Security
Headlines
HeadlinesLatestCVEs

Headline

Red Hat Security Advisory 2023-1325-01

Red Hat Security Advisory 2023-1325-01 - Red Hat OpenShift Container Platform is Red Hat’s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.0. Issues addressed include bypass, denial of service, and information leakage vulnerabilities.

Packet Storm
#sql#vulnerability#web#ios#mac#linux#red_hat#dos#redis#memcached#js#git#kubernetes#perl#auth#ssh#rpm#postgres#docker#ssl

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Important: OpenShift Container Platform 4.13.0 security update
Advisory ID: RHSA-2023:1325-01
Product: Red Hat OpenShift Enterprise
Advisory URL: https://access.redhat.com/errata/RHSA-2023:1325
Issue date: 2023-05-17
CVE Names: CVE-2022-2990 CVE-2022-3259 CVE-2022-41717
CVE-2022-41723 CVE-2022-41724 CVE-2022-41725
CVE-2023-0056 CVE-2023-0229 CVE-2023-0778
CVE-2023-25577 CVE-2023-25725
====================================================================

  1. Summary:

Red Hat OpenShift Container Platform release 4.13.0 is now available with
updates to packages and images that fix several bugs and add enhancements.

This release includes a security update for Red Hat OpenShift Container
Platform 4.13.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Ironic content for Red Hat OpenShift Container Platform 4.13 - aarch64, noarch, ppc64le, s390x, x86_64
Red Hat OpenShift Container Platform 4.13 - aarch64, noarch, ppc64le, s390x, x86_64

  1. Description:

Red Hat OpenShift Container Platform is Red Hat’s cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.

This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 4.13.0. See the following advisory for the container images for
this release:

https://access.redhat.com/errata/RHSA-2023:1326

Security Fix(es):

  • python-werkzeug: high resource usage when parsing multipart form data
    with many fields (CVE-2023-25577)

  • golang: net/http: excessive memory growth in a Go server accepting HTTP/2
    requests (CVE-2022-41717)

  • net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK
    decoding (CVE-2022-41723)

  • golang: crypto/tls: large handshake records may cause panics
    (CVE-2022-41724)

  • golang: net/http, mime/multipart: denial of service from excessive
    resource consumption (CVE-2022-41725)

  • haproxy: segfault DoS (CVE-2023-0056)

  • openshift/apiserver-library-go: Bypass of SCC seccomp profile
    restrictions (CVE-2023-0229)

  • podman: symlink exchange attack in podman export volume (CVE-2023-0778)

  • haproxy: request smuggling attack in HTTP/1 header parsing
    (CVE-2023-25725)

  • buildah: possible information disclosure and modification (CVE-2022-2990)

  • OpenShift: Missing HTTP Strict Transport Security (CVE-2022-3259)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

All OpenShift Container Platform 4.13 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift CLI (oc)
or web console. Instructions for upgrading a cluster are available at
https://docs.openshift.com/container-platform/4.13/updating/updating-cluster-cli.html

  1. Solution:

For OpenShift Container Platform 4.13 see the following documentation,
which will be updated shortly for this release, for important instructions
on how to upgrade your cluster and fully apply this asynchronous errata
update:

https://docs.openshift.com/container-platform/4.13/release_notes/ocp-4-13-release-notes.html

  1. Bugs fixed (https://bugzilla.redhat.com/):

2103220 - CVE-2022-3259 OpenShift: Missing HTTP Strict Transport Security
2121453 - CVE-2022-2990 buildah: possible information disclosure and modification
2160349 - CVE-2023-0229 openshift/apiserver-library-go: Bypass of SCC seccomp profile restrictions
2160808 - CVE-2023-0056 haproxy: segfault DoS
2161274 - CVE-2022-41717 golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
2168256 - CVE-2023-0778 podman: symlink exchange attack in podman export volume
2169089 - CVE-2023-25725 haproxy: request smuggling attack in HTTP/1 header parsing
2170242 - CVE-2023-25577 python-werkzeug: high resource usage when parsing multipart form data with many fields
2178358 - CVE-2022-41723 net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding
2178488 - CVE-2022-41725 golang: net/http, mime/multipart: denial of service from excessive resource consumption
2178492 - CVE-2022-41724 golang: crypto/tls: large handshake records may cause panics

  1. Package List:

Red Hat OpenShift Container Platform 4.13:

Source:
ansible-runner-1.4.6-2.el8ar.src.rpm
ansible-runner-http-1.0.0-2.el8ar.src.rpm
atomic-openshift-service-idler-4.13.0-202303172327.p0.ga0f9090.assembly.stream.el8.src.rpm
conmon-2.1.7-1.rhaos4.13.el8.src.rpm
container-selinux-2.208.0-2.rhaos4.13.el8.src.rpm
containernetworking-plugins-1.0.1-6.rhaos4.13.el8.src.rpm
criu-3.15-4.rhaos4.11.el8.src.rpm
fuse-overlayfs-1.10-2.rhaos4.13.el8.src.rpm
grpc-1.18.0-4.el8ost.src.rpm
haproxy-2.2.24-3.rhaos4.13.el8.src.rpm
libslirp-4.4.0-2.rhaos4.11.el8.src.rpm
nmstate-2.2.9-6.rhaos4.13.el8.src.rpm
openshift-4.13.0-202304211155.p0.gb404935.assembly.stream.el8.src.rpm
openshift-ansible-4.13.0-202304171417.p0.gb4280f6.assembly.stream.el8.src.rpm
openshift-clients-4.13.0-202303241616.p0.g92b1a3d.assembly.stream.el8.src.rpm
openshift-kuryr-4.13.0-202304192042.p0.g4fe6bbc.assembly.stream.el8.src.rpm
openshift4-aws-iso-4.13.0-202304052215.p0.gd2acdd5.assembly.stream.el8.src.rpm
podman-4.4.1-3.rhaos4.13.el8.src.rpm
python-alembic-1.4.2-5.el8ost.src.rpm
python-amqp-2.5.2-7.el8ost.1.src.rpm
python-cmd2-1.4.0-1.1.el8.src.rpm
python-construct-2.10.56-1.el8ost.src.rpm
python-dogpile-cache-1.1.2-1.el8ost.1.src.rpm
python-eventlet-0.30.2-1.el8.src.rpm
python-flask-1.1.1-1.el8ost.src.rpm
python-funcsigs-1.0.2-8.el8ost.1.src.rpm
python-gunicorn-19.9.0-10.el8ost.1.src.rpm
python-ifaddr-0.1.6-5.el8ost.src.rpm
python-importlib-metadata-1.7.0-1.el8ost.src.rpm
python-iso8601-0.1.12-8.el8ost.1.src.rpm
python-jsonschema-3.2.0-5.el8ost.src.rpm
python-kombu-4.6.6-7.el8ost.1.src.rpm
python-kubernetes-25.3.0-1.el8.src.rpm
python-lockfile-0.11.0-8.el8ar.src.rpm
python-msgpack-0.6.2-1.el8ost.src.rpm
python-oslo-config-8.7.1-0.20211012155707.1a7bd66.el8.src.rpm
python-oslo-context-3.3.1-0.20211012152439.641a1e0.el8.src.rpm
python-oslo-db-9.1.0-0.20211020204148.be2cc6a.el8.src.rpm
python-oslo-i18n-5.1.0-0.20211012165753.b031d17.el8.src.rpm
python-oslo-log-4.6.0-0.20211012154701.41c8807.el8.src.rpm
python-oslo-messaging-12.9.1-0.20211020204149.f9de265.el8.src.rpm
python-oslo-metrics-0.3.0-0.20211020174122.43eee50.el8.src.rpm
python-oslo-policy-3.8.2-0.20211012161944.c7fd9f4.el8.src.rpm
python-oslo-serialization-4.2.0-0.20211012151454.2b94a4f.el8.src.rpm
python-packaging-20.4-1.el8ost.src.rpm
python-paste-3.2.4-1.el8ost.src.rpm
python-paste-deploy-2.0.1-4.el8ost.src.rpm
python-pexpect-4.6-2.el8ar.src.rpm
python-pint-0.10.1-1.el8ost.src.rpm
python-pycdlib-1.11.0-3.el8.src.rpm
python-pyghmi-1.5.14-2.1.el8ost.src.rpm
python-pyperclip-1.6.4-6.el8ost.src.rpm
python-pyroute2-0.5.13-1.el8ost.src.rpm
python-pyrsistent-0.16.0-3.el8ost.src.rpm
python-requests-unixsocket-0.1.5-5.el8ar.src.rpm
python-rsa-4.7-1.el8.src.rpm
python-tenacity-6.2.0-1.el8ost.src.rpm
python-wcwidth-0.1.7-14.el8ost.src.rpm
python-werkzeug-1.0.1-3.el8ost.src.rpm
python-zeroconf-0.24.4-1.el8ost.src.rpm
python-zipp-0.5.1-2.el8ost.src.rpm
runc-1.1.6-3.rhaos4.13.el8.src.rpm
tini-0.16.1-1.el8ar.src.rpm

aarch64:
atomic-openshift-service-idler-4.13.0-202303172327.p0.ga0f9090.assembly.stream.el8.aarch64.rpm
conmon-2.1.7-1.rhaos4.13.el8.aarch64.rpm
conmon-debuginfo-2.1.7-1.rhaos4.13.el8.aarch64.rpm
conmon-debugsource-2.1.7-1.rhaos4.13.el8.aarch64.rpm
containernetworking-plugins-1.0.1-6.rhaos4.13.el8.aarch64.rpm
containernetworking-plugins-debuginfo-1.0.1-6.rhaos4.13.el8.aarch64.rpm
containernetworking-plugins-debugsource-1.0.1-6.rhaos4.13.el8.aarch64.rpm
crit-3.15-4.rhaos4.11.el8.aarch64.rpm
criu-3.15-4.rhaos4.11.el8.aarch64.rpm
criu-debuginfo-3.15-4.rhaos4.11.el8.aarch64.rpm
criu-debugsource-3.15-4.rhaos4.11.el8.aarch64.rpm
criu-devel-3.15-4.rhaos4.11.el8.aarch64.rpm
criu-libs-3.15-4.rhaos4.11.el8.aarch64.rpm
criu-libs-debuginfo-3.15-4.rhaos4.11.el8.aarch64.rpm
fuse-overlayfs-1.10-2.rhaos4.13.el8.aarch64.rpm
fuse-overlayfs-debuginfo-1.10-2.rhaos4.13.el8.aarch64.rpm
fuse-overlayfs-debugsource-1.10-2.rhaos4.13.el8.aarch64.rpm
grpc-1.18.0-4.el8ost.aarch64.rpm
grpc-cli-1.18.0-4.el8ost.aarch64.rpm
grpc-cli-debuginfo-1.18.0-4.el8ost.aarch64.rpm
grpc-debuginfo-1.18.0-4.el8ost.aarch64.rpm
grpc-debugsource-1.18.0-4.el8ost.aarch64.rpm
grpc-devel-1.18.0-4.el8ost.aarch64.rpm
grpc-plugins-1.18.0-4.el8ost.aarch64.rpm
grpc-plugins-debuginfo-1.18.0-4.el8ost.aarch64.rpm
haproxy-debugsource-2.2.24-3.rhaos4.13.el8.aarch64.rpm
haproxy22-2.2.24-3.rhaos4.13.el8.aarch64.rpm
haproxy22-debuginfo-2.2.24-3.rhaos4.13.el8.aarch64.rpm
libslirp-4.4.0-2.rhaos4.11.el8.aarch64.rpm
libslirp-debuginfo-4.4.0-2.rhaos4.11.el8.aarch64.rpm
libslirp-debugsource-4.4.0-2.rhaos4.11.el8.aarch64.rpm
libslirp-devel-4.4.0-2.rhaos4.11.el8.aarch64.rpm
nmstate-2.2.9-6.rhaos4.13.el8.aarch64.rpm
nmstate-debuginfo-2.2.9-6.rhaos4.13.el8.aarch64.rpm
nmstate-debugsource-2.2.9-6.rhaos4.13.el8.aarch64.rpm
nmstate-devel-2.2.9-6.rhaos4.13.el8.aarch64.rpm
nmstate-libs-2.2.9-6.rhaos4.13.el8.aarch64.rpm
nmstate-libs-debuginfo-2.2.9-6.rhaos4.13.el8.aarch64.rpm
openshift-clients-4.13.0-202303241616.p0.g92b1a3d.assembly.stream.el8.aarch64.rpm
openshift-hyperkube-4.13.0-202304211155.p0.gb404935.assembly.stream.el8.aarch64.rpm
podman-4.4.1-3.rhaos4.13.el8.aarch64.rpm
podman-catatonit-4.4.1-3.rhaos4.13.el8.aarch64.rpm
podman-catatonit-debuginfo-4.4.1-3.rhaos4.13.el8.aarch64.rpm
podman-debuginfo-4.4.1-3.rhaos4.13.el8.aarch64.rpm
podman-debugsource-4.4.1-3.rhaos4.13.el8.aarch64.rpm
podman-gvproxy-4.4.1-3.rhaos4.13.el8.aarch64.rpm
podman-gvproxy-debuginfo-4.4.1-3.rhaos4.13.el8.aarch64.rpm
podman-plugins-4.4.1-3.rhaos4.13.el8.aarch64.rpm
podman-plugins-debuginfo-4.4.1-3.rhaos4.13.el8.aarch64.rpm
podman-remote-4.4.1-3.rhaos4.13.el8.aarch64.rpm
podman-remote-debuginfo-4.4.1-3.rhaos4.13.el8.aarch64.rpm
podman-tests-4.4.1-3.rhaos4.13.el8.aarch64.rpm
python-msgpack-debugsource-0.6.2-1.el8ost.aarch64.rpm
python-pyrsistent-debugsource-0.16.0-3.el8ost.aarch64.rpm
python3-criu-3.15-4.rhaos4.11.el8.aarch64.rpm
python3-grpcio-1.18.0-4.el8ost.aarch64.rpm
python3-grpcio-debuginfo-1.18.0-4.el8ost.aarch64.rpm
python3-msgpack-0.6.2-1.el8ost.aarch64.rpm
python3-msgpack-debuginfo-0.6.2-1.el8ost.aarch64.rpm
python3-pyrsistent-0.16.0-3.el8ost.aarch64.rpm
python3-pyrsistent-debuginfo-0.16.0-3.el8ost.aarch64.rpm
runc-1.1.6-3.rhaos4.13.el8.aarch64.rpm
runc-debuginfo-1.1.6-3.rhaos4.13.el8.aarch64.rpm
runc-debugsource-1.1.6-3.rhaos4.13.el8.aarch64.rpm
tini-0.16.1-1.el8ar.aarch64.rpm

noarch:
ansible-runner-1.4.6-2.el8ar.noarch.rpm
ansible-runner-http-1.0.0-2.el8ar.noarch.rpm
container-selinux-2.208.0-2.rhaos4.13.el8.noarch.rpm
openshift-ansible-4.13.0-202304171417.p0.gb4280f6.assembly.stream.el8.noarch.rpm
openshift-ansible-test-4.13.0-202304171417.p0.gb4280f6.assembly.stream.el8.noarch.rpm
openshift-kuryr-cni-4.13.0-202304192042.p0.g4fe6bbc.assembly.stream.el8.noarch.rpm
openshift-kuryr-common-4.13.0-202304192042.p0.g4fe6bbc.assembly.stream.el8.noarch.rpm
openshift-kuryr-controller-4.13.0-202304192042.p0.g4fe6bbc.assembly.stream.el8.noarch.rpm
openshift4-aws-iso-4.13.0-202304052215.p0.gd2acdd5.assembly.stream.el8.noarch.rpm
podman-docker-4.4.1-3.rhaos4.13.el8.noarch.rpm
pycdlib-tools-1.11.0-3.el8.noarch.rpm
python-amqp-doc-2.5.2-7.el8ost.1.noarch.rpm
python-flask-doc-1.1.1-1.el8ost.noarch.rpm
python-oslo-db-lang-9.1.0-0.20211020204148.be2cc6a.el8.noarch.rpm
python-oslo-i18n-lang-5.1.0-0.20211012165753.b031d17.el8.noarch.rpm
python-oslo-log-lang-4.6.0-0.20211012154701.41c8807.el8.noarch.rpm
python-oslo-policy-lang-3.8.2-0.20211012161944.c7fd9f4.el8.noarch.rpm
python-packaging-doc-20.4-1.el8ost.noarch.rpm
python-pyperclip-doc-1.6.4-6.el8ost.noarch.rpm
python2-funcsigs-1.0.2-8.el8ost.1.noarch.rpm
python3-alembic-1.4.2-5.el8ost.noarch.rpm
python3-amqp-2.5.2-7.el8ost.1.noarch.rpm
python3-ansible-runner-1.4.6-2.el8ar.noarch.rpm
python3-cmd2-1.4.0-1.1.el8.noarch.rpm
python3-construct-2.10.56-1.el8ost.noarch.rpm
python3-dogpile-cache-1.1.2-1.el8ost.1.noarch.rpm
python3-eventlet-0.30.2-1.el8.noarch.rpm
python3-flask-1.1.1-1.el8ost.noarch.rpm
python3-funcsigs-1.0.2-8.el8ost.1.noarch.rpm
python3-gunicorn-19.9.0-10.el8ost.1.noarch.rpm
python3-ifaddr-0.1.6-5.el8ost.noarch.rpm
python3-importlib-metadata-1.7.0-1.el8ost.noarch.rpm
python3-iso8601-0.1.12-8.el8ost.1.noarch.rpm
python3-jsonschema-3.2.0-5.el8ost.noarch.rpm
python3-kombu-4.6.6-7.el8ost.1.noarch.rpm
python3-kubernetes-25.3.0-1.el8.noarch.rpm
python3-kubernetes-tests-25.3.0-1.el8.noarch.rpm
python3-kuryr-kubernetes-4.13.0-202304192042.p0.g4fe6bbc.assembly.stream.el8.noarch.rpm
python3-lockfile-0.11.0-8.el8ar.noarch.rpm
python3-oslo-config-8.7.1-0.20211012155707.1a7bd66.el8.noarch.rpm
python3-oslo-context-3.3.1-0.20211012152439.641a1e0.el8.noarch.rpm
python3-oslo-context-tests-3.3.1-0.20211012152439.641a1e0.el8.noarch.rpm
python3-oslo-db-9.1.0-0.20211020204148.be2cc6a.el8.noarch.rpm
python3-oslo-db-tests-9.1.0-0.20211020204148.be2cc6a.el8.noarch.rpm
python3-oslo-i18n-5.1.0-0.20211012165753.b031d17.el8.noarch.rpm
python3-oslo-log-4.6.0-0.20211012154701.41c8807.el8.noarch.rpm
python3-oslo-log-tests-4.6.0-0.20211012154701.41c8807.el8.noarch.rpm
python3-oslo-messaging-12.9.1-0.20211020204149.f9de265.el8.noarch.rpm
python3-oslo-messaging-tests-12.9.1-0.20211020204149.f9de265.el8.noarch.rpm
python3-oslo-metrics-0.3.0-0.20211020174122.43eee50.el8.noarch.rpm
python3-oslo-metrics-tests-0.3.0-0.20211020174122.43eee50.el8.noarch.rpm
python3-oslo-policy-3.8.2-0.20211012161944.c7fd9f4.el8.noarch.rpm
python3-oslo-policy-tests-3.8.2-0.20211012161944.c7fd9f4.el8.noarch.rpm
python3-oslo-serialization-4.2.0-0.20211012151454.2b94a4f.el8.noarch.rpm
python3-oslo-serialization-tests-4.2.0-0.20211012151454.2b94a4f.el8.noarch.rpm
python3-packaging-20.4-1.el8ost.noarch.rpm
python3-paste-3.2.4-1.el8ost.noarch.rpm
python3-paste-deploy-2.0.1-4.el8ost.noarch.rpm
python3-pexpect-4.6-2.el8ar.noarch.rpm
python3-pint-0.10.1-1.el8ost.noarch.rpm
python3-pycdlib-1.11.0-3.el8.noarch.rpm
python3-pyghmi-1.5.14-2.1.el8ost.noarch.rpm
python3-pyperclip-1.6.4-6.el8ost.noarch.rpm
python3-pyroute2-0.5.13-1.el8ost.noarch.rpm
python3-requests-unixsocket-0.1.5-5.el8ar.noarch.rpm
python3-rsa-4.7-1.el8.noarch.rpm
python3-tenacity-6.2.0-1.el8ost.noarch.rpm
python3-wcwidth-0.1.7-14.el8ost.noarch.rpm
python3-werkzeug-1.0.1-3.el8ost.noarch.rpm
python3-zeroconf-0.24.4-1.el8ost.noarch.rpm
python3-zipp-0.5.1-2.el8ost.noarch.rpm

ppc64le:
atomic-openshift-service-idler-4.13.0-202303172327.p0.ga0f9090.assembly.stream.el8.ppc64le.rpm
conmon-2.1.7-1.rhaos4.13.el8.ppc64le.rpm
conmon-debuginfo-2.1.7-1.rhaos4.13.el8.ppc64le.rpm
conmon-debugsource-2.1.7-1.rhaos4.13.el8.ppc64le.rpm
containernetworking-plugins-1.0.1-6.rhaos4.13.el8.ppc64le.rpm
containernetworking-plugins-debuginfo-1.0.1-6.rhaos4.13.el8.ppc64le.rpm
containernetworking-plugins-debugsource-1.0.1-6.rhaos4.13.el8.ppc64le.rpm
crit-3.15-4.rhaos4.11.el8.ppc64le.rpm
criu-3.15-4.rhaos4.11.el8.ppc64le.rpm
criu-debuginfo-3.15-4.rhaos4.11.el8.ppc64le.rpm
criu-debugsource-3.15-4.rhaos4.11.el8.ppc64le.rpm
criu-devel-3.15-4.rhaos4.11.el8.ppc64le.rpm
criu-libs-3.15-4.rhaos4.11.el8.ppc64le.rpm
criu-libs-debuginfo-3.15-4.rhaos4.11.el8.ppc64le.rpm
fuse-overlayfs-1.10-2.rhaos4.13.el8.ppc64le.rpm
fuse-overlayfs-debuginfo-1.10-2.rhaos4.13.el8.ppc64le.rpm
fuse-overlayfs-debugsource-1.10-2.rhaos4.13.el8.ppc64le.rpm
grpc-1.18.0-4.el8ost.ppc64le.rpm
grpc-cli-1.18.0-4.el8ost.ppc64le.rpm
grpc-cli-debuginfo-1.18.0-4.el8ost.ppc64le.rpm
grpc-debuginfo-1.18.0-4.el8ost.ppc64le.rpm
grpc-debugsource-1.18.0-4.el8ost.ppc64le.rpm
grpc-devel-1.18.0-4.el8ost.ppc64le.rpm
grpc-plugins-1.18.0-4.el8ost.ppc64le.rpm
grpc-plugins-debuginfo-1.18.0-4.el8ost.ppc64le.rpm
haproxy-debugsource-2.2.24-3.rhaos4.13.el8.ppc64le.rpm
haproxy22-2.2.24-3.rhaos4.13.el8.ppc64le.rpm
haproxy22-debuginfo-2.2.24-3.rhaos4.13.el8.ppc64le.rpm
libslirp-4.4.0-2.rhaos4.11.el8.ppc64le.rpm
libslirp-debuginfo-4.4.0-2.rhaos4.11.el8.ppc64le.rpm
libslirp-debugsource-4.4.0-2.rhaos4.11.el8.ppc64le.rpm
libslirp-devel-4.4.0-2.rhaos4.11.el8.ppc64le.rpm
nmstate-2.2.9-6.rhaos4.13.el8.ppc64le.rpm
nmstate-debuginfo-2.2.9-6.rhaos4.13.el8.ppc64le.rpm
nmstate-debugsource-2.2.9-6.rhaos4.13.el8.ppc64le.rpm
nmstate-devel-2.2.9-6.rhaos4.13.el8.ppc64le.rpm
nmstate-libs-2.2.9-6.rhaos4.13.el8.ppc64le.rpm
nmstate-libs-debuginfo-2.2.9-6.rhaos4.13.el8.ppc64le.rpm
openshift-clients-4.13.0-202303241616.p0.g92b1a3d.assembly.stream.el8.ppc64le.rpm
openshift-hyperkube-4.13.0-202304211155.p0.gb404935.assembly.stream.el8.ppc64le.rpm
podman-4.4.1-3.rhaos4.13.el8.ppc64le.rpm
podman-catatonit-4.4.1-3.rhaos4.13.el8.ppc64le.rpm
podman-catatonit-debuginfo-4.4.1-3.rhaos4.13.el8.ppc64le.rpm
podman-debuginfo-4.4.1-3.rhaos4.13.el8.ppc64le.rpm
podman-debugsource-4.4.1-3.rhaos4.13.el8.ppc64le.rpm
podman-gvproxy-4.4.1-3.rhaos4.13.el8.ppc64le.rpm
podman-gvproxy-debuginfo-4.4.1-3.rhaos4.13.el8.ppc64le.rpm
podman-plugins-4.4.1-3.rhaos4.13.el8.ppc64le.rpm
podman-plugins-debuginfo-4.4.1-3.rhaos4.13.el8.ppc64le.rpm
podman-remote-4.4.1-3.rhaos4.13.el8.ppc64le.rpm
podman-remote-debuginfo-4.4.1-3.rhaos4.13.el8.ppc64le.rpm
podman-tests-4.4.1-3.rhaos4.13.el8.ppc64le.rpm
python-pyrsistent-debugsource-0.16.0-3.el8ost.ppc64le.rpm
python3-criu-3.15-4.rhaos4.11.el8.ppc64le.rpm
python3-grpcio-1.18.0-4.el8ost.ppc64le.rpm
python3-grpcio-debuginfo-1.18.0-4.el8ost.ppc64le.rpm
python3-pyrsistent-0.16.0-3.el8ost.ppc64le.rpm
python3-pyrsistent-debuginfo-0.16.0-3.el8ost.ppc64le.rpm
runc-1.1.6-3.rhaos4.13.el8.ppc64le.rpm
runc-debuginfo-1.1.6-3.rhaos4.13.el8.ppc64le.rpm
runc-debugsource-1.1.6-3.rhaos4.13.el8.ppc64le.rpm
tini-0.16.1-1.el8ar.ppc64le.rpm

s390x:
atomic-openshift-service-idler-4.13.0-202303172327.p0.ga0f9090.assembly.stream.el8.s390x.rpm
conmon-2.1.7-1.rhaos4.13.el8.s390x.rpm
conmon-debuginfo-2.1.7-1.rhaos4.13.el8.s390x.rpm
conmon-debugsource-2.1.7-1.rhaos4.13.el8.s390x.rpm
containernetworking-plugins-1.0.1-6.rhaos4.13.el8.s390x.rpm
containernetworking-plugins-debuginfo-1.0.1-6.rhaos4.13.el8.s390x.rpm
containernetworking-plugins-debugsource-1.0.1-6.rhaos4.13.el8.s390x.rpm
crit-3.15-4.rhaos4.11.el8.s390x.rpm
criu-3.15-4.rhaos4.11.el8.s390x.rpm
criu-debuginfo-3.15-4.rhaos4.11.el8.s390x.rpm
criu-debugsource-3.15-4.rhaos4.11.el8.s390x.rpm
criu-devel-3.15-4.rhaos4.11.el8.s390x.rpm
criu-libs-3.15-4.rhaos4.11.el8.s390x.rpm
criu-libs-debuginfo-3.15-4.rhaos4.11.el8.s390x.rpm
fuse-overlayfs-1.10-2.rhaos4.13.el8.s390x.rpm
fuse-overlayfs-debuginfo-1.10-2.rhaos4.13.el8.s390x.rpm
fuse-overlayfs-debugsource-1.10-2.rhaos4.13.el8.s390x.rpm
grpc-1.18.0-4.el8ost.s390x.rpm
grpc-cli-1.18.0-4.el8ost.s390x.rpm
grpc-cli-debuginfo-1.18.0-4.el8ost.s390x.rpm
grpc-debuginfo-1.18.0-4.el8ost.s390x.rpm
grpc-debugsource-1.18.0-4.el8ost.s390x.rpm
grpc-devel-1.18.0-4.el8ost.s390x.rpm
grpc-plugins-1.18.0-4.el8ost.s390x.rpm
grpc-plugins-debuginfo-1.18.0-4.el8ost.s390x.rpm
haproxy-debugsource-2.2.24-3.rhaos4.13.el8.s390x.rpm
haproxy22-2.2.24-3.rhaos4.13.el8.s390x.rpm
haproxy22-debuginfo-2.2.24-3.rhaos4.13.el8.s390x.rpm
libslirp-4.4.0-2.rhaos4.11.el8.s390x.rpm
libslirp-debuginfo-4.4.0-2.rhaos4.11.el8.s390x.rpm
libslirp-debugsource-4.4.0-2.rhaos4.11.el8.s390x.rpm
libslirp-devel-4.4.0-2.rhaos4.11.el8.s390x.rpm
nmstate-2.2.9-6.rhaos4.13.el8.s390x.rpm
nmstate-debuginfo-2.2.9-6.rhaos4.13.el8.s390x.rpm
nmstate-debugsource-2.2.9-6.rhaos4.13.el8.s390x.rpm
nmstate-devel-2.2.9-6.rhaos4.13.el8.s390x.rpm
nmstate-libs-2.2.9-6.rhaos4.13.el8.s390x.rpm
nmstate-libs-debuginfo-2.2.9-6.rhaos4.13.el8.s390x.rpm
openshift-clients-4.13.0-202303241616.p0.g92b1a3d.assembly.stream.el8.s390x.rpm
openshift-hyperkube-4.13.0-202304211155.p0.gb404935.assembly.stream.el8.s390x.rpm
podman-4.4.1-3.rhaos4.13.el8.s390x.rpm
podman-catatonit-4.4.1-3.rhaos4.13.el8.s390x.rpm
podman-catatonit-debuginfo-4.4.1-3.rhaos4.13.el8.s390x.rpm
podman-debuginfo-4.4.1-3.rhaos4.13.el8.s390x.rpm
podman-debugsource-4.4.1-3.rhaos4.13.el8.s390x.rpm
podman-gvproxy-4.4.1-3.rhaos4.13.el8.s390x.rpm
podman-gvproxy-debuginfo-4.4.1-3.rhaos4.13.el8.s390x.rpm
podman-plugins-4.4.1-3.rhaos4.13.el8.s390x.rpm
podman-plugins-debuginfo-4.4.1-3.rhaos4.13.el8.s390x.rpm
podman-remote-4.4.1-3.rhaos4.13.el8.s390x.rpm
podman-remote-debuginfo-4.4.1-3.rhaos4.13.el8.s390x.rpm
podman-tests-4.4.1-3.rhaos4.13.el8.s390x.rpm
python-pyrsistent-debugsource-0.16.0-3.el8ost.s390x.rpm
python3-criu-3.15-4.rhaos4.11.el8.s390x.rpm
python3-grpcio-1.18.0-4.el8ost.s390x.rpm
python3-grpcio-debuginfo-1.18.0-4.el8ost.s390x.rpm
python3-pyrsistent-0.16.0-3.el8ost.s390x.rpm
python3-pyrsistent-debuginfo-0.16.0-3.el8ost.s390x.rpm
runc-1.1.6-3.rhaos4.13.el8.s390x.rpm
runc-debuginfo-1.1.6-3.rhaos4.13.el8.s390x.rpm
runc-debugsource-1.1.6-3.rhaos4.13.el8.s390x.rpm
tini-0.16.1-1.el8ar.s390x.rpm

x86_64:
atomic-openshift-service-idler-4.13.0-202303172327.p0.ga0f9090.assembly.stream.el8.x86_64.rpm
conmon-2.1.7-1.rhaos4.13.el8.x86_64.rpm
conmon-debuginfo-2.1.7-1.rhaos4.13.el8.x86_64.rpm
conmon-debugsource-2.1.7-1.rhaos4.13.el8.x86_64.rpm
containernetworking-plugins-1.0.1-6.rhaos4.13.el8.x86_64.rpm
containernetworking-plugins-debuginfo-1.0.1-6.rhaos4.13.el8.x86_64.rpm
containernetworking-plugins-debugsource-1.0.1-6.rhaos4.13.el8.x86_64.rpm
crit-3.15-4.rhaos4.11.el8.x86_64.rpm
criu-3.15-4.rhaos4.11.el8.x86_64.rpm
criu-debuginfo-3.15-4.rhaos4.11.el8.x86_64.rpm
criu-debugsource-3.15-4.rhaos4.11.el8.x86_64.rpm
criu-devel-3.15-4.rhaos4.11.el8.x86_64.rpm
criu-libs-3.15-4.rhaos4.11.el8.x86_64.rpm
criu-libs-debuginfo-3.15-4.rhaos4.11.el8.x86_64.rpm
fuse-overlayfs-1.10-2.rhaos4.13.el8.x86_64.rpm
fuse-overlayfs-debuginfo-1.10-2.rhaos4.13.el8.x86_64.rpm
fuse-overlayfs-debugsource-1.10-2.rhaos4.13.el8.x86_64.rpm
grpc-1.18.0-4.el8ost.x86_64.rpm
grpc-cli-1.18.0-4.el8ost.x86_64.rpm
grpc-cli-debuginfo-1.18.0-4.el8ost.x86_64.rpm
grpc-debuginfo-1.18.0-4.el8ost.x86_64.rpm
grpc-debugsource-1.18.0-4.el8ost.x86_64.rpm
grpc-devel-1.18.0-4.el8ost.x86_64.rpm
grpc-plugins-1.18.0-4.el8ost.x86_64.rpm
grpc-plugins-debuginfo-1.18.0-4.el8ost.x86_64.rpm
haproxy-debugsource-2.2.24-3.rhaos4.13.el8.x86_64.rpm
haproxy22-2.2.24-3.rhaos4.13.el8.x86_64.rpm
haproxy22-debuginfo-2.2.24-3.rhaos4.13.el8.x86_64.rpm
libslirp-4.4.0-2.rhaos4.11.el8.x86_64.rpm
libslirp-debuginfo-4.4.0-2.rhaos4.11.el8.x86_64.rpm
libslirp-debugsource-4.4.0-2.rhaos4.11.el8.x86_64.rpm
libslirp-devel-4.4.0-2.rhaos4.11.el8.x86_64.rpm
nmstate-2.2.9-6.rhaos4.13.el8.x86_64.rpm
nmstate-debuginfo-2.2.9-6.rhaos4.13.el8.x86_64.rpm
nmstate-debugsource-2.2.9-6.rhaos4.13.el8.x86_64.rpm
nmstate-devel-2.2.9-6.rhaos4.13.el8.x86_64.rpm
nmstate-libs-2.2.9-6.rhaos4.13.el8.x86_64.rpm
nmstate-libs-debuginfo-2.2.9-6.rhaos4.13.el8.x86_64.rpm
openshift-clients-4.13.0-202303241616.p0.g92b1a3d.assembly.stream.el8.x86_64.rpm
openshift-clients-redistributable-4.13.0-202303241616.p0.g92b1a3d.assembly.stream.el8.x86_64.rpm
openshift-hyperkube-4.13.0-202304211155.p0.gb404935.assembly.stream.el8.x86_64.rpm
podman-4.4.1-3.rhaos4.13.el8.x86_64.rpm
podman-catatonit-4.4.1-3.rhaos4.13.el8.x86_64.rpm
podman-catatonit-debuginfo-4.4.1-3.rhaos4.13.el8.x86_64.rpm
podman-debuginfo-4.4.1-3.rhaos4.13.el8.x86_64.rpm
podman-debugsource-4.4.1-3.rhaos4.13.el8.x86_64.rpm
podman-gvproxy-4.4.1-3.rhaos4.13.el8.x86_64.rpm
podman-gvproxy-debuginfo-4.4.1-3.rhaos4.13.el8.x86_64.rpm
podman-plugins-4.4.1-3.rhaos4.13.el8.x86_64.rpm
podman-plugins-debuginfo-4.4.1-3.rhaos4.13.el8.x86_64.rpm
podman-remote-4.4.1-3.rhaos4.13.el8.x86_64.rpm
podman-remote-debuginfo-4.4.1-3.rhaos4.13.el8.x86_64.rpm
podman-tests-4.4.1-3.rhaos4.13.el8.x86_64.rpm
python-msgpack-debugsource-0.6.2-1.el8ost.x86_64.rpm
python-pyrsistent-debugsource-0.16.0-3.el8ost.x86_64.rpm
python3-criu-3.15-4.rhaos4.11.el8.x86_64.rpm
python3-grpcio-1.18.0-4.el8ost.x86_64.rpm
python3-grpcio-debuginfo-1.18.0-4.el8ost.x86_64.rpm
python3-msgpack-0.6.2-1.el8ost.x86_64.rpm
python3-msgpack-debuginfo-0.6.2-1.el8ost.x86_64.rpm
python3-pyrsistent-0.16.0-3.el8ost.x86_64.rpm
python3-pyrsistent-debuginfo-0.16.0-3.el8ost.x86_64.rpm
runc-1.1.6-3.rhaos4.13.el8.x86_64.rpm
runc-debuginfo-1.1.6-3.rhaos4.13.el8.x86_64.rpm
runc-debugsource-1.1.6-3.rhaos4.13.el8.x86_64.rpm
tini-0.16.1-1.el8ar.x86_64.rpm

Red Hat OpenShift Container Platform 4.13:

Source:
buildah-1.29.1-1.rhaos4.13.el9.src.rpm
conmon-2.1.7-1.rhaos4.13.el9.src.rpm
conmon-rs-0.5.1-5.rhaos4.13.git.el9.src.rpm
container-selinux-2.208.0-2.rhaos4.13.el9.src.rpm
containers-common-1-35.rhaos4.13.el9.src.rpm
coreos-installer-0.17.0-1.rhaos4.13.el9.src.rpm
cri-o-1.26.3-3.rhaos4.13.git641290e.el9.src.rpm
cri-tools-1.26.0-1.el9.src.rpm
crun-1.8.4-1.rhaos4.13.el9.src.rpm
kata-containers-3.0.2-5.el9.src.rpm
kernel-5.14.0-284.13.1.el9_2.src.rpm
kernel-rt-5.14.0-284.13.1.rt14.298.el9_2.src.rpm
openshift-4.13.0-202304211155.p0.gb404935.assembly.stream.el9.src.rpm
openshift-ansible-4.13.0-202304171417.p0.gb4280f6.assembly.stream.el9.src.rpm
openshift-clients-4.13.0-202303241616.p0.g92b1a3d.assembly.stream.el9.src.rpm
openvswitch3.0-3.0.0-28.el9fdp.src.rpm
openvswitch3.1-3.1.0-10.el9fdp.src.rpm
ovn22.12-22.12.0-25.el9fdp.src.rpm
ovn23.03-23.03.0-7.el9fdp.src.rpm
podman-4.4.1-3.rhaos4.13.el9.src.rpm
runc-1.1.6-3.rhaos4.13.el9.src.rpm
skopeo-1.10.0-1.rhaos4.13.el9.src.rpm
systemd-252-14.el9.rhaos4.13.src.rpm
toolbox-0.1.2-1.rhaos4.13.el9.src.rpm

aarch64:
bpftool-7.0.0-284.13.1.el9_2.aarch64.rpm
bpftool-debuginfo-7.0.0-284.13.1.el9_2.aarch64.rpm
buildah-1.29.1-1.rhaos4.13.el9.aarch64.rpm
buildah-debuginfo-1.29.1-1.rhaos4.13.el9.aarch64.rpm
buildah-debugsource-1.29.1-1.rhaos4.13.el9.aarch64.rpm
buildah-tests-1.29.1-1.rhaos4.13.el9.aarch64.rpm
buildah-tests-debuginfo-1.29.1-1.rhaos4.13.el9.aarch64.rpm
conmon-2.1.7-1.rhaos4.13.el9.aarch64.rpm
conmon-debuginfo-2.1.7-1.rhaos4.13.el9.aarch64.rpm
conmon-debugsource-2.1.7-1.rhaos4.13.el9.aarch64.rpm
conmon-rs-0.5.1-5.rhaos4.13.git.el9.aarch64.rpm
containers-common-1-35.rhaos4.13.el9.aarch64.rpm
coreos-installer-0.17.0-1.rhaos4.13.el9.aarch64.rpm
coreos-installer-bootinfra-0.17.0-1.rhaos4.13.el9.aarch64.rpm
coreos-installer-bootinfra-debuginfo-0.17.0-1.rhaos4.13.el9.aarch64.rpm
coreos-installer-debuginfo-0.17.0-1.rhaos4.13.el9.aarch64.rpm
coreos-installer-debugsource-0.17.0-1.rhaos4.13.el9.aarch64.rpm
coreos-installer-dracut-0.17.0-1.rhaos4.13.el9.aarch64.rpm
cri-o-1.26.3-3.rhaos4.13.git641290e.el9.aarch64.rpm
cri-o-debuginfo-1.26.3-3.rhaos4.13.git641290e.el9.aarch64.rpm
cri-o-debugsource-1.26.3-3.rhaos4.13.git641290e.el9.aarch64.rpm
cri-tools-1.26.0-1.el9.aarch64.rpm
cri-tools-debuginfo-1.26.0-1.el9.aarch64.rpm
cri-tools-debugsource-1.26.0-1.el9.aarch64.rpm
crun-1.8.4-1.rhaos4.13.el9.aarch64.rpm
crun-debuginfo-1.8.4-1.rhaos4.13.el9.aarch64.rpm
crun-debugsource-1.8.4-1.rhaos4.13.el9.aarch64.rpm
kata-containers-3.0.2-5.el9.aarch64.rpm
kernel-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-64k-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-64k-core-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-64k-debug-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-64k-debug-core-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-64k-debug-debuginfo-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-64k-debug-devel-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-64k-debug-devel-matched-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-64k-debug-modules-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-64k-debug-modules-core-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-64k-debug-modules-extra-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-64k-debug-modules-internal-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-64k-debug-modules-partner-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-64k-debuginfo-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-64k-devel-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-64k-devel-matched-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-64k-modules-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-64k-modules-core-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-64k-modules-extra-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-64k-modules-internal-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-64k-modules-partner-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-core-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-cross-headers-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-debug-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-debug-core-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-debug-debuginfo-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-debug-devel-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-debug-devel-matched-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-debug-modules-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-debug-modules-core-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-debug-modules-extra-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-debug-modules-internal-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-debug-modules-partner-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-debuginfo-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-debuginfo-common-aarch64-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-devel-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-devel-matched-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-headers-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-modules-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-modules-core-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-modules-extra-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-modules-internal-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-modules-partner-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-selftests-internal-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-tools-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-tools-debuginfo-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-tools-libs-5.14.0-284.13.1.el9_2.aarch64.rpm
kernel-tools-libs-devel-5.14.0-284.13.1.el9_2.aarch64.rpm
openshift-clients-4.13.0-202303241616.p0.g92b1a3d.assembly.stream.el9.aarch64.rpm
openshift-hyperkube-4.13.0-202304211155.p0.gb404935.assembly.stream.el9.aarch64.rpm
openvswitch3.0-3.0.0-28.el9fdp.aarch64.rpm
openvswitch3.0-debuginfo-3.0.0-28.el9fdp.aarch64.rpm
openvswitch3.0-debugsource-3.0.0-28.el9fdp.aarch64.rpm
openvswitch3.0-devel-3.0.0-28.el9fdp.aarch64.rpm
openvswitch3.0-ipsec-3.0.0-28.el9fdp.aarch64.rpm
openvswitch3.1-3.1.0-10.el9fdp.aarch64.rpm
openvswitch3.1-debuginfo-3.1.0-10.el9fdp.aarch64.rpm
openvswitch3.1-debugsource-3.1.0-10.el9fdp.aarch64.rpm
openvswitch3.1-devel-3.1.0-10.el9fdp.aarch64.rpm
openvswitch3.1-ipsec-3.1.0-10.el9fdp.aarch64.rpm
ovn22.12-22.12.0-25.el9fdp.aarch64.rpm
ovn22.12-central-22.12.0-25.el9fdp.aarch64.rpm
ovn22.12-central-debuginfo-22.12.0-25.el9fdp.aarch64.rpm
ovn22.12-debuginfo-22.12.0-25.el9fdp.aarch64.rpm
ovn22.12-debugsource-22.12.0-25.el9fdp.aarch64.rpm
ovn22.12-host-22.12.0-25.el9fdp.aarch64.rpm
ovn22.12-host-debuginfo-22.12.0-25.el9fdp.aarch64.rpm
ovn22.12-vtep-22.12.0-25.el9fdp.aarch64.rpm
ovn22.12-vtep-debuginfo-22.12.0-25.el9fdp.aarch64.rpm
ovn23.03-23.03.0-7.el9fdp.aarch64.rpm
ovn23.03-central-23.03.0-7.el9fdp.aarch64.rpm
ovn23.03-central-debuginfo-23.03.0-7.el9fdp.aarch64.rpm
ovn23.03-debuginfo-23.03.0-7.el9fdp.aarch64.rpm
ovn23.03-debugsource-23.03.0-7.el9fdp.aarch64.rpm
ovn23.03-host-23.03.0-7.el9fdp.aarch64.rpm
ovn23.03-host-debuginfo-23.03.0-7.el9fdp.aarch64.rpm
ovn23.03-vtep-23.03.0-7.el9fdp.aarch64.rpm
ovn23.03-vtep-debuginfo-23.03.0-7.el9fdp.aarch64.rpm
perf-5.14.0-284.13.1.el9_2.aarch64.rpm
perf-debuginfo-5.14.0-284.13.1.el9_2.aarch64.rpm
podman-4.4.1-3.rhaos4.13.el9.aarch64.rpm
podman-debuginfo-4.4.1-3.rhaos4.13.el9.aarch64.rpm
podman-debugsource-4.4.1-3.rhaos4.13.el9.aarch64.rpm
podman-gvproxy-4.4.1-3.rhaos4.13.el9.aarch64.rpm
podman-gvproxy-debuginfo-4.4.1-3.rhaos4.13.el9.aarch64.rpm
podman-plugins-4.4.1-3.rhaos4.13.el9.aarch64.rpm
podman-plugins-debuginfo-4.4.1-3.rhaos4.13.el9.aarch64.rpm
podman-remote-4.4.1-3.rhaos4.13.el9.aarch64.rpm
podman-remote-debuginfo-4.4.1-3.rhaos4.13.el9.aarch64.rpm
podman-tests-4.4.1-3.rhaos4.13.el9.aarch64.rpm
python3-openvswitch3.0-3.0.0-28.el9fdp.aarch64.rpm
python3-openvswitch3.0-debuginfo-3.0.0-28.el9fdp.aarch64.rpm
python3-openvswitch3.1-3.1.0-10.el9fdp.aarch64.rpm
python3-openvswitch3.1-debuginfo-3.1.0-10.el9fdp.aarch64.rpm
python3-perf-5.14.0-284.13.1.el9_2.aarch64.rpm
python3-perf-debuginfo-5.14.0-284.13.1.el9_2.aarch64.rpm
rtla-5.14.0-284.13.1.el9_2.aarch64.rpm
runc-1.1.6-3.rhaos4.13.el9.aarch64.rpm
runc-debuginfo-1.1.6-3.rhaos4.13.el9.aarch64.rpm
runc-debugsource-1.1.6-3.rhaos4.13.el9.aarch64.rpm
skopeo-1.10.0-1.rhaos4.13.el9.aarch64.rpm
skopeo-debuginfo-1.10.0-1.rhaos4.13.el9.aarch64.rpm
skopeo-debugsource-1.10.0-1.rhaos4.13.el9.aarch64.rpm
skopeo-tests-1.10.0-1.rhaos4.13.el9.aarch64.rpm
systemd-252-14.el9.rhaos4.13.aarch64.rpm
systemd-boot-unsigned-252-14.el9.rhaos4.13.aarch64.rpm
systemd-boot-unsigned-debuginfo-252-14.el9.rhaos4.13.aarch64.rpm
systemd-container-252-14.el9.rhaos4.13.aarch64.rpm
systemd-container-debuginfo-252-14.el9.rhaos4.13.aarch64.rpm
systemd-debuginfo-252-14.el9.rhaos4.13.aarch64.rpm
systemd-debugsource-252-14.el9.rhaos4.13.aarch64.rpm
systemd-devel-252-14.el9.rhaos4.13.aarch64.rpm
systemd-journal-remote-252-14.el9.rhaos4.13.aarch64.rpm
systemd-journal-remote-debuginfo-252-14.el9.rhaos4.13.aarch64.rpm
systemd-libs-252-14.el9.rhaos4.13.aarch64.rpm
systemd-libs-debuginfo-252-14.el9.rhaos4.13.aarch64.rpm
systemd-oomd-252-14.el9.rhaos4.13.aarch64.rpm
systemd-oomd-debuginfo-252-14.el9.rhaos4.13.aarch64.rpm
systemd-pam-252-14.el9.rhaos4.13.aarch64.rpm
systemd-pam-debuginfo-252-14.el9.rhaos4.13.aarch64.rpm
systemd-resolved-252-14.el9.rhaos4.13.aarch64.rpm
systemd-resolved-debuginfo-252-14.el9.rhaos4.13.aarch64.rpm
systemd-standalone-sysusers-252-14.el9.rhaos4.13.aarch64.rpm
systemd-standalone-sysusers-debuginfo-252-14.el9.rhaos4.13.aarch64.rpm
systemd-standalone-tmpfiles-252-14.el9.rhaos4.13.aarch64.rpm
systemd-standalone-tmpfiles-debuginfo-252-14.el9.rhaos4.13.aarch64.rpm
systemd-udev-252-14.el9.rhaos4.13.aarch64.rpm
systemd-udev-debuginfo-252-14.el9.rhaos4.13.aarch64.rpm

noarch:
container-selinux-2.208.0-2.rhaos4.13.el9.noarch.rpm
kernel-abi-stablelists-5.14.0-284.13.1.el9_2.noarch.rpm
kernel-doc-5.14.0-284.13.1.el9_2.noarch.rpm
openshift-ansible-4.13.0-202304171417.p0.gb4280f6.assembly.stream.el9.noarch.rpm
openshift-ansible-test-4.13.0-202304171417.p0.gb4280f6.assembly.stream.el9.noarch.rpm
openvswitch3.0-test-3.0.0-28.el9fdp.noarch.rpm
openvswitch3.1-test-3.1.0-10.el9fdp.noarch.rpm
podman-docker-4.4.1-3.rhaos4.13.el9.noarch.rpm
systemd-rpm-macros-252-14.el9.rhaos4.13.noarch.rpm
toolbox-0.1.2-1.rhaos4.13.el9.noarch.rpm

ppc64le:
bpftool-7.0.0-284.13.1.el9_2.ppc64le.rpm
bpftool-debuginfo-7.0.0-284.13.1.el9_2.ppc64le.rpm
buildah-1.29.1-1.rhaos4.13.el9.ppc64le.rpm
buildah-debuginfo-1.29.1-1.rhaos4.13.el9.ppc64le.rpm
buildah-debugsource-1.29.1-1.rhaos4.13.el9.ppc64le.rpm
buildah-tests-1.29.1-1.rhaos4.13.el9.ppc64le.rpm
buildah-tests-debuginfo-1.29.1-1.rhaos4.13.el9.ppc64le.rpm
conmon-2.1.7-1.rhaos4.13.el9.ppc64le.rpm
conmon-debuginfo-2.1.7-1.rhaos4.13.el9.ppc64le.rpm
conmon-debugsource-2.1.7-1.rhaos4.13.el9.ppc64le.rpm
conmon-rs-0.5.1-5.rhaos4.13.git.el9.ppc64le.rpm
containers-common-1-35.rhaos4.13.el9.ppc64le.rpm
coreos-installer-0.17.0-1.rhaos4.13.el9.ppc64le.rpm
coreos-installer-bootinfra-0.17.0-1.rhaos4.13.el9.ppc64le.rpm
coreos-installer-bootinfra-debuginfo-0.17.0-1.rhaos4.13.el9.ppc64le.rpm
coreos-installer-debuginfo-0.17.0-1.rhaos4.13.el9.ppc64le.rpm
coreos-installer-debugsource-0.17.0-1.rhaos4.13.el9.ppc64le.rpm
coreos-installer-dracut-0.17.0-1.rhaos4.13.el9.ppc64le.rpm
cri-o-1.26.3-3.rhaos4.13.git641290e.el9.ppc64le.rpm
cri-o-debuginfo-1.26.3-3.rhaos4.13.git641290e.el9.ppc64le.rpm
cri-o-debugsource-1.26.3-3.rhaos4.13.git641290e.el9.ppc64le.rpm
cri-tools-1.26.0-1.el9.ppc64le.rpm
cri-tools-debuginfo-1.26.0-1.el9.ppc64le.rpm
cri-tools-debugsource-1.26.0-1.el9.ppc64le.rpm
crun-1.8.4-1.rhaos4.13.el9.ppc64le.rpm
crun-debuginfo-1.8.4-1.rhaos4.13.el9.ppc64le.rpm
crun-debugsource-1.8.4-1.rhaos4.13.el9.ppc64le.rpm
kata-containers-3.0.2-5.el9.ppc64le.rpm
kernel-5.14.0-284.13.1.el9_2.ppc64le.rpm
kernel-core-5.14.0-284.13.1.el9_2.ppc64le.rpm
kernel-cross-headers-5.14.0-284.13.1.el9_2.ppc64le.rpm
kernel-debug-5.14.0-284.13.1.el9_2.ppc64le.rpm
kernel-debug-core-5.14.0-284.13.1.el9_2.ppc64le.rpm
kernel-debug-debuginfo-5.14.0-284.13.1.el9_2.ppc64le.rpm
kernel-debug-devel-5.14.0-284.13.1.el9_2.ppc64le.rpm
kernel-debug-devel-matched-5.14.0-284.13.1.el9_2.ppc64le.rpm
kernel-debug-modules-5.14.0-284.13.1.el9_2.ppc64le.rpm
kernel-debug-modules-core-5.14.0-284.13.1.el9_2.ppc64le.rpm
kernel-debug-modules-extra-5.14.0-284.13.1.el9_2.ppc64le.rpm
kernel-debug-modules-internal-5.14.0-284.13.1.el9_2.ppc64le.rpm
kernel-debug-modules-partner-5.14.0-284.13.1.el9_2.ppc64le.rpm
kernel-debuginfo-5.14.0-284.13.1.el9_2.ppc64le.rpm
kernel-debuginfo-common-ppc64le-5.14.0-284.13.1.el9_2.ppc64le.rpm
kernel-devel-5.14.0-284.13.1.el9_2.ppc64le.rpm
kernel-devel-matched-5.14.0-284.13.1.el9_2.ppc64le.rpm
kernel-headers-5.14.0-284.13.1.el9_2.ppc64le.rpm
kernel-ipaclones-internal-5.14.0-284.13.1.el9_2.ppc64le.rpm
kernel-modules-5.14.0-284.13.1.el9_2.ppc64le.rpm
kernel-modules-core-5.14.0-284.13.1.el9_2.ppc64le.rpm
kernel-modules-extra-5.14.0-284.13.1.el9_2.ppc64le.rpm
kernel-modules-internal-5.14.0-284.13.1.el9_2.ppc64le.rpm
kernel-modules-partner-5.14.0-284.13.1.el9_2.ppc64le.rpm
kernel-selftests-internal-5.14.0-284.13.1.el9_2.ppc64le.rpm
kernel-tools-5.14.0-284.13.1.el9_2.ppc64le.rpm
kernel-tools-debuginfo-5.14.0-284.13.1.el9_2.ppc64le.rpm
kernel-tools-libs-5.14.0-284.13.1.el9_2.ppc64le.rpm
kernel-tools-libs-devel-5.14.0-284.13.1.el9_2.ppc64le.rpm
openshift-clients-4.13.0-202303241616.p0.g92b1a3d.assembly.stream.el9.ppc64le.rpm
openshift-hyperkube-4.13.0-202304211155.p0.gb404935.assembly.stream.el9.ppc64le.rpm
openvswitch3.0-3.0.0-28.el9fdp.ppc64le.rpm
openvswitch3.0-debuginfo-3.0.0-28.el9fdp.ppc64le.rpm
openvswitch3.0-debugsource-3.0.0-28.el9fdp.ppc64le.rpm
openvswitch3.0-devel-3.0.0-28.el9fdp.ppc64le.rpm
openvswitch3.0-ipsec-3.0.0-28.el9fdp.ppc64le.rpm
openvswitch3.1-3.1.0-10.el9fdp.ppc64le.rpm
openvswitch3.1-debuginfo-3.1.0-10.el9fdp.ppc64le.rpm
openvswitch3.1-debugsource-3.1.0-10.el9fdp.ppc64le.rpm
openvswitch3.1-devel-3.1.0-10.el9fdp.ppc64le.rpm
openvswitch3.1-ipsec-3.1.0-10.el9fdp.ppc64le.rpm
ovn22.12-22.12.0-25.el9fdp.ppc64le.rpm
ovn22.12-central-22.12.0-25.el9fdp.ppc64le.rpm
ovn22.12-central-debuginfo-22.12.0-25.el9fdp.ppc64le.rpm
ovn22.12-debuginfo-22.12.0-25.el9fdp.ppc64le.rpm
ovn22.12-debugsource-22.12.0-25.el9fdp.ppc64le.rpm
ovn22.12-host-22.12.0-25.el9fdp.ppc64le.rpm
ovn22.12-host-debuginfo-22.12.0-25.el9fdp.ppc64le.rpm
ovn22.12-vtep-22.12.0-25.el9fdp.ppc64le.rpm
ovn22.12-vtep-debuginfo-22.12.0-25.el9fdp.ppc64le.rpm
ovn23.03-23.03.0-7.el9fdp.ppc64le.rpm
ovn23.03-central-23.03.0-7.el9fdp.ppc64le.rpm
ovn23.03-central-debuginfo-23.03.0-7.el9fdp.ppc64le.rpm
ovn23.03-debuginfo-23.03.0-7.el9fdp.ppc64le.rpm
ovn23.03-debugsource-23.03.0-7.el9fdp.ppc64le.rpm
ovn23.03-host-23.03.0-7.el9fdp.ppc64le.rpm
ovn23.03-host-debuginfo-23.03.0-7.el9fdp.ppc64le.rpm
ovn23.03-vtep-23.03.0-7.el9fdp.ppc64le.rpm
ovn23.03-vtep-debuginfo-23.03.0-7.el9fdp.ppc64le.rpm
perf-5.14.0-284.13.1.el9_2.ppc64le.rpm
perf-debuginfo-5.14.0-284.13.1.el9_2.ppc64le.rpm
podman-4.4.1-3.rhaos4.13.el9.ppc64le.rpm
podman-debuginfo-4.4.1-3.rhaos4.13.el9.ppc64le.rpm
podman-debugsource-4.4.1-3.rhaos4.13.el9.ppc64le.rpm
podman-gvproxy-4.4.1-3.rhaos4.13.el9.ppc64le.rpm
podman-gvproxy-debuginfo-4.4.1-3.rhaos4.13.el9.ppc64le.rpm
podman-plugins-4.4.1-3.rhaos4.13.el9.ppc64le.rpm
podman-plugins-debuginfo-4.4.1-3.rhaos4.13.el9.ppc64le.rpm
podman-remote-4.4.1-3.rhaos4.13.el9.ppc64le.rpm
podman-remote-debuginfo-4.4.1-3.rhaos4.13.el9.ppc64le.rpm
podman-tests-4.4.1-3.rhaos4.13.el9.ppc64le.rpm
python3-openvswitch3.0-3.0.0-28.el9fdp.ppc64le.rpm
python3-openvswitch3.0-debuginfo-3.0.0-28.el9fdp.ppc64le.rpm
python3-openvswitch3.1-3.1.0-10.el9fdp.ppc64le.rpm
python3-openvswitch3.1-debuginfo-3.1.0-10.el9fdp.ppc64le.rpm
python3-perf-5.14.0-284.13.1.el9_2.ppc64le.rpm
python3-perf-debuginfo-5.14.0-284.13.1.el9_2.ppc64le.rpm
rtla-5.14.0-284.13.1.el9_2.ppc64le.rpm
runc-1.1.6-3.rhaos4.13.el9.ppc64le.rpm
runc-debuginfo-1.1.6-3.rhaos4.13.el9.ppc64le.rpm
runc-debugsource-1.1.6-3.rhaos4.13.el9.ppc64le.rpm
skopeo-1.10.0-1.rhaos4.13.el9.ppc64le.rpm
skopeo-debuginfo-1.10.0-1.rhaos4.13.el9.ppc64le.rpm
skopeo-debugsource-1.10.0-1.rhaos4.13.el9.ppc64le.rpm
skopeo-tests-1.10.0-1.rhaos4.13.el9.ppc64le.rpm
systemd-252-14.el9.rhaos4.13.ppc64le.rpm
systemd-container-252-14.el9.rhaos4.13.ppc64le.rpm
systemd-container-debuginfo-252-14.el9.rhaos4.13.ppc64le.rpm
systemd-debuginfo-252-14.el9.rhaos4.13.ppc64le.rpm
systemd-debugsource-252-14.el9.rhaos4.13.ppc64le.rpm
systemd-devel-252-14.el9.rhaos4.13.ppc64le.rpm
systemd-journal-remote-252-14.el9.rhaos4.13.ppc64le.rpm
systemd-journal-remote-debuginfo-252-14.el9.rhaos4.13.ppc64le.rpm
systemd-libs-252-14.el9.rhaos4.13.ppc64le.rpm
systemd-libs-debuginfo-252-14.el9.rhaos4.13.ppc64le.rpm
systemd-oomd-252-14.el9.rhaos4.13.ppc64le.rpm
systemd-oomd-debuginfo-252-14.el9.rhaos4.13.ppc64le.rpm
systemd-pam-252-14.el9.rhaos4.13.ppc64le.rpm
systemd-pam-debuginfo-252-14.el9.rhaos4.13.ppc64le.rpm
systemd-resolved-252-14.el9.rhaos4.13.ppc64le.rpm
systemd-resolved-debuginfo-252-14.el9.rhaos4.13.ppc64le.rpm
systemd-standalone-sysusers-252-14.el9.rhaos4.13.ppc64le.rpm
systemd-standalone-sysusers-debuginfo-252-14.el9.rhaos4.13.ppc64le.rpm
systemd-standalone-tmpfiles-252-14.el9.rhaos4.13.ppc64le.rpm
systemd-standalone-tmpfiles-debuginfo-252-14.el9.rhaos4.13.ppc64le.rpm
systemd-udev-252-14.el9.rhaos4.13.ppc64le.rpm
systemd-udev-debuginfo-252-14.el9.rhaos4.13.ppc64le.rpm

s390x:
bpftool-7.0.0-284.13.1.el9_2.s390x.rpm
bpftool-debuginfo-7.0.0-284.13.1.el9_2.s390x.rpm
buildah-1.29.1-1.rhaos4.13.el9.s390x.rpm
buildah-debuginfo-1.29.1-1.rhaos4.13.el9.s390x.rpm
buildah-debugsource-1.29.1-1.rhaos4.13.el9.s390x.rpm
buildah-tests-1.29.1-1.rhaos4.13.el9.s390x.rpm
buildah-tests-debuginfo-1.29.1-1.rhaos4.13.el9.s390x.rpm
conmon-2.1.7-1.rhaos4.13.el9.s390x.rpm
conmon-debuginfo-2.1.7-1.rhaos4.13.el9.s390x.rpm
conmon-debugsource-2.1.7-1.rhaos4.13.el9.s390x.rpm
conmon-rs-0.5.1-5.rhaos4.13.git.el9.s390x.rpm
containers-common-1-35.rhaos4.13.el9.s390x.rpm
coreos-installer-0.17.0-1.rhaos4.13.el9.s390x.rpm
coreos-installer-bootinfra-0.17.0-1.rhaos4.13.el9.s390x.rpm
coreos-installer-bootinfra-debuginfo-0.17.0-1.rhaos4.13.el9.s390x.rpm
coreos-installer-debuginfo-0.17.0-1.rhaos4.13.el9.s390x.rpm
coreos-installer-debugsource-0.17.0-1.rhaos4.13.el9.s390x.rpm
coreos-installer-dracut-0.17.0-1.rhaos4.13.el9.s390x.rpm
cri-o-1.26.3-3.rhaos4.13.git641290e.el9.s390x.rpm
cri-o-debuginfo-1.26.3-3.rhaos4.13.git641290e.el9.s390x.rpm
cri-o-debugsource-1.26.3-3.rhaos4.13.git641290e.el9.s390x.rpm
cri-tools-1.26.0-1.el9.s390x.rpm
cri-tools-debuginfo-1.26.0-1.el9.s390x.rpm
cri-tools-debugsource-1.26.0-1.el9.s390x.rpm
crun-1.8.4-1.rhaos4.13.el9.s390x.rpm
crun-debuginfo-1.8.4-1.rhaos4.13.el9.s390x.rpm
crun-debugsource-1.8.4-1.rhaos4.13.el9.s390x.rpm
kata-containers-3.0.2-5.el9.s390x.rpm
kernel-5.14.0-284.13.1.el9_2.s390x.rpm
kernel-core-5.14.0-284.13.1.el9_2.s390x.rpm
kernel-cross-headers-5.14.0-284.13.1.el9_2.s390x.rpm
kernel-debug-5.14.0-284.13.1.el9_2.s390x.rpm
kernel-debug-core-5.14.0-284.13.1.el9_2.s390x.rpm
kernel-debug-debuginfo-5.14.0-284.13.1.el9_2.s390x.rpm
kernel-debug-devel-5.14.0-284.13.1.el9_2.s390x.rpm
kernel-debug-devel-matched-5.14.0-284.13.1.el9_2.s390x.rpm
kernel-debug-modules-5.14.0-284.13.1.el9_2.s390x.rpm
kernel-debug-modules-core-5.14.0-284.13.1.el9_2.s390x.rpm
kernel-debug-modules-extra-5.14.0-284.13.1.el9_2.s390x.rpm
kernel-debug-modules-internal-5.14.0-284.13.1.el9_2.s390x.rpm
kernel-debug-modules-partner-5.14.0-284.13.1.el9_2.s390x.rpm
kernel-debuginfo-5.14.0-284.13.1.el9_2.s390x.rpm
kernel-debuginfo-common-s390x-5.14.0-284.13.1.el9_2.s390x.rpm
kernel-devel-5.14.0-284.13.1.el9_2.s390x.rpm
kernel-devel-matched-5.14.0-284.13.1.el9_2.s390x.rpm
kernel-headers-5.14.0-284.13.1.el9_2.s390x.rpm
kernel-modules-5.14.0-284.13.1.el9_2.s390x.rpm
kernel-modules-core-5.14.0-284.13.1.el9_2.s390x.rpm
kernel-modules-extra-5.14.0-284.13.1.el9_2.s390x.rpm
kernel-modules-internal-5.14.0-284.13.1.el9_2.s390x.rpm
kernel-modules-partner-5.14.0-284.13.1.el9_2.s390x.rpm
kernel-selftests-internal-5.14.0-284.13.1.el9_2.s390x.rpm
kernel-tools-5.14.0-284.13.1.el9_2.s390x.rpm
kernel-tools-debuginfo-5.14.0-284.13.1.el9_2.s390x.rpm
kernel-zfcpdump-5.14.0-284.13.1.el9_2.s390x.rpm
kernel-zfcpdump-core-5.14.0-284.13.1.el9_2.s390x.rpm
kernel-zfcpdump-debuginfo-5.14.0-284.13.1.el9_2.s390x.rpm
kernel-zfcpdump-devel-5.14.0-284.13.1.el9_2.s390x.rpm
kernel-zfcpdump-devel-matched-5.14.0-284.13.1.el9_2.s390x.rpm
kernel-zfcpdump-modules-5.14.0-284.13.1.el9_2.s390x.rpm
kernel-zfcpdump-modules-core-5.14.0-284.13.1.el9_2.s390x.rpm
kernel-zfcpdump-modules-extra-5.14.0-284.13.1.el9_2.s390x.rpm
kernel-zfcpdump-modules-internal-5.14.0-284.13.1.el9_2.s390x.rpm
kernel-zfcpdump-modules-partner-5.14.0-284.13.1.el9_2.s390x.rpm
openshift-clients-4.13.0-202303241616.p0.g92b1a3d.assembly.stream.el9.s390x.rpm
openshift-hyperkube-4.13.0-202304211155.p0.gb404935.assembly.stream.el9.s390x.rpm
openvswitch3.0-3.0.0-28.el9fdp.s390x.rpm
openvswitch3.0-debuginfo-3.0.0-28.el9fdp.s390x.rpm
openvswitch3.0-debugsource-3.0.0-28.el9fdp.s390x.rpm
openvswitch3.0-devel-3.0.0-28.el9fdp.s390x.rpm
openvswitch3.0-ipsec-3.0.0-28.el9fdp.s390x.rpm
openvswitch3.1-3.1.0-10.el9fdp.s390x.rpm
openvswitch3.1-debuginfo-3.1.0-10.el9fdp.s390x.rpm
openvswitch3.1-debugsource-3.1.0-10.el9fdp.s390x.rpm
openvswitch3.1-devel-3.1.0-10.el9fdp.s390x.rpm
openvswitch3.1-ipsec-3.1.0-10.el9fdp.s390x.rpm
ovn22.12-22.12.0-25.el9fdp.s390x.rpm
ovn22.12-central-22.12.0-25.el9fdp.s390x.rpm
ovn22.12-central-debuginfo-22.12.0-25.el9fdp.s390x.rpm
ovn22.12-debuginfo-22.12.0-25.el9fdp.s390x.rpm
ovn22.12-debugsource-22.12.0-25.el9fdp.s390x.rpm
ovn22.12-host-22.12.0-25.el9fdp.s390x.rpm
ovn22.12-host-debuginfo-22.12.0-25.el9fdp.s390x.rpm
ovn22.12-vtep-22.12.0-25.el9fdp.s390x.rpm
ovn22.12-vtep-debuginfo-22.12.0-25.el9fdp.s390x.rpm
ovn23.03-23.03.0-7.el9fdp.s390x.rpm
ovn23.03-central-23.03.0-7.el9fdp.s390x.rpm
ovn23.03-central-debuginfo-23.03.0-7.el9fdp.s390x.rpm
ovn23.03-debuginfo-23.03.0-7.el9fdp.s390x.rpm
ovn23.03-debugsource-23.03.0-7.el9fdp.s390x.rpm
ovn23.03-host-23.03.0-7.el9fdp.s390x.rpm
ovn23.03-host-debuginfo-23.03.0-7.el9fdp.s390x.rpm
ovn23.03-vtep-23.03.0-7.el9fdp.s390x.rpm
ovn23.03-vtep-debuginfo-23.03.0-7.el9fdp.s390x.rpm
perf-5.14.0-284.13.1.el9_2.s390x.rpm
perf-debuginfo-5.14.0-284.13.1.el9_2.s390x.rpm
podman-4.4.1-3.rhaos4.13.el9.s390x.rpm
podman-debuginfo-4.4.1-3.rhaos4.13.el9.s390x.rpm
podman-debugsource-4.4.1-3.rhaos4.13.el9.s390x.rpm
podman-gvproxy-4.4.1-3.rhaos4.13.el9.s390x.rpm
podman-gvproxy-debuginfo-4.4.1-3.rhaos4.13.el9.s390x.rpm
podman-plugins-4.4.1-3.rhaos4.13.el9.s390x.rpm
podman-plugins-debuginfo-4.4.1-3.rhaos4.13.el9.s390x.rpm
podman-remote-4.4.1-3.rhaos4.13.el9.s390x.rpm
podman-remote-debuginfo-4.4.1-3.rhaos4.13.el9.s390x.rpm
podman-tests-4.4.1-3.rhaos4.13.el9.s390x.rpm
python3-openvswitch3.0-3.0.0-28.el9fdp.s390x.rpm
python3-openvswitch3.0-debuginfo-3.0.0-28.el9fdp.s390x.rpm
python3-openvswitch3.1-3.1.0-10.el9fdp.s390x.rpm
python3-openvswitch3.1-debuginfo-3.1.0-10.el9fdp.s390x.rpm
python3-perf-5.14.0-284.13.1.el9_2.s390x.rpm
python3-perf-debuginfo-5.14.0-284.13.1.el9_2.s390x.rpm
rtla-5.14.0-284.13.1.el9_2.s390x.rpm
runc-1.1.6-3.rhaos4.13.el9.s390x.rpm
runc-debuginfo-1.1.6-3.rhaos4.13.el9.s390x.rpm
runc-debugsource-1.1.6-3.rhaos4.13.el9.s390x.rpm
skopeo-1.10.0-1.rhaos4.13.el9.s390x.rpm
skopeo-debuginfo-1.10.0-1.rhaos4.13.el9.s390x.rpm
skopeo-debugsource-1.10.0-1.rhaos4.13.el9.s390x.rpm
skopeo-tests-1.10.0-1.rhaos4.13.el9.s390x.rpm
systemd-252-14.el9.rhaos4.13.s390x.rpm
systemd-container-252-14.el9.rhaos4.13.s390x.rpm
systemd-container-debuginfo-252-14.el9.rhaos4.13.s390x.rpm
systemd-debuginfo-252-14.el9.rhaos4.13.s390x.rpm
systemd-debugsource-252-14.el9.rhaos4.13.s390x.rpm
systemd-devel-252-14.el9.rhaos4.13.s390x.rpm
systemd-journal-remote-252-14.el9.rhaos4.13.s390x.rpm
systemd-journal-remote-debuginfo-252-14.el9.rhaos4.13.s390x.rpm
systemd-libs-252-14.el9.rhaos4.13.s390x.rpm
systemd-libs-debuginfo-252-14.el9.rhaos4.13.s390x.rpm
systemd-oomd-252-14.el9.rhaos4.13.s390x.rpm
systemd-oomd-debuginfo-252-14.el9.rhaos4.13.s390x.rpm
systemd-pam-252-14.el9.rhaos4.13.s390x.rpm
systemd-pam-debuginfo-252-14.el9.rhaos4.13.s390x.rpm
systemd-resolved-252-14.el9.rhaos4.13.s390x.rpm
systemd-resolved-debuginfo-252-14.el9.rhaos4.13.s390x.rpm
systemd-standalone-sysusers-252-14.el9.rhaos4.13.s390x.rpm
systemd-standalone-sysusers-debuginfo-252-14.el9.rhaos4.13.s390x.rpm
systemd-standalone-tmpfiles-252-14.el9.rhaos4.13.s390x.rpm
systemd-standalone-tmpfiles-debuginfo-252-14.el9.rhaos4.13.s390x.rpm
systemd-udev-252-14.el9.rhaos4.13.s390x.rpm
systemd-udev-debuginfo-252-14.el9.rhaos4.13.s390x.rpm

x86_64:
bpftool-7.0.0-284.13.1.el9_2.x86_64.rpm
bpftool-debuginfo-7.0.0-284.13.1.el9_2.x86_64.rpm
buildah-1.29.1-1.rhaos4.13.el9.x86_64.rpm
buildah-debuginfo-1.29.1-1.rhaos4.13.el9.x86_64.rpm
buildah-debugsource-1.29.1-1.rhaos4.13.el9.x86_64.rpm
buildah-tests-1.29.1-1.rhaos4.13.el9.x86_64.rpm
buildah-tests-debuginfo-1.29.1-1.rhaos4.13.el9.x86_64.rpm
conmon-2.1.7-1.rhaos4.13.el9.x86_64.rpm
conmon-debuginfo-2.1.7-1.rhaos4.13.el9.x86_64.rpm
conmon-debugsource-2.1.7-1.rhaos4.13.el9.x86_64.rpm
conmon-rs-0.5.1-5.rhaos4.13.git.el9.x86_64.rpm
containers-common-1-35.rhaos4.13.el9.x86_64.rpm
coreos-installer-0.17.0-1.rhaos4.13.el9.x86_64.rpm
coreos-installer-bootinfra-0.17.0-1.rhaos4.13.el9.x86_64.rpm
coreos-installer-bootinfra-debuginfo-0.17.0-1.rhaos4.13.el9.x86_64.rpm
coreos-installer-debuginfo-0.17.0-1.rhaos4.13.el9.x86_64.rpm
coreos-installer-debugsource-0.17.0-1.rhaos4.13.el9.x86_64.rpm
coreos-installer-dracut-0.17.0-1.rhaos4.13.el9.x86_64.rpm
cri-o-1.26.3-3.rhaos4.13.git641290e.el9.x86_64.rpm
cri-o-debuginfo-1.26.3-3.rhaos4.13.git641290e.el9.x86_64.rpm
cri-o-debugsource-1.26.3-3.rhaos4.13.git641290e.el9.x86_64.rpm
cri-tools-1.26.0-1.el9.x86_64.rpm
cri-tools-debuginfo-1.26.0-1.el9.x86_64.rpm
cri-tools-debugsource-1.26.0-1.el9.x86_64.rpm
crun-1.8.4-1.rhaos4.13.el9.x86_64.rpm
crun-debuginfo-1.8.4-1.rhaos4.13.el9.x86_64.rpm
crun-debugsource-1.8.4-1.rhaos4.13.el9.x86_64.rpm
kata-containers-3.0.2-5.el9.x86_64.rpm
kernel-5.14.0-284.13.1.el9_2.x86_64.rpm
kernel-core-5.14.0-284.13.1.el9_2.x86_64.rpm
kernel-cross-headers-5.14.0-284.13.1.el9_2.x86_64.rpm
kernel-debug-5.14.0-284.13.1.el9_2.x86_64.rpm
kernel-debug-core-5.14.0-284.13.1.el9_2.x86_64.rpm
kernel-debug-debuginfo-5.14.0-284.13.1.el9_2.x86_64.rpm
kernel-debug-devel-5.14.0-284.13.1.el9_2.x86_64.rpm
kernel-debug-devel-matched-5.14.0-284.13.1.el9_2.x86_64.rpm
kernel-debug-modules-5.14.0-284.13.1.el9_2.x86_64.rpm
kernel-debug-modules-core-5.14.0-284.13.1.el9_2.x86_64.rpm
kernel-debug-modules-extra-5.14.0-284.13.1.el9_2.x86_64.rpm
kernel-debug-modules-internal-5.14.0-284.13.1.el9_2.x86_64.rpm
kernel-debug-modules-partner-5.14.0-284.13.1.el9_2.x86_64.rpm
kernel-debug-uki-virt-5.14.0-284.13.1.el9_2.x86_64.rpm
kernel-debuginfo-5.14.0-284.13.1.el9_2.x86_64.rpm
kernel-debuginfo-common-x86_64-5.14.0-284.13.1.el9_2.x86_64.rpm
kernel-devel-5.14.0-284.13.1.el9_2.x86_64.rpm
kernel-devel-matched-5.14.0-284.13.1.el9_2.x86_64.rpm
kernel-headers-5.14.0-284.13.1.el9_2.x86_64.rpm
kernel-ipaclones-internal-5.14.0-284.13.1.el9_2.x86_64.rpm
kernel-modules-5.14.0-284.13.1.el9_2.x86_64.rpm
kernel-modules-core-5.14.0-284.13.1.el9_2.x86_64.rpm
kernel-modules-extra-5.14.0-284.13.1.el9_2.x86_64.rpm
kernel-modules-internal-5.14.0-284.13.1.el9_2.x86_64.rpm
kernel-modules-partner-5.14.0-284.13.1.el9_2.x86_64.rpm
kernel-rt-5.14.0-284.13.1.rt14.298.el9_2.x86_64.rpm
kernel-rt-core-5.14.0-284.13.1.rt14.298.el9_2.x86_64.rpm
kernel-rt-debug-5.14.0-284.13.1.rt14.298.el9_2.x86_64.rpm
kernel-rt-debug-core-5.14.0-284.13.1.rt14.298.el9_2.x86_64.rpm
kernel-rt-debug-debuginfo-5.14.0-284.13.1.rt14.298.el9_2.x86_64.rpm
kernel-rt-debug-devel-5.14.0-284.13.1.rt14.298.el9_2.x86_64.rpm
kernel-rt-debug-devel-matched-5.14.0-284.13.1.rt14.298.el9_2.x86_64.rpm
kernel-rt-debug-kvm-5.14.0-284.13.1.rt14.298.el9_2.x86_64.rpm
kernel-rt-debug-modules-5.14.0-284.13.1.rt14.298.el9_2.x86_64.rpm
kernel-rt-debug-modules-core-5.14.0-284.13.1.rt14.298.el9_2.x86_64.rpm
kernel-rt-debug-modules-extra-5.14.0-284.13.1.rt14.298.el9_2.x86_64.rpm
kernel-rt-debug-modules-internal-5.14.0-284.13.1.rt14.298.el9_2.x86_64.rpm
kernel-rt-debug-modules-partner-5.14.0-284.13.1.rt14.298.el9_2.x86_64.rpm
kernel-rt-debuginfo-5.14.0-284.13.1.rt14.298.el9_2.x86_64.rpm
kernel-rt-debuginfo-common-x86_64-5.14.0-284.13.1.rt14.298.el9_2.x86_64.rpm
kernel-rt-devel-5.14.0-284.13.1.rt14.298.el9_2.x86_64.rpm
kernel-rt-devel-matched-5.14.0-284.13.1.rt14.298.el9_2.x86_64.rpm
kernel-rt-kvm-5.14.0-284.13.1.rt14.298.el9_2.x86_64.rpm
kernel-rt-modules-5.14.0-284.13.1.rt14.298.el9_2.x86_64.rpm
kernel-rt-modules-core-5.14.0-284.13.1.rt14.298.el9_2.x86_64.rpm
kernel-rt-modules-extra-5.14.0-284.13.1.rt14.298.el9_2.x86_64.rpm
kernel-rt-modules-internal-5.14.0-284.13.1.rt14.298.el9_2.x86_64.rpm
kernel-rt-modules-partner-5.14.0-284.13.1.rt14.298.el9_2.x86_64.rpm
kernel-rt-selftests-internal-5.14.0-284.13.1.rt14.298.el9_2.x86_64.rpm
kernel-selftests-internal-5.14.0-284.13.1.el9_2.x86_64.rpm
kernel-tools-5.14.0-284.13.1.el9_2.x86_64.rpm
kernel-tools-debuginfo-5.14.0-284.13.1.el9_2.x86_64.rpm
kernel-tools-libs-5.14.0-284.13.1.el9_2.x86_64.rpm
kernel-tools-libs-devel-5.14.0-284.13.1.el9_2.x86_64.rpm
kernel-uki-virt-5.14.0-284.13.1.el9_2.x86_64.rpm
openshift-clients-4.13.0-202303241616.p0.g92b1a3d.assembly.stream.el9.x86_64.rpm
openshift-clients-redistributable-4.13.0-202303241616.p0.g92b1a3d.assembly.stream.el9.x86_64.rpm
openshift-hyperkube-4.13.0-202304211155.p0.gb404935.assembly.stream.el9.x86_64.rpm
openvswitch3.0-3.0.0-28.el9fdp.x86_64.rpm
openvswitch3.0-debuginfo-3.0.0-28.el9fdp.x86_64.rpm
openvswitch3.0-debugsource-3.0.0-28.el9fdp.x86_64.rpm
openvswitch3.0-devel-3.0.0-28.el9fdp.x86_64.rpm
openvswitch3.0-ipsec-3.0.0-28.el9fdp.x86_64.rpm
openvswitch3.1-3.1.0-10.el9fdp.x86_64.rpm
openvswitch3.1-debuginfo-3.1.0-10.el9fdp.x86_64.rpm
openvswitch3.1-debugsource-3.1.0-10.el9fdp.x86_64.rpm
openvswitch3.1-devel-3.1.0-10.el9fdp.x86_64.rpm
openvswitch3.1-ipsec-3.1.0-10.el9fdp.x86_64.rpm
ovn22.12-22.12.0-25.el9fdp.x86_64.rpm
ovn22.12-central-22.12.0-25.el9fdp.x86_64.rpm
ovn22.12-central-debuginfo-22.12.0-25.el9fdp.x86_64.rpm
ovn22.12-debuginfo-22.12.0-25.el9fdp.x86_64.rpm
ovn22.12-debugsource-22.12.0-25.el9fdp.x86_64.rpm
ovn22.12-host-22.12.0-25.el9fdp.x86_64.rpm
ovn22.12-host-debuginfo-22.12.0-25.el9fdp.x86_64.rpm
ovn22.12-vtep-22.12.0-25.el9fdp.x86_64.rpm
ovn22.12-vtep-debuginfo-22.12.0-25.el9fdp.x86_64.rpm
ovn23.03-23.03.0-7.el9fdp.x86_64.rpm
ovn23.03-central-23.03.0-7.el9fdp.x86_64.rpm
ovn23.03-central-debuginfo-23.03.0-7.el9fdp.x86_64.rpm
ovn23.03-debuginfo-23.03.0-7.el9fdp.x86_64.rpm
ovn23.03-debugsource-23.03.0-7.el9fdp.x86_64.rpm
ovn23.03-host-23.03.0-7.el9fdp.x86_64.rpm
ovn23.03-host-debuginfo-23.03.0-7.el9fdp.x86_64.rpm
ovn23.03-vtep-23.03.0-7.el9fdp.x86_64.rpm
ovn23.03-vtep-debuginfo-23.03.0-7.el9fdp.x86_64.rpm
perf-5.14.0-284.13.1.el9_2.x86_64.rpm
perf-debuginfo-5.14.0-284.13.1.el9_2.x86_64.rpm
podman-4.4.1-3.rhaos4.13.el9.x86_64.rpm
podman-debuginfo-4.4.1-3.rhaos4.13.el9.x86_64.rpm
podman-debugsource-4.4.1-3.rhaos4.13.el9.x86_64.rpm
podman-gvproxy-4.4.1-3.rhaos4.13.el9.x86_64.rpm
podman-gvproxy-debuginfo-4.4.1-3.rhaos4.13.el9.x86_64.rpm
podman-plugins-4.4.1-3.rhaos4.13.el9.x86_64.rpm
podman-plugins-debuginfo-4.4.1-3.rhaos4.13.el9.x86_64.rpm
podman-remote-4.4.1-3.rhaos4.13.el9.x86_64.rpm
podman-remote-debuginfo-4.4.1-3.rhaos4.13.el9.x86_64.rpm
podman-tests-4.4.1-3.rhaos4.13.el9.x86_64.rpm
python3-openvswitch3.0-3.0.0-28.el9fdp.x86_64.rpm
python3-openvswitch3.0-debuginfo-3.0.0-28.el9fdp.x86_64.rpm
python3-openvswitch3.1-3.1.0-10.el9fdp.x86_64.rpm
python3-openvswitch3.1-debuginfo-3.1.0-10.el9fdp.x86_64.rpm
python3-perf-5.14.0-284.13.1.el9_2.x86_64.rpm
python3-perf-debuginfo-5.14.0-284.13.1.el9_2.x86_64.rpm
rtla-5.14.0-284.13.1.el9_2.x86_64.rpm
runc-1.1.6-3.rhaos4.13.el9.x86_64.rpm
runc-debuginfo-1.1.6-3.rhaos4.13.el9.x86_64.rpm
runc-debugsource-1.1.6-3.rhaos4.13.el9.x86_64.rpm
skopeo-1.10.0-1.rhaos4.13.el9.x86_64.rpm
skopeo-debuginfo-1.10.0-1.rhaos4.13.el9.x86_64.rpm
skopeo-debugsource-1.10.0-1.rhaos4.13.el9.x86_64.rpm
skopeo-tests-1.10.0-1.rhaos4.13.el9.x86_64.rpm
systemd-252-14.el9.rhaos4.13.x86_64.rpm
systemd-boot-unsigned-252-14.el9.rhaos4.13.x86_64.rpm
systemd-boot-unsigned-debuginfo-252-14.el9.rhaos4.13.x86_64.rpm
systemd-container-252-14.el9.rhaos4.13.x86_64.rpm
systemd-container-debuginfo-252-14.el9.rhaos4.13.x86_64.rpm
systemd-debuginfo-252-14.el9.rhaos4.13.x86_64.rpm
systemd-debugsource-252-14.el9.rhaos4.13.x86_64.rpm
systemd-devel-252-14.el9.rhaos4.13.x86_64.rpm
systemd-journal-remote-252-14.el9.rhaos4.13.x86_64.rpm
systemd-journal-remote-debuginfo-252-14.el9.rhaos4.13.x86_64.rpm
systemd-libs-252-14.el9.rhaos4.13.x86_64.rpm
systemd-libs-debuginfo-252-14.el9.rhaos4.13.x86_64.rpm
systemd-oomd-252-14.el9.rhaos4.13.x86_64.rpm
systemd-oomd-debuginfo-252-14.el9.rhaos4.13.x86_64.rpm
systemd-pam-252-14.el9.rhaos4.13.x86_64.rpm
systemd-pam-debuginfo-252-14.el9.rhaos4.13.x86_64.rpm
systemd-resolved-252-14.el9.rhaos4.13.x86_64.rpm
systemd-resolved-debuginfo-252-14.el9.rhaos4.13.x86_64.rpm
systemd-standalone-sysusers-252-14.el9.rhaos4.13.x86_64.rpm
systemd-standalone-sysusers-debuginfo-252-14.el9.rhaos4.13.x86_64.rpm
systemd-standalone-tmpfiles-252-14.el9.rhaos4.13.x86_64.rpm
systemd-standalone-tmpfiles-debuginfo-252-14.el9.rhaos4.13.x86_64.rpm
systemd-udev-252-14.el9.rhaos4.13.x86_64.rpm
systemd-udev-debuginfo-252-14.el9.rhaos4.13.x86_64.rpm

Ironic content for Red Hat OpenShift Container Platform 4.13:

Source:
crudini-0.9.3-4.el9.src.rpm
future-0.18.2-9.el9.1.src.rpm
openstack-ironic-21.2.0-0.20221209211422.b70b418.el9.src.rpm
openstack-ironic-inspector-11.2.0-0.20221128164644.d83454c.el9.src.rpm
openstack-ironic-python-agent-9.2.0-0.20221128164006.a167075.el9.src.rpm
openstack-macros-2020.1.2-1.el9.src.rpm
pyOpenSSL-20.0.1-2.el9.1.src.rpm
pyflakes-2.2.0-3.el9.1.src.rpm
pysnmp-4.4.12-6.el9.src.rpm
python-SecretStorage-2.3.1-9.el9.src.rpm
python-alembic-1.6.0-1.el9.src.rpm
python-amqp-5.0.6-1.el9.src.rpm
python-apipkg-1.5-12.el9.1.src.rpm
python-atomicwrites-1.4.0-6.el9.1.src.rpm
python-automaton-3.0.1-0.20221128143847.0ea747e.el9.src.rpm
python-autopage-0.4.0-1.el9.2.src.rpm
python-bcrypt-3.1.6-3.el9.src.rpm
python-beautifulsoup4-4.9.3-2.el9.1.src.rpm
python-betamax-0.8.1-12.el9.1.src.rpm
python-binary-memcached-0.31.1-1.el9.src.rpm
python-cachetools-3.1.0-4.el9.src.rpm
python-case-1.5.3-5.el9.src.rpm
python-cinderclient-9.1.0-0.20221128151726.730a8c7.el9.src.rpm
python-click-7.1.2-5.el9.1.src.rpm
python-cliff-4.0.0-0.20221128185800.58c853d.el9.src.rpm
python-cmd2-1.4.0-2.el9.1.src.rpm
python-colorama-0.4.1-2.el9.src.rpm
python-construct-2.10.56-2.el9.src.rpm
python-contextlib2-0.6.0.post1-1.el9.src.rpm
python-coverage-5.6-0.1b1.el9.src.rpm
python-dataclasses-0.8-2.el9.src.rpm
python-ddt-1.4.2-1.el9.src.rpm
python-debtcollector-2.5.0-0.20221128140303.a6b46c5.el9.src.rpm
python-decorator-4.4.0-6.el9.src.rpm
python-defusedxml-0.7.1-1.el9.src.rpm
python-distlib-0.3.1-4.el9.1.src.rpm
python-dogpile-cache-1.1.5-3.el9.src.rpm
python-dracclient-8.0.0-0.20221128135758.9c7499c.el9.src.rpm
python-editor-1.0.4-5.el9.src.rpm
python-entrypoints-0.3-8.el9.src.rpm
python-eventlet-0.33.1-4.el9.src.rpm
python-execnet-1.7.1-5.el9.1.src.rpm
python-extras-1.0.0-15.el9.1.src.rpm
python-fasteners-0.18-1.el9.src.rpm
python-filelock-3.0.12-9.el9.1.src.rpm
python-fixtures-3.0.0-22.el9.1.src.rpm
python-flake8-3.8.4-1.el9.1.src.rpm
python-flask-2.0.1-2.el9.1.src.rpm
python-flit-3.0.0-1.el9.2.src.rpm
python-freezegun-1.0.0-4.el9.1.src.rpm
python-funcsigs-1.0.2-17.el9.src.rpm
python-futurist-2.4.1-0.20221128140910.159d752.el9.src.rpm
python-gevent-21.1.2-1.el9.src.rpm
python-glanceclient-4.1.0-0.20221128153803.f2999ce.el9.src.rpm
python-greenlet-1.1.3-1.el9.src.rpm
python-gunicorn-20.0.4-2.el9.src.rpm
python-hacking-1.0.1-0.20210812104123.865398f.el9.src.rpm
python-hardware-0.30.0-0.20221128155150.f6ff0ed.el9.src.rpm
python-html5lib-1.1-4.el9.1.src.rpm
python-hypothesis-6.6.0-2.el9.1.src.rpm
python-ifaddr-0.1.6-6.el9.src.rpm
python-importlib-metadata-4.12.0-2.el9.src.rpm
python-ironic-lib-5.3.0-0.20221128152640.340a4b2.el9.src.rpm
python-ironic-prometheus-exporter-3.1.1-0.20221128155706.eb27243.el9.src.rpm
python-ironicclient-4.9.0-0.20211209154934.6f1be06.el9.src.rpm
python-iso8601-0.1.12-9.el9.src.rpm
python-itsdangerous-2.0.1-2.el9.src.rpm
python-jinja2-3.0.1-2.el9.1.src.rpm
python-jsonpath-rw-1.2.3-23.el9.src.rpm
python-kafka-1.4.3-3.el9.src.rpm
python-kazoo-2.7.0-2.el9.src.rpm
python-kerberos-1.3.0-11.el9.1.src.rpm
python-keyring-21.0.0-2.el9.src.rpm
python-keystoneauth1-5.0.0-0.20221128144522.2445a5d.el9.src.rpm
python-keystoneclient-5.0.1-0.20221128145838.bc8e9e7.el9.src.rpm
python-keystonemiddleware-10.1.0-0.20221128152538.f7ac6a1.el9.src.rpm
python-kiwisolver-1.1.0-4.el9.src.rpm
python-kombu-5.0.2-1.el9.2.src.rpm
python-linecache2-1.0.0-25.el9.src.rpm
python-logutils-0.3.5-7.1.el9.src.rpm
python-m2r-0.2.1-3.1.20190604git66f4a5a.el9.src.rpm
python-markupsafe-2.0.0-2.el9.src.rpm
python-mccabe-0.6.1-18.el9.1.src.rpm
python-memcached-1.58-12.el9.src.rpm
python-migrate-0.13.0-2.el9.src.rpm
python-mimeparse-1.6.0-16.el9.1.src.rpm
python-mistune-0.8.3-15.1.el9.src.rpm
python-mock-3.0.5-14.el9.2.src.rpm
python-monotonic-1.5-9.el9.1.src.rpm
python-more-itertools-7.2.0-3.el9.src.rpm
python-mox3-1.1.0-0.20210812114029.99a302f.el9.src.rpm
python-msgpack-0.6.2-2.el9.src.rpm
python-munch-2.3.2-7.el9.src.rpm
python-neutronclient-7.6.0-0.20211012175718.983f0ab.el9.src.rpm
python-nose-1.3.7-33.el9.1.src.rpm
python-nose-cover3-0.1.0-31.el9.src.rpm
python-openstacksdk-0.102.0-0.20221128160622.9a17781.el9.src.rpm
python-os-client-config-2.1.0-0.20210722194729.bc96c23.el9.src.rpm
python-os-service-types-1.7.0-0.20221128134625.0b2f473.el9.src.rpm
python-os-traits-2.9.0-0.20221128153153.fc91a78.el9.src.rpm
python-osc-lib-2.6.2-0.20221128150506.d438afa.el9.src.rpm
python-oslo-cache-3.1.0-0.20221129203427.7fb06bc.el9.src.rpm
python-oslo-concurrency-5.0.1-0.20221129205158.01cf2ff.el9.src.rpm
python-oslo-config-9.0.0-0.20221128141318.9eaae04.el9.src.rpm
python-oslo-context-5.0.0-0.20221128142633.f388eb9.el9.src.rpm
python-oslo-db-12.2.0-0.20221128163146.a191d2e.el9.src.rpm
python-oslo-i18n-5.1.0-0.20221128135758.b031d17.el9.src.rpm
python-oslo-log-5.0.0-0.20221128143137.6401da7.el9.src.rpm
python-oslo-messaging-14.0.0-0.20221128151928.e44f286.el9.src.rpm
python-oslo-metrics-0.5.0-0.20221128141719.fc22d0d.el9.src.rpm
python-oslo-middleware-5.0.0-0.20221128142027.51e1882.el9.src.rpm
python-oslo-policy-4.0.0-0.20221128143837.5bd767b.el9.src.rpm
python-oslo-reports-2.3.0-0.20211012151507.f2799dc.el9.src.rpm
python-oslo-rootwrap-6.3.1-0.20221128140202.1b1b960.el9.src.rpm
python-oslo-serialization-5.0.0-0.20221128142424.dd2a819.el9.src.rpm
python-oslo-service-3.0.0-0.20221128144658.a27acfe.el9.src.rpm
python-oslo-upgradecheck-2.0.0-0.20221128142932.b3a2b19.el9.src.rpm
python-oslo-utils-6.0.1-0.20221128145135.760deb9.el9.src.rpm
python-oslo-versionedobjects-3.0.1-0.20221128145846.2b12029.el9.src.rpm
python-oslotest-4.4.1-0.20210812115053.aaf3a72.el9.src.rpm
python-osprofiler-3.4.3-0.20221128140710.3286301.el9.src.rpm
python-paste-3.5.0-3.el9.1.src.rpm
python-paste-deploy-2.0.1-5.el9.src.rpm
python-pbr-5.5.1-3.el9.1.src.rpm
python-pecan-1.3.2-10.el9.src.rpm
python-pexpect-4.6-3.el9.src.rpm
python-pint-0.10.1-3.el9.src.rpm
python-pretend-1.0.8-19.el9.src.rpm
python-proliantutils-2.14.0-0.20221128154535.de9759c.el9.src.rpm
python-prometheus_client-0.7.1-3.el9.src.rpm
python-pycadf-3.1.1-0.20221128135153.4179996.el9.src.rpm
python-pycodestyle-2.6.0-4.el9.1.src.rpm
python-pyfakefs-4.4.0-4.el9.src.rpm
python-pymemcache-3.5.0-1.el9.src.rpm
python-pyperclip-1.8.0-3.el9.1.src.rpm
python-pytest-cov-2.11.1-3.el9.1.src.rpm
python-pytest-forked-1.3.0-2.el9.1.src.rpm
python-pytest-runner-4.0-12.el9.1.src.rpm
python-pytest-xdist-2.2.1-1.el9.src.rpm
python-pytest-xprocess-0.18.1-4.el9.src.rpm
python-redis-3.3.8-2.el9.src.rpm
python-repoze-lru-0.7-7.el9.src.rpm
python-requests-kerberos-0.12.0-12.el9.1.src.rpm
python-requests-mock-1.8.0-2.el9.1.src.rpm
python-requests-unixsocket-0.2.0-2.el9.src.rpm
python-requestsexceptions-1.4.0-0.20221128134625.d7ac0ff.el9.src.rpm
python-retrying-1.3.3-2.el9.1.src.rpm
python-rfc3986-1.2.0-6.el9.src.rpm
python-routes-2.4.1-12.el9.src.rpm
python-scciclient-0.12.3-0.20221128150506.0940a71.el9.src.rpm
python-service-identity-18.1.0-9.1.el9.src.rpm
python-simplegeneric-0.8.1-18.el9.src.rpm
python-simplejson-3.17.0-2.el9.src.rpm
python-singledispatch-3.4.0.3-19.el9.src.rpm
python-smi-0.3.4-10.el9.src.rpm
python-sortedcontainers-2.3.0-2.el9.1.src.rpm
python-soupsieve-2.1.0-2.el9.1.src.rpm
python-sqlalchemy-1.4.39-2.el9.src.rpm
python-sqlparse-0.2.4-10.el9.src.rpm
python-statsd-3.2.1-20.el9.src.rpm
python-stestr-2.6.0-8.el9.src.rpm
python-stevedore-4.1.0-0.20221128161654.9eb8094.el9.src.rpm
python-sure-1.4.11-12.el9.2.src.rpm
python-sushy-4.4.3-0.20230425095526.9f708cf.el9.src.rpm
python-sushy-oem-idrac-5.0.0-0.20221128204359.da9a0e4.el9.src.rpm
python-swiftclient-4.1.0-0.20221128153149.662e530.el9.src.rpm
python-tempita-0.5.1-25.el9.src.rpm
python-tenacity-6.2.0-2.el9.src.rpm
python-testrepository-0.0.20-20.el9.src.rpm
python-testresources-2.0.1-2.el9.src.rpm
python-testscenarios-0.5.0-21.el9.1.src.rpm
python-testtools-2.4.0-8.el9.1.src.rpm
python-tooz-3.2.0-0.20221128162335.1a76dd6.el9.src.rpm
python-tornado-6.1.0-2.el9.1.src.rpm
python-tox-3.23.0-2.el9.1.src.rpm
python-tox-current-env-0.0.6-1.el9.src.rpm
python-traceback2-1.4.0-25.el9.src.rpm
python-trustme-0.7.0-1.el9.src.rpm
python-typeguard-2.9.1-1.el9.src.rpm
python-typing-extensions-3.7.4.3-2.el9.1.src.rpm
python-uhashring-2.1-2.el9.src.rpm
python-unittest2-1.1.0-24.el9.src.rpm
python-vine-5.0.0-3.el9.src.rpm
python-virtualenv-20.4.4-1.el9.src.rpm
python-voluptuous-0.11.7-3.el9.src.rpm
python-waitress-2.0.0-2.el9.src.rpm
python-warlock-1.3.3-2.el9.src.rpm
python-wcwidth-0.2.5-2.el9.2.src.rpm
python-webencodings-0.5.1-15.el9.1.src.rpm
python-webob-1.8.5-5.el9.src.rpm
python-webtest-2.0.33-5.el9.src.rpm
python-werkzeug-2.0.3-4.el9.src.rpm
python-wrapt-1.11.2-4.el9.src.rpm
python-wsme-0.11.0-0.20221128135154.80bda90.el9.src.rpm
python-yappi-1.3.1-2.el9.src.rpm
python-zake-0.2.2-19.el9.src.rpm
python-zeroconf-0.24.4-2.el9.src.rpm
python-zipp-0.5.1-3.el9.src.rpm
python-zope-event-4.2.0-20.el9.1.src.rpm
python-zope-interface-5.4.0-1.el9.src.rpm
python-zope-testing-4.7-4.el9.1.src.rpm
subunit-1.4.0-6.el9.1.src.rpm

aarch64:
python-bcrypt-debugsource-3.1.6-3.el9.aarch64.rpm
python-coverage-debugsource-5.6-0.1b1.el9.aarch64.rpm
python-gevent-debugsource-21.1.2-1.el9.aarch64.rpm
python-greenlet-debugsource-1.1.3-1.el9.aarch64.rpm
python-kerberos-debugsource-1.3.0-11.el9.1.aarch64.rpm
python-kiwisolver-debugsource-1.1.0-4.el9.aarch64.rpm
python-markupsafe-debugsource-2.0.0-2.el9.aarch64.rpm
python-mistune-debugsource-0.8.3-15.1.el9.aarch64.rpm
python-msgpack-debugsource-0.6.2-2.el9.aarch64.rpm
python-simplejson-debugsource-3.17.0-2.el9.aarch64.rpm
python-sqlalchemy-debugsource-1.4.39-2.el9.aarch64.rpm
python-tornado-debugsource-6.1.0-2.el9.1.aarch64.rpm
python-tornado-doc-6.1.0-2.el9.1.aarch64.rpm
python-wrapt-debugsource-1.11.2-4.el9.aarch64.rpm
python-wrapt-doc-1.11.2-4.el9.aarch64.rpm
python-yappi-debugsource-1.3.1-2.el9.aarch64.rpm
python3-bcrypt-3.1.6-3.el9.aarch64.rpm
python3-bcrypt-debuginfo-3.1.6-3.el9.aarch64.rpm
python3-coverage-5.6-0.1b1.el9.aarch64.rpm
python3-coverage-debuginfo-5.6-0.1b1.el9.aarch64.rpm
python3-gevent-21.1.2-1.el9.aarch64.rpm
python3-gevent-debuginfo-21.1.2-1.el9.aarch64.rpm
python3-greenlet-1.1.3-1.el9.aarch64.rpm
python3-greenlet-debuginfo-1.1.3-1.el9.aarch64.rpm
python3-greenlet-devel-1.1.3-1.el9.aarch64.rpm
python3-kerberos-1.3.0-11.el9.1.aarch64.rpm
python3-kerberos-debuginfo-1.3.0-11.el9.1.aarch64.rpm
python3-kiwisolver-1.1.0-4.el9.aarch64.rpm
python3-kiwisolver-debuginfo-1.1.0-4.el9.aarch64.rpm
python3-markupsafe-2.0.0-2.el9.aarch64.rpm
python3-markupsafe-debuginfo-2.0.0-2.el9.aarch64.rpm
python3-mistune-0.8.3-15.1.el9.aarch64.rpm
python3-mistune-debuginfo-0.8.3-15.1.el9.aarch64.rpm
python3-msgpack-0.6.2-2.el9.aarch64.rpm
python3-msgpack-debuginfo-0.6.2-2.el9.aarch64.rpm
python3-simplejson-3.17.0-2.el9.aarch64.rpm
python3-simplejson-debuginfo-3.17.0-2.el9.aarch64.rpm
python3-sqlalchemy+aiomysql-1.4.39-2.el9.aarch64.rpm
python3-sqlalchemy+aiosqlite-1.4.39-2.el9.aarch64.rpm
python3-sqlalchemy+asyncio-1.4.39-2.el9.aarch64.rpm
python3-sqlalchemy+mssql_pymssql-1.4.39-2.el9.aarch64.rpm
python3-sqlalchemy+mssql_pyodbc-1.4.39-2.el9.aarch64.rpm
python3-sqlalchemy+mysql-1.4.39-2.el9.aarch64.rpm
python3-sqlalchemy+postgresql-1.4.39-2.el9.aarch64.rpm
python3-sqlalchemy+postgresql_asyncpg-1.4.39-2.el9.aarch64.rpm
python3-sqlalchemy+postgresql_pg8000-1.4.39-2.el9.aarch64.rpm
python3-sqlalchemy+pymysql-1.4.39-2.el9.aarch64.rpm
python3-sqlalchemy-1.4.39-2.el9.aarch64.rpm
python3-sqlalchemy-debuginfo-1.4.39-2.el9.aarch64.rpm
python3-tornado-6.1.0-2.el9.1.aarch64.rpm
python3-tornado-debuginfo-6.1.0-2.el9.1.aarch64.rpm
python3-wrapt-1.11.2-4.el9.aarch64.rpm
python3-wrapt-debuginfo-1.11.2-4.el9.aarch64.rpm
python3-yappi-1.3.1-2.el9.aarch64.rpm
python3-yappi-debuginfo-1.3.1-2.el9.aarch64.rpm
python3-zope-interface-5.4.0-1.el9.aarch64.rpm
subunit-1.4.0-6.el9.1.aarch64.rpm
subunit-cppunit-1.4.0-6.el9.1.aarch64.rpm
subunit-cppunit-debuginfo-1.4.0-6.el9.1.aarch64.rpm
subunit-cppunit-devel-1.4.0-6.el9.1.aarch64.rpm
subunit-debuginfo-1.4.0-6.el9.1.aarch64.rpm
subunit-debugsource-1.4.0-6.el9.1.aarch64.rpm
subunit-devel-1.4.0-6.el9.1.aarch64.rpm
subunit-static-1.4.0-6.el9.1.aarch64.rpm

noarch:
crudini-0.9.3-4.el9.noarch.rpm
openstack-ironic-21.2.0-0.20221209211422.b70b418.el9.noarch.rpm
openstack-ironic-api-21.2.0-0.20221209211422.b70b418.el9.noarch.rpm
openstack-ironic-common-21.2.0-0.20221209211422.b70b418.el9.noarch.rpm
openstack-ironic-conductor-21.2.0-0.20221209211422.b70b418.el9.noarch.rpm
openstack-ironic-dnsmasq-tftp-server-21.2.0-0.20221209211422.b70b418.el9.noarch.rpm
openstack-ironic-inspector-11.2.0-0.20221128164644.d83454c.el9.noarch.rpm
openstack-ironic-inspector-api-11.2.0-0.20221128164644.d83454c.el9.noarch.rpm
openstack-ironic-inspector-conductor-11.2.0-0.20221128164644.d83454c.el9.noarch.rpm
openstack-ironic-inspector-dnsmasq-11.2.0-0.20221128164644.d83454c.el9.noarch.rpm
openstack-ironic-python-agent-9.2.0-0.20221128164006.a167075.el9.noarch.rpm
openstack-macros-2020.1.2-1.el9.noarch.rpm
pyOpenSSL-doc-20.0.1-2.el9.1.noarch.rpm
python-amqp-doc-5.0.6-1.el9.noarch.rpm
python-entrypoints-doc-0.3-8.el9.noarch.rpm
python-filelock-doc-3.0.12-9.el9.1.noarch.rpm
python-flask-doc-2.0.1-2.el9.1.noarch.rpm
python-funcsigs-doc-1.0.2-17.el9.noarch.rpm
python-gunicorn-doc-20.0.4-2.el9.noarch.rpm
python-kazoo-doc-2.7.0-2.el9.noarch.rpm
python-oslo-cache-lang-3.1.0-0.20221129203427.7fb06bc.el9.noarch.rpm
python-oslo-concurrency-lang-5.0.1-0.20221129205158.01cf2ff.el9.noarch.rpm
python-oslo-db-lang-12.2.0-0.20221128163146.a191d2e.el9.noarch.rpm
python-oslo-i18n-lang-5.1.0-0.20221128135758.b031d17.el9.noarch.rpm
python-oslo-log-lang-5.0.0-0.20221128143137.6401da7.el9.noarch.rpm
python-oslo-middleware-lang-5.0.0-0.20221128142027.51e1882.el9.noarch.rpm
python-oslo-policy-lang-4.0.0-0.20221128143837.5bd767b.el9.noarch.rpm
python-oslo-utils-lang-6.0.1-0.20221128145135.760deb9.el9.noarch.rpm
python-oslo-versionedobjects-lang-3.0.1-0.20221128145846.2b12029.el9.noarch.rpm
python-pycadf-common-3.1.1-0.20221128135153.4179996.el9.noarch.rpm
python-pyperclip-doc-1.8.0-3.el9.1.noarch.rpm
python-service-identity-doc-18.1.0-9.1.el9.noarch.rpm
python-sqlalchemy-doc-1.4.39-2.el9.noarch.rpm
python-statsd-doc-3.2.1-20.el9.noarch.rpm
python-testtools-doc-2.4.0-8.el9.1.noarch.rpm
python-webencodings-doc-0.5.1-15.el9.1.noarch.rpm
python3-SecretStorage-2.3.1-9.el9.noarch.rpm
python3-alembic-1.6.0-1.el9.noarch.rpm
python3-amqp-5.0.6-1.el9.noarch.rpm
python3-apipkg-1.5-12.el9.1.noarch.rpm
python3-atomicwrites-1.4.0-6.el9.1.noarch.rpm
python3-automaton-3.0.1-0.20221128143847.0ea747e.el9.noarch.rpm
python3-autopage-0.4.0-1.el9.2.noarch.rpm
python3-beautifulsoup4-4.9.3-2.el9.1.noarch.rpm
python3-betamax-0.8.1-12.el9.1.noarch.rpm
python3-binary-memcached-0.31.1-1.el9.noarch.rpm
python3-cachetools-3.1.0-4.el9.noarch.rpm
python3-case-1.5.3-5.el9.noarch.rpm
python3-cinderclient-9.1.0-0.20221128151726.730a8c7.el9.noarch.rpm
python3-click-7.1.2-5.el9.1.noarch.rpm
python3-cliff-4.0.0-0.20221128185800.58c853d.el9.noarch.rpm
python3-cliff-tests-4.0.0-0.20221128185800.58c853d.el9.noarch.rpm
python3-cmd2-1.4.0-2.el9.1.noarch.rpm
python3-colorama-0.4.1-2.el9.noarch.rpm
python3-construct-2.10.56-2.el9.noarch.rpm
python3-contextlib2-0.6.0.post1-1.el9.noarch.rpm
python3-dataclasses-0.8-2.el9.noarch.rpm
python3-ddt-1.4.2-1.el9.noarch.rpm
python3-debtcollector-2.5.0-0.20221128140303.a6b46c5.el9.noarch.rpm
python3-decorator-4.4.0-6.el9.noarch.rpm
python3-defusedxml-0.7.1-1.el9.noarch.rpm
python3-distlib-0.3.1-4.el9.1.noarch.rpm
python3-dogpile-cache-1.1.5-3.el9.noarch.rpm
python3-dracclient-8.0.0-0.20221128135758.9c7499c.el9.noarch.rpm
python3-editor-1.0.4-5.el9.noarch.rpm
python3-entrypoints-0.3-8.el9.noarch.rpm
python3-eventlet-0.33.1-4.el9.noarch.rpm
python3-execnet-1.7.1-5.el9.1.noarch.rpm
python3-extras-1.0.0-15.el9.1.noarch.rpm
python3-fasteners-0.18-1.el9.noarch.rpm
python3-filelock-3.0.12-9.el9.1.noarch.rpm
python3-fixtures-3.0.0-22.el9.1.noarch.rpm
python3-flake8-3.8.4-1.el9.1.noarch.rpm
python3-flask-2.0.1-2.el9.1.noarch.rpm
python3-flit-3.0.0-1.el9.2.noarch.rpm
python3-flit-core-3.0.0-1.el9.2.noarch.rpm
python3-freezegun-1.0.0-4.el9.1.noarch.rpm
python3-funcsigs-1.0.2-17.el9.noarch.rpm
python3-future-0.18.2-9.el9.1.noarch.rpm
python3-futurist-2.4.1-0.20221128140910.159d752.el9.noarch.rpm
python3-glanceclient-4.1.0-0.20221128153803.f2999ce.el9.noarch.rpm
python3-gunicorn-20.0.4-2.el9.noarch.rpm
python3-hacking-1.0.1-0.20210812104123.865398f.el9.noarch.rpm
python3-hardware-0.30.0-0.20221128155150.f6ff0ed.el9.noarch.rpm
python3-hardware-detect-0.30.0-0.20221128155150.f6ff0ed.el9.noarch.rpm
python3-html5lib-1.1-4.el9.1.noarch.rpm
python3-hypothesis+cli-6.6.0-2.el9.1.noarch.rpm
python3-hypothesis+dateutil-6.6.0-2.el9.1.noarch.rpm
python3-hypothesis+django-6.6.0-2.el9.1.noarch.rpm
python3-hypothesis+ghostwriter-6.6.0-2.el9.1.noarch.rpm
python3-hypothesis+lark-6.6.0-2.el9.1.noarch.rpm
python3-hypothesis+numpy-6.6.0-2.el9.1.noarch.rpm
python3-hypothesis+pandas-6.6.0-2.el9.1.noarch.rpm
python3-hypothesis+pytest-6.6.0-2.el9.1.noarch.rpm
python3-hypothesis+pytz-6.6.0-2.el9.1.noarch.rpm
python3-hypothesis+redis-6.6.0-2.el9.1.noarch.rpm
python3-hypothesis+zoneinfo-6.6.0-2.el9.1.noarch.rpm
python3-hypothesis-6.6.0-2.el9.1.noarch.rpm
python3-ifaddr-0.1.6-6.el9.noarch.rpm
python3-importlib-metadata-4.12.0-2.el9.noarch.rpm
python3-ironic-inspector-tests-11.2.0-0.20221128164644.d83454c.el9.noarch.rpm
python3-ironic-lib-5.3.0-0.20221128152640.340a4b2.el9.noarch.rpm
python3-ironic-prometheus-exporter-3.1.1-0.20221128155706.eb27243.el9.noarch.rpm
python3-ironic-python-agent-9.2.0-0.20221128164006.a167075.el9.noarch.rpm
python3-ironic-python-agent-tests-9.2.0-0.20221128164006.a167075.el9.noarch.rpm
python3-ironic-tests-21.2.0-0.20221209211422.b70b418.el9.noarch.rpm
python3-ironicclient-4.9.0-0.20211209154934.6f1be06.el9.noarch.rpm
python3-iso8601-0.1.12-9.el9.noarch.rpm
python3-itsdangerous-2.0.1-2.el9.noarch.rpm
python3-jinja2-3.0.1-2.el9.1.noarch.rpm
python3-jsonpath-rw-1.2.3-23.el9.noarch.rpm
python3-kafka-1.4.3-3.el9.noarch.rpm
python3-kazoo-2.7.0-2.el9.noarch.rpm
python3-keyring-21.0.0-2.el9.noarch.rpm
python3-keystoneauth1-5.0.0-0.20221128144522.2445a5d.el9.noarch.rpm
python3-keystoneclient-5.0.1-0.20221128145838.bc8e9e7.el9.noarch.rpm
python3-keystoneclient-tests-5.0.1-0.20221128145838.bc8e9e7.el9.noarch.rpm
python3-keystonemiddleware-10.1.0-0.20221128152538.f7ac6a1.el9.noarch.rpm
python3-kombu-5.0.2-1.el9.2.noarch.rpm
python3-linecache2-1.0.0-25.el9.noarch.rpm
python3-logutils-0.3.5-7.1.el9.noarch.rpm
python3-m2r-0.2.1-3.1.20190604git66f4a5a.el9.noarch.rpm
python3-mccabe-0.6.1-18.el9.1.noarch.rpm
python3-memcached-1.58-12.el9.noarch.rpm
python3-migrate-0.13.0-2.el9.noarch.rpm
python3-mimeparse-1.6.0-16.el9.1.noarch.rpm
python3-mock-3.0.5-14.el9.2.noarch.rpm
python3-monotonic-1.5-9.el9.1.noarch.rpm
python3-more-itertools-7.2.0-3.el9.noarch.rpm
python3-mox3-1.1.0-0.20210812114029.99a302f.el9.noarch.rpm
python3-munch-2.3.2-7.el9.noarch.rpm
python3-neutronclient-7.6.0-0.20211012175718.983f0ab.el9.noarch.rpm
python3-neutronclient-tests-7.6.0-0.20211012175718.983f0ab.el9.noarch.rpm
python3-nose-1.3.7-33.el9.1.noarch.rpm
python3-nose-cover3-0.1.0-31.el9.noarch.rpm
python3-openstacksdk-0.102.0-0.20221128160622.9a17781.el9.noarch.rpm
python3-openstacksdk-tests-0.102.0-0.20221128160622.9a17781.el9.noarch.rpm
python3-os-client-config-2.1.0-0.20210722194729.bc96c23.el9.noarch.rpm
python3-os-service-types-1.7.0-0.20221128134625.0b2f473.el9.noarch.rpm
python3-os-traits-2.9.0-0.20221128153153.fc91a78.el9.noarch.rpm
python3-os-traits-tests-2.9.0-0.20221128153153.fc91a78.el9.noarch.rpm
python3-osc-lib-2.6.2-0.20221128150506.d438afa.el9.noarch.rpm
python3-osc-lib-tests-2.6.2-0.20221128150506.d438afa.el9.noarch.rpm
python3-oslo-cache-3.1.0-0.20221129203427.7fb06bc.el9.noarch.rpm
python3-oslo-cache-tests-3.1.0-0.20221129203427.7fb06bc.el9.noarch.rpm
python3-oslo-concurrency-5.0.1-0.20221129205158.01cf2ff.el9.noarch.rpm
python3-oslo-concurrency-tests-5.0.1-0.20221129205158.01cf2ff.el9.noarch.rpm
python3-oslo-config-9.0.0-0.20221128141318.9eaae04.el9.noarch.rpm
python3-oslo-context-5.0.0-0.20221128142633.f388eb9.el9.noarch.rpm
python3-oslo-context-tests-5.0.0-0.20221128142633.f388eb9.el9.noarch.rpm
python3-oslo-db-12.2.0-0.20221128163146.a191d2e.el9.noarch.rpm
python3-oslo-db-tests-12.2.0-0.20221128163146.a191d2e.el9.noarch.rpm
python3-oslo-i18n-5.1.0-0.20221128135758.b031d17.el9.noarch.rpm
python3-oslo-log-5.0.0-0.20221128143137.6401da7.el9.noarch.rpm
python3-oslo-log-tests-5.0.0-0.20221128143137.6401da7.el9.noarch.rpm
python3-oslo-messaging-14.0.0-0.20221128151928.e44f286.el9.noarch.rpm
python3-oslo-messaging-tests-14.0.0-0.20221128151928.e44f286.el9.noarch.rpm
python3-oslo-metrics-0.5.0-0.20221128141719.fc22d0d.el9.noarch.rpm
python3-oslo-metrics-tests-0.5.0-0.20221128141719.fc22d0d.el9.noarch.rpm
python3-oslo-middleware-5.0.0-0.20221128142027.51e1882.el9.noarch.rpm
python3-oslo-middleware-tests-5.0.0-0.20221128142027.51e1882.el9.noarch.rpm
python3-oslo-policy-4.0.0-0.20221128143837.5bd767b.el9.noarch.rpm
python3-oslo-policy-tests-4.0.0-0.20221128143837.5bd767b.el9.noarch.rpm
python3-oslo-reports-2.3.0-0.20211012151507.f2799dc.el9.noarch.rpm
python3-oslo-reports-tests-2.3.0-0.20211012151507.f2799dc.el9.noarch.rpm
python3-oslo-rootwrap-6.3.1-0.20221128140202.1b1b960.el9.noarch.rpm
python3-oslo-rootwrap-tests-6.3.1-0.20221128140202.1b1b960.el9.noarch.rpm
python3-oslo-serialization-5.0.0-0.20221128142424.dd2a819.el9.noarch.rpm
python3-oslo-serialization-tests-5.0.0-0.20221128142424.dd2a819.el9.noarch.rpm
python3-oslo-service-3.0.0-0.20221128144658.a27acfe.el9.noarch.rpm
python3-oslo-service-tests-3.0.0-0.20221128144658.a27acfe.el9.noarch.rpm
python3-oslo-upgradecheck-2.0.0-0.20221128142932.b3a2b19.el9.noarch.rpm
python3-oslo-utils-6.0.1-0.20221128145135.760deb9.el9.noarch.rpm
python3-oslo-utils-tests-6.0.1-0.20221128145135.760deb9.el9.noarch.rpm
python3-oslo-versionedobjects-3.0.1-0.20221128145846.2b12029.el9.noarch.rpm
python3-oslo-versionedobjects-tests-3.0.1-0.20221128145846.2b12029.el9.noarch.rpm
python3-oslotest-4.4.1-0.20210812115053.aaf3a72.el9.noarch.rpm
python3-osprofiler-3.4.3-0.20221128140710.3286301.el9.noarch.rpm
python3-paste-3.5.0-3.el9.1.noarch.rpm
python3-paste-deploy-2.0.1-5.el9.noarch.rpm
python3-pbr-5.5.1-3.el9.1.noarch.rpm
python3-pecan-1.3.2-10.el9.noarch.rpm
python3-pexpect-4.6-3.el9.noarch.rpm
python3-pint-0.10.1-3.el9.noarch.rpm
python3-pretend-1.0.8-19.el9.noarch.rpm
python3-proliantutils-2.14.0-0.20221128154535.de9759c.el9.noarch.rpm
python3-prometheus_client-0.7.1-3.el9.noarch.rpm
python3-pyOpenSSL-20.0.1-2.el9.1.noarch.rpm
python3-pycadf-3.1.1-0.20221128135153.4179996.el9.noarch.rpm
python3-pycodestyle-2.6.0-4.el9.1.noarch.rpm
python3-pyfakefs-4.4.0-4.el9.noarch.rpm
python3-pyflakes-2.2.0-3.el9.1.noarch.rpm
python3-pymemcache-3.5.0-1.el9.noarch.rpm
python3-pyperclip-1.8.0-3.el9.1.noarch.rpm
python3-pysnmp-4.4.12-6.el9.noarch.rpm
python3-pytest-cov-2.11.1-3.el9.1.noarch.rpm
python3-pytest-forked-1.3.0-2.el9.1.noarch.rpm
python3-pytest-runner-4.0-12.el9.1.noarch.rpm
python3-pytest-xdist-2.2.1-1.el9.noarch.rpm
python3-pytest-xprocess-0.18.1-4.el9.noarch.rpm
python3-redis-3.3.8-2.el9.noarch.rpm
python3-repoze-lru-0.7-7.el9.noarch.rpm
python3-requests-kerberos-0.12.0-12.el9.1.noarch.rpm
python3-requests-mock-1.8.0-2.el9.1.noarch.rpm
python3-requests-unixsocket-0.2.0-2.el9.noarch.rpm
python3-requestsexceptions-1.4.0-0.20221128134625.d7ac0ff.el9.noarch.rpm
python3-retrying-1.3.3-2.el9.1.noarch.rpm
python3-rfc3986-1.2.0-6.el9.noarch.rpm
python3-routes-2.4.1-12.el9.noarch.rpm
python3-scciclient-0.12.3-0.20221128150506.0940a71.el9.noarch.rpm
python3-service-identity-18.1.0-9.1.el9.noarch.rpm
python3-simplegeneric-0.8.1-18.el9.noarch.rpm
python3-singledispatch-3.4.0.3-19.el9.noarch.rpm
python3-smi-0.3.4-10.el9.noarch.rpm
python3-sortedcontainers-2.3.0-2.el9.1.noarch.rpm
python3-soupsieve-2.1.0-2.el9.1.noarch.rpm
python3-sqlparse-0.2.4-10.el9.noarch.rpm
python3-statsd-3.2.1-20.el9.noarch.rpm
python3-stestr-2.6.0-8.el9.noarch.rpm
python3-stevedore-4.1.0-0.20221128161654.9eb8094.el9.noarch.rpm
python3-subunit-1.4.0-6.el9.1.noarch.rpm
python3-subunit-test-1.4.0-6.el9.1.noarch.rpm
python3-sure-1.4.11-12.el9.2.noarch.rpm
python3-sushy-4.4.3-0.20230425095526.9f708cf.el9.noarch.rpm
python3-sushy-oem-idrac-5.0.0-0.20221128204359.da9a0e4.el9.noarch.rpm
python3-sushy-oem-idrac-tests-5.0.0-0.20221128204359.da9a0e4.el9.noarch.rpm
python3-sushy-tests-4.4.3-0.20230425095526.9f708cf.el9.noarch.rpm
python3-swiftclient-4.1.0-0.20221128153149.662e530.el9.noarch.rpm
python3-tempita-0.5.1-25.el9.noarch.rpm
python3-tenacity-6.2.0-2.el9.noarch.rpm
python3-testrepository-0.0.20-20.el9.noarch.rpm
python3-testresources-2.0.1-2.el9.noarch.rpm
python3-testscenarios-0.5.0-21.el9.1.noarch.rpm
python3-testtools-2.4.0-8.el9.1.noarch.rpm
python3-tooz-3.2.0-0.20221128162335.1a76dd6.el9.noarch.rpm
python3-tox-current-env-0.0.6-1.el9.noarch.rpm
python3-traceback2-1.4.0-25.el9.noarch.rpm
python3-trustme-0.7.0-1.el9.noarch.rpm
python3-typeguard-2.9.1-1.el9.noarch.rpm
python3-typing-extensions-3.7.4.3-2.el9.1.noarch.rpm
python3-uhashring-2.1-2.el9.noarch.rpm
python3-unittest2-1.1.0-24.el9.noarch.rpm
python3-vine-5.0.0-3.el9.noarch.rpm
python3-virtualenv-20.4.4-1.el9.noarch.rpm
python3-voluptuous-0.11.7-3.el9.noarch.rpm
python3-waitress-2.0.0-2.el9.noarch.rpm
python3-warlock-1.3.3-2.el9.noarch.rpm
python3-wcwidth-0.2.5-2.el9.2.noarch.rpm
python3-webencodings-0.5.1-15.el9.1.noarch.rpm
python3-webob-1.8.5-5.el9.noarch.rpm
python3-webtest-2.0.33-5.el9.noarch.rpm
python3-werkzeug-2.0.3-4.el9.noarch.rpm
python3-wsme-0.11.0-0.20221128135154.80bda90.el9.noarch.rpm
python3-zake-0.2.2-19.el9.noarch.rpm
python3-zeroconf-0.24.4-2.el9.noarch.rpm
python3-zipp-0.5.1-3.el9.noarch.rpm
python3-zope-event-4.2.0-20.el9.1.noarch.rpm
python3-zope-testing-4.7-4.el9.1.noarch.rpm
subunit-filters-1.4.0-6.el9.1.noarch.rpm
subunit-perl-1.4.0-6.el9.1.noarch.rpm
subunit-shell-1.4.0-6.el9.1.noarch.rpm
tox-3.23.0-2.el9.1.noarch.rpm

ppc64le:
python-bcrypt-debugsource-3.1.6-3.el9.ppc64le.rpm
python-coverage-debugsource-5.6-0.1b1.el9.ppc64le.rpm
python-gevent-debugsource-21.1.2-1.el9.ppc64le.rpm
python-greenlet-debugsource-1.1.3-1.el9.ppc64le.rpm
python-kerberos-debugsource-1.3.0-11.el9.1.ppc64le.rpm
python-kiwisolver-debugsource-1.1.0-4.el9.ppc64le.rpm
python-markupsafe-debugsource-2.0.0-2.el9.ppc64le.rpm
python-mistune-debugsource-0.8.3-15.1.el9.ppc64le.rpm
python-msgpack-debugsource-0.6.2-2.el9.ppc64le.rpm
python-simplejson-debugsource-3.17.0-2.el9.ppc64le.rpm
python-sqlalchemy-debugsource-1.4.39-2.el9.ppc64le.rpm
python-tornado-debugsource-6.1.0-2.el9.1.ppc64le.rpm
python-tornado-doc-6.1.0-2.el9.1.ppc64le.rpm
python-wrapt-debugsource-1.11.2-4.el9.ppc64le.rpm
python-wrapt-doc-1.11.2-4.el9.ppc64le.rpm
python-yappi-debugsource-1.3.1-2.el9.ppc64le.rpm
python3-bcrypt-3.1.6-3.el9.ppc64le.rpm
python3-bcrypt-debuginfo-3.1.6-3.el9.ppc64le.rpm
python3-coverage-5.6-0.1b1.el9.ppc64le.rpm
python3-coverage-debuginfo-5.6-0.1b1.el9.ppc64le.rpm
python3-gevent-21.1.2-1.el9.ppc64le.rpm
python3-gevent-debuginfo-21.1.2-1.el9.ppc64le.rpm
python3-greenlet-1.1.3-1.el9.ppc64le.rpm
python3-greenlet-debuginfo-1.1.3-1.el9.ppc64le.rpm
python3-greenlet-devel-1.1.3-1.el9.ppc64le.rpm
python3-kerberos-1.3.0-11.el9.1.ppc64le.rpm
python3-kerberos-debuginfo-1.3.0-11.el9.1.ppc64le.rpm
python3-kiwisolver-1.1.0-4.el9.ppc64le.rpm
python3-kiwisolver-debuginfo-1.1.0-4.el9.ppc64le.rpm
python3-markupsafe-2.0.0-2.el9.ppc64le.rpm
python3-markupsafe-debuginfo-2.0.0-2.el9.ppc64le.rpm
python3-mistune-0.8.3-15.1.el9.ppc64le.rpm
python3-mistune-debuginfo-0.8.3-15.1.el9.ppc64le.rpm
python3-msgpack-0.6.2-2.el9.ppc64le.rpm
python3-msgpack-debuginfo-0.6.2-2.el9.ppc64le.rpm
python3-simplejson-3.17.0-2.el9.ppc64le.rpm
python3-simplejson-debuginfo-3.17.0-2.el9.ppc64le.rpm
python3-sqlalchemy+aiomysql-1.4.39-2.el9.ppc64le.rpm
python3-sqlalchemy+aiosqlite-1.4.39-2.el9.ppc64le.rpm
python3-sqlalchemy+asyncio-1.4.39-2.el9.ppc64le.rpm
python3-sqlalchemy+mssql_pymssql-1.4.39-2.el9.ppc64le.rpm
python3-sqlalchemy+mssql_pyodbc-1.4.39-2.el9.ppc64le.rpm
python3-sqlalchemy+mysql-1.4.39-2.el9.ppc64le.rpm
python3-sqlalchemy+postgresql-1.4.39-2.el9.ppc64le.rpm
python3-sqlalchemy+postgresql_asyncpg-1.4.39-2.el9.ppc64le.rpm
python3-sqlalchemy+postgresql_pg8000-1.4.39-2.el9.ppc64le.rpm
python3-sqlalchemy+pymysql-1.4.39-2.el9.ppc64le.rpm
python3-sqlalchemy-1.4.39-2.el9.ppc64le.rpm
python3-sqlalchemy-debuginfo-1.4.39-2.el9.ppc64le.rpm
python3-tornado-6.1.0-2.el9.1.ppc64le.rpm
python3-tornado-debuginfo-6.1.0-2.el9.1.ppc64le.rpm
python3-wrapt-1.11.2-4.el9.ppc64le.rpm
python3-wrapt-debuginfo-1.11.2-4.el9.ppc64le.rpm
python3-yappi-1.3.1-2.el9.ppc64le.rpm
python3-yappi-debuginfo-1.3.1-2.el9.ppc64le.rpm
python3-zope-interface-5.4.0-1.el9.ppc64le.rpm
subunit-1.4.0-6.el9.1.ppc64le.rpm
subunit-cppunit-1.4.0-6.el9.1.ppc64le.rpm
subunit-cppunit-debuginfo-1.4.0-6.el9.1.ppc64le.rpm
subunit-cppunit-devel-1.4.0-6.el9.1.ppc64le.rpm
subunit-debuginfo-1.4.0-6.el9.1.ppc64le.rpm
subunit-debugsource-1.4.0-6.el9.1.ppc64le.rpm
subunit-devel-1.4.0-6.el9.1.ppc64le.rpm
subunit-static-1.4.0-6.el9.1.ppc64le.rpm

s390x:
python-bcrypt-debugsource-3.1.6-3.el9.s390x.rpm
python-coverage-debugsource-5.6-0.1b1.el9.s390x.rpm
python-gevent-debugsource-21.1.2-1.el9.s390x.rpm
python-greenlet-debugsource-1.1.3-1.el9.s390x.rpm
python-kerberos-debugsource-1.3.0-11.el9.1.s390x.rpm
python-kiwisolver-debugsource-1.1.0-4.el9.s390x.rpm
python-markupsafe-debugsource-2.0.0-2.el9.s390x.rpm
python-mistune-debugsource-0.8.3-15.1.el9.s390x.rpm
python-msgpack-debugsource-0.6.2-2.el9.s390x.rpm
python-simplejson-debugsource-3.17.0-2.el9.s390x.rpm
python-sqlalchemy-debugsource-1.4.39-2.el9.s390x.rpm
python-tornado-debugsource-6.1.0-2.el9.1.s390x.rpm
python-tornado-doc-6.1.0-2.el9.1.s390x.rpm
python-wrapt-debugsource-1.11.2-4.el9.s390x.rpm
python-wrapt-doc-1.11.2-4.el9.s390x.rpm
python-yappi-debugsource-1.3.1-2.el9.s390x.rpm
python3-bcrypt-3.1.6-3.el9.s390x.rpm
python3-bcrypt-debuginfo-3.1.6-3.el9.s390x.rpm
python3-coverage-5.6-0.1b1.el9.s390x.rpm
python3-coverage-debuginfo-5.6-0.1b1.el9.s390x.rpm
python3-gevent-21.1.2-1.el9.s390x.rpm
python3-gevent-debuginfo-21.1.2-1.el9.s390x.rpm
python3-greenlet-1.1.3-1.el9.s390x.rpm
python3-greenlet-debuginfo-1.1.3-1.el9.s390x.rpm
python3-greenlet-devel-1.1.3-1.el9.s390x.rpm
python3-kerberos-1.3.0-11.el9.1.s390x.rpm
python3-kerberos-debuginfo-1.3.0-11.el9.1.s390x.rpm
python3-kiwisolver-1.1.0-4.el9.s390x.rpm
python3-kiwisolver-debuginfo-1.1.0-4.el9.s390x.rpm
python3-markupsafe-2.0.0-2.el9.s390x.rpm
python3-markupsafe-debuginfo-2.0.0-2.el9.s390x.rpm
python3-mistune-0.8.3-15.1.el9.s390x.rpm
python3-mistune-debuginfo-0.8.3-15.1.el9.s390x.rpm
python3-msgpack-0.6.2-2.el9.s390x.rpm
python3-msgpack-debuginfo-0.6.2-2.el9.s390x.rpm
python3-simplejson-3.17.0-2.el9.s390x.rpm
python3-simplejson-debuginfo-3.17.0-2.el9.s390x.rpm
python3-sqlalchemy+aiomysql-1.4.39-2.el9.s390x.rpm
python3-sqlalchemy+aiosqlite-1.4.39-2.el9.s390x.rpm
python3-sqlalchemy+asyncio-1.4.39-2.el9.s390x.rpm
python3-sqlalchemy+mssql_pymssql-1.4.39-2.el9.s390x.rpm
python3-sqlalchemy+mssql_pyodbc-1.4.39-2.el9.s390x.rpm
python3-sqlalchemy+mysql-1.4.39-2.el9.s390x.rpm
python3-sqlalchemy+postgresql-1.4.39-2.el9.s390x.rpm
python3-sqlalchemy+postgresql_asyncpg-1.4.39-2.el9.s390x.rpm
python3-sqlalchemy+postgresql_pg8000-1.4.39-2.el9.s390x.rpm
python3-sqlalchemy+pymysql-1.4.39-2.el9.s390x.rpm
python3-sqlalchemy-1.4.39-2.el9.s390x.rpm
python3-sqlalchemy-debuginfo-1.4.39-2.el9.s390x.rpm
python3-tornado-6.1.0-2.el9.1.s390x.rpm
python3-tornado-debuginfo-6.1.0-2.el9.1.s390x.rpm
python3-wrapt-1.11.2-4.el9.s390x.rpm
python3-wrapt-debuginfo-1.11.2-4.el9.s390x.rpm
python3-yappi-1.3.1-2.el9.s390x.rpm
python3-yappi-debuginfo-1.3.1-2.el9.s390x.rpm
python3-zope-interface-5.4.0-1.el9.s390x.rpm
subunit-1.4.0-6.el9.1.s390x.rpm
subunit-cppunit-1.4.0-6.el9.1.s390x.rpm
subunit-cppunit-debuginfo-1.4.0-6.el9.1.s390x.rpm
subunit-cppunit-devel-1.4.0-6.el9.1.s390x.rpm
subunit-debuginfo-1.4.0-6.el9.1.s390x.rpm
subunit-debugsource-1.4.0-6.el9.1.s390x.rpm
subunit-devel-1.4.0-6.el9.1.s390x.rpm
subunit-static-1.4.0-6.el9.1.s390x.rpm

x86_64:
python-bcrypt-debugsource-3.1.6-3.el9.x86_64.rpm
python-coverage-debugsource-5.6-0.1b1.el9.x86_64.rpm
python-gevent-debugsource-21.1.2-1.el9.x86_64.rpm
python-greenlet-debugsource-1.1.3-1.el9.x86_64.rpm
python-kerberos-debugsource-1.3.0-11.el9.1.x86_64.rpm
python-kiwisolver-debugsource-1.1.0-4.el9.x86_64.rpm
python-markupsafe-debugsource-2.0.0-2.el9.x86_64.rpm
python-mistune-debugsource-0.8.3-15.1.el9.x86_64.rpm
python-msgpack-debugsource-0.6.2-2.el9.x86_64.rpm
python-simplejson-debugsource-3.17.0-2.el9.x86_64.rpm
python-sqlalchemy-debugsource-1.4.39-2.el9.x86_64.rpm
python-tornado-debugsource-6.1.0-2.el9.1.x86_64.rpm
python-tornado-doc-6.1.0-2.el9.1.x86_64.rpm
python-wrapt-debugsource-1.11.2-4.el9.x86_64.rpm
python-wrapt-doc-1.11.2-4.el9.x86_64.rpm
python-yappi-debugsource-1.3.1-2.el9.x86_64.rpm
python3-bcrypt-3.1.6-3.el9.x86_64.rpm
python3-bcrypt-debuginfo-3.1.6-3.el9.x86_64.rpm
python3-coverage-5.6-0.1b1.el9.x86_64.rpm
python3-coverage-debuginfo-5.6-0.1b1.el9.x86_64.rpm
python3-gevent-21.1.2-1.el9.x86_64.rpm
python3-gevent-debuginfo-21.1.2-1.el9.x86_64.rpm
python3-greenlet-1.1.3-1.el9.x86_64.rpm
python3-greenlet-debuginfo-1.1.3-1.el9.x86_64.rpm
python3-greenlet-devel-1.1.3-1.el9.x86_64.rpm
python3-kerberos-1.3.0-11.el9.1.x86_64.rpm
python3-kerberos-debuginfo-1.3.0-11.el9.1.x86_64.rpm
python3-kiwisolver-1.1.0-4.el9.x86_64.rpm
python3-kiwisolver-debuginfo-1.1.0-4.el9.x86_64.rpm
python3-markupsafe-2.0.0-2.el9.x86_64.rpm
python3-markupsafe-debuginfo-2.0.0-2.el9.x86_64.rpm
python3-mistune-0.8.3-15.1.el9.x86_64.rpm
python3-mistune-debuginfo-0.8.3-15.1.el9.x86_64.rpm
python3-msgpack-0.6.2-2.el9.x86_64.rpm
python3-msgpack-debuginfo-0.6.2-2.el9.x86_64.rpm
python3-simplejson-3.17.0-2.el9.x86_64.rpm
python3-simplejson-debuginfo-3.17.0-2.el9.x86_64.rpm
python3-sqlalchemy+aiomysql-1.4.39-2.el9.x86_64.rpm
python3-sqlalchemy+aiosqlite-1.4.39-2.el9.x86_64.rpm
python3-sqlalchemy+asyncio-1.4.39-2.el9.x86_64.rpm
python3-sqlalchemy+mssql_pymssql-1.4.39-2.el9.x86_64.rpm
python3-sqlalchemy+mssql_pyodbc-1.4.39-2.el9.x86_64.rpm
python3-sqlalchemy+mysql-1.4.39-2.el9.x86_64.rpm
python3-sqlalchemy+postgresql-1.4.39-2.el9.x86_64.rpm
python3-sqlalchemy+postgresql_asyncpg-1.4.39-2.el9.x86_64.rpm
python3-sqlalchemy+postgresql_pg8000-1.4.39-2.el9.x86_64.rpm
python3-sqlalchemy+pymysql-1.4.39-2.el9.x86_64.rpm
python3-sqlalchemy-1.4.39-2.el9.x86_64.rpm
python3-sqlalchemy-debuginfo-1.4.39-2.el9.x86_64.rpm
python3-tornado-6.1.0-2.el9.1.x86_64.rpm
python3-tornado-debuginfo-6.1.0-2.el9.1.x86_64.rpm
python3-wrapt-1.11.2-4.el9.x86_64.rpm
python3-wrapt-debuginfo-1.11.2-4.el9.x86_64.rpm
python3-yappi-1.3.1-2.el9.x86_64.rpm
python3-yappi-debuginfo-1.3.1-2.el9.x86_64.rpm
python3-zope-interface-5.4.0-1.el9.x86_64.rpm
subunit-1.4.0-6.el9.1.x86_64.rpm
subunit-cppunit-1.4.0-6.el9.1.x86_64.rpm
subunit-cppunit-debuginfo-1.4.0-6.el9.1.x86_64.rpm
subunit-cppunit-devel-1.4.0-6.el9.1.x86_64.rpm
subunit-debuginfo-1.4.0-6.el9.1.x86_64.rpm
subunit-debugsource-1.4.0-6.el9.1.x86_64.rpm
subunit-devel-1.4.0-6.el9.1.x86_64.rpm
subunit-static-1.4.0-6.el9.1.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2022-2990
https://access.redhat.com/security/cve/CVE-2022-3259
https://access.redhat.com/security/cve/CVE-2022-41717
https://access.redhat.com/security/cve/CVE-2022-41723
https://access.redhat.com/security/cve/CVE-2022-41724
https://access.redhat.com/security/cve/CVE-2022-41725
https://access.redhat.com/security/cve/CVE-2023-0056
https://access.redhat.com/security/cve/CVE-2023-0229
https://access.redhat.com/security/cve/CVE-2023-0778
https://access.redhat.com/security/cve/CVE-2023-25577
https://access.redhat.com/security/cve/CVE-2023-25725
https://access.redhat.com/security/updates/classification/#important
https://docs.openshift.com/container-platform/4.13/release_notes/ocp-4-13-release-notes.html

  1. Contact:

The Red Hat security contact is [email protected]. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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/7Vs
-----END PGP SIGNATURE-----

RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce

Related news

Ubuntu Security Notice USN-7111-1

Ubuntu Security Notice 7111-1 - Philippe Antoine discovered that Go incorrectly handled crafted HTTP/2 streams. An attacker could possibly use this issue to cause a denial of service. Marten Seemann discovered that Go did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a panic resulting in a denial of service. Ameya Darshan and Jakob Ackermann discovered that Go did not properly validate the amount of memory and disk files ReadForm can consume. An attacker could possibly use this issue to cause a panic resulting in a denial of service.

Gentoo Linux Security Advisory 202407-12

Gentoo Linux Security Advisory 202407-12 - Multiple vulnerabilities have been discovered in Podman, the worst of which could lead to privilege escalation. Versions greater than or equal to 4.9.4 are affected.

Red Hat Security Advisory 2024-0746-03

Red Hat Security Advisory 2024-0746-03 - Updated container image for Red Hat Ceph Storage 5.3 is now available in the Red Hat Ecosystem Catalog. Issues addressed include cross site scripting and denial of service vulnerabilities.

Red Hat Security Advisory 2023-7341-01

Red Hat Security Advisory 2023-7341-01 - An update is now available for Red Hat Quay 3.

Red Hat Security Advisory 2023-6235-01

Red Hat Security Advisory 2023-6235-01 - Red Hat OpenShift Virtualization release 4.13.5 is now available with updates to packages and images that fix several bugs and add enhancements. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-5976-01

Red Hat Security Advisory 2023-5976-01 - An update is now available for Service Telemetry Framework 1.5.2. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-5233-01

Red Hat Security Advisory 2023-5233-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 4.13.4 images.

Red Hat Security Advisory 2023-4731-01

Red Hat Security Advisory 2023-4731-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.10.

Red Hat Security Advisory 2023-4603-01

Red Hat Security Advisory 2023-4603-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.9.

Red Hat Security Advisory 2023-4627-01

Red Hat Security Advisory 2023-4627-01 - Migration Toolkit for Applications 6.2.0 Images. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-4456-01

Red Hat Security Advisory 2023-4456-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.8. Issues addressed include an add administrator vulnerability.

RHSA-2023:4335: Red Hat Security Advisory: Security Update for cert-manager Operator for Red Hat OpenShift 1.10.3

cert-manager Operator for Red Hat OpenShift 1.10.3 Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specia...

Red Hat Security Advisory 2023-4421-01

Red Hat Security Advisory 2023-4421-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 4.12.5 images.

RHSA-2023:4226: Red Hat Security Advisory: OpenShift Container Platform 4.13.6 bug fix and security update

Red Hat OpenShift Container Platform release 4.13.6 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number...

Red Hat Security Advisory 2023-4091-01

Red Hat Security Advisory 2023-4091-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.5. Issues addressed include a denial of service vulnerability.

RHSA-2023:4091: Red Hat Security Advisory: OpenShift Container Platform 4.13.5 security update

Red Hat OpenShift Container Platform release 4.13.5 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server c...

RHSA-2023:4113: Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.3.5 security update

Red Hat OpenShift Service Mesh 2.3.5 Containers Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptog...

RHSA-2023:4003: Red Hat Security Advisory: Red Hat Service Interconnect 1.4 Release security update

This is release 1.4 of the rpms for Red Hat Service Interconnect. Red Hat Service Interconnect 1.4 introduces a service network, linking TCP and HTTP services across the hybrid cloud. A service network enables communication between services running in different network locations or sites. It allows geographically distributed services to connect as if they were all running in the same site. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: A flaw was found in the gol...

RHSA-2023:3925: Red Hat Security Advisory: Red Hat OpenShift Enterprise security update

Red Hat OpenShift Container Platform release 4.12.23 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-...

RHSA-2023:3943: Red Hat Security Advisory: ACS 4.1 enhancement and security update

Updated images are now available for Red Hat Advanced Cluster Security (RHACS). The updated image includes new features and bug fixes. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27191: A broken cryptographic algorithm flaw was found in golang.org/x/crypto/ssh. This issue causes a client to fail authentication with RSA keys to servers that reject signature algorithms based on SHA-2, enabling an attacker to crash the server, resulting in a loss of availability. * CVE...

Red Hat Security Advisory 2023-3742-02

Red Hat Security Advisory 2023-3742-02 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. Issues addressed include bypass, denial of service, and remote SQL injection vulnerabilities.

RHSA-2023:3614: Red Hat Security Advisory: OpenShift Container Platform 4.13.4 bug fix and security update

Red Hat OpenShift Container Platform release 4.13.4 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number...

Ubuntu Security Notice USN-5948-2

Ubuntu Security Notice 5948-2 - USN-5948-1 fixed vulnerabilities in Werkzeug. This update provides the corresponding updates for Ubuntu 23.04. It was discovered that Werkzeug did not properly handle the parsing of nameless cookies. A remote attacker could possibly use this issue to shadow other cookies.

Red Hat Security Advisory 2023-3610-01

Red Hat Security Advisory 2023-3610-01 - Jenkins is a continuous integration server that monitors executions of repeated jobs, such as building a software project or jobs run by cron. Issues addressed include bypass, code execution, cross site request forgery, cross site scripting, denial of service, memory exhaustion, and resource exhaustion vulnerabilities.

RHSA-2023:3644: Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.0

Red Hat OpenShift Service Mesh Containers for 2.4.0 Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24540: A flaw was found in golang, where not all valid JavaScript white-space characters were considered white space. Due to this issue, templates containing white-space characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution.

Red Hat Security Advisory 2023-3495-01

Red Hat Security Advisory 2023-3495-01 - Logging Subsystem 5.7.2 - Red Hat OpenShift. Issues addressed include cross site scripting and denial of service vulnerabilities.

RHSA-2023:3537: Red Hat Security Advisory: OpenShift Container Platform 4.13.3 bug fix and security update

Red Hat OpenShift Container Platform release 4.13.3 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number...

RHSA-2023:3366: Red Hat Security Advisory: OpenShift Container Platform 4.13.2 packages and security update

Red Hat OpenShift Container Platform release 4.13.2 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27191: A broken cryptographic algorithm flaw was found in golang.org/x/crypto/ssh. This issue causes a client to fail authentication with RSA keys to servers that reject signature algorithms...

Ubuntu Security Notice USN-6140-1

Ubuntu Security Notice 6140-1 - It was discovered that Go did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a panic resulting in a denial of service. This issue only affected golang-1.19 on Ubuntu 22.10. It was discovered that Go did not properly validate the amount of memory and disk files ReadForm can consume. An attacker could possibly use this issue to cause a panic resulting in a denial of service. This issue only affected golang-1.19 on Ubuntu 22.10.

RHSA-2023:3455: Red Hat Security Advisory: Release of OpenShift Serverless 1.29.0

OpenShift Serverless version 1.29.0 contains a moderate security impact. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker ...

RHSA-2023:3445: Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update

An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-28235: A flaw was found in etcd, where etc-io could allow a remote attacker to gain elevated privileges on the system caused by a vulnerability in the debug function. By sending a specially crafted request, an attacker can gain elevated privileges. * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause e...

Red Hat Security Advisory 2023-3304-01

Red Hat Security Advisory 2023-3304-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.1. Issues addressed include denial of service and traversal vulnerabilities.

Red Hat Security Advisory 2023-3305-02

Red Hat Security Advisory 2023-3305-02 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.1.

RHSA-2023:3450: Red Hat Security Advisory: OpenShift Serverless Client kn 1.29.0 release

OpenShift Serverless 1.29.0 has been released. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of serv...

RHSA-2023:3303: Red Hat Security Advisory: OpenShift Container Platform 4.13.1 packages and security update

Red Hat OpenShift Container Platform release 4.13.1 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a ...

RHSA-2023:3304: Red Hat Security Advisory: OpenShift Container Platform 4.13.1 bug fix and security update

Red Hat OpenShift Container Platform release 4.13.1 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2018-17419: The Miek Gieben DNS library is vulnerable to a denial of service caused by a segmentation violation in setTA in scan_rr.go. By persuading a victim to open a specially-crafted file, a ...

RHSA-2023:3305: Red Hat Security Advisory: OpenShift Container Platform 4.13.1 security and extras update

Red Hat OpenShift Container Platform release 4.13.1 is now available with updates to packages and images that fix several bugs. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.

Red Hat Security Advisory 2023-3296-01

Red Hat Security Advisory 2023-3296-01 - Multicluster Engine for Kubernetes 2.2.4 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy.

RHSA-2023:3296: Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.2.4 security fixes and container updates

Multicluster Engine for Kubernetes 2.2.4 General Availability release images, which fix security issues and update container images. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-32313: A flaw was found in the vm2. After making a vm, the inspect method is read-write for console.log, which allows an attacker to edit options for console.log. This issue impacts the integrity by changing the log subsystem. * CVE-2023-32314: A flaw was found in the vm2 sandbox. When a host ...

Red Hat Security Advisory 2023-3167-01

Red Hat Security Advisory 2023-3167-01 - New Red Hat build of Cryostat 2.3.0 on RHEL 8 container images have been released, adding a variety of features and bug fixes. Issues addressed include a denial of service vulnerability.

RHSA-2023:0584: Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.1.1 security update

Secondary Scheduler Operator for Red Hat OpenShift 1.1.1 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2880: A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy sanitizes the query ...

Red Hat Security Advisory 2023-1328-01

Red Hat Security Advisory 2023-1328-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include denial of service and out of bounds read vulnerabilities.

Red Hat Security Advisory 2023-1326-01

Red Hat Security Advisory 2023-1326-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.0. Issues addressed include bypass, denial of service, information leakage, out of bounds read, and remote SQL injection vulnerabilities.

RHSA-2023:3167: Red Hat Security Advisory: Red Hat build of Cryostat 2.3.0: new RHEL 8 container images

New Red Hat build of Cryostat 2.3.0 on RHEL 8 container images are now availableThis content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition. * CVE-2022-41725: A flaw was found in Go, where it is vulnerable to a denial of service caused by an excessive resource consumption...

RHSA-2023:1325: Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update

Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2990: An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has d...

RHSA-2023:1325: Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update

Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2990: An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has d...

RHSA-2023:1325: Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update

Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2990: An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has d...

RHSA-2023:1325: Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update

Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2990: An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has d...

RHSA-2023:1325: Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update

Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2990: An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has d...

RHSA-2023:1325: Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update

Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2990: An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has d...

RHSA-2023:1325: Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update

Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2990: An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has d...

RHSA-2023:1325: Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update

Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2990: An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has d...

RHSA-2023:1325: Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update

Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2990: An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has d...

RHSA-2023:1325: Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update

Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2990: An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has d...

RHSA-2023:1326: Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update

Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: A flaw was found in go-yaml. This issue occurs due to unbounded alias chasing, where a maliciously crafted YAML file can cause the system to consume significant system resources. If p...

RHSA-2023:1326: Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update

Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: A flaw was found in go-yaml. This issue occurs due to unbounded alias chasing, where a maliciously crafted YAML file can cause the system to consume significant system resources. If p...

RHSA-2023:1326: Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update

Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: A flaw was found in go-yaml. This issue occurs due to unbounded alias chasing, where a maliciously crafted YAML file can cause the system to consume significant system resources. If p...

RHSA-2023:1326: Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update

Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: A flaw was found in go-yaml. This issue occurs due to unbounded alias chasing, where a maliciously crafted YAML file can cause the system to consume significant system resources. If p...

RHSA-2023:1326: Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update

Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: A flaw was found in go-yaml. This issue occurs due to unbounded alias chasing, where a maliciously crafted YAML file can cause the system to consume significant system resources. If p...

RHSA-2023:1326: Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update

Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: A flaw was found in go-yaml. This issue occurs due to unbounded alias chasing, where a maliciously crafted YAML file can cause the system to consume significant system resources. If p...

RHSA-2023:1326: Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update

Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: A flaw was found in go-yaml. This issue occurs due to unbounded alias chasing, where a maliciously crafted YAML file can cause the system to consume significant system resources. If p...

RHSA-2023:1326: Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update

Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: A flaw was found in go-yaml. This issue occurs due to unbounded alias chasing, where a maliciously crafted YAML file can cause the system to consume significant system resources. If p...

Red Hat Security Advisory 2023-1327-01

Red Hat Security Advisory 2023-1327-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.0.

Red Hat Security Advisory 2023-1327-01

Red Hat Security Advisory 2023-1327-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.0.

Red Hat Security Advisory 2023-1327-01

Red Hat Security Advisory 2023-1327-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.0.

Red Hat Security Advisory 2023-1327-01

Red Hat Security Advisory 2023-1327-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.0.

Red Hat Security Advisory 2023-1327-01

Red Hat Security Advisory 2023-1327-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.0.

Red Hat Security Advisory 2023-1327-01

Red Hat Security Advisory 2023-1327-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.0.

Red Hat Security Advisory 2023-1327-01

Red Hat Security Advisory 2023-1327-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.0.

Red Hat Security Advisory 2023-1327-01

Red Hat Security Advisory 2023-1327-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.0.

Red Hat Security Advisory 2023-1327-01

Red Hat Security Advisory 2023-1327-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.0.

Red Hat Security Advisory 2023-1327-01

Red Hat Security Advisory 2023-1327-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.0.

Red Hat Security Advisory 2023-2802-01

Red Hat Security Advisory 2023-2802-01 - The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Issues addressed include denial of service and information leakage vulnerabilities.

RHSA-2023:3083: Red Hat Security Advisory: go-toolset:rhel8 security and bug fix update

An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition. * CVE-2022-41725: A flaw was found in Go, where it is vulnerable to a den...

RHSA-2023:3083: Red Hat Security Advisory: go-toolset:rhel8 security and bug fix update

An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition. * CVE-2022-41725: A flaw was found in Go, where it is vulnerable to a den...

Red Hat Security Advisory 2023-2283-01

Red Hat Security Advisory 2023-2283-01 - The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files.

Red Hat Security Advisory 2023-2367-01

Red Hat Security Advisory 2023-2367-01 - The Container Network Interface project consists of a specification and libraries for writing plug-ins for configuring network interfaces in Linux containers, along with a number of supported plug-ins. CNI concerns itself only with network connectivity of containers and removing allocated resources when the container is deleted.

RHSA-2023:2283: Red Hat Security Advisory: skopeo security and bug fix update

An update for skopeo is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30629: A flaw was found in the crypto/tls golang package. When session tickets are generated by crypto/tls, it is missing the ticket expiration. This issue may allow an attacker to observe the TLS handshakes to correlate successive connections during session resumption. * CVE-2022-41717: A flaw was found in the net/http library of the golang package. Thi...

Red Hat Security Advisory 2023-2107-01

Red Hat Security Advisory 2023-2107-01 - The Migration Toolkit for Containers (MTC) 1.7.9 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-2107-01

Red Hat Security Advisory 2023-2107-01 - The Migration Toolkit for Containers (MTC) 1.7.9 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. Issues addressed include a denial of service vulnerability.

RHSA-2023:2107: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.9 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.9 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition. * CVE-2022-41725: A flaw was found in Go, where it is vulnerable to a denial of service caused by...

RHSA-2023:2107: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.9 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.9 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition. * CVE-2022-41725: A flaw was found in Go, where it is vulnerable to a denial of service caused by...

RHSA-2023:2041: Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update

Migration Toolkit for Applications 6.1.0 release Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3782: A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. An attacker can use this flaw to construct a malicious request to bypass validation and access other URLs and potentially sensitive information within the domain or possibly conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect ...

Red Hat Security Advisory 2023-1978-01

Red Hat Security Advisory 2023-1978-01 - The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-1978-01

Red Hat Security Advisory 2023-1978-01 - The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications. Issues addressed include a denial of service vulnerability.

RHSA-2023:1978: Red Hat Security Advisory: haproxy security update

An update for haproxy is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0056: An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impact is to availability. * CVE-2023-25725: A flaw was found in HAProxy's hea...

RHSA-2023:1978: Red Hat Security Advisory: haproxy security update

An update for haproxy is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0056: An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impact is to availability. * CVE-2023-25725: A flaw was found in HAProxy's hea...

Red Hat Security Advisory 2023-1817-01

Red Hat Security Advisory 2023-1817-01 - Network Observability 1.2.0 is an OpenShift operator that provides a monitoring pipeline to collect and enrich network flows that are produced by the Network observability eBPF agent. The operator provides dashboards, metrics, and keeps flows accessible in a queryable log store, Grafana Loki. When a FlowCollector is deployed, new dashboards are available in the Console. This update contains bug fixes. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-1817-01

Red Hat Security Advisory 2023-1817-01 - Network Observability 1.2.0 is an OpenShift operator that provides a monitoring pipeline to collect and enrich network flows that are produced by the Network observability eBPF agent. The operator provides dashboards, metrics, and keeps flows accessible in a queryable log store, Grafana Loki. When a FlowCollector is deployed, new dashboards are available in the Console. This update contains bug fixes. Issues addressed include a denial of service vulnerability.

RHSA-2023:1696: Red Hat Security Advisory: haproxy security update

An update for haproxy is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0056: An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impact is to availability. * CVE-2023-25725: A flaw was found in HAProxy's headers processing that cause...

RHSA-2023:1696: Red Hat Security Advisory: haproxy security update

An update for haproxy is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0056: An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impact is to availability. * CVE-2023-25725: A flaw was found in HAProxy's headers processing that cause...

Red Hat Security Advisory 2023-1639-01

Red Hat Security Advisory 2023-1639-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-1639-01

Red Hat Security Advisory 2023-1639-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes. Issues addressed include a denial of service vulnerability.

RHSA-2023:1639: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.3 security and bug fix update

OpenShift API for Data Protection (OADP) 1.1.3 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition. * CVE-2022-41725: A flaw was found in Go, where it is vulnerable to a denial of service caused by a...

RHSA-2023:1639: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.3 security and bug fix update

OpenShift API for Data Protection (OADP) 1.1.3 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition. * CVE-2022-41725: A flaw was found in Go, where it is vulnerable to a denial of service caused by a...

GHSA-qwqv-rqgf-8qh8: Podman Time-of-check Time-of-use (TOCTOU) Race Condition

A Time-of-check Time-of-use (TOCTOU) flaw was found in podman. This issue may allow a malicious user to replace a normal file in a volume with a symlink while exporting the volume, allowing for access to arbitrary files on the host file system.

CVE-2023-0778: Invalid Bug ID

A Time-of-check Time-of-use (TOCTOU) flaw was found in podman. This issue may allow a malicious user to replace a normal file in a volume with a symlink while exporting the volume, allowing for access to arbitrary files on the host file system.

Red Hat Security Advisory 2023-1448-01

Red Hat Security Advisory 2023-1448-01 - Red Hat OpenShift Service Mesh is the Red Hat distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation. This advisory covers container images for the release.

CVE-2023-0056: Red Hat Customer Portal - Access to 24x7 support and knowledge

An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impact is to availability.

Red Hat Security Advisory 2023-1281-01

Red Hat Security Advisory 2023-1281-01 - An update for python-werkzeug is now available for Red Hat OpenStack Platform. Issues addressed include a remote shell upload vulnerability.

RHSA-2023:1281: Red Hat Security Advisory: Red Hat OpenStack Platform (python-werkzeug) security update

An update for python-werkzeug is now available for Red Hat OpenStack Platform. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-25577: A flaw was found in python-werkzeug. Werkzeug is multipart form data parser, that will parse an unlimited number of parts, including file parts. These parts can be a small amount of bytes, but each requires CPU time to parse, and may use more memory as Python data. If a request can be made to an endpoint that accesses request.data, reque...

Ubuntu Security Notice USN-5948-1

Ubuntu Security Notice 5948-1 - It was discovered that Werkzeug did not properly handle the parsing of nameless cookies. A remote attacker could possibly use this issue to shadow other cookies. It was discovered that Werkzeug could be made to process unlimited number of multipart form data parts. A remote attacker could possibly use this issue to cause Werkzeug to consume resources, leading to a denial of service.

Red Hat Security Advisory 2023-1181-01

Red Hat Security Advisory 2023-1181-01 - OpenShift Serverless version 1.27.1 contains a moderate security impact. This release includes security and bug fixes, and enhancements.

Red Hat Security Advisory 2023-1179-01

Red Hat Security Advisory 2023-1179-01 - Red Hat OpenShift Serverless Client kn 1.27.1 provides a CLI to interact with Red Hat OpenShift Serverless 1.27.1. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms. This release includes security and bug fixes, and enhancements.

Red Hat Security Advisory 2023-1018-01

Red Hat Security Advisory 2023-1018-01 - An update for python-werkzeug is now available for Red Hat OpenStack Platform 17.0 (Wallaby). Issues addressed include a remote shell upload vulnerability.

CVE-2022-41725: net/http, mime/multipart: denial of service from excessive resource consumption (CVE-2022-41725) · Issue #58006 · golang/go

A denial of service is possible from excessive resource consumption in net/http and mime/multipart. Multipart form parsing with mime/multipart.Reader.ReadForm can consume largely unlimited amounts of memory and disk files. This also affects form parsing in the net/http package with the Request methods FormFile, FormValue, ParseMultipartForm, and PostFormValue. ReadForm takes a maxMemory parameter, and is documented as storing "up to maxMemory bytes +10MB (reserved for non-file parts) in memory". File parts which cannot be stored in memory are stored on disk in temporary files. The unconfigurable 10MB reserved for non-file parts is excessively large and can potentially open a denial of service vector on its own. However, ReadForm did not properly account for all memory consumed by a parsed form, such as map entry overhead, part names, and MIME headers, permitting a maliciously crafted form to consume well over 10MB. In addition, ReadForm contained no limit on the number of disk files cr...

CVE-2022-41724: [security] Go 1.20.1 and Go 1.19.6 are released

Large handshake records may cause panics in crypto/tls. Both clients and servers may send large TLS handshake records which cause servers and clients, respectively, to panic when attempting to construct responses. This affects all TLS 1.3 clients, TLS 1.2 clients which explicitly enable session resumption (by setting Config.ClientSessionCache to a non-nil value), and TLS 1.3 servers which request client certificates (by setting Config.ClientAuth >= RequestClientCert).

CVE-2022-41723

A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.

CVE-2022-41724: [security] Go 1.20.1 and Go 1.19.6 are released

Large handshake records may cause panics in crypto/tls. Both clients and servers may send large TLS handshake records which cause servers and clients, respectively, to panic when attempting to construct responses. This affects all TLS 1.3 clients, TLS 1.2 clients which explicitly enable session resumption (by setting Config.ClientSessionCache to a non-nil value), and TLS 1.3 servers which request client certificates (by setting Config.ClientAuth >= RequestClientCert).

CVE-2022-41724: [security] Go 1.20.1 and Go 1.19.6 are released

Large handshake records may cause panics in crypto/tls. Both clients and servers may send large TLS handshake records which cause servers and clients, respectively, to panic when attempting to construct responses. This affects all TLS 1.3 clients, TLS 1.2 clients which explicitly enable session resumption (by setting Config.ClientSessionCache to a non-nil value), and TLS 1.3 servers which request client certificates (by setting Config.ClientAuth >= RequestClientCert).

RHSA-2023:1018: Red Hat Security Advisory: Red Hat OpenStack Platform 17.0 (python-werkzeug) security update

An update for python-werkzeug is now available for Red Hat OpenStack Platform 17.0 (Wallaby). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-25577: A flaw was found in python-werkzeug. Werkzeug is multipart form data parser, that will parse an unlimited number of parts, including file parts. These parts can be a small amount of bytes, but each requires CPU time to parse, and may use more memory as Python data. If a request can be made to an endpoint that accesses requ...

Red Hat Security Advisory 2023-0774-01

Red Hat Security Advisory 2023-0774-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.28. Issues addressed include denial of service and out of bounds read vulnerabilities.

RHSA-2023:0774: Red Hat Security Advisory: OpenShift Container Platform 4.11.28 security update

Red Hat OpenShift Container Platform release 4.11.28 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4238: A flaw was found in goutils where randomly generated alphanumeric strings contain significantly less entropy than expected. Both the `RandomAlphaNumeric` and `CryptoRandomAlphaNumeric` functions always return strings containing at least one digit from 0 to 9. This issu...

Red Hat Security Advisory 2023-0769-01

Red Hat Security Advisory 2023-0769-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.

GHSA-vvpx-j8f3-3w6h: Uncontrolled Resource Consumption

A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.

Debian Security Advisory 5348-1

Debian Linux Security Advisory 5348-1 - Two vulnerabilities were discovered in HAProxy, a fast and reliable load balancing reverse proxy, which may result in denial of service, or bypass of access controls and routing rules via specially crafted requests.

Debian Security Advisory 5348-1

Debian Linux Security Advisory 5348-1 - Two vulnerabilities were discovered in HAProxy, a fast and reliable load balancing reverse proxy, which may result in denial of service, or bypass of access controls and routing rules via specially crafted requests.

Ubuntu Security Notice USN-5869-1

Ubuntu Security Notice 5869-1 - Bahruz Jabiyev, Anthony Gavazzi, Engin Kirda, Kaan Onarlioglu, Adi Peleg, and Harvey Tuch discovered that HAProxy incorrectly handled empty header names. A remote attacker could possibly use this issue to manipulate headers and bypass certain authentication checks and restrictions.

GHSA-xg9f-g7g7-2323: High resource usage when parsing multipart form data with many fields

Werkzeug's multipart form data parser will parse an unlimited number of parts, including file parts. Parts can be a small amount of bytes, but each requires CPU time to parse and may use more memory as Python data. If a request can be made to an endpoint that accesses `request.data`, `request.form`, `request.files`, or `request.get_data(parse_form_data=False)`, it can cause unexpectedly high resource usage. This allows an attacker to cause a denial of service by sending crafted multipart data to an endpoint that will parse it. The amount of CPU time required can block worker processes from handling legitimate requests. The amount of RAM required can trigger an out of memory kill of the process. Unlimited file parts can use up memory and file handles. If many concurrent requests are sent continuously, this can exhaust or kill all available workers.

CVE-2023-25577: Merge pull request from GHSA-xg9f-g7g7-2323 · pallets/werkzeug@517cac5

Werkzeug is a comprehensive WSGI web application library. Prior to version 2.2.3, Werkzeug's multipart form data parser will parse an unlimited number of parts, including file parts. Parts can be a small amount of bytes, but each requires CPU time to parse and may use more memory as Python data. If a request can be made to an endpoint that accesses `request.data`, `request.form`, `request.files`, or `request.get_data(parse_form_data=False)`, it can cause unexpectedly high resource usage. This allows an attacker to cause a denial of service by sending crafted multipart data to an endpoint that will parse it. The amount of CPU time required can block worker processes from handling legitimate requests. The amount of RAM required can trigger an out of memory kill of the process. Unlimited file parts can use up memory and file handles. If many concurrent requests are sent continuously, this can exhaust or kill all available workers. Version 2.2.3 contains a patch for this issue.

CVE-2023-25725: The Reliable, High Performance TCP/HTTP Load Balancer

HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31.

RHSA-2023:0693: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.7 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.7 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-43138: A vulnerability was found in the async package. This flaw allows a malicious user to obtain privileges via the mapValues() method. * CVE-2022-2879: A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw a...

RHSA-2023:0631: Red Hat Security Advisory: RHSA: Submariner 0.14 - bug fix and security updates

Submariner 0.14 packages that fix various bugs and add various enhancements that are now available for Red Hat Advanced Cluster Management for Kubernetes version 2.7 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2880: A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go ...

CVE-2023-0229: Invalid Bug ID

A flaw was found in github.com/openshift/apiserver-library-go, used in OpenShift 4.12 and 4.11, that contains an issue that can allow low-privileged users to set the seccomp profile for pods they control to "unconfined." By default, the seccomp profile used in the restricted-v2 Security Context Constraint (SCC) is "runtime/default," allowing users to disable seccomp for pods they can create and modify.

Red Hat Security Advisory 2022-7399-01

Red Hat Security Advisory 2022-7399-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.0. Issues addressed include denial of service, memory leak, and out of bounds read vulnerabilities.

Red Hat Security Advisory 2022-7398-02

Red Hat Security Advisory 2022-7398-02 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.12.0. Issues addressed include a denial of service vulnerability.

RHSA-2022:7399: Red Hat Security Advisory: OpenShift Container Platform 4.12.0 bug fix and security update

Red Hat OpenShift Container Platform release 4.12.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-2879: golang: arc...

RHSA-2022:7398: Red Hat Security Advisory: OpenShift Container Platform 4.12.0 packages and security update

Red Hat OpenShift Container Platform release 4.12.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: go-yaml: Denial of Service in go-yaml * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-2995: cri-o: incorrect handlin...

CVE-2022-3259: Invalid Bug ID

Openshift 4.9 does not use HTTP Strict Transport Security (HSTS) which may allow man-in-the-middle (MITM) attacks.

Red Hat Security Advisory 2022-8008-01

Red Hat Security Advisory 2022-8008-01 - The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images. Issues addressed include denial of service and information leakage vulnerabilities.

RHSA-2022:8431: Red Hat Security Advisory: podman security, bug fix, and enhancement update

An update for podman is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2989: podman: possible information disclosure and modification * CVE-2022-2990: buildah: possible information disclosure and modification

RHSA-2022:8008: Red Hat Security Advisory: buildah security and bug fix update

An update for buildah is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-20291: containers/storage: DoS via malicious image * CVE-2021-33195: golang: net: lookup functions may return invalid host names * CVE-2021-33197: golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty * CVE-2021-33198: golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very l...

Red Hat Security Advisory 2022-7457-01

Red Hat Security Advisory 2022-7457-01 - The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Issues addressed include information leakage and memory exhaustion vulnerabilities.

Red Hat Security Advisory 2022-7822-01

Red Hat Security Advisory 2022-7822-01 - The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Issues addressed include an information leakage vulnerability.

RHSA-2022:7457: Red Hat Security Advisory: container-tools:rhel8 security, bug fix, and enhancement update

An update for the container-tools:rhel8 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-36221: golang: net/http/httputil: panic due to racy read of persistConn after handler panic * CVE-2021-41190: opencontainers: OCI manifest and index parsing confusion * CVE-2022-1708: cri-o: memory exhaustion on the node when access to the kube api * CVE-2022-2990: buildah: possible information disclosure and modification * CVE-...

CVE-2022-2990: Vulnerability in Linux containers – investigation and mitigation

An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.

Retbleed Fixed in Linux Kernel, Patch Delayed

Linus Torvalds says Retbleed has been addressed in the Linux kernel, but code complexity means the release will be delayed by a week to give more time for testing.

Packet Storm: Latest News

Acronis Cyber Protect/Backup Remote Code Execution