aarch64.rpm
openshift-clients-4.12.0-202301042257.p0.g854f807.assembly.stream.el9.aarch64.rpm
openshift-hyperkube-4.12.0-202301042257.p0.g77bec7a.assembly.stream.el9.aarch64.rpm
podman-4.2.0-4.rhaos4.12.el9.aarch64.rpm
podman-catatonit-4.2.0-4.rhaos4.12.el9.aarch64.rpm
podman-catatonit-debuginfo-4.2.0-4.rhaos4.12.el9.aarch64.rpm
podman-debuginfo-4.2.0-4.rhaos4.12.el9.aarch64.rpm
podman-debugsource-4.2.0-4.rhaos4.12.el9.aarch64.rpm
podman-gvproxy-4.2.0-4.rhaos4.12.el9.aarch64.rpm
podman-gvproxy-debuginfo-4.2.0-4.rhaos4.12.el9.aarch64.rpm
podman-plugins-4.2.0-4.rhaos4.12.el9.aarch64.rpm
podman-plugins-debuginfo-4.2.0-4.rhaos4.12.el9.aarch64.rpm
podman-remote-4.2.0-4.rhaos4.12.el9.aarch64.rpm
podman-remote-debuginfo-4.2.0-4.rhaos4.12.el9.aarch64.rpm
podman-tests-4.2.0-4.rhaos4.12.el9.aarch64.rpm
rpm-ostree-2022.10.99.g0049dbdd-3.rhaos4.12.el9.aarch64.rpm
rpm-ostree-debuginfo-2022.10.99.g0049dbdd-3.rhaos4.12.el9.aarch64.rpm
rpm-ostree-debugsource-2022.10.99.g0049dbdd-3.rhaos4.12.el9.aarch64.rpm
rpm-ostree-devel-2022.10.99.g0049dbdd-3.rhaos4.12.el9.aarch64.rpm
rpm-ostree-libs-2022.10.99.g0049dbdd-3.rhaos4.12.el9.aarch64.rpm
rpm-ostree-libs-debuginfo-2022.10.99.g0049dbdd-3.rhaos4.12.el9.aarch64.rpm
rust-afterburn-debugsource-5.3.0-1.rhaos4.12.el9.aarch64.rpm
skopeo-1.8.0-5.rhaos4.12.el9.aarch64.rpm
skopeo-debuginfo-1.8.0-5.rhaos4.12.el9.aarch64.rpm
skopeo-debugsource-1.8.0-5.rhaos4.12.el9.aarch64.rpm
skopeo-tests-1.8.0-5.rhaos4.12.el9.aarch64.rpm

noarch:
podman-docker-4.2.0-4.rhaos4.12.el9.noarch.rpm

ppc64le:
afterburn-5.3.0-1.rhaos4.12.el9.ppc64le.rpm
afterburn-debuginfo-5.3.0-1.rhaos4.12.el9.ppc64le.rpm
afterburn-dracut-5.3.0-1.rhaos4.12.el9.ppc64le.rpm
buildah-1.23.4-3.rhaos4.12.el9.ppc64le.rpm
buildah-debuginfo-1.23.4-3.rhaos4.12.el9.ppc64le.rpm
buildah-debugsource-1.23.4-3.rhaos4.12.el9.ppc64le.rpm
buildah-tests-1.23.4-3.rhaos4.12.el9.ppc64le.rpm
buildah-tests-debuginfo-1.23.4-3.rhaos4.12.el9.ppc64le.rpm
conmon-2.1.2-3.rhaos4.12.el9.ppc64le.rpm
conmon-debuginfo-2.1.2-3.rhaos4.12.el9.ppc64le.rpm
conmon-debugsource-2.1.2-3.rhaos4.12.el9.ppc64le.rpm
conmon-rs-0.4.0-2.rhaos4.12.git.el9.ppc64le.rpm
coreos-installer-0.16.1-1.rhaos4.12.el9.ppc64le.rpm
coreos-installer-bootinfra-0.16.1-1.rhaos4.12.el9.ppc64le.rpm
coreos-installer-bootinfra-debuginfo-0.16.1-1.rhaos4.12.el9.ppc64le.rpm
coreos-installer-debuginfo-0.16.1-1.rhaos4.12.el9.ppc64le.rpm
coreos-installer-debugsource-0.16.1-1.rhaos4.12.el9.ppc64le.rpm
coreos-installer-dracut-0.16.1-1.rhaos4.12.el9.ppc64le.rpm
cri-o-1.25.1-5.rhaos4.12.git6005903.el9.ppc64le.rpm
cri-o-debuginfo-1.25.1-5.rhaos4.12.git6005903.el9.ppc64le.rpm
cri-o-debugsource-1.25.1-5.rhaos4.12.git6005903.el9.ppc64le.rpm
cri-tools-1.25.0-2.el9.ppc64le.rpm
cri-tools-debuginfo-1.25.0-2.el9.ppc64le.rpm
cri-tools-debugsource-1.25.0-2.el9.ppc64le.rpm
crun-1.4.2-2.rhaos4.12.el9.ppc64le.rpm
crun-debuginfo-1.4.2-2.rhaos4.12.el9.ppc64le.rpm
crun-debugsource-1.4.2-2.rhaos4.12.el9.ppc64le.rpm
ignition-2.14.0-5.rhaos4.12.el9.ppc64le.rpm
ignition-debuginfo-2.14.0-5.rhaos4.12.el9.ppc64le.rpm
ignition-debugsource-2.14.0-5.rhaos4.12.el9.ppc64le.rpm
ignition-validate-2.14.0-5.rhaos4.12.el9.ppc64le.rpm
ignition-validate-debuginfo-2.14.0-5.rhaos4.12.el9.ppc64le.rpm
kata-containers-2.5.2-1.el9.ppc64le.rpm
openshift-clients-4.12.0-202301042257.p0.g854f807.assembly.stream.el9.ppc64le.rpm
openshift-hyperkube-4.12.0-202301042257.p0.g77bec7a.assembly.stream.el9.ppc64le.rpm
podman-4.2.0-4.rhaos4.12.el9.ppc64le.rpm
podman-catatonit-4.2.0-4.rhaos4.12.el9.ppc64le.rpm
podman-catatonit-debuginfo-4.2.0-4.rhaos4.12.el9.ppc64le.rpm
podman-debuginfo-4.2.0-4.rhaos4.12.el9.ppc64le.rpm
podman-debugsource-4.2.0-4.rhaos4.12.el9.ppc64le.rpm
podman-gvproxy-4.2.0-4.rhaos4.12.el9.ppc64le.rpm
podman-gvproxy-debuginfo-4.2.0-4.rhaos4.12.el9.ppc64le.rpm
podman-plugins-4.2.0-4.rhaos4.12.el9.ppc64le.rpm
podman-plugins-debuginfo-4.2.0-4.rhaos4.12.el9.ppc64le.rpm
podman-remote-4.2.0-4.rhaos4.12.el9.ppc64le.rpm
podman-remote-debuginfo-4.2.0-4.rhaos4.12.el9.ppc64le.rpm
podman-tests-4.2.0-4.rhaos4.12.el9.ppc64le.rpm
rpm-ostree-2022.10.99.g0049dbdd-3.rhaos4.12.el9.ppc64le.rpm
rpm-ostree-debuginfo-2022.10.99.g0049dbdd-3.rhaos4.12.el9.ppc64le.rpm
rpm-ostree-debugsource-2022.10.99.g0049dbdd-3.rhaos4.12.el9.ppc64le.rpm
rpm-ostree-devel-2022.10.99.g0049dbdd-3.rhaos4.12.el9.ppc64le.rpm
rpm-ostree-libs-2022.10.99.g0049dbdd-3.rhaos4.12.el9.ppc64le.rpm
rpm-ostree-libs-debuginfo-2022.10.99.g0049dbdd-3.rhaos4.12.el9.ppc64le.rpm
rust-afterburn-debugsource-5.3.0-1.rhaos4.12.el9.ppc64le.rpm
skopeo-1.8.0-5.rhaos4.12.el9.ppc64le.rpm
skopeo-debuginfo-1.8.0-5.rhaos4.12.el9.ppc64le.rpm
skopeo-debugsource-1.8.0-5.rhaos4.12.el9.ppc64le.rpm
skopeo-tests-1.8.0-5.rhaos4.12.el9.ppc64le.rpm

s390x:
afterburn-5.3.0-1.rhaos4.12.el9.s390x.rpm
afterburn-debuginfo-5.3.0-1.rhaos4.12.el9.s390x.rpm
afterburn-dracut-5.3.0-1.rhaos4.12.el9.s390x.rpm
buildah-1.23.4-3.rhaos4.12.el9.s390x.rpm
buildah-debuginfo-1.23.4-3.rhaos4.12.el9.s390x.rpm
buildah-debugsource-1.23.4-3.rhaos4.12.el9.s390x.rpm
buildah-tests-1.23.4-3.rhaos4.12.el9.s390x.rpm
buildah-tests-debuginfo-1.23.4-3.rhaos4.12.el9.s390x.rpm
conmon-2.1.2-3.rhaos4.12.el9.s390x.rpm
conmon-debuginfo-2.1.2-3.rhaos4.12.el9.s390x.rpm
conmon-debugsource-2.1.2-3.rhaos4.12.el9.s390x.rpm
conmon-rs-0.4.0-2.rhaos4.12.git.el9.s390x.rpm
coreos-installer-0.16.1-1.rhaos4.12.el9.s390x.rpm
coreos-installer-bootinfra-0.16.1-1.rhaos4.12.el9.s390x.rpm
coreos-installer-bootinfra-debuginfo-0.16.1-1.rhaos4.12.el9.s390x.rpm
coreos-installer-debuginfo-0.16.1-1.rhaos4.12.el9.s390x.rpm
coreos-installer-debugsource-0.16.1-1.rhaos4.12.el9.s390x.rpm
coreos-installer-dracut-0.16.1-1.rhaos4.12.el9.s390x.rpm
cri-o-1.25.1-5.rhaos4.12.git6005903.el9.s390x.rpm
cri-o-debuginfo-1.25.1-5.rhaos4.12.git6005903.el9.s390x.rpm
cri-o-debugsource-1.25.1-5.rhaos4.12.git6005903.el9.s390x.rpm
cri-tools-1.25.0-2.el9.s390x.rpm
cri-tools-debuginfo-1.25.0-2.el9.s390x.rpm
cri-tools-debugsource-1.25.0-2.el9.s390x.rpm
crun-1.4.2-2.rhaos4.12.el9.s390x.rpm
crun-debuginfo-1.4.2-2.rhaos4.12.el9.s390x.rpm
crun-debugsource-1.4.2-2.rhaos4.12.el9.s390x.rpm
ignition-2.14.0-5.rhaos4.12.el9.s390x.rpm
ignition-debuginfo-2.14.0-5.rhaos4.12.el9.s390x.rpm
ignition-debugsource-2.14.0-5.rhaos4.12.el9.s390x.rpm
ignition-validate-2.14.0-5.rhaos4.12.el9.s390x.rpm
ignition-validate-debuginfo-2.14.0-5.rhaos4.12.el9.s390x.rpm
kata-containers-2.5.2-1.el9.s390x.rpm
openshift-clients-4.12.0-202301042257.p0.g854f807.assembly.stream.el9.s390x.rpm
openshift-hyperkube-4.12.0-202301042257.p0.g77bec7a.assembly.stream.el9.s390x.rpm
podman-4.2.0-4.rhaos4.12.el9.s390x.rpm
podman-catatonit-4.2.0-4.rhaos4.12.el9.s390x.rpm
podman-catatonit-debuginfo-4.2.0-4.rhaos4.12.el9.s390x.rpm
podman-debuginfo-4.2.0-4.rhaos4.12.el9.s390x.rpm
podman-debugsource-4.2.0-4.rhaos4.12.el9.s390x.rpm
podman-gvproxy-4.2.0-4.rhaos4.12.el9.s390x.rpm
podman-gvproxy-debuginfo-4.2.0-4.rhaos4.12.el9.s390x.rpm
podman-plugins-4.2.0-4.rhaos4.12.el9.s390x.rpm
podman-plugins-debuginfo-4.2.0-4.rhaos4.12.el9.s390x.rpm
podman-remote-4.2.0-4.rhaos4.12.el9.s390x.rpm
podman-remote-debuginfo-4.2.0-4.rhaos4.12.el9.s390x.rpm
podman-tests-4.2.0-4.rhaos4.12.el9.s390x.rpm
rpm-ostree-2022.10.99.g0049dbdd-3.rhaos4.12.el9.s390x.rpm
rpm-ostree-debuginfo-2022.10.99.g0049dbdd-3.rhaos4.12.el9.s390x.rpm
rpm-ostree-debugsource-2022.10.99.g0049dbdd-3.rhaos4.12.el9.s390x.rpm
rpm-ostree-devel-2022.10.99.g0049dbdd-3.rhaos4.12.el9.s390x.rpm
rpm-ostree-libs-2022.10.99.g0049dbdd-3.rhaos4.12.el9.s390x.rpm
rpm-ostree-libs-debuginfo-2022.10.99.g0049dbdd-3.rhaos4.12.el9.s390x.rpm
rust-afterburn-debugsource-5.3.0-1.rhaos4.12.el9.s390x.rpm
skopeo-1.8.0-5.rhaos4.12.el9.s390x.rpm
skopeo-debuginfo-1.8.0-5.rhaos4.12.el9.s390x.rpm
skopeo-debugsource-1.8.0-5.rhaos4.12.el9.s390x.rpm
skopeo-tests-1.8.0-5.rhaos4.12.el9.s390x.rpm

x86_64:
afterburn-5.3.0-1.rhaos4.12.el9.x86_64.rpm
afterburn-debuginfo-5.3.0-1.rhaos4.12.el9.x86_64.rpm
afterburn-dracut-5.3.0-1.rhaos4.12.el9.x86_64.rpm
buildah-1.23.4-3.rhaos4.12.el9.x86_64.rpm
buildah-debuginfo-1.23.4-3.rhaos4.12.el9.x86_64.rpm
buildah-debugsource-1.23.4-3.rhaos4.12.el9.x86_64.rpm
buildah-tests-1.23.4-3.rhaos4.12.el9.x86_64.rpm
buildah-tests-debuginfo-1.23.4-3.rhaos4.12.el9.x86_64.rpm
conmon-2.1.2-3.rhaos4.12.el9.x86_64.rpm
conmon-debuginfo-2.1.2-3.rhaos4.12.el9.x86_64.rpm
conmon-debugsource-2.1.2-3.rhaos4.12.el9.x86_64.rpm
conmon-rs-0.4.0-2.rhaos4.12.git.el9.x86_64.rpm
coreos-installer-0.16.1-1.rhaos4.12.el9.x86_64.rpm
coreos-installer-bootinfra-0.16.1-1.rhaos4.12.el9.x86_64.rpm
coreos-installer-bootinfra-debuginfo-0.16.1-1.rhaos4.12.el9.x86_64.rpm
coreos-installer-debuginfo-0.16.1-1.rhaos4.12.el9.x86_64.rpm
coreos-installer-debugsource-0.16.1-1.rhaos4.12.el9.x86_64.rpm
coreos-installer-dracut-0.16.1-1.rhaos4.12.el9.x86_64.rpm
cri-o-1.25.1-5.rhaos4.12.git6005903.el9.x86_64.rpm
cri-o-debuginfo-1.25.1-5.rhaos4.12.git6005903.el9.x86_64.rpm
cri-o-debugsource-1.25.1-5.rhaos4.12.git6005903.el9.x86_64.rpm
cri-tools-1.25.0-2.el9.x86_64.rpm
cri-tools-debuginfo-1.25.0-2.el9.x86_64.rpm
cri-tools-debugsource-1.25.0-2.el9.x86_64.rpm
crun-1.4.2-2.rhaos4.12.el9.x86_64.rpm
crun-debuginfo-1.4.2-2.rhaos4.12.el9.x86_64.rpm
crun-debugsource-1.4.2-2.rhaos4.12.el9.x86_64.rpm
ignition-2.14.0-5.rhaos4.12.el9.x86_64.rpm
ignition-debuginfo-2.14.0-5.rhaos4.12.el9.x86_64.rpm
ignition-debugsource-2.14.0-5.rhaos4.12.el9.x86_64.rpm
ignition-validate-2.14.0-5.rhaos4.12.el9.x86_64.rpm
ignition-validate-debuginfo-2.14.0-5.rhaos4.12.el9.x86_64.rpm
kata-containers-2.5.2-1.el9.x86_64.rpm
openshift-clients-4.12.0-202301042257.p0.g854f807.assembly.stream.el9.x86_64.rpm
openshift-clients-redistributable-4.12.0-202301042257.p0.g854f807.assembly.stream.el9.x86_64.rpm
openshift-hyperkube-4.12.0-202301042257.p0.g77bec7a.assembly.stream.el9.x86_64.rpm
podman-4.2.0-4.rhaos4.12.el9.x86_64.rpm
podman-catatonit-4.2.0-4.rhaos4.12.el9.x86_64.rpm
podman-catatonit-debuginfo-4.2.0-4.rhaos4.12.el9.x86_64.rpm
podman-debuginfo-4.2.0-4.rhaos4.12.el9.x86_64.rpm
podman-debugsource-4.2.0-4.rhaos4.12.el9.x86_64.rpm
podman-gvproxy-4.2.0-4.rhaos4.12.el9.x86_64.rpm
podman-gvproxy-debuginfo-4.2.0-4.rhaos4.12.el9.x86_64.rpm
podman-plugins-4.2.0-4.rhaos4.12.el9.x86_64.rpm
podman-plugins-debuginfo-4.2.0-4.rhaos4.12.el9.x86_64.rpm
podman-remote-4.2.0-4.rhaos4.12.el9.x86_64.rpm
podman-remote-debuginfo-4.2.0-4.rhaos4.12.el9.x86_64.rpm
podman-tests-4.2.0-4.rhaos4.12.el9.x86_64.rpm
rpm-ostree-2022.10.99.g0049dbdd-3.rhaos4.12.el9.x86_64.rpm
rpm-ostree-debuginfo-2022.10.99.g0049dbdd-3.rhaos4.12.el9.x86_64.rpm
rpm-ostree-debugsource-2022.10.99.g0049dbdd-3.rhaos4.12.el9.x86_64.rpm
rpm-ostree-devel-2022.10.99.g0049dbdd-3.rhaos4.12.el9.x86_64.rpm
rpm-ostree-libs-2022.10.99.g0049dbdd-3.rhaos4.12.el9.x86_64.rpm
rpm-ostree-libs-debuginfo-2022.10.99.g0049dbdd-3.rhaos4.12.el9.x86_64.rpm
rust-afterburn-debugsource-5.3.0-1.rhaos4.12.el9.x86_64.rpm
skopeo-1.8.0-5.rhaos4.12.el9.x86_64.rpm
skopeo-debuginfo-1.8.0-5.rhaos4.12.el9.x86_64.rpm
skopeo-debugsource-1.8.0-5.rhaos4.12.el9.x86_64.rpm
skopeo-tests-1.8.0-5.rhaos4.12.el9.x86_64.rpm

Ironic content for Red Hat OpenShift Container Platform 4.12:

Source:
crudini-0.9.3-4.el9.src.rpm
future-0.18.2-9.el9.1.src.rpm
openstack-ironic-21.0.1-0.20221114235951.fe64d5e.el9.src.rpm
openstack-ironic-inspector-11.0.1-0.20221205155952.cd22607.el9.src.rpm
openstack-ironic-python-agent-9.0.1-0.20220818145522.ad1eb41.el9.src.rpm
openstack-macros-2020.1.2-1.el9.src.rpm
pyOpenSSL-20.0.1-2.el9.1.src.rpm
pyflakes-2.2.0-3.el9.1.src.rpm
pysnmp-4.4.12-6.el9.src.rpm
python-SecretStorage-2.3.1-9.el9.src.rpm
python-alembic-1.6.0-1.el9.src.rpm
python-amqp-5.0.6-1.el9.src.rpm
python-apipkg-1.5-12.el9.1.src.rpm
python-atomicwrites-1.4.0-6.el9.1.src.rpm
python-automaton-3.0.0-0.20220811170530.ed884e8.el9.src.rpm
python-autopage-0.4.0-1.el9.2.src.rpm
python-bcrypt-3.1.6-3.el9.src.rpm
python-beautifulsoup4-4.9.3-2.el9.1.src.rpm
python-betamax-0.8.1-12.el9.1.src.rpm
python-cachetools-3.1.0-4.el9.src.rpm
python-case-1.5.3-5.el9.src.rpm
python-cinderclient-9.0.0-0.20220811172734.2c7d463.el9.src.rpm
python-click-7.1.2-5.el9.1.src.rpm
python-cliff-3.10.1-0.20220802152018.a04a48f.el9.src.rpm
python-cmd2-1.4.0-2.el9.1.src.rpm
python-colorama-0.4.1-2.el9.src.rpm
python-construct-2.10.56-2.el9.src.rpm
python-contextlib2-0.6.0.post1-1.el9.src.rpm
python-coverage-5.6-0.1b1.el9.src.rpm
python-dataclasses-0.8-2.el9.src.rpm
python-ddt-1.4.2-1.el9.src.rpm
python-debtcollector-2.5.0-0.20220802170047.a6b46c5.el9.src.rpm
python-decorator-4.4.0-6.el9.src.rpm
python-defusedxml-0.7.1-1.el9.src.rpm
python-distlib-0.3.1-4.el9.1.src.rpm
python-dogpile-cache-1.1.5-3.el9.src.rpm
python-dracclient-8.0.0-0.20220802154400.9c7499c.el9.src.rpm
python-editor-1.0.4-5.el9.src.rpm
python-entrypoints-0.3-8.el9.src.rpm
python-eventlet-0.30.2-1.el9.src.rpm
python-execnet-1.7.1-5.el9.1.src.rpm
python-extras-1.0.0-15.el9.1.src.rpm
python-fasteners-0.14.1-21.el9.src.rpm
python-filelock-3.0.12-9.el9.1.src.rpm
python-fixtures-3.0.0-22.el9.1.src.rpm
python-flake8-3.8.4-1.el9.1.src.rpm
python-flask-2.0.1-2.el9.1.src.rpm
python-flit-3.0.0-1.el9.2.src.rpm
python-freezegun-1.0.0-4.el9.1.src.rpm
python-funcsigs-1.0.2-17.el9.src.rpm
python-futurist-2.4.1-0.20220802175500.159d752.el9.src.rpm
python-gevent-21.1.2-1.el9.src.rpm
python-glanceclient-4.0.1-0.20220811181326.1b854e1.el9.src.rpm
python-greenlet-1.0.0-1.el9.src.rpm
python-gunicorn-20.0.4-2.el9.src.rpm
python-hacking-1.0.1-0.20210812104123.865398f.el9.src.rpm
python-hardware-0.29.1-0.20220811165930.fd4bce6.el9.src.rpm
python-html5lib-1.1-4.el9.1.src.rpm
python-hypothesis-6.6.0-2.el9.1.src.rpm
python-ifaddr-0.1.6-6.el9.src.rpm
python-importlib-metadata-1.7.0-2.el9.src.rpm
python-ironic-lib-5.2.0-0.20220802170917.e205816.el9.src.rpm
python-ironic-prometheus-exporter-3.1.1-0.20221003235527.eb27243.el9.src.rpm
python-ironicclient-4.9.0-0.20211209154934.6f1be06.el9.src.rpm
python-iso8601-0.1.12-9.el9.src.rpm
python-itsdangerous-2.0.1-2.el9.src.rpm
python-jinja2-3.0.1-2.el9.1.src.rpm
python-jsonpath-rw-1.2.3-23.el9.src.rpm
python-kafka-1.4.3-3.el9.src.rpm
python-kazoo-2.7.0-2.el9.src.rpm
python-kerberos-1.3.0-11.el9.1.src.rpm
python-keyring-21.0.0-2.el9.src.rpm
python-keystoneauth1-5.0.0-0.20220811173415.2445a5d.el9.src.rpm
python-keystoneclient-5.0.0-0.20220811173653.11d5abe.el9.src.rpm
python-keystonemiddleware-10.0.0-0.20220811174058.dd31878.el9.src.rpm
python-kiwisolver-1.1.0-4.el9.src.rpm
python-kombu-5.0.2-1.el9.2.src.rpm
python-linecache2-1.0.0-25.el9.src.rpm
python-logutils-0.3.5-7.1.el9.src.rpm
python-markupsafe-2.0.0-2.el9.src.rpm
python-mccabe-0.6.1-18.el9.1.src.rpm
python-memcached-1.58-12.el9.src.rpm
python-migrate-0.13.0-2.el9.src.rpm
python-mimeparse-1.6.0-16.el9.1.src.rpm
python-mock-3.0.5-14.el9.2.src.rpm
python-monotonic-1.5-9.el9.1.src.rpm
python-more-itertools-7.2.0-3.el9.src.rpm
python-mox3-1.1.0-0.20210812114029.99a302f.el9.src.rpm
python-msgpack-0.6.2-2.el9.src.rpm
python-munch-2.3.2-7.el9.src.rpm
python-neutronclient-7.6.0-0.20211012175718.983f0ab.el9.src.rpm
python-nose-1.3.7-33.el9.1.src.rpm
python-nose-cover3-0.1.0-31.el9.src.rpm
python-openstacksdk-0.99.1-0.20220811190026.a41d04e.el9.src.rpm
python-os-client-config-2.1.0-0.20210722194729.bc96c23.el9.src.rpm
python-os-service-types-1.7.0-0.20220802143336.0b2f473.el9.src.rpm
python-os-traits-2.8.0-0.20220811182615.04e8bb3.el9.src.rpm
python-osc-lib-2.6.1-0.20220811172053.973e169.el9.src.rpm
python-oslo-cache-3.0.0-0.20220811175617.79945c1.el9.src.rpm
python-oslo-concurrency-5.0.0-0.20220811181826.052b2f2.el9.src.rpm
python-oslo-config-9.0.0-0.20220811165930.9eaae04.el9.src.rpm
python-oslo-context-5.0.0-0.20220811171413.f388eb9.el9.src.rpm
python-oslo-db-12.0.0-0.20220811175859.a808381.el9.src.rpm
python-oslo-i18n-5.1.0-0.20220802145025.b031d17.el9.src.rpm
python-oslo-log-5.0.0-0.20220811172332.6401da7.el9.src.rpm
python-oslo-messaging-13.0.0-0.20220811175319.4186386.el9.src.rpm
python-oslo-metrics-0.3.0-0.20220802145828.43eee50.el9.src.rpm
python-oslo-middleware-5.0.0-0.20220811170931.51e1882.el9.src.rpm
python-oslo-policy-4.0.0-0.20220811173113.5bd767b.el9.src.rpm
python-oslo-reports-2.3.0-0.20211012151507.f2799dc.el9.src.rpm
python-oslo-rootwrap-6.3.1-0.20220803131706.1b1b960.el9.src.rpm
python-oslo-serialization-5.0.0-0.20220811171112.dd2a819.el9.src.rpm
python-oslo-service-3.0.0-0.20220811180157.a27acfe.el9.src.rpm
python-oslo-upgradecheck-2.0.0-0.20220811171652.b3a2b19.el9.src.rpm
python-oslo-utils-6.0.0-0.20220811175035.7df6473.el9.src.rpm
python-oslo-versionedobjects-3.0.0-0.20220811180555.cec2b8e.el9.src.rpm
python-oslotest-4.4.1-0.20210812115053.aaf3a72.el9.src.rpm
python-osprofiler-3.4.3-0.20220802174918.3286301.el9.src.rpm
python-paste-3.5.0-3.el9.1.src.rpm
python-paste-deploy-2.0.1-5.el9.src.rpm
python-pbr-5.5.1-3.el9.1.src.rpm
python-pecan-1.3.2-10.el9.src.rpm
python-pexpect-4.6-3.el9.src.rpm
python-pint-0.10.1-3.el9.src.rpm
python-pretend-1.0.8-19.el9.src.rpm
python-proliantutils-2.13.2-0.20220802173426.8c7b6b1.el9.src.rpm
python-prometheus_client-0.7.1-3.el9.src.rpm
python-pycadf-3.1.1-0.20220802144439.4179996.el9.src.rpm
python-pycodestyle-2.6.0-4.el9.1.src.rpm
python-pymemcache-3.5.0-1.el9.src.rpm
python-pyperclip-1.8.0-3.el9.1.src.rpm
python-pytest-cov-2.11.1-3.el9.1.src.rpm
python-pytest-forked-1.3.0-2.el9.1.src.rpm
python-pytest-runner-4.0-12.el9.1.src.rpm
python-pytest-xdist-2.2.1-1.el9.src.rpm
python-pytest-xprocess-0.18.1-4.el9.src.rpm
python-redis-3.3.8-2.el9.src.rpm
python-repoze-lru-0.7-7.el9.src.rpm
python-requests-kerberos-0.12.0-12.el9.1.src.rpm
python-requests-mock-1.8.0-2.el9.1.src.rpm
python-requests-unixsocket-0.2.0-2.el9.src.rpm
python-requestsexceptions-1.4.0-0.20220802143336.d7ac0ff.el9.src.rpm
python-retrying-1.3.3-2.el9.1.src.rpm
python-rfc3986-1.2.0-6.el9.src.rpm
python-routes-2.4.1-12.el9.src.rpm
python-scciclient-0.12.3-0.20220811182700.0940a71.el9.src.rpm
python-simplegeneric-0.8.1-18.el9.src.rpm
python-simplejson-3.17.0-2.el9.src.rpm
python-singledispatch-3.4.0.3-19.el9.src.rpm
python-smi-0.3.4-10.el9.src.rpm
python-sortedcontainers-2.3.0-2.el9.1.src.rpm
python-soupsieve-2.1.0-2.el9.1.src.rpm
python-sqlalchemy-1.4.39-2.el9.src.rpm
python-sqlparse-0.2.4-10.el9.src.rpm
python-statsd-3.2.1-20.el9.src.rpm
python-stestr-2.6.0-8.el9.src.rpm
python-stevedore-4.0.0-0.20220811180640.ccd1754.el9.src.rpm
python-sure-1.4.11-12.el9.2.src.rpm
python-sushy-4.3.4-0.20221213135957.69b014c.el9.src.rpm
python-sushy-oem-idrac-4.0.0-0.20220802162610.7b75e6e.el9.src.rpm
python-swiftclient-4.0.1-0.20220811174436.9eee29d.el9.src.rpm
python-tempita-0.5.1-25.el9.src.rpm
python-tenacity-6.2.0-2.el9.src.rpm
python-testrepository-0.0.20-20.el9.src.rpm
python-testresources-2.0.1-2.el9.src.rpm
python-testscenarios-0.5.0-21.el9.1.src.rpm
python-testtools-2.4.0-8.el9.1.src.rpm
python-tooz-3.0.0-0.20220811181909.d145b50.el9.src.rpm
python-tornado-6.1.0-2.el9.1.src.rpm
python-tox-3.23.0-2.el9.1.src.rpm
python-tox-current-env-0.0.6-1.el9.src.rpm
python-traceback2-1.4.0-25.el9.src.rpm
python-typeguard-2.9.1-1.el9.src.rpm
python-typing-extensions-3.7.4.3-2.el9.1.src.rpm
python-unittest2-1.1.0-24.el9.src.rpm
python-vine-5.0.0-3.el9.src.rpm
python-virtualenv-20.4.4-1.el9.src.rpm
python-voluptuous-0.11.7-3.el9.src.rpm
python-waitress-2.0.0-2.el9.src.rpm
python-warlock-1.3.3-2.el9.src.rpm
python-wcwidth-0.2.5-2.el9.2.src.rpm
python-webencodings-0.5.1-15.el9.1.src.rpm
python-webob-1.8.5-5.el9.src.rpm
python-webtest-2.0.33-5.el9.src.rpm
python-werkzeug-2.0.3-3.el9.src.rpm
python-wrapt-1.11.2-4.el9.src.rpm
python-wsme-0.11.0-0.20220802144439.80bda90.el9.src.rpm
python-yappi-1.3.1-2.el9.src.rpm
python-zake-0.2.2-19.el9.src.rpm
python-zeroconf-0.24.4-2.el9.src.rpm
python-zipp-0.5.1-3.el9.src.rpm
python-zope-event-4.2.0-20.el9.1.src.rpm
python-zope-interface-5.4.0-1.el9.src.rpm
python-zope-testing-4.7-4.el9.1.src.rpm
subunit-1.4.0-6.el9.1.src.rpm

aarch64:
python-bcrypt-debugsource-3.1.6-3.el9.aarch64.rpm
python-coverage-debugsource-5.6-0.1b1.el9.aarch64.rpm
python-gevent-debugsource-21.1.2-1.el9.aarch64.rpm
python-greenlet-debugsource-1.0.0-1.el9.aarch64.rpm
python-kerberos-debugsource-1.3.0-11.el9.1.aarch64.rpm
python-kiwisolver-debugsource-1.1.0-4.el9.aarch64.rpm
python-markupsafe-debugsource-2.0.0-2.el9.aarch64.rpm
python-msgpack-debugsource-0.6.2-2.el9.aarch64.rpm
python-simplejson-debugsource-3.17.0-2.el9.aarch64.rpm
python-sqlalchemy-debugsource-1.4.39-2.el9.aarch64.rpm
python-tornado-debugsource-6.1.0-2.el9.1.aarch64.rpm
python-tornado-doc-6.1.0-2.el9.1.aarch64.rpm
python-wrapt-debugsource-1.11.2-4.el9.aarch64.rpm
python-wrapt-doc-1.11.2-4.el9.aarch64.rpm
python-yappi-debugsource-1.3.1-2.el9.aarch64.rpm
python3-bcrypt-3.1.6-3.el9.aarch64.rpm
python3-bcrypt-debuginfo-3.1.6-3.el9.aarch64.rpm
python3-coverage-5.6-0.1b1.el9.aarch64.rpm
python3-coverage-debuginfo-5.6-0.1b1.el9.aarch64.rpm
python3-gevent-21.1.2-1.el9.aarch64.rpm
python3-gevent-debuginfo-21.1.2-1.el9.aarch64.rpm
python3-greenlet-1.0.0-1.el9.aarch64.rpm
python3-greenlet-debuginfo-1.0.0-1.el9.aarch64.rpm
python3-greenlet-devel-1.0.0-1.el9.aarch64.rpm
python3-kerberos-1.3.0-11.el9.1.aarch64.rpm
python3-kerberos-debuginfo-1.3.0-11.el9.1.aarch64.rpm
python3-kiwisolver-1.1.0-4.el9.aarch64.rpm
python3-kiwisolver-debuginfo-1.1.0-4.el9.aarch64.rpm
python3-markupsafe-2.0.0-2.el9.aarch64.rpm
python3-markupsafe-debuginfo-2.0.0-2.el9.aarch64.rpm
python3-msgpack-0.6.2-2.el9.aarch64.rpm
python3-msgpack-debuginfo-0.6.2-2.el9.aarch64.rpm
python3-simplejson-3.17.0-2.el9.aarch64.rpm
python3-simplejson-debuginfo-3.17.0-2.el9.aarch64.rpm
python3-sqlalchemy+aiomysql-1.4.39-2.el9.aarch64.rpm
python3-sqlalchemy+aiosqlite-1.4.39-2.el9.aarch64.rpm
python3-sqlalchemy+asyncio-1.4.39-2.el9.aarch64.rpm
python3-sqlalchemy+mssql_pymssql-1.4.39-2.el9.aarch64.rpm
python3-sqlalchemy+mssql_pyodbc-1.4.39-2.el9.aarch64.rpm
python3-sqlalchemy+mysql-1.4.39-2.el9.aarch64.rpm
python3-sqlalchemy+postgresql-1.4.39-2.el9.aarch64.rpm
python3-sqlalchemy+postgresql_asyncpg-1.4.39-2.el9.aarch64.rpm
python3-sqlalchemy+postgresql_pg8000-1.4.39-2.el9.aarch64.rpm
python3-sqlalchemy+pymysql-1.4.39-2.el9.aarch64.rpm
python3-sqlalchemy-1.4.39-2.el9.aarch64.rpm
python3-sqlalchemy-debuginfo-1.4.39-2.el9.aarch64.rpm
python3-tornado-6.1.0-2.el9.1.aarch64.rpm
python3-tornado-debuginfo-6.1.0-2.el9.1.aarch64.rpm
python3-wrapt-1.11.2-4.el9.aarch64.rpm
python3-wrapt-debuginfo-1.11.2-4.el9.aarch64.rpm
python3-yappi-1.3.1-2.el9.aarch64.rpm
python3-yappi-debuginfo-1.3.1-2.el9.aarch64.rpm
python3-zope-interface-5.4.0-1.el9.aarch64.rpm
subunit-1.4.0-6.el9.1.aarch64.rpm
subunit-cppunit-1.4.0-6.el9.1.aarch64.rpm
subunit-cppunit-debuginfo-1.4.0-6.el9.1.aarch64.rpm
subunit-cppunit-devel-1.4.0-6.el9.1.aarch64.rpm
subunit-debuginfo-1.4.0-6.el9.1.aarch64.rpm
subunit-debugsource-1.4.0-6.el9.1.aarch64.rpm
subunit-devel-1.4.0-6.el9.1.aarch64.rpm
subunit-static-1.4.0-6.el9.1.aarch64.rpm

noarch:
crudini-0.9.3-4.el9.noarch.rpm
openstack-ironic-21.0.1-0.20221114235951.fe64d5e.el9.noarch.rpm
openstack-ironic-api-21.0.1-0.20221114235951.fe64d5e.el9.noarch.rpm
openstack-ironic-common-21.0.1-0.20221114235951.fe64d5e.el9.noarch.rpm
openstack-ironic-conductor-21.0.1-0.20221114235951.fe64d5e.el9.noarch.rpm
openstack-ironic-dnsmasq-tftp-server-21.0.1-0.20221114235951.fe64d5e.el9.noarch.rpm
openstack-ironic-inspector-11.0.1-0.20221205155952.cd22607.el9.noarch.rpm
openstack-ironic-inspector-api-11.0.1-0.20221205155952.cd22607.el9.noarch.rpm
openstack-ironic-inspector-conductor-11.0.1-0.20221205155952.cd22607.el9.noarch.rpm
openstack-ironic-inspector-dnsmasq-11.0.1-0.20221205155952.cd22607.el9.noarch.rpm
openstack-ironic-python-agent-9.0.1-0.20220818145522.ad1eb41.el9.noarch.rpm
openstack-macros-2020.1.2-1.el9.noarch.rpm
pyOpenSSL-doc-20.0.1-2.el9.1.noarch.rpm
python-amqp-doc-5.0.6-1.el9.noarch.rpm
python-entrypoints-doc-0.3-8.el9.noarch.rpm
python-filelock-doc-3.0.12-9.el9.1.noarch.rpm
python-flask-doc-2.0.1-2.el9.1.noarch.rpm
python-funcsigs-doc-1.0.2-17.el9.noarch.rpm
python-gunicorn-doc-20.0.4-2.el9.noarch.rpm
python-kazoo-doc-2.7.0-2.el9.noarch.rpm
python-oslo-cache-lang-3.0.0-0.20220811175617.79945c1.el9.noarch.rpm
python-oslo-concurrency-lang-5.0.0-0.20220811181826.052b2f2.el9.noarch.rpm
python-oslo-db-lang-12.0.0-0.20220811175859.a808381.el9.noarch.rpm
python-oslo-i18n-lang-5.1.0-0.20220802145025.b031d17.el9.noarch.rpm
python-oslo-log-lang-5.0.0-0.20220811172332.6401da7.el9.noarch.rpm
python-oslo-middleware-lang-5.0.0-0.20220811170931.51e1882.el9.noarch.rpm
python-oslo-policy-lang-4.0.0-0.20220811173113.5bd767b.el9.noarch.rpm
python-oslo-utils-lang-6.0.0-0.20220811175035.7df6473.el9.noarch.rpm
python-oslo-versionedobjects-lang-3.0.0-0.20220811180555.cec2b8e.el9.noarch.rpm
python-pycadf-common-3.1.1-0.20220802144439.4179996.el9.noarch.rpm
python-pyperclip-doc-1.8.0-3.el9.1.noarch.rpm
python-sqlalchemy-doc-1.4.39-2.el9.noarch.rpm
python-statsd-doc-3.2.1-20.el9.noarch.rpm
python-testtools-doc-2.4.0-8.el9.1.noarch.rpm
python-webencodings-doc-0.5.1-15.el9.1.noarch.rpm
python3-SecretStorage-2.3.1-9.el9.noarch.rpm
python3-alembic-1.6.0-1.el9.noarch.rpm
python3-amqp-5.0.6-1.el9.noarch.rpm
python3-apipkg-1.5-12.el9.1.noarch.rpm
python3-atomicwrites-1.4.0-6.el9.1.noarch.rpm
python3-automaton-3.0.0-0.20220811170530.ed884e8.el9.noarch.rpm
python3-autopage-0.4.0-1.el9.2.noarch.rpm
python3-beautifulsoup4-4.9.3-2.el9.1.noarch.rpm
python3-betamax-0.8.1-12.el9.1.noarch.rpm
python3-cachetools-3.1.0-4.el9.noarch.rpm
python3-case-1.5.3-5.el9.noarch.rpm
python3-cinderclient-9.0.0-0.20220811172734.2c7d463.el9.noarch.rpm
python3-click-7.1.2-5.el9.1.noarch.rpm
python3-cliff-3.10.1-0.20220802152018.a04a48f.el9.noarch.rpm
python3-cliff-tests-3.10.1-0.20220802152018.a04a48f.el9.noarch.rpm
python3-cmd2-1.4.0-2.el9.1.noarch.rpm
python3-colorama-0.4.1-2.el9.noarch.rpm
python3-construct-2.10.56-2.el9.noarch.rpm
python3-contextlib2-0.6.0.post1-1.el9.noarch.rpm
python3-dataclasses-0.8-2.el9.noarch.rpm
python3-ddt-1.4.2-1.el9.noarch.rpm
python3-debtcollector-2.5.0-0.20220802170047.a6b46c5.el9.noarch.rpm
python3-decorator-4.4.0-6.el9.noarch.rpm
python3-defusedxml-0.7.1-1.el9.noarch.rpm
python3-distlib-0.3.1-4.el9.1.noarch.rpm
python3-dogpile-cache-1.1.5-3.el9.noarch.rpm
python3-dracclient-8.0.0-0.20220802154400.9c7499c.el9.noarch.rpm
python3-editor-1.0.4-5.el9.noarch.rpm
python3-entrypoints-0.3-8.el9.noarch.rpm
python3-eventlet-0.30.2-1.el9.noarch.rpm
python3-execnet-1.7.1-5.el9.1.noarch.rpm
python3-extras-1.0.0-15.el9.1.noarch.rpm
python3-fasteners-0.14.1-21.el9.noarch.rpm
python3-filelock-3.0.12-9.el9.1.noarch.rpm
python3-fixtures-3.0.0-22.el9.1.noarch.rpm
python3-flake8-3.8.4-1.el9.1.noarch.rpm
python3-flask-2.0.1-2.el9.1.noarch.rpm
python3-flit-3.0.0-1.el9.2.noarch.rpm
python3-flit-core-3.0.0-1.el9.2.noarch.rpm
python3-freezegun-1.0.0-4.el9.1.noarch.rpm
python3-funcsigs-1.0.2-17.el9.noarch.rpm
python3-future-0.18.2-9.el9.1.noarch.rpm
python3-futurist-2.4.1-0.20220802175500.159d752.el9.noarch.rpm
python3-glanceclient-4.0.1-0.20220811181326.1b854e1.el9.noarch.rpm
python3-gunicorn-20.0.4-2.el9.noarch.rpm
python3-hacking-1.0.1-0.20210812104123.865398f.el9.noarch.rpm
python3-hardware-0.29.1-0.20220811165930.fd4bce6.el9.noarch.rpm
python3-hardware-detect-0.29.1-0.20220811165930.fd4bce6.el9.noarch.rpm
python3-html5lib-1.1-4.el9.1.noarch.rpm
python3-hypothesis+cli-6.6.0-2.el9.1.noarch.rpm
python3-hypothesis+dateutil-6.6.0-2.el9.1.noarch.rpm
python3-hypothesis+django-6.6.0-2.el9.1.noarch.rpm
python3-hypothesis+ghostwriter-6.6.0-2.el9.1.noarch.rpm
python3-hypothesis+lark-6.6.0-2.el9.1.noarch.rpm
python3-hypothesis+numpy-6.6.0-2.el9.1.noarch.rpm
python3-hypothesis+pandas-6.6.0-2.el9.1.noarch.rpm
python3-hypothesis+pytest-6.6.0-2.el9.1.noarch.rpm
python3-hypothesis+pytz-6.6.0-2.el9.1.noarch.rpm
python3-hypothesis+redis-6.6.0-2.el9.1.noarch.rpm
python3-hypothesis+zoneinfo-6.6.0-2.el9.1.noarch.rpm
python3-hypothesis-6.6.0-2.el9.1.noarch.rpm
python3-ifaddr-0.1.6-6.el9.noarch.rpm
python3-importlib-metadata-1.7.0-2.el9.noarch.rpm
python3-ironic-inspector-tests-11.0.1-0.20221205155952.cd22607.el9.noarch.rpm
python3-ironic-lib-5.2.0-0.20220802170917.e205816.el9.noarch.rpm
python3-ironic-prometheus-exporter-3.1.1-0.20221003235527.eb27243.el9.noarch.rpm
python3-ironic-python-agent-9.0.1-0.20220818145522.ad1eb41.el9.noarch.rpm
python3-ironic-python-agent-tests-9.0.1-0.20220818145522.ad1eb41.el9.noarch.rpm
python3-ironic-tests-21.0.1-0.20221114235951.fe64d5e.el9.noarch.rpm
python3-ironicclient-4.9.0-0.20211209154934.6f1be06.el9.noarch.rpm
python3-iso8601-0.1.12-9.el9.noarch.rpm
python3-itsdangerous-2.0.1-2.el9.noarch.rpm
python3-jinja2-3.0.1-2.el9.1.noarch.rpm
python3-jsonpath-rw-1.2.3-23.el9.noarch.rpm
python3-kafka-1.4.3-3.el9.noarch.rpm
python3-kazoo-2.7.0-2.el9.noarch.rpm
python3-keyring-21.0.0-2.el9.noarch.rpm
python3-keystoneauth1-5.0.0-0.20220811173415.2445a5d.el9.noarch.rpm
python3-keystoneclient-5.0.0-0.20220811173653.11d5abe.el9.noarch.rpm
python3-keystoneclient-tests-5.0.0-0.20220811173653.11d5abe.el9.noarch.rpm
python3-keystonemiddleware-10.0.0-0.20220811174058.dd31878.el9.noarch.rpm
python3-kombu-5.0.2-1.el9.2.noarch.rpm
python3-linecache2-1.0.0-25.el9.noarch.rpm
python3-logutils-0.3.5-7.1.el9.noarch.rpm
python3-mccabe-0.6.1-18.el9.1.noarch.rpm
python3-memcached-1.58-12.el9.noarch.rpm
python3-migrate-0.13.0-2.el9.noarch.rpm
python3-mimeparse-1.6.0-16.el9.1.noarch.rpm
python3-mock-3.0.5-14.el9.2.noarch.rpm
python3-monotonic-1.5-9.el9.1.noarch.rpm
python3-more-itertools-7.2.0-3.el9.noarch.rpm
python3-mox3-1.1.0-0.20210812114029.99a302f.el9.noarch.rpm
python3-munch-2.3.2-7.el9.noarch.rpm
python3-neutronclient-7.6.0-0.20211012175718.983f0ab.el9.noarch.rpm
python3-neutronclient-tests-7.6.0-0.20211012175718.983f0ab.el9.noarch.rpm
python3-nose-1.3.7-33.el9.1.noarch.rpm
python3-nose-cover3-0.1.0-31.el9.noarch.rpm
python3-openstacksdk-0.99.1-0.20220811190026.a41d04e.el9.noarch.rpm
python3-openstacksdk-tests-0.99.1-0.20220811190026.a41d04e.el9.noarch.rpm
python3-os-client-config-2.1.0-0.20210722194729.bc96c23.el9.noarch.rpm
python3-os-service-types-1.7.0-0.20220802143336.0b2f473.el9.noarch.rpm
python3-os-traits-2.8.0-0.20220811182615.04e8bb3.el9.noarch.rpm
python3-os-traits-tests-2.8.0-0.20220811182615.04e8bb3.el9.noarch.rpm
python3-osc-lib-2.6.1-0.20220811172053.973e169.el9.noarch.rpm
python3-osc-lib-tests-2.6.1-0.20220811172053.973e169.el9.noarch.rpm
python3-oslo-cache-3.0.0-0.20220811175617.79945c1.el9.noarch.rpm
python3-oslo-cache-tests-3.0.0-0.20220811175617.79945c1.el9.noarch.rpm
python3-oslo-concurrency-5.0.0-0.20220811181826.052b2f2.el9.noarch.rpm
python3-oslo-concurrency-tests-5.0.0-0.20220811181826.052b2f2.el9.noarch.rpm
python3-oslo-config-9.0.0-0.20220811165930.9eaae04.el9.noarch.rpm
python3-oslo-context-5.0.0-0.20220811171413.f388eb9.el9.noarch.rpm
python3-oslo-context-tests-5.0.0-0.20220811171413.f388eb9.el9.noarch.rpm
python3-oslo-db-12.0.0-0.20220811175859.a808381.el9.noarch.rpm
python3-oslo-db-tests-12.0.0-0.20220811175859.a808381.el9.noarch.rpm
python3-oslo-i18n-5.1.0-0.20220802145025.b031d17.el9.noarch.rpm
python3-oslo-log-5.0.0-0.20220811172332.6401da7.el9.noarch.rpm
python3-oslo-log-tests-5.0.0-0.20220811172332.6401da7.el9.noarch.rpm
python3-oslo-messaging-13.0.0-0.20220811175319.4186386.el9.noarch.rpm
python3-oslo-messaging-tests-13.0.0-0.20220811175319.4186386.el9.noarch.rpm
python3-oslo-metrics-0.3.0-0.20220802145828.43eee50.el9.noarch.rpm
python3-oslo-metrics-tests-0.3.0-0.20220802145828.43eee50.el9.noarch.rpm
python3-oslo-middleware-5.0.0-0.20220811170931.51e1882.el9.noarch.rpm
python3-oslo-middleware-tests-5.0.0-0.20220811170931.51e1882.el9.noarch.rpm
python3-oslo-policy-4.0.0-0.20220811173113.5bd767b.el9.noarch.rpm
python3-oslo-policy-tests-4.0.0-0.20220811173113.5bd767b.el9.noarch.rpm
python3-oslo-reports-2.3.0-0.20211012151507.f2799dc.el9.noarch.rpm
python3-oslo-reports-tests-2.3.0-0.20211012151507.f2799dc.el9.noarch.rpm
python3-oslo-rootwrap-6.3.1-0.20220803131706.1b1b960.el9.noarch.rpm
python3-oslo-rootwrap-tests-6.3.1-0.20220803131706.1b1b960.el9.noarch.rpm
python3-oslo-serialization-5.0.0-0.20220811171112.dd2a819.el9.noarch.rpm
python3-oslo-serialization-tests-5.0.0-0.20220811171112.dd2a819.el9.noarch.rpm
python3-oslo-service-3.0.0-0.20220811180157.a27acfe.el9.noarch.rpm
python3-oslo-service-tests-3.0.0-0.20220811180157.a27acfe.el9.noarch.rpm
python3-oslo-upgradecheck-2.0.0-0.20220811171652.b3a2b19.el9.noarch.rpm
python3-oslo-utils-6.0.0-0.20220811175035.7df6473.el9.noarch.rpm
python3-oslo-utils-tests-6.0.0-0.20220811175035.7df6473.el9.noarch.rpm
python3-oslo-versionedobjects-3.0.0-0.20220811180555.cec2b8e.el9.noarch.rpm
python3-oslo-versionedobjects-tests-3.0.0-0.20220811180555.cec2b8e.el9.noarch.rpm
python3-oslotest-4.4.1-0.20210812115053.aaf3a72.el9.noarch.rpm
python3-osprofiler-3.4.3-0.20220802174918.3286301.el9.noarch.rpm
python3-paste-3.5.0-3.el9.1.noarch.rpm
python3-paste-deploy-2.0.1-5.el9.noarch.rpm
python3-pbr-5.5.1-3.el9.1.noarch.rpm
python3-pecan-1.3.2-10.el9.noarch.rpm
python3-pexpect-4.6-3.el9.noarch.rpm
python3-pint-0.10.1-3.el9.noarch.rpm
python3-pretend-1.0.8-19.el9.noarch.rpm
python3-proliantutils-2.13.2-0.20220802173426.8c7b6b1.el9.noarch.rpm
python3-prometheus_client-0.7.1-3.el9.noarch.rpm
python3-pyOpenSSL-20.0.1-2.el9.1.noarch.rpm
python3-pycadf-3.1.1-0.20220802144439.4179996.el9.noarch.rpm
python3-pycodestyle-2.6.0-4.el9.1.noarch.rpm
python3-pyflakes-2.2.0-3.el9.1.noarch.rpm
python3-pymemcache-3.5.0-1.el9.noarch.rpm
python3-pyperclip-1.8.0-3.el9.1.noarch.rpm
python3-pysnmp-4.4.12-6.el9.noarch.rpm
python3-pytest-cov-2.11.1-3.el9.1.noarch.rpm
python3-pytest-forked-1.3.0-2.el9.1.noarch.rpm
python3-pytest-runner-4.0-12.el9.1.noarch.rpm
python3-pytest-xdist-2.2.1-1.el9.noarch.rpm
python3-pytest-xprocess-0.18.1-4.el9.noarch.rpm
python3-redis-3.3.8-2.el9.noarch.rpm
python3-repoze-lru-0.7-7.el9.noarch.rpm
python3-requests-kerberos-0.12.0-12.el9.1.noarch.rpm
python3-requests-mock-1.8.0-2.el9.1.noarch.rpm
python3-requests-unixsocket-0.2.0-2.el9.noarch.rpm
python3-requestsexceptions-1.4.0-0.20220802143336.d7ac0ff.el9.noarch.rpm
python3-retrying-1.3.3-2.el9.1.noarch.rpm
python3-rfc3986-1.2.0-6.el9.noarch.rpm
python3-routes-2.4.1-12.el9.noarch.rpm
python3-scciclient-0.12.3-0.20220811182700.0940a71.el9.noarch.rpm
python3-simplegeneric-0.8.1-18.el9.noarch.rpm
python3-singledispatch-3.4.0.3-19.el9.noarch.rpm
python3-smi-0.3.4-10.el9.noarch.rpm
python3-sortedcontainers-2.3.0-2.el9.1.noarch.rpm
python3-soupsieve-2.1.0-2.el9.1.noarch.rpm
python3-sqlparse-0.2.4-10.el9.noarch.rpm
python3-statsd-3.2.1-20.el9.noarch.rpm
python3-stestr-2.6.0-8.el9.noarch.rpm
python3-stevedore-4.0.0-0.20220811180640.ccd1754.el9.noarch.rpm
python3-subunit-1.4.0-6.el9.1.noarch.rpm
python3-subunit-test-1.4.0-6.el9.1.noarch.rpm
python3-sure-1.4.11-12.el9.2.noarch.rpm
python3-sushy-4.3.4-0.20221213135957.69b014c.el9.noarch.rpm
python3-sushy-oem-idrac-4.0.0-0.20220802162610.7b75e6e.el9.noarch.rpm
python3-sushy-oem-idrac-tests-4.0.0-0.20220802162610.7b75e6e.el9.noarch.rpm
python3-sushy-tests-4.3.4-0.20221213135957.69b014c.el9.noarch.rpm
python3-swiftclient-4.0.1-0.20220811174436.9eee29d.el9.noarch.rpm
python3-tempita-0.5.1-25.el9.noarch.rpm
python3-tenacity-6.2.0-2.el9.noarch.rpm
python3-testrepository-0.0.20-20.el9.noarch.rpm
python3-testresources-2.0.1-2.el9.noarch.rpm
python3-testscenarios-0.5.0-21.el9.1.noarch.rpm
python3-testtools-2.4.0-8.el9.1.noarch.rpm
python3-tooz-3.0.0-0.20220811181909.d145b50.el9.noarch.rpm
python3-tox-current-env-0.0.6-1.el9.noarch.rpm
python3-traceback2-1.4.0-25.el9.noarch.rpm
python3-typeguard-2.9.1-1.el9.noarch.rpm
python3-typing-extensions-3.7.4.3-2.el9.1.noarch.rpm
python3-unittest2-1.1.0-24.el9.noarch.rpm
python3-vine-5.0.0-3.el9.noarch.rpm
python3-virtualenv-20.4.4-1.el9.noarch.rpm
python3-voluptuous-0.11.7-3.el9.noarch.rpm
python3-waitress-2.0.0-2.el9.noarch.rpm
python3-warlock-1.3.3-2.el9.noarch.rpm
python3-wcwidth-0.2.5-2.el9.2.noarch.rpm
python3-webencodings-0.5.1-15.el9.1.noarch.rpm
python3-webob-1.8.5-5.el9.noarch.rpm
python3-webtest-2.0.33-5.el9.noarch.rpm
python3-werkzeug-2.0.3-3.el9.noarch.rpm
python3-wsme-0.11.0-0.20220802144439.80bda90.el9.noarch.rpm
python3-zake-0.2.2-19.el9.noarch.rpm
python3-zeroconf-0.24.4-2.el9.noarch.rpm
python3-zipp-0.5.1-3.el9.noarch.rpm
python3-zope-event-4.2.0-20.el9.1.noarch.rpm
python3-zope-testing-4.7-4.el9.1.noarch.rpm
subunit-filters-1.4.0-6.el9.1.noarch.rpm
subunit-perl-1.4.0-6.el9.1.noarch.rpm
subunit-shell-1.4.0-6.el9.1.noarch.rpm
tox-3.23.0-2.el9.1.noarch.rpm

ppc64le:
python-bcrypt-debugsource-3.1.6-3.el9.ppc64le.rpm
python-coverage-debugsource-5.6-0.1b1.el9.ppc64le.rpm
python-gevent-debugsource-21.1.2-1.el9.ppc64le.rpm
python-greenlet-debugsource-1.0.0-1.el9.ppc64le.rpm
python-kerberos-debugsource-1.3.0-11.el9.1.ppc64le.rpm
python-kiwisolver-debugsource-1.1.0-4.el9.ppc64le.rpm
python-markupsafe-debugsource-2.0.0-2.el9.ppc64le.rpm
python-msgpack-debugsource-0.6.2-2.el9.ppc64le.rpm
python-simplejson-debugsource-3.17.0-2.el9.ppc64le.rpm
python-sqlalchemy-debugsource-1.4.39-2.el9.ppc64le.rpm
python-tornado-debugsource-6.1.0-2.el9.1.ppc64le.rpm
python-tornado-doc-6.1.0-2.el9.1.ppc64le.rpm
python-wrapt-debugsource-1.11.2-4.el9.ppc64le.rpm
python-wrapt-doc-1.11.2-4.el9.ppc64le.rpm
python-yappi-debugsource-1.3.1-2.el9.ppc64le.rpm
python3-bcrypt-3.1.6-3.el9.ppc64le.rpm
python3-bcrypt-debuginfo-3.1.6-3.el9.ppc64le.rpm
python3-coverage-5.6-0.1b1.el9.ppc64le.rpm
python3-coverage-debuginfo-5.6-0.1b1.el9.ppc64le.rpm
python3-gevent-21.1.2-1.el9.ppc64le.rpm
python3-gevent-debuginfo-21.1.2-1.el9.ppc64le.rpm
python3-greenlet-1.0.0-1.el9.ppc64le.rpm
python3-greenlet-debuginfo-1.0.0-1.el9.ppc64le.rpm
python3-greenlet-devel-1.0.0-1.el9.ppc64le.rpm
python3-kerberos-1.3.0-11.el9.1.ppc64le.rpm
python3-kerberos-debuginfo-1.3.0-11.el9.1.ppc64le.rpm
python3-kiwisolver-1.1.0-4.el9.ppc64le.rpm
python3-kiwisolver-debuginfo-1.1.0-4.el9.ppc64le.rpm
python3-markupsafe-2.0.0-2.el9.ppc64le.rpm
python3-markupsafe-debuginfo-2.0.0-2.el9.ppc64le.rpm
python3-msgpack-0.6.2-2.el9.ppc64le.rpm
python3-msgpack-debuginfo-0.6.2-2.el9.ppc64le.rpm
python3-simplejson-3.17.0-2.el9.ppc64le.rpm
python3-simplejson-debuginfo-3.17.0-2.el9.ppc64le.rpm
python3-sqlalchemy+aiomysql-1.4.39-2.el9.ppc64le.rpm
python3-sqlalchemy+aiosqlite-1.4.39-2.el9.ppc64le.rpm
python3-sqlalchemy+asyncio-1.4.39-2.el9.ppc64le.rpm
python3-sqlalchemy+mssql_pymssql-1.4.39-2.el9.ppc64le.rpm
python3-sqlalchemy+mssql_pyodbc-1.4.39-2.el9.ppc64le.rpm
python3-sqlalchemy+mysql-1.4.39-2.el9.ppc64le.rpm
python3-sqlalchemy+postgresql-1.4.39-2.el9.ppc64le.rpm
python3-sqlalchemy+postgresql_asyncpg-1.4.39-2.el9.ppc64le.rpm
python3-sqlalchemy+postgresql_pg8000-1.4.39-2.el9.ppc64le.rpm
python3-sqlalchemy+pymysql-1.4.39-2.el9.ppc64le.rpm
python3-sqlalchemy-1.4.39-2.el9.ppc64le.rpm
python3-sqlalchemy-debuginfo-1.4.39-2.el9.ppc64le.rpm
python3-tornado-6.1.0-2.el9.1.ppc64le.rpm
python3-tornado-debuginfo-6.1.0-2.el9.1.ppc64le.rpm
python3-wrapt-1.11.2-4.el9.ppc64le.rpm
python3-wrapt-debuginfo-1.11.2-4.el9.ppc64le.rpm
python3-yappi-1.3.1-2.el9.ppc64le.rpm
python3-yappi-debuginfo-1.3.1-2.el9.ppc64le.rpm
python3-zope-interface-5.4.0-1.el9.ppc64le.rpm
subunit-1.4.0-6.el9.1.ppc64le.rpm
subunit-cppunit-1.4.0-6.el9.1.ppc64le.rpm
subunit-cppunit-debuginfo-1.4.0-6.el9.1.ppc64le.rpm
subunit-cppunit-devel-1.4.0-6.el9.1.ppc64le.rpm
subunit-debuginfo-1.4.0-6.el9.1.ppc64le.rpm
subunit-debugsource-1.4.0-6.el9.1.ppc64le.rpm
subunit-devel-1.4.0-6.el9.1.ppc64le.rpm
subunit-static-1.4.0-6.el9.1.ppc64le.rpm

s390x:
python-bcrypt-debugsource-3.1.6-3.el9.s390x.rpm
python-coverage-debugsource-5.6-0.1b1.el9.s390x.rpm
python-gevent-debugsource-21.1.2-1.el9.s390x.rpm
python-greenlet-debugsource-1.0.0-1.el9.s390x.rpm
python-kerberos-debugsource-1.3.0-11.el9.1.s390x.rpm
python-kiwisolver-debugsource-1.1.0-4.el9.s390x.rpm
python-markupsafe-debugsource-2.0.0-2.el9.s390x.rpm
python-msgpack-debugsource-0.6.2-2.el9.s390x.rpm
python-simplejson-debugsource-3.17.0-2.el9.s390x.rpm
python-sqlalchemy-debugsource-1.4.39-2.el9.s390x.rpm
python-tornado-debugsource-6.1.0-2.el9.1.s390x.rpm
python-tornado-doc-6.1.0-2.el9.1.s390x.rpm
python-wrapt-debugsource-1.11.2-4.el9.s390x.rpm
python-wrapt-doc-1.11.2-4.el9.s390x.rpm
python-yappi-debugsource-1.3.1-2.el9.s390x.rpm
python3-bcrypt-3.1.6-3.el9.s390x.rpm
python3-bcrypt-debuginfo-3.1.6-3.el9.s390x.rpm
python3-coverage-5.6-0.1b1.el9.s390x.rpm
python3-coverage-debuginfo-5.6-0.1b1.el9.s390x.rpm
python3-gevent-21.1.2-1.el9.s390x.rpm
python3-gevent-debuginfo-21.1.2-1.el9.s390x.rpm
python3-greenlet-1.0.0-1.el9.s390x.rpm
python3-greenlet-debuginfo-1.0.0-1.el9.s390x.rpm
python3-greenlet-devel-1.0.0-1.el9.s390x.rpm
python3-kerberos-1.3.0-11.el9.1.s390x.rpm
python3-kerberos-debuginfo-1.3.0-11.el9.1.s390x.rpm
python3-kiwisolver-1.1.0-4.el9.s390x.rpm
python3-kiwisolver-debuginfo-1.1.0-4.el9.s390x.rpm
python3-markupsafe-2.0.0-2.el9.s390x.rpm
python3-markupsafe-debuginfo-2.0.0-2.el9.s390x.rpm
python3-msgpack-0.6.2-2.el9.s390x.rpm
python3-msgpack-debuginfo-0.6.2-2.el9.s390x.rpm
python3-simplejson-3.17.0-2.el9.s390x.rpm
python3-simplejson-debuginfo-3.17.0-2.el9.s390x.rpm
python3-sqlalchemy+aiomysql-1.4.39-2.el9.s390x.rpm
python3-sqlalchemy+aiosqlite-1.4.39-2.el9.s390x.rpm
python3-sqlalchemy+asyncio-1.4.39-2.el9.s390x.rpm
python3-sqlalchemy+mssql_pymssql-1.4.39-2.el9.s390x.rpm
python3-sqlalchemy+mssql_pyodbc-1.4.39-2.el9.s390x.rpm
python3-sqlalchemy+mysql-1.4.39-2.el9.s390x.rpm
python3-sqlalchemy+postgresql-1.4.39-2.el9.s390x.rpm
python3-sqlalchemy+postgresql_asyncpg-1.4.39-2.el9.s390x.rpm
python3-sqlalchemy+postgresql_pg8000-1.4.39-2.el9.s390x.rpm
python3-sqlalchemy+pymysql-1.4.39-2.el9.s390x.rpm
python3-sqlalchemy-1.4.39-2.el9.s390x.rpm
python3-sqlalchemy-debuginfo-1.4.39-2.el9.s390x.rpm
python3-tornado-6.1.0-2.el9.1.s390x.rpm
python3-tornado-debuginfo-6.1.0-2.el9.1.s390x.rpm
python3-wrapt-1.11.2-4.el9.s390x.rpm
python3-wrapt-debuginfo-1.11.2-4.el9.s390x.rpm
python3-yappi-1.3.1-2.el9.s390x.rpm
python3-yappi-debuginfo-1.3.1-2.el9.s390x.rpm
python3-zope-interface-5.4.0-1.el9.s390x.rpm
subunit-1.4.0-6.el9.1.s390x.rpm
subunit-cppunit-1.4.0-6.el9.1.s390x.rpm
subunit-cppunit-debuginfo-1.4.0-6.el9.1.s390x.rpm
subunit-cppunit-devel-1.4.0-6.el9.1.s390x.rpm
subunit-debuginfo-1.4.0-6.el9.1.s390x.rpm
subunit-debugsource-1.4.0-6.el9.1.s390x.rpm
subunit-devel-1.4.0-6.el9.1.s390x.rpm
subunit-static-1.4.0-6.el9.1.s390x.rpm

x86_64:
python-bcrypt-debugsource-3.1.6-3.el9.x86_64.rpm
python-coverage-debugsource-5.6-0.1b1.el9.x86_64.rpm
python-gevent-debugsource-21.1.2-1.el9.x86_64.rpm
python-greenlet-debugsource-1.0.0-1.el9.x86_64.rpm
python-kerberos-debugsource-1.3.0-11.el9.1.x86_64.rpm
python-kiwisolver-debugsource-1.1.0-4.el9.x86_64.rpm
python-markupsafe-debugsource-2.0.0-2.el9.x86_64.rpm
python-msgpack-debugsource-0.6.2-2.el9.x86_64.rpm
python-simplejson-debugsource-3.17.0-2.el9.x86_64.rpm
python-sqlalchemy-debugsource-1.4.39-2.el9.x86_64.rpm
python-tornado-debugsource-6.1.0-2.el9.1.x86_64.rpm
python-tornado-doc-6.1.0-2.el9.1.x86_64.rpm
python-wrapt-debugsource-1.11.2-4.el9.x86_64.rpm
python-wrapt-doc-1.11.2-4.el9.x86_64.rpm
python-yappi-debugsource-1.3.1-2.el9.x86_64.rpm
python3-bcrypt-3.1.6-3.el9.x86_64.rpm
python3-bcrypt-debuginfo-3.1.6-3.el9.x86_64.rpm
python3-coverage-5.6-0.1b1.el9.x86_64.rpm
python3-coverage-debuginfo-5.6-0.1b1.el9.x86_64.rpm
python3-gevent-21.1.2-1.el9.x86_64.rpm
python3-gevent-debuginfo-21.1.2-1.el9.x86_64.rpm
python3-greenlet-1.0.0-1.el9.x86_64.rpm
python3-greenlet-debuginfo-1.0.0-1.el9.x86_64.rpm
python3-greenlet-devel-1.0.0-1.el9.x86_64.rpm
python3-kerberos-1.3.0-11.el9.1.x86_64.rpm
python3-kerberos-debuginfo-1.3.0-11.el9.1.x86_64.rpm
python3-kiwisolver-1.1.0-4.el9.x86_64.rpm
python3-kiwisolver-debuginfo-1.1.0-4.el9.x86_64.rpm
python3-markupsafe-2.0.0-2.el9.x86_64.rpm
python3-markupsafe-debuginfo-2.0.0-2.el9.x86_64.rpm
python3-msgpack-0.6.2-2.el9.x86_64.rpm
python3-msgpack-debuginfo-0.6.2-2.el9.x86_64.rpm
python3-simplejson-3.17.0-2.el9.x86_64.rpm
python3-simplejson-debuginfo-3.17.0-2.el9.x86_64.rpm
python3-sqlalchemy+aiomysql-1.4.39-2.el9.x86_64.rpm
python3-sqlalchemy+aiosqlite-1.4.39-2.el9.x86_64.rpm
python3-sqlalchemy+asyncio-1.4.39-2.el9.x86_64.rpm
python3-sqlalchemy+mssql_pymssql-1.4.39-2.el9.x86_64.rpm
python3-sqlalchemy+mssql_pyodbc-1.4.39-2.el9.x86_64.rpm
python3-sqlalchemy+mysql-1.4.39-2.el9.x86_64.rpm
python3-sqlalchemy+postgresql-1.4.39-2.el9.x86_64.rpm
python3-sqlalchemy+postgresql_asyncpg-1.4.39-2.el9.x86_64.rpm
python3-sqlalchemy+postgresql_pg8000-1.4.39-2.el9.x86_64.rpm
python3-sqlalchemy+pymysql-1.4.39-2.el9.x86_64.rpm
python3-sqlalchemy-1.4.39-2.el9.x86_64.rpm
python3-sqlalchemy-debuginfo-1.4.39-2.el9.x86_64.rpm
python3-tornado-6.1.0-2.el9.1.x86_64.rpm
python3-tornado-debuginfo-6.1.0-2.el9.1.x86_64.rpm
python3-wrapt-1.11.2-4.el9.x86_64.rpm
python3-wrapt-debuginfo-1.11.2-4.el9.x86_64.rpm
python3-yappi-1.3.1-2.el9.x86_64.rpm
python3-yappi-debuginfo-1.3.1-2.el9.x86_64.rpm
python3-zope-interface-5.4.0-1.el9.x86_64.rpm
subunit-1.4.0-6.el9.1.x86_64.rpm
subunit-cppunit-1.4.0-6.el9.1.x86_64.rpm
subunit-cppunit-debuginfo-1.4.0-6.el9.1.x86_64.rpm
subunit-cppunit-devel-1.4.0-6.el9.1.x86_64.rpm
subunit-debuginfo-1.4.0-6.el9.1.x86_64.rpm
subunit-debugsource-1.4.0-6.el9.1.x86_64.rpm
subunit-devel-1.4.0-6.el9.1.x86_64.rpm
subunit-static-1.4.0-6.el9.1.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2021-4235
https://access.redhat.com/security/cve/CVE-2022-2880
https://access.redhat.com/security/cve/CVE-2022-2995
https://access.redhat.com/security/cve/CVE-2022-3162
https://access.redhat.com/security/cve/CVE-2022-3172
https://access.redhat.com/security/cve/CVE-2022-3259
https://access.redhat.com/security/cve/CVE-2022-3466
https://access.redhat.com/security/cve/CVE-2022-27664
https://access.redhat.com/security/cve/CVE-2022-30631
https://access.redhat.com/security/cve/CVE-2022-32148
https://access.redhat.com/security/cve/CVE-2022-32189
https://access.redhat.com/security/cve/CVE-2022-41715
https://access.redhat.com/security/updates/classification/#moderate

  1. Contact:

The Red Hat security contact is [email protected]. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBY8cidNzjgjWX9erEAQjHqxAApTzekpMHm5RAq12AoPtTL34SG8DDpFx2
R9aII2c6gPByrs4SXAUYEwo6HiljgqsSihUsrmNR9MAKBqauBj9NH8b1nXEJzQ+g
W+z9CiK2R40xu4+sdhJpplTdjqw6P06wF/xRykhtyA6QotNeJQVbeUqL715oozFJ
DNXeSPvbaHgrvPcT2sDO2jc0VJ9BTWlmocnvdJHK/3qjj/2DDCp0vkxVU3TBxhBN
e3W2bFU0nR54lxUMkVSOwVus9hqcaVPF/mEUrPE3DKfdxflNNQfsHn01zrfHVShv
kHE+jAHSuP7mfTQLge2dUnXIAdaVsxX31zK8Xe4aU9OYFSGLF/SXLnqR6cO6d5iu
CAMA0a0kgrD6RnxQK247dYMm5grSrU1OG36O2zF8pqBy2GuFZDwCdupK0mvWNvpR
tnOgeKixqRGU0yR58s2d3Wv+Zsm7T+ahPiNe9RtfELwDY8x9HqcFj42tvMbqIkxJ
1voAZ/tZlTLl2S+ziAPRsKag2YKZ5QSFKIQdFhqAkNLSM7zhms7uGQrCHjHBO1lf
jLlOD4nf9zu7XEuxhNuyjB+IZWoym8kmxqrryNnAgz+uQ4/dAHU+7SwCBgcJipgw
G51Z24RQIChUe3e7aCOHyS1ABuZVHt2/33iBYTkgXMx2GcrEAT7KiGlwR5jLs8aV
dG89vBwV7t0=
=zwlZ
-----END PGP SIGNATURE-----

RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce

Related news

CVE-2022-3172: CVE-2022-3172: Aggregated API server can cause clients to be redirected (SSRF) · Issue #112513 · kubernetes/kubernetes

A security issue was discovered in kube-apiserver that allows an aggregated API server to redirect client traffic to any URL. This could lead to the client performing unexpected actions as well as forwarding the client's API server credentials to third parties.

CVE-2022-3466

The version of cri-o as released for Red Hat OpenShift Container Platform 4.9.48, 4.10.31, and 4.11.6 via RHBA-2022:6316, RHBA-2022:6257, and RHBA-2022:6658, respectively, included an incorrect version of cri-o missing the fix for CVE-2022-27652, which was previously fixed in OCP 4.9.41 and 4.10.12 via RHBA-2022:5433 and RHSA-2022:1600. This issue could allow an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs. For more details, see https://access.redhat.com/security/cve/CVE-2022-27652.

Ubuntu Security Notice USN-6287-1

Ubuntu Security Notice 6287-1 - Simon Ferquel discovered that the Go yaml package incorrectly handled certain YAML documents. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause the system to crash, resulting in a denial of service. It was discovered that the Go yaml package incorrectly handled certain large YAML documents. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause the system to crash, resulting in a denial of service.

RHSA-2023:3915: Red Hat Security Advisory: OpenShift Container Platform 4.11.44 bug fix and security update

Red Hat OpenShift Container Platform release 4.11.44 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS...

Red Hat Security Advisory 2023-3615-01

Red Hat Security Advisory 2023-3615-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.22. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3742-02

Red Hat Security Advisory 2023-3742-02 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. Issues addressed include bypass, denial of service, and remote SQL injection vulnerabilities.

RHSA-2023:3742: Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.13.0 security and bug fix update

Updated images that include numerous enhancements, security, and bug fixes are now available in Red Hat Container Registry for Red Hat OpenShift Data Foundation 4.13.0 on Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-16250: A flaw was found in Vault and Vault Enterprise (“Vault”). In the affected versions of Vault, with the AWS Auth Method configured and under certain circumstances, the values relied upon by Vault to validate AWS IAM ident...

Red Hat Security Advisory 2023-3644-01

Red Hat Security Advisory 2023-3644-01 - Red Hat OpenShift Service Mesh is the Red Hat distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation. This advisory covers container images for the release.

Red Hat Security Advisory 2023-3609-01

Red Hat Security Advisory 2023-3609-01 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Data Foundation. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform.

RHSA-2023:3644: Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.0

Red Hat OpenShift Service Mesh Containers for 2.4.0 Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24540: A flaw was found in golang, where not all valid JavaScript white-space characters were considered white space. Due to this issue, templates containing white-space characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution.

RHSA-2023:3541: Red Hat Security Advisory: OpenShift Container Platform 4.11.43 packages and security update

Red Hat OpenShift Container Platform release 4.11.43 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2995: Incorrect handling of the supplementary groups in the CRI-O container engine might lead to sensitive information disclosure or possible data modification if an attacker has direct acc...

Red Hat Security Advisory 2023-3296-01

Red Hat Security Advisory 2023-3296-01 - Multicluster Engine for Kubernetes 2.2.4 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy.

Red Hat Security Advisory 2023-3216-01

Red Hat Security Advisory 2023-3216-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.10.60.

RHSA-2023:3296: Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.2.4 security fixes and container updates

Multicluster Engine for Kubernetes 2.2.4 General Availability release images, which fix security issues and update container images. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-32313: A flaw was found in the vm2. After making a vm, the inspect method is read-write for console.log, which allows an attacker to edit options for console.log. This issue impacts the integrity by changing the log subsystem. * CVE-2023-32314: A flaw was found in the vm2 sandbox. When a host ...

RHSA-2023:3216: Red Hat Security Advisory: OpenShift Container Platform 4.10.60 packages and security update

Red Hat OpenShift Container Platform release 4.10.60 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.10. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2995: Incorrect handling of the supplementary groups in the CRI-O container engine might lead to sensitive information disclosure or possible data modification if an attacker has direct acc...

Red Hat Security Advisory 2023-1325-01

Red Hat Security Advisory 2023-1325-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.0. Issues addressed include bypass, denial of service, and information leakage vulnerabilities.

RHSA-2023:1325: Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update

Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2990: An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has d...

RHSA-2023:1326: Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update

Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: A flaw was found in go-yaml. This issue occurs due to unbounded alias chasing, where a maliciously crafted YAML file can cause the system to consume significant system resources. If p...

Red Hat Security Advisory 2023-1327-01

Red Hat Security Advisory 2023-1327-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.0.

RHSA-2023:2780: Red Hat Security Advisory: Image Builder security, bug fix, and enhancement update

An update for cockpit-composer, osbuild, osbuild-composer, and weldr-client is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, ...

RHSA-2023:2866: Red Hat Security Advisory: git-lfs security and bug fix update

An update for git-lfs is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2880: A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy saniti...

RHSA-2023:2204: Red Hat Security Advisory: Image Builder security, bug fix, and enhancement update

An update for cockpit-composer, osbuild, osbuild-composer, and weldr-client is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, ...

RHSA-2023:2193: Red Hat Security Advisory: butane security, bug fix, and enhancement update

An update for butane is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27664: A flaw was found in the golang package. In net/http in Go, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if a fatal error preempts the shutdown. * CVE-2022-32189: An uncontrolled resource consumption flaw was found in Golang math/big. A too-short encoded message can cause a panic in Float.GobDecode an...

Red Hat Security Advisory 2023-2041-01

Red Hat Security Advisory 2023-2041-01 - Migration Toolkit for Applications 6.1.0 Images. Issues addressed include denial of service, privilege escalation, server-side request forgery, and traversal vulnerabilities.

RHSA-2023:2041: Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update

Migration Toolkit for Applications 6.1.0 release Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3782: A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. An attacker can use this flaw to construct a malicious request to bypass validation and access other URLs and potentially sensitive information within the domain or possibly conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect ...

Red Hat Security Advisory 2023-1656-01

Red Hat Security Advisory 2023-1656-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.56.

Red Hat Security Advisory 2023-1655-01

Red Hat Security Advisory 2023-1655-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.10.56. Issues addressed include bypass, cross site scripting, information leakage, insecure permissions, and privilege escalation vulnerabilities.

RHSA-2023:1655: Red Hat Security Advisory: OpenShift Container Platform 4.10.56 security update

Red Hat OpenShift Container Platform release 4.10.56 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.10. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3172: A security issue was discovered in kube-apiserver that allows an aggregated API server to redirect client traffic to any URL. This issue leads to the client performing unexpected acti...

CVE-2023-1802: Docker Desktop release notes

In Docker Desktop 4.17.x the Artifactory Integration falls back to sending registry credentials over plain HTTP if the HTTPS health check has failed. A targeted network sniffing attack can lead to a disclosure of sensitive information. Only users who have Access Experimental Features enabled and have logged in to a private registry are affected.

RHSA-2023:1529: Red Hat Security Advisory: Service Telemetry Framework 1.5 security update

An update is now available for Service Telemetry Framework 1.5. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: A flaw was found in golang. The HTTP/1 client accepted invalid Transfer-Encoding headers indicating "chunked" encoding. This issue could allow request smuggling, but only if combined with an intermediate server that also improperly accepts the header as invalid. * CVE-2022-23772: A flaw was found in the big package of the math library in golang. The Rat....

RHSA-2023:1428: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.8 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.8 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36567: A flaw was found in gin. This issue occurs when the default Formatter for the Logger middleware (LoggerConfig.Formatter), which is included in the Default engine, allows attackers to inject arbitrary log entries by manipulating the request path. * CVE-2022-24999: A flaw was found in the express.js npm package. Express.js Express is vulnerable to a d...

RHSA-2023:1275: Red Hat Security Advisory: Red Hat OpenStack Platform (etcd) security update

An update for etcd is now available for Red Hat OpenStack Platform. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: A flaw was found in golang. The HTTP/1 client accepted invalid Transfer-Encoding headers indicating "chunked" encoding. This issue could allow request smuggling, but only if combined with an intermediate server that also improperly accepts the header as invalid. * CVE-2022-2880: A flaw was found in the golang package, where requests forwarded by rev...

Red Hat Security Advisory 2023-1174-01

Red Hat Security Advisory 2023-1174-01 - OpenShift API for Data Protection (OADP) 1.1.2 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate.

Red Hat Security Advisory 2023-1079-01

Red Hat Security Advisory 2023-1079-01 - An update for osp-director-downloader-container, osp-director-agent-container and osp-director-operator-container is now available for Red Hat OpenStack Platform 16.2 (Train).

RHSA-2023:1042: Red Hat Security Advisory: Custom Metrics Autoscaler Operator for Red Hat OpenShift (with security updates)

Custom Metrics Autoscaler Operator for Red Hat OpenShift including security updates. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: A flaw was found in golang. The HTTP/1 client accepted invalid Transfer-Encoding headers indicating "chunked" encoding. This issue could allow request smuggling, but only if combined with an intermediate server that also improperly accepts the header as invalid. * CVE-2022-1962: A flaw was found in the golang standard library, go/par...

CVE-2022-3162: CVE-2022-3162: Unauthorized read of Custom Resources · Issue #113756 · kubernetes/kubernetes

Users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group without authorization. Clusters are impacted by this vulnerability if all of the following are true: 1. There are 2+ CustomResourceDefinitions sharing the same API group 2. Users have cluster-wide list or watch authorization on one of those custom resources. 3. The same users are not authorized to read another custom resource in the same API group.

Red Hat Security Advisory 2023-0774-01

Red Hat Security Advisory 2023-0774-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.28. Issues addressed include denial of service and out of bounds read vulnerabilities.

Red Hat Security Advisory 2023-0772-01

Red Hat Security Advisory 2023-0772-01 - Red Hat build of MicroShift is Red Hat's light-weight Kubernetes orchestration solution designed for edge device deployments and is built from the edge capabilities of Red Hat OpenShift. MicroShift is an application that is deployed on top of Red Hat Enterprise Linux devices at the edge, providing an efficient way to operate single-node clusters in these low-resource environments. This advisory contains the RPM packages for Red Hat build of MicroShift 4.12.4.

RHSA-2023:0772: Red Hat Security Advisory: OpenShift Container Platform 4.12.4 security update

Red Hat build of MicroShift release 4.12.4 is now available with updates to packages and images that fix several bugs. This release includes a security update for the Red Hat build of MicroShift 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3162: A flaw was found in kubernetes. Users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different kind in the same API group they are not authorized to read...

RHSA-2023:0769: Red Hat Security Advisory: OpenShift Container Platform 4.12.4 security update

Red Hat OpenShift Container Platform release 4.12.4 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total numb...

RHSA-2023:0727: Red Hat Security Advisory: OpenShift Container Platform 4.12.3 security update

Red Hat OpenShift Container Platform release 4.12.3 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks t...

Red Hat Security Advisory 2023-0708-01

Red Hat Security Advisory 2023-0708-01 - Red Hat OpenShift Serverless Client kn 1.27.0 provides a CLI to interact with Red Hat OpenShift Serverless 1.27.0. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms.

Red Hat Security Advisory 2023-0709-01

Red Hat Security Advisory 2023-0709-01 - Version 1.27.0 of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.8, 4.9, 4.10, 4.11 and 4.12. This release includes security and bug fixes, and enhancements.

Red Hat Security Advisory 2023-0693-01

Red Hat Security Advisory 2023-0693-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Issues addressed include a denial of service vulnerability.

RHSA-2023:0693: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.7 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.7 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-43138: A vulnerability was found in the async package. This flaw allows a malicious user to obtain privileges via the mapValues() method. * CVE-2022-2879: A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw a...

Red Hat Security Advisory 2023-0569-01

Red Hat Security Advisory 2023-0569-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.2. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-0570-01

Red Hat Security Advisory 2023-0570-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.12.2. Issues addressed include a denial of service vulnerability.

RHSA-2023:0569: Red Hat Security Advisory: OpenShift Container Platform 4.12.2 security update

Red Hat OpenShift Container Platform release 4.12.2 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: A flaw was found in go-yaml. This issue occurs due to unbounded alias chasing, where a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector. * CVE-2021-4238: A f...

RHSA-2023:0570: Red Hat Security Advisory: OpenShift Container Platform 4.12.2 security update

Red Hat OpenShift Container Platform release 4.12.2 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: A flaw was found in go-yaml. This issue occurs due to unbounded alias chasing, where a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector.

RHSA-2023:0631: Red Hat Security Advisory: RHSA: Submariner 0.14 - bug fix and security updates

Submariner 0.14 packages that fix various bugs and add various enhancements that are now available for Red Hat Advanced Cluster Management for Kubernetes version 2.7 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2880: A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go ...

Red Hat Security Advisory 2023-0542-01

Red Hat Security Advisory 2023-0542-01 - Red Hat OpenShift Service Mesh is the Red Hat distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation. This advisory covers container images for the release. Issues addressed include denial of service and spoofing vulnerabilities.

RHSA-2023:0542: Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.3.1 Containers security update

Red Hat OpenShift Service Mesh 2.3.1 Containers Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4238: goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be * CVE-2022-2879: golang: archive/tar: unbounded memory consumption when reading headers * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-3962: kiali: error message spoofing in kiali UI * CVE-2022-27664: golang: ...

Red Hat Security Advisory 2023-0446-01

Red Hat Security Advisory 2023-0446-01 - Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.

Red Hat Security Advisory 2023-0445-01

Red Hat Security Advisory 2023-0445-01 - Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.

RHSA-2023:0446: Red Hat Security Advisory: go-toolset:rhel8 security and bug fix update

An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: golang: archive/tar: unbounded memory consumption when reading headers * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-41715: golang: regexp/syntax: limit memory used by parsing regexps

RHSA-2023:0445: Red Hat Security Advisory: go-toolset-1.18 security update

An update for go-toolset-1.18 and go-toolset-1.18-golang is now available for Red Hat Developer Tools. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: golang: archive/tar: unbounded memory consumption when reading headers * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-41715: golang: regexp/syntax: limit memory used by parsing regexps

RHSA-2023:0328: Red Hat Security Advisory: go-toolset and golang security and bug fix update

An update for go-toolset and golang is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: golang: archive/tar: unbounded memory consumption when reading headers * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-41715: golang: regexp/syntax: limit memory used by parsing regexps

Red Hat Security Advisory 2023-0264-01

Red Hat Security Advisory 2023-0264-01 - An update for Logging Subsystem (5.6.0) is now available for Red Hat OpenShift Container Platform. Issues addressed include a denial of service vulnerability.

RHSA-2023:0264: Red Hat Security Advisory: Red Hat OpenShift (Logging Subsystem) security update

An update for Logging Subsystem (5.6.0) is now available for Red Hat OpenShift Container Platform. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36518: jackson-databind: denial of service via a large depth of nested objects * CVE-2022-2879: golang: archive/tar: unbounded memory consumption when reading headers * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-27664: golang: net/http: handle server error...

Red Hat Security Advisory 2022-7401-01

Red Hat Security Advisory 2022-7401-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include denial of service and out of bounds read vulnerabilities.

Red Hat Security Advisory 2022-7399-01

Red Hat Security Advisory 2022-7399-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.0. Issues addressed include denial of service, memory leak, and out of bounds read vulnerabilities.

Red Hat Security Advisory 2022-7399-01

Red Hat Security Advisory 2022-7399-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.0. Issues addressed include denial of service, memory leak, and out of bounds read vulnerabilities.

Red Hat Security Advisory 2022-7399-01

Red Hat Security Advisory 2022-7399-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.0. Issues addressed include denial of service, memory leak, and out of bounds read vulnerabilities.

Red Hat Security Advisory 2022-7399-01

Red Hat Security Advisory 2022-7399-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.0. Issues addressed include denial of service, memory leak, and out of bounds read vulnerabilities.

Red Hat Security Advisory 2022-7399-01

Red Hat Security Advisory 2022-7399-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.0. Issues addressed include denial of service, memory leak, and out of bounds read vulnerabilities.

Red Hat Security Advisory 2022-7399-01

Red Hat Security Advisory 2022-7399-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.0. Issues addressed include denial of service, memory leak, and out of bounds read vulnerabilities.

Red Hat Security Advisory 2022-7399-01

Red Hat Security Advisory 2022-7399-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.0. Issues addressed include denial of service, memory leak, and out of bounds read vulnerabilities.

Red Hat Security Advisory 2022-7399-01

Red Hat Security Advisory 2022-7399-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.0. Issues addressed include denial of service, memory leak, and out of bounds read vulnerabilities.

Red Hat Security Advisory 2022-7399-01

Red Hat Security Advisory 2022-7399-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.0. Issues addressed include denial of service, memory leak, and out of bounds read vulnerabilities.

Red Hat Security Advisory 2022-7399-01

Red Hat Security Advisory 2022-7399-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.0. Issues addressed include denial of service, memory leak, and out of bounds read vulnerabilities.

RHSA-2022:7399: Red Hat Security Advisory: OpenShift Container Platform 4.12.0 bug fix and security update

Red Hat OpenShift Container Platform release 4.12.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-2879: golang: arc...

RHSA-2022:7399: Red Hat Security Advisory: OpenShift Container Platform 4.12.0 bug fix and security update

Red Hat OpenShift Container Platform release 4.12.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-2879: golang: arc...

RHSA-2022:7399: Red Hat Security Advisory: OpenShift Container Platform 4.12.0 bug fix and security update

Red Hat OpenShift Container Platform release 4.12.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-2879: golang: arc...

RHSA-2022:7399: Red Hat Security Advisory: OpenShift Container Platform 4.12.0 bug fix and security update

Red Hat OpenShift Container Platform release 4.12.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-2879: golang: arc...

RHSA-2022:7399: Red Hat Security Advisory: OpenShift Container Platform 4.12.0 bug fix and security update

Red Hat OpenShift Container Platform release 4.12.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-2879: golang: arc...

RHSA-2022:7399: Red Hat Security Advisory: OpenShift Container Platform 4.12.0 bug fix and security update

Red Hat OpenShift Container Platform release 4.12.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-2879: golang: arc...

RHSA-2022:7399: Red Hat Security Advisory: OpenShift Container Platform 4.12.0 bug fix and security update

Red Hat OpenShift Container Platform release 4.12.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-2879: golang: arc...

RHSA-2022:7399: Red Hat Security Advisory: OpenShift Container Platform 4.12.0 bug fix and security update

Red Hat OpenShift Container Platform release 4.12.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-2879: golang: arc...

RHSA-2022:7399: Red Hat Security Advisory: OpenShift Container Platform 4.12.0 bug fix and security update

Red Hat OpenShift Container Platform release 4.12.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-2879: golang: arc...

RHSA-2022:7398: Red Hat Security Advisory: OpenShift Container Platform 4.12.0 packages and security update

Red Hat OpenShift Container Platform release 4.12.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: go-yaml: Denial of Service in go-yaml * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-2995: cri-o: incorrect handlin...

RHSA-2022:7398: Red Hat Security Advisory: OpenShift Container Platform 4.12.0 packages and security update

Red Hat OpenShift Container Platform release 4.12.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: go-yaml: Denial of Service in go-yaml * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-2995: cri-o: incorrect handlin...

RHSA-2022:7398: Red Hat Security Advisory: OpenShift Container Platform 4.12.0 packages and security update

Red Hat OpenShift Container Platform release 4.12.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: go-yaml: Denial of Service in go-yaml * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-2995: cri-o: incorrect handlin...

RHSA-2022:7398: Red Hat Security Advisory: OpenShift Container Platform 4.12.0 packages and security update

Red Hat OpenShift Container Platform release 4.12.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: go-yaml: Denial of Service in go-yaml * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-2995: cri-o: incorrect handlin...

RHSA-2022:7398: Red Hat Security Advisory: OpenShift Container Platform 4.12.0 packages and security update

Red Hat OpenShift Container Platform release 4.12.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: go-yaml: Denial of Service in go-yaml * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-2995: cri-o: incorrect handlin...

RHSA-2022:7398: Red Hat Security Advisory: OpenShift Container Platform 4.12.0 packages and security update

Red Hat OpenShift Container Platform release 4.12.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: go-yaml: Denial of Service in go-yaml * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-2995: cri-o: incorrect handlin...

RHSA-2022:7398: Red Hat Security Advisory: OpenShift Container Platform 4.12.0 packages and security update

Red Hat OpenShift Container Platform release 4.12.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: go-yaml: Denial of Service in go-yaml * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-2995: cri-o: incorrect handlin...

RHSA-2022:7398: Red Hat Security Advisory: OpenShift Container Platform 4.12.0 packages and security update

Red Hat OpenShift Container Platform release 4.12.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: go-yaml: Denial of Service in go-yaml * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-2995: cri-o: incorrect handlin...

RHSA-2022:7398: Red Hat Security Advisory: OpenShift Container Platform 4.12.0 packages and security update

Red Hat OpenShift Container Platform release 4.12.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: go-yaml: Denial of Service in go-yaml * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-2995: cri-o: incorrect handlin...

GHSA-r88r-gmrh-7j83: YAML Go package vulnerable to denial of service

Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector.

CVE-2021-4235: Add logic to catch cases of alias abuse. · go-yaml/yaml@bb4e33b

Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector.

RHSA-2022:9047: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.6 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.6 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30630: golang: io/fs: stack exhaustion in G...

RHSA-2022:9047: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.6 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.6 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30630: golang: io/fs: stack exhaustion in G...

CVE-2022-41296: Multiple vulnerabilities affect IBM Db2® on Cloud Pak for Data and Db2 Warehouse® on Cloud Pak for Data

IBM Db2U 3.5, 4.0, and 4.5 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 237210.

CVE-2022-3259: Invalid Bug ID

Openshift 4.9 does not use HTTP Strict Transport Security (HSTS) which may allow man-in-the-middle (MITM) attacks.

Red Hat Security Advisory 2022-8781-01

Red Hat Security Advisory 2022-8781-01 - Logging Subsystem for Red Hat OpenShift has a security update. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-8781-01

Red Hat Security Advisory 2022-8781-01 - Logging Subsystem for Red Hat OpenShift has a security update. Issues addressed include a denial of service vulnerability.

RHSA-2022:8781: Red Hat Security Advisory: Logging Subsystem 5.5.5 - Red Hat OpenShift security update

Logging Subsystem 5.5.5 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36518: jackson-databind: denial of service via a large depth of nested objects * CVE-2022-2879: golang: archive/tar: unbounded memory consumption when reading headers * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-27664: golang: net/http: handle server errors after sending GOAWAY * CVE-2022-32189: golang: math/b...

RHSA-2022:8781: Red Hat Security Advisory: Logging Subsystem 5.5.5 - Red Hat OpenShift security update

Logging Subsystem 5.5.5 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36518: jackson-databind: denial of service via a large depth of nested objects * CVE-2022-2879: golang: archive/tar: unbounded memory consumption when reading headers * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-27664: golang: net/http: handle server errors after sending GOAWAY * CVE-2022-32189: golang: math/b...

RHSA-2022:8781: Red Hat Security Advisory: Logging Subsystem 5.5.5 - Red Hat OpenShift security update

Logging Subsystem 5.5.5 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36518: jackson-databind: denial of service via a large depth of nested objects * CVE-2022-2879: golang: archive/tar: unbounded memory consumption when reading headers * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-27664: golang: net/http: handle server errors after sending GOAWAY * CVE-2022-32189: golang: math/b...

Red Hat Security Advisory 2022-8626-01

Red Hat Security Advisory 2022-8626-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.11.17. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-8626-01

Red Hat Security Advisory 2022-8626-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.11.17. Issues addressed include a denial of service vulnerability.

RHSA-2022:8626: Red Hat Security Advisory: OpenShift Container Platform 4.11.17 packages and security update

Red Hat OpenShift Container Platform release 4.11.17 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-27664: golang: net/http: handle server errors after sending GOAWAY * CVE-2022-32148: golang: net/http/ht...

RHSA-2022:8626: Red Hat Security Advisory: OpenShift Container Platform 4.11.17 packages and security update

Red Hat OpenShift Container Platform release 4.11.17 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-27664: golang: net/http: handle server errors after sending GOAWAY * CVE-2022-32148: golang: net/http/ht...

RHSA-2022:8634: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.1 security and bug fix update

OpenShift API for Data Protection (OADP) 1.1.1 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27191: golang: crash in a golang.org/x/crypto/ssh server * CVE-2022-27664: golang: net/http: handle server errors after sending GOAWAY * CVE-2022-30632: golang: path/filepath: stack exhaustion in Glob * CVE-2022-30635: golang: encoding/gob: stack exhaustion in Decoder.Decode * CVE-2022-32190: golang: net/url: JoinPath does not strip relative path components i...

Red Hat Security Advisory 2022-8534-01

Red Hat Security Advisory 2022-8534-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.11.16. Issues addressed include a denial of service vulnerability.

RHSA-2022:8535: Red Hat Security Advisory: OpenShift Container Platform 4.11.16 security update

Red Hat OpenShift Container Platform release 4.11.16 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27664: golang: net/http: handle server errors after sending GOAWAY * CVE-2022-32189: golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, po...

RHSA-2022:8535: Red Hat Security Advisory: OpenShift Container Platform 4.11.16 security update

Red Hat OpenShift Container Platform release 4.11.16 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27664: golang: net/http: handle server errors after sending GOAWAY * CVE-2022-32189: golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, po...

RHSA-2022:8534: Red Hat Security Advisory: OpenShift Container Platform 4.11.16 security update

Red Hat OpenShift Container Platform release 4.11.16 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32189: golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service

Red Hat Security Advisory 2022-7648-01

Red Hat Security Advisory 2022-7648-01 - The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards.

RHSA-2022:7548: Red Hat Security Advisory: Image Builder security, bug fix, and enhancement update

An update for cockpit-composer, osbuild, osbuild-composer, and weldr-client is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32189: golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service

RHSA-2022:7648: Red Hat Security Advisory: grafana-pcp security update

An update for grafana-pcp is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-30630: golang: io/fs: stack exhaustion in Glob * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read * CVE-2022-30632: golang: path/filepath: stack exhaustion in Glob * CVE-2022-30635: golang: encoding/gob: stack exhaustion in Decoder.Decode * CVE...

RHSA-2022:7519: Red Hat Security Advisory: grafana security, bug fix, and enhancement update

An update for grafana is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-23648: sanitize-url: XSS due to improper sanitization in sanitizeUrl function * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-21673: grafana: Forward OAuth Identity Token can allow users to access some data sources * CVE-2022-2169...

CVE-2022-41715: [security] Go 1.19.2 and Go 1.18.7 are released

Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.

CVE-2022-41715: [security] Go 1.19.2 and Go 1.18.7 are released

Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.

CVE-2022-2880: net/http/httputil: ReverseProxy should not forward unparseable query parameters · Issue #54663 · golang/go

Requests forwarded by ReverseProxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After fix, ReverseProxy sanitizes the query parameters in the forwarded query when the outbound request's Form field is set after the ReverseProxy. Director function returns, indicating that the proxy has parsed the query parameters. Proxies which do not parse query parameters continue to forward the original query parameters unchanged.

CVE-2022-39278: Announcing Istio 1.13.9

Istio is an open platform-independent service mesh that provides traffic management, policy enforcement, and telemetry collection. Prior to versions 1.15.2, 1.14.5, and 1.13.9, the Istio control plane, istiod, is vulnerable to a request processing error, allowing a malicious attacker that sends a specially crafted or oversized message which results in the control plane crashing when the Kubernetes validating or mutating webhook service is exposed publicly. This endpoint is served over TLS port 15017, but does not require any authentication from the attacker. For simple installations, Istiod is typically only reachable from within the cluster, limiting the blast radius. However, for some deployments, especially external istiod topologies, this port is exposed over the public internet. Versions 1.15.2, 1.14.5, and 1.13.9 contain patches for this issue. There are no effective workarounds, beyond upgrading. This bug is due to an error in `regexp.Compile` in Go.

RHSA-2022:6714: Red Hat Security Advisory: RHACS 3.72 enhancement and security update

Updated images are now available for Red Hat Advanced Cluster Security for Kubernetes (RHACS). The updated image includes new features and bug fixes. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-24921: golang: regexp: stack exhaustion via a deeply nested expression * CVE-2022-28327: golang: crypto/elliptic: panic caused by oversized scalar * CVE-2022-29526: golang: syscall: faccessat checks wrong gr...

GHSA-phjr-8j92-w5v7: CRI-O incorrect handling of supplementary groups may lead to sensitive information disclosure

Incorrect handling of the supplementary groups in the CRI-O container engine might lead to sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.

Red Hat Security Advisory 2022-6308-01

Red Hat Security Advisory 2022-6308-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.8.49. There are no RPMs for this release. Space precludes documenting all of the container images in this advisory. Issues addressed include bypass and code execution vulnerabilities.

Red Hat Security Advisory 2022-6517-01

Red Hat Security Advisory 2022-6517-01 - Red Hat OpenStack Platform 16.2 (Train) director operator containers, with several Important security fixes, are available for technology preview.

RHSA-2022:6308: Red Hat Security Advisory: OpenShift Container Platform 4.8.49 security update

Red Hat OpenShift Container Platform release 4.8.49 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-39226: grafana: Snapshot authentication bypass * CVE-2022-26945: go-getter: command injection vulnerability * CVE-2022-30321: go-getter: unsafe download (issue 1 of 3) * CVE-2022-30322: go-getter: unsafe download (issue 2 of 3) * CVE-2022-30323: go-getter: unsafe download (is...

Red Hat Security Advisory 2022-6430-01

Red Hat Security Advisory 2022-6430-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes. Issues addressed include a denial of service vulnerability.

CVE-2022-2990: Vulnerability in Linux containers – investigation and mitigation

An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.

RHSA-2022:6430: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.0.4 security and bug fix update

OpenShift API for Data Protection (OADP) 1.0.4 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-21698: prometheus/client_golang: Denial of service using InstrumentHandlerCounter * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-30629: golang: crypto/tls: session ti...

RHSA-2022:6430: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.0.4 security and bug fix update

OpenShift API for Data Protection (OADP) 1.0.4 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-21698: prometheus/client_golang: Denial of service using InstrumentHandlerCounter * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-30629: golang: crypto/tls: session ti...

Red Hat Security Advisory 2022-6370-01

Red Hat Security Advisory 2022-6370-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.0 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix security issues and several bugs. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-6370-01

Red Hat Security Advisory 2022-6370-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.0 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix security issues and several bugs. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-6183-01

Red Hat Security Advisory 2022-6183-01 - Logging Subsystem 5.4.5 for Red Hat OpenShift has been released. Issue addressed include a stack exhaustion vulnerability.

Red Hat Security Advisory 2022-6348-01

Red Hat Security Advisory 2022-6348-01 - Gatekeeper is an open source project that applies the OPA Constraint Framework to enforce policies on your Kubernetes clusters. This advisory contains the container images for Gatekeeper that include bug fixes and container upgrades.

CVE-2022-27664: [security] Go 1.19.1 and Go 1.18.6 are released

In net/http in Go before 1.18.6 and 1.19.x before 1.19.1, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if shutdown were preempted by a fatal error.

RHSA-2022:6345: Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.1 security updates and bug fixes

Multicluster Engine v2.1 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30630: golang: io/fs: stack exhaustion in Glob * CVE-2022-30631: golang: compress/gzi...

RHSA-2022:6345: Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.1 security updates and bug fixes

Multicluster Engine v2.1 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30630: golang: io/fs: stack exhaustion in Glob * CVE-2022-30631: golang: compress/gzi...

RHSA-2022:6182: Red Hat Security Advisory: Openshift Logging Security and Bug Fix update (5.3.11)

Openshift Logging Bug Fix Release (5.3.11) Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read

Red Hat Security Advisory 2022-6184-01

Red Hat Security Advisory 2022-6184-01 - The Self Node Remediation Operator works in conjunction with the Machine Health Check or the Node Health Check Operators to provide automatic remediation of unhealthy nodes by rebooting them. This minimizes downtime for stateful applications and RWO volumes, as well as restoring compute capacity in the event of transient failures.

RHSA-2022:6188: Red Hat Security Advisory: Node Maintenance Operator 4.11.1 security update

An update for node-maintenance-must-gather-container, node-maintenance-operator-bundle-container, and node-maintenance-operator-container is now available for Node Maintenance Operator 4.11 for RHEL 8. This Operator is delivered by Red Hat Workload Availability. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-...

Red Hat Security Advisory 2022-6103-01

Red Hat Security Advisory 2022-6103-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.1.

CVE-2022-32189: math/big: index out of range in Float.GobDecode · Issue #53871 · golang/go

A too-short encoded message can cause a panic in Float.GobDecode and Rat GobDecode in math/big in Go before 1.17.13 and 1.18.5, potentially allowing a denial of service.

CVE-2021-21285: Docker Engine release notes

In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in which pulling an intentionally malformed Docker image manifest crashes the dockerd daemon. Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing.

CVE-2021-21285: Docker Engine release notes

In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in which pulling an intentionally malformed Docker image manifest crashes the dockerd daemon. Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing.

CVE-2021-21285: Docker Engine release notes

In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in which pulling an intentionally malformed Docker image manifest crashes the dockerd daemon. Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing.

CVE-2020-11110: grafana/CHANGELOG.md at main · grafana/grafana

Grafana through 6.7.1 allows stored XSS due to insufficient input protection in the originalUrl field, which allows an attacker to inject JavaScript code that will be executed after clicking on Open Original Dashboard after visiting the snapshot.

Packet Storm: Latest News

Ivanti EPM Remote Code Execution