Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:7529: Red Hat Security Advisory: container-tools:3.0 security update

An update for the container-tools:3.0 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header
  • CVE-2022-1708: cri-o: memory exhaustion on the node when access to the kube api
  • CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions
  • CVE-2022-21698: prometheus/client_golang: Denial of service using InstrumentHandlerCounter
  • CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip
  • CVE-2022-30630: golang: io/fs: stack exhaustion in Glob
  • CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read
  • CVE-2022-30632: golang: path/filepath: stack exhaustion in Glob
  • CVE-2022-30633: golang: encoding/xml: stack exhaustion in Unmarshal
  • CVE-2022-32148: golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
Red Hat Security Data
#vulnerability#linux#red_hat#dos#ibm#docker

Synopsis

Moderate: container-tools:3.0 security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for the container-tools:3.0 module is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

Security Fix(es):

  • golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
  • cri-o: memory exhaustion on the node when access to the kube api (CVE-2022-1708)
  • golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)
  • prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)
  • golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)
  • golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
  • golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
  • golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
  • golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)
  • golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.

Affected Products

  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 8 s390x
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
  • Red Hat Enterprise Linux for ARM 64 8 aarch64

Fixes

  • BZ - 2045880 - CVE-2022-21698 prometheus/client_golang: Denial of service using InstrumentHandlerCounter
  • BZ - 2085361 - CVE-2022-1708 cri-o: memory exhaustion on the node when access to the kube api
  • BZ - 2107342 - CVE-2022-30631 golang: compress/gzip: stack exhaustion in Reader.Read
  • BZ - 2107371 - CVE-2022-30630 golang: io/fs: stack exhaustion in Glob
  • BZ - 2107374 - CVE-2022-1705 golang: net/http: improper sanitization of Transfer-Encoding header
  • BZ - 2107376 - CVE-2022-1962 golang: go/parser: stack exhaustion in all Parse* functions
  • BZ - 2107383 - CVE-2022-32148 golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
  • BZ - 2107386 - CVE-2022-30632 golang: path/filepath: stack exhaustion in Glob
  • BZ - 2107390 - CVE-2022-28131 golang: encoding/xml: stack exhaustion in Decoder.Skip
  • BZ - 2107392 - CVE-2022-30633 golang: encoding/xml: stack exhaustion in Unmarshal

CVEs

  • CVE-2022-1705
  • CVE-2022-1708
  • CVE-2022-1962
  • CVE-2022-21698
  • CVE-2022-28131
  • CVE-2022-30630
  • CVE-2022-30631
  • CVE-2022-30632
  • CVE-2022-30633
  • CVE-2022-32148

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index

Red Hat Enterprise Linux for x86_64 8

SRPM

buildah-1.19.9-6.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 92482c45f79d2ce1954ef58459a6dc6e828b495dc65425e358c495d573e5944f

cockpit-podman-29-2.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 0d9465114f469f3fae2737563dbae62b741e0cd399a70375ea5a431ed9b3971d

conmon-2.0.26-3.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 3bb9cff4eb00ee1ba897a327e16686603430df0b9fb75f8539b35489bde3ea6a

container-selinux-2.189.0-1.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 281435cb9c36b21850c2e7d60d8c97abd2d4f2add4812acf64d96b43eb9998e9

containernetworking-plugins-0.9.1-1.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: bd9d0e6c4f203859d722a951e720d37f8e80e77543158070983f09c144a7741b

criu-3.15-1.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 44210b9094e4916b13d794f87de0e6e9a325a2df96e3d5fdf3140ca34572dc0f

crun-0.18-3.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 053858a0fbe4053051e9f785f04aadefcc249636cbe93ac67dc1718f7798174e

fuse-overlayfs-1.4.0-2.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 8db12c5243668889f9f14ad6d06a4e55cd5d2f5a01372bcee4e87d98b45eb272

libslirp-4.3.1-1.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: b08a4f7f27373993fed6470aff4abfb003c659f89cdb5ac9e00b58487b618e8b

oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: d876be54cb15ddcfd481860e95fb2282eb7dd6745da5702c555c633a8ba2c227

podman-3.0.1-13.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 03b89a0934599762cbb5ead2444653610459c9831c6a11ece02d56bf4f15094a

runc-1.0.0-73.rc95.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 1fc8e4adb12b23f6cdbd7c1126951cc15c518371482ab88c44b8e16f948de103

skopeo-1.2.4-2.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: e6069ac41c8e49516e99e7c38ddebc096a86aed97866bf1083792e152f423ef8

slirp4netns-1.1.8-1.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 06c2adba4671fd064fb748a5facee3edeb75e5e9a16c08315f9df703e261b4c3

toolbox-0.0.99.3-1.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: af04f590b9dbf24f874d3c5038ca3d3dcd42fed501618604b924a82c2c7a5562

udica-0.2.4-1.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: fde78987cb47284c795ed39b3728cc171f0c323ef7b85ddf0c855928a084a501

x86_64

buildah-1.19.9-6.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: ca3211538bac5e640a6431dd208d45d8eb6d6675f1d8caa6ee5d1a382ef3b923

buildah-debuginfo-1.19.9-6.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: 8b6ef453215ba7e756dcb3e779d0dcff7f1d6a850419847d3b6f89f129abb924

buildah-debugsource-1.19.9-6.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: b1d433fbc17e76af8fcc8864c59c8d9d954e9eb20321b6fe273e291a035de6a2

buildah-tests-1.19.9-6.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: 21343318ba6716ec7598e217ef338f4ff35d00143a3b22a355db9ecfe22bca47

buildah-tests-debuginfo-1.19.9-6.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: c453df6d74dcd4f3c2c87a2804f97ea2a5ead83d432709ce352ff3a53159f31e

cockpit-podman-29-2.module+el8.7.0+16212+65e1b35f.noarch.rpm

SHA-256: cbb4cda08b8f96efc93f782699882e12bd04186178a598b1a9857a6ab4d4fafc

conmon-2.0.26-3.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: 7191cc24f58e0924f561652d7f541192ffa2c00284e43c5c2ee51f1a1ceebebf

conmon-debuginfo-2.0.26-3.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: b6f32366f1023025db2a162bf500d3e877b976dc71784a4fe4230919a474a423

conmon-debugsource-2.0.26-3.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: 1f84db7dd911422c4504841576d43221f64d904335223d750eb930210835de05

container-selinux-2.189.0-1.module+el8.7.0+16212+65e1b35f.noarch.rpm

SHA-256: cc8a76716aebc587bb21bc1e380306dbfe74a01c37dad7fa27fe6a196178234a

containernetworking-plugins-0.9.1-1.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: 62a0eba2edc752b567f984323b53be857071b92585eb4fbb39aab4b117dd8aa4

containernetworking-plugins-debuginfo-0.9.1-1.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: f1c96080bba3eedcb3b818eae8b4f7a0fceaef4f2da627e784168413d2a19db8

containernetworking-plugins-debugsource-0.9.1-1.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: e28adb9c7671db796ee8af27e793432ff0ed7c573d128f5fb81e3beacd315135

containers-common-1.2.4-2.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: 49a72001bc9526b22f2e21e89f2cab446e293aa082adc29c3b135244248a04e0

crit-3.15-1.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: 58c289160125ac0b4b27d929c227aa92a3d8356b4685938aa5ee81f027b14249

criu-3.15-1.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: c2f425f7ee0aa310010e12e17d9d29b7b1eb2ce8be23b61cc3c81ccc13732548

criu-debuginfo-3.15-1.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: 15ab1a75031580ae493ee53e8b2b7a59d8a7b916815860ac4019d57cf953a9c0

criu-debugsource-3.15-1.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: 22eb1f3bcb3417004b5b7a646dbaad137b3f8368456874cf78b5eb846aeca24f

crun-0.18-3.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: f40cfe1f8c1658a74e938a0f444a78e7d709543e54fd3c46ac5d06064eb8b4e8

crun-debuginfo-0.18-3.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: c8210ce442b57cee86ca983f29cfe28743c805ad1d786f5510a763e9de91e20e

crun-debugsource-0.18-3.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: 0d2ade120c7e5dfaef023e29f043113b15378b6f2961e221f9ef9feae9a68825

fuse-overlayfs-1.4.0-2.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: 3eb47c1eef4de7e10cf5995bf011b9cf16d5e04454791d542e197402fb0c9ece

fuse-overlayfs-debuginfo-1.4.0-2.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: 8fdfbe97584c206d2f2ba3eac880f30eb54500b7f08f3c018037c5d0a5b47632

fuse-overlayfs-debugsource-1.4.0-2.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: d7c5e49df2e6a6761f10a20970c21b1d26a0c99d865130051dc8638cb75ea873

libslirp-4.3.1-1.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: 5338dc9a03be1a621961692a0c9847ea77b63b3fb68b77a2fa8b6e1d1e9a178b

libslirp-debuginfo-4.3.1-1.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: 4ee1ebe03e709e35020c3a894645ae4ae50e0f94260ab54b300f07723a98f2e6

libslirp-debugsource-4.3.1-1.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: 4e7d44221ac7c873df943a94ff5fdb25d146e842925805db3da27115076713d5

libslirp-devel-4.3.1-1.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: e9f8d12b25b0b28a9ea608f32bb7782da9ae9c1c0b335a61674e96ebdabb5f92

oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: dc269652af3867207e5102beb10733ed9cfe41e394ccb0b06cbbf77e9448d490

oci-seccomp-bpf-hook-debuginfo-1.2.0-3.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: 592bc21e8124c0b6dace46d3d5aaaa0acc54dc8162bc7be77e1d3864ce724f4f

oci-seccomp-bpf-hook-debugsource-1.2.0-3.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: 1a76d7e79232fef15e02450923e4b7fb34b66d53f791227734015d74c0c8dae0

podman-3.0.1-13.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: 5ee11ef940a4e6b3b65b546acdb214ce80406610032f9a33d94d38ecda21ae18

podman-catatonit-3.0.1-13.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: 32fd3d684af87807eb4d8da17d242f7479452cd2e7af99fe19fff89ad61744c7

podman-catatonit-debuginfo-3.0.1-13.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: 7cb64745437d3a03d7ab17a8f9320a7a23c72021fbc09c649cf2b3ac7f334cd8

podman-debuginfo-3.0.1-13.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: bcc1164cb1a7dac3b9dea47b9cf75d96fa6ccfd41b459d1d68c1f2ee2f7e6758

podman-debugsource-3.0.1-13.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: 4d10ab34d843ae6b93e6042828357f613ab7533c6d04ba061b7ef65b747ccb9d

podman-docker-3.0.1-13.module+el8.7.0+16212+65e1b35f.noarch.rpm

SHA-256: 6d334865f301305f759307fad344eda1fbbf242cc76b15d806af0359a1f666f9

podman-plugins-3.0.1-13.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: 1ac41b78bf04f7285d9977b82b303614a5be48ee56899f4b064f269f029bab41

podman-plugins-debuginfo-3.0.1-13.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: 3655f0721ecd2cdff50d4e8312a34c1652731b424b59a970edb489fc4a3e10ad

podman-remote-3.0.1-13.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: c7d8cb2e89b42f2d97ad432916296af0efccdd80dc9a991c744994625249c5e6

podman-remote-debuginfo-3.0.1-13.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: 95271932b9f1a2874ef03ac9227ed6aefc16b1eeb10ad896ee8a8783b3965787

podman-tests-3.0.1-13.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: e1cd71840ebf5d7ece7158577f4fda0d971049584dfb37c916a6de5a2096de18

python3-criu-3.15-1.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: 0c42277ce2a594723755d3f1a08f157b9787f006aab94e7dd277c5990f276856

runc-1.0.0-73.rc95.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: 8fcc6714059df6c8eb43cccc24e464b503626a1cb9ed2104ed43d96ec4c0d58e

runc-debuginfo-1.0.0-73.rc95.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: a087fda0da5d8176f72b3a0b1bf640a017e2cc1e962286feed2054bcb701f474

runc-debugsource-1.0.0-73.rc95.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: 0f42a3eba837d0e7d95135abd0f0359bed0ae2f84f3b44461d1ba38c676e9eeb

skopeo-1.2.4-2.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: e12c6b60f6c669ee1e1a05874e5040d6c1450b1e8398045c4f77190100486d25

skopeo-debuginfo-1.2.4-2.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: 8bca0d5e5a50b1612e74e6afa3c387024d307f4fefd91c3728c8fa348a580c21

skopeo-debugsource-1.2.4-2.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: 204fecbc69357d209672e180144493bcd157ce7bdec9fee7f033872d96f20412

skopeo-tests-1.2.4-2.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: bb2ed0f2b050bdebc68ff58b8ac66ecb39e82cd1c5d1e23e87a9c2edeecfffc4

slirp4netns-1.1.8-1.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: add347766aa85b91e77675a67751173c487fe21ec842d3148791f9ad0a5405e2

slirp4netns-debuginfo-1.1.8-1.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: a856f3415c0521d3b577d4efbf359eee992fae0c52edd8eb4a51c370c1010a5e

slirp4netns-debugsource-1.1.8-1.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: c9da5b02fdf60e3ba96d62b5f90a7e280d3e85c0e8c84a7c79638f28a15b0ab3

toolbox-0.0.99.3-1.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: f8ec586b8ccb6993393ced3d737d173af3cd4cc05ce96b3d0ec02ff262f011cc

toolbox-debuginfo-0.0.99.3-1.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: 9a883cfca2844c5af147bf983ecd78f1e3c3019c863d7ac54359e82d5445c0dc

toolbox-debugsource-0.0.99.3-1.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: df27f8c5a6baf9aff7a3ba69de7fb4df9139a32f53298ceb55930f17487fa7a2

toolbox-tests-0.0.99.3-1.module+el8.7.0+16212+65e1b35f.x86_64.rpm

SHA-256: 846d80bfd0ff6f21865b3a60d61def843d8b7b328fc1f23918ec796b60f7df38

udica-0.2.4-1.module+el8.7.0+16212+65e1b35f.noarch.rpm

SHA-256: 2965aa3edd8e81fba5d52482c809db1ffe8d1d7ae975fef62b7330a82d36e943

Red Hat Enterprise Linux for IBM z Systems 8

SRPM

buildah-1.19.9-6.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 92482c45f79d2ce1954ef58459a6dc6e828b495dc65425e358c495d573e5944f

cockpit-podman-29-2.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 0d9465114f469f3fae2737563dbae62b741e0cd399a70375ea5a431ed9b3971d

conmon-2.0.26-3.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 3bb9cff4eb00ee1ba897a327e16686603430df0b9fb75f8539b35489bde3ea6a

container-selinux-2.189.0-1.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 281435cb9c36b21850c2e7d60d8c97abd2d4f2add4812acf64d96b43eb9998e9

containernetworking-plugins-0.9.1-1.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: bd9d0e6c4f203859d722a951e720d37f8e80e77543158070983f09c144a7741b

criu-3.15-1.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 44210b9094e4916b13d794f87de0e6e9a325a2df96e3d5fdf3140ca34572dc0f

crun-0.18-3.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 053858a0fbe4053051e9f785f04aadefcc249636cbe93ac67dc1718f7798174e

fuse-overlayfs-1.4.0-2.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 8db12c5243668889f9f14ad6d06a4e55cd5d2f5a01372bcee4e87d98b45eb272

libslirp-4.3.1-1.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: b08a4f7f27373993fed6470aff4abfb003c659f89cdb5ac9e00b58487b618e8b

oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: d876be54cb15ddcfd481860e95fb2282eb7dd6745da5702c555c633a8ba2c227

podman-3.0.1-13.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 03b89a0934599762cbb5ead2444653610459c9831c6a11ece02d56bf4f15094a

runc-1.0.0-73.rc95.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 1fc8e4adb12b23f6cdbd7c1126951cc15c518371482ab88c44b8e16f948de103

skopeo-1.2.4-2.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: e6069ac41c8e49516e99e7c38ddebc096a86aed97866bf1083792e152f423ef8

slirp4netns-1.1.8-1.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 06c2adba4671fd064fb748a5facee3edeb75e5e9a16c08315f9df703e261b4c3

toolbox-0.0.99.3-1.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: af04f590b9dbf24f874d3c5038ca3d3dcd42fed501618604b924a82c2c7a5562

udica-0.2.4-1.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: fde78987cb47284c795ed39b3728cc171f0c323ef7b85ddf0c855928a084a501

s390x

cockpit-podman-29-2.module+el8.7.0+16212+65e1b35f.noarch.rpm

SHA-256: cbb4cda08b8f96efc93f782699882e12bd04186178a598b1a9857a6ab4d4fafc

container-selinux-2.189.0-1.module+el8.7.0+16212+65e1b35f.noarch.rpm

SHA-256: cc8a76716aebc587bb21bc1e380306dbfe74a01c37dad7fa27fe6a196178234a

podman-docker-3.0.1-13.module+el8.7.0+16212+65e1b35f.noarch.rpm

SHA-256: 6d334865f301305f759307fad344eda1fbbf242cc76b15d806af0359a1f666f9

udica-0.2.4-1.module+el8.7.0+16212+65e1b35f.noarch.rpm

SHA-256: 2965aa3edd8e81fba5d52482c809db1ffe8d1d7ae975fef62b7330a82d36e943

buildah-1.19.9-6.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 88983c029fd95f040b4c1ba7c308146f2763484e26d7e65fb2340ee823415355

buildah-debuginfo-1.19.9-6.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 856c5c9ef18855aeecfa1384a4f45ea35c620697cdd123adb2f75e921f07d6e3

buildah-debugsource-1.19.9-6.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 0f7454ce02b825a563ef7b1fea37048f36471fe7d319d9dd83b324fe6be4b97f

buildah-tests-1.19.9-6.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 835af416a1debf00e8e5143a36e0e1851feb1fcede1647936ebf968d4462e890

buildah-tests-debuginfo-1.19.9-6.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 0ca29998946c6621d950bf6ce334c9eae45324fd9ab91d556aa013366c0ba743

conmon-2.0.26-3.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: ca2d60d87372759085f77a708058acc1f3b8ae4209d08657e1ed7e1f7b0569b7

conmon-debuginfo-2.0.26-3.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: c9018b8c33ee8f5acfcd0638c61bd01e79ea4f783aac27e92ac17646afadc7b5

conmon-debugsource-2.0.26-3.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: c7efebfc9dc59645fdb0a966aa5f5265dcfea8570058d0b2ede9c7549534bdf0

containernetworking-plugins-0.9.1-1.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 4df28b3b7b34967e1e33e5426b32475bdf75e4d6d75be9200763d8677f09df69

containernetworking-plugins-debuginfo-0.9.1-1.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 430852aaffaaa0e57b5ad7a6424237f8c74ca21abbf1a88bc39c8979ad99cf40

containernetworking-plugins-debugsource-0.9.1-1.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 46289cfb7d63cbbb5affff000cee347870e359227eab0839fbe328d3493302ab

containers-common-1.2.4-2.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 7da87012c2b5ebba414e099af04b390768c37714e86829cc3f7486376e13310e

crit-3.15-1.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 5fbb4f1dc9a681266da5d4e233fc0e3d8f70ac15d79ffbba237b4d1d56f17d3d

criu-3.15-1.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: b51a421092c83669921c19e95014ede1422caa53f20ad9156abc978965233efe

criu-debuginfo-3.15-1.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: d8bb01a5f153143a49948f1a40272bc93595c9db7c3fa050d38b43bbff6517c1

criu-debugsource-3.15-1.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: d4fd2f87b2ebaa0c8b94ec4de9586cbce12749a34683d2f3c36c05f0b66fde9b

crun-0.18-3.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 23be24789056547d33e97531b5f6d6f94f9706abc2cdcc1b56bd23efe6df008d

crun-debuginfo-0.18-3.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: dd80d0e99d0b84d90a0711f40011076bcc0ba29fa4d606fb14be6deb8e3e7604

crun-debugsource-0.18-3.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 4580d520ac9fd44f9c27eb00cc1f0e2e103e11e8a246e3c34babaa2993c6b905

fuse-overlayfs-1.4.0-2.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 8c29e198111cc29e35ce0ef4b6d13a09bddb662a14d42a58f44b67ea43c8fac0

fuse-overlayfs-debuginfo-1.4.0-2.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 846bf123146fcc71ac7fae69e5a63c3eeb8dba3e8e988f7c5346ccf09e8e5f10

fuse-overlayfs-debugsource-1.4.0-2.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 03fec5392d3fe2cb12270e4e5e275c16d72e2de1720161f640a99af654058442

libslirp-4.3.1-1.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 6631ef9cbc14f572e7e65baa630cf436430d4ef2f7526231238732538604486f

libslirp-debuginfo-4.3.1-1.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 2ae64166702f0786c5c5f5d69b67e9af00d0b672bcab67147e017c9ca63de069

libslirp-debugsource-4.3.1-1.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 7783eb714dcffa87ec8a370a3bacc6f38335df0f0c6aba9e28c4e09ccb390020

libslirp-devel-4.3.1-1.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: ea6f4fe081fb7829fe4f28f8098fce8a9a8398fdbe554ec0645a5841dcc9fe37

oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 3fd0f0f13ff4a901950b41ed7cdc812b7dedd70322c34492373ae5d018b2b550

oci-seccomp-bpf-hook-debuginfo-1.2.0-3.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: b4020e8c61ca327e3b326dba262595cc8f402d6693c1401c0f0871e173a128ec

oci-seccomp-bpf-hook-debugsource-1.2.0-3.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 7ee2dc4b5964d69d39caf8efb891f83b537bdef6ccc4f438d4a300b9883126d7

podman-3.0.1-13.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 8005b54b4ac169624a9b67dce6dafd1d2c4f01499003d687b7f2ffddf7c09a6f

podman-catatonit-3.0.1-13.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: bd7c0b17da06f67423fe1e251ccec24e19fca8b68dea5744e8758ca2ddf26bb7

podman-catatonit-debuginfo-3.0.1-13.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: e6254b58d4ad2e45d8526f3e006711d750a278e1b8d4f8dcff92e73f7ffd5bd2

podman-debuginfo-3.0.1-13.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 11da9398bd04c5590a318f6e8f7787ac23790c075cd0fe9e361722a3a0ae9a14

podman-debugsource-3.0.1-13.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: d4e6ad02215689d29c2722a4ae583c4b73c835432300c3c40fe4872f1c480f46

podman-plugins-3.0.1-13.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: cb3186f8c8b298fcb8eeb5be641637b455aeba37d76ae1f7c0c702963d245fa3

podman-plugins-debuginfo-3.0.1-13.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 3bd3a0054ac10522a3621e4db47e5d2c82cee6a1b9ffc05c06f42203bb7fd2d8

podman-remote-3.0.1-13.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 304ff455b9cb04320f63e1acc4147877d5ddf8d7da5d73d9e743343149fe1dda

podman-remote-debuginfo-3.0.1-13.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: a33cd09b249266d0dc87277af6afa003efc5431bbe57ee86ad2468ba1f4cbd86

podman-tests-3.0.1-13.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: d0b30d76f5bb3fd464ac3d61127e70c3542ce19a59f864224449ffdf7a5eac74

python3-criu-3.15-1.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 147f747aaa333a448a21b7a9ea686221de9c36719f77e5640cd7347cec065ae7

runc-1.0.0-73.rc95.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: cac4829b1fbdde9dc22819002dd0e137a3e8179a3eff23c3781e92181d538d9a

runc-debuginfo-1.0.0-73.rc95.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 17ec18e341d44d559d62824fdda06a549db08186e1b6ece99c4f55a72b995ab3

runc-debugsource-1.0.0-73.rc95.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 3d7040d873f2ace55a12abb896e046f2cc12aa1382be368c9d890eee93bfad01

skopeo-1.2.4-2.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 2e16ae5a2daa7374137a0088c3bb768a1030908902438d59e1d4f23514e09010

skopeo-debuginfo-1.2.4-2.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 1d1d40b1fefc296e3166d6d474b74f2d2d00b3729f06566b04497843e8052c8d

skopeo-debugsource-1.2.4-2.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 72f451353d8c1c62bafa4c11d49c7ec5a4e9cf2c22efcfd1a2df63526e94f09b

skopeo-tests-1.2.4-2.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 05cea9dae7f3c668d6365aba5f438dec90470e6dd9363eea8c3e437dd4275b1f

slirp4netns-1.1.8-1.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 0bfbdd6b28d3f6c70efc3f9a50f357325a08830689b4ee50843497780ddb21c0

slirp4netns-debuginfo-1.1.8-1.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 1c92f1686121173638935ea7574b9461e809e7688fae9290a9f8a499942d759f

slirp4netns-debugsource-1.1.8-1.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 9face6fc4cec75706de99320762c4ba0388f758e23b447ca9fef6d498b759d46

toolbox-0.0.99.3-1.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: b9f29544d3815956bd15f34ff2647571f0de9f94e20e62f2a400e9a0cf258652

toolbox-debuginfo-0.0.99.3-1.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: b52a2b3d503f4c41f92b5e40403ec33979685a8915b943db9e723ee1f39acbca

toolbox-debugsource-0.0.99.3-1.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 4cf6bc4c309c347a9b39838a1dffe53da99d7713788aecf53420af6583d731a5

toolbox-tests-0.0.99.3-1.module+el8.7.0+16212+65e1b35f.s390x.rpm

SHA-256: 533c1329c497a61ff7054994b47860891e36a4919b273ca2eb89d9172d408970

Red Hat Enterprise Linux for Power, little endian 8

SRPM

buildah-1.19.9-6.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 92482c45f79d2ce1954ef58459a6dc6e828b495dc65425e358c495d573e5944f

cockpit-podman-29-2.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 0d9465114f469f3fae2737563dbae62b741e0cd399a70375ea5a431ed9b3971d

conmon-2.0.26-3.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 3bb9cff4eb00ee1ba897a327e16686603430df0b9fb75f8539b35489bde3ea6a

container-selinux-2.189.0-1.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 281435cb9c36b21850c2e7d60d8c97abd2d4f2add4812acf64d96b43eb9998e9

containernetworking-plugins-0.9.1-1.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: bd9d0e6c4f203859d722a951e720d37f8e80e77543158070983f09c144a7741b

criu-3.15-1.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 44210b9094e4916b13d794f87de0e6e9a325a2df96e3d5fdf3140ca34572dc0f

crun-0.18-3.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 053858a0fbe4053051e9f785f04aadefcc249636cbe93ac67dc1718f7798174e

fuse-overlayfs-1.4.0-2.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 8db12c5243668889f9f14ad6d06a4e55cd5d2f5a01372bcee4e87d98b45eb272

libslirp-4.3.1-1.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: b08a4f7f27373993fed6470aff4abfb003c659f89cdb5ac9e00b58487b618e8b

oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: d876be54cb15ddcfd481860e95fb2282eb7dd6745da5702c555c633a8ba2c227

podman-3.0.1-13.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 03b89a0934599762cbb5ead2444653610459c9831c6a11ece02d56bf4f15094a

runc-1.0.0-73.rc95.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 1fc8e4adb12b23f6cdbd7c1126951cc15c518371482ab88c44b8e16f948de103

skopeo-1.2.4-2.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: e6069ac41c8e49516e99e7c38ddebc096a86aed97866bf1083792e152f423ef8

slirp4netns-1.1.8-1.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 06c2adba4671fd064fb748a5facee3edeb75e5e9a16c08315f9df703e261b4c3

toolbox-0.0.99.3-1.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: af04f590b9dbf24f874d3c5038ca3d3dcd42fed501618604b924a82c2c7a5562

udica-0.2.4-1.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: fde78987cb47284c795ed39b3728cc171f0c323ef7b85ddf0c855928a084a501

ppc64le

cockpit-podman-29-2.module+el8.7.0+16212+65e1b35f.noarch.rpm

SHA-256: cbb4cda08b8f96efc93f782699882e12bd04186178a598b1a9857a6ab4d4fafc

container-selinux-2.189.0-1.module+el8.7.0+16212+65e1b35f.noarch.rpm

SHA-256: cc8a76716aebc587bb21bc1e380306dbfe74a01c37dad7fa27fe6a196178234a

podman-docker-3.0.1-13.module+el8.7.0+16212+65e1b35f.noarch.rpm

SHA-256: 6d334865f301305f759307fad344eda1fbbf242cc76b15d806af0359a1f666f9

udica-0.2.4-1.module+el8.7.0+16212+65e1b35f.noarch.rpm

SHA-256: 2965aa3edd8e81fba5d52482c809db1ffe8d1d7ae975fef62b7330a82d36e943

buildah-1.19.9-6.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: cea2b84997aa75e7bc026904a3003fc92e8f28cf409f3ffd1106d58789f7d5c5

buildah-debuginfo-1.19.9-6.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: 9c58722b51c316665b408a326be5dfc2e030e4b0760bc973f027ea92ff689725

buildah-debugsource-1.19.9-6.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: e9d1e5c971fed2774539a48bf5f398dfb28f857e201f90e2ec4e5702238f71ca

buildah-tests-1.19.9-6.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: c72cbfd654f6fc5ccca6e905a023c59d2720278b867195938bbdb71c80db92f9

buildah-tests-debuginfo-1.19.9-6.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: 2597a1bf1dfcefd5f840e0e0d2fa2243180fa201e3dba5f3ddd71ea39cf88eb6

conmon-2.0.26-3.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: 2af29f7cb520b4997bb72f535600e49b8625c8311836b2ec4323aefb7660f1cf

conmon-debuginfo-2.0.26-3.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: fb5b4f27e6bdfe7639b11e4baa6e3f631079cc5c4d34d48cdfcb884834de0f45

conmon-debugsource-2.0.26-3.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: e10344cbdc9a62cce13c158be0ae6bca44b3322b7875aab16b170b288bb9cbfc

containernetworking-plugins-0.9.1-1.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: 173e31971509cfc84412dc7279f3d3976a7a37ede4023f88d0e77a2aab6f5e45

containernetworking-plugins-debuginfo-0.9.1-1.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: af57d626b32f74f9ae0cc403602a6878be544e642c67f64134c0d72b2be1169d

containernetworking-plugins-debugsource-0.9.1-1.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: bd5946e98c43e3b7a1d3b9ab7e3c5fc008eab608a76f734236090ba24fd8940d

containers-common-1.2.4-2.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: 45ecea59037e34dfc8b010d4192dd061b71cab8b36d85642498e0339cac572ed

crit-3.15-1.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: 72d80b3255ee3283b819335ecc96795313b162d8c6f6e29810340d02c08a7fd5

criu-3.15-1.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: ed8601c6e9a942195a5524d65bb3f54fdf29d8c1d5093e8966f7c6df24b92261

criu-debuginfo-3.15-1.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: 2913e7dd067ee59b04c1a5b5acc2622ad3887a396a353447c63030c7f6d25a34

criu-debugsource-3.15-1.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: dd3f05f2834b7f296f537524766d4a4c45dbd03d5bc502bf89587ed10f82bbbb

crun-0.18-3.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: e94d06c438e0fe386b0acba21fbd0a50ce69201a018e56cf05463e300b580e93

crun-debuginfo-0.18-3.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: 84990caad6fc51455161a656443b86d550cd13966a7d28120f03565e48474907

crun-debugsource-0.18-3.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: 0f369d295b48d5c70394ad1c11cd34c0fa5a1139f368a5215c40506ba738f3a9

fuse-overlayfs-1.4.0-2.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: e534ded2d6822d302a98248be176d3053b53e51ca693bec01897aa714a7bb38d

fuse-overlayfs-debuginfo-1.4.0-2.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: dc5aff744505dbebdae24c95d8eaae28ceb40d8093db1198282833304ba8c79d

fuse-overlayfs-debugsource-1.4.0-2.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: e8f94a6f6cfbedd7cfcc6550f82726a6fbf597d7460d56345b156c762389490f

libslirp-4.3.1-1.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: b016a1b33d17b811ed19500bdbc4045281237db9bcde7cd17591348d93381946

libslirp-debuginfo-4.3.1-1.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: 36b25540765bdecd76a552a68a0e3ae7a715296e20b0b8abc786f677db16ac21

libslirp-debugsource-4.3.1-1.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: f3c9fe82f4b17e5173df180e8eb241761e635255f6b80c295d20a4ae9f36e961

libslirp-devel-4.3.1-1.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: d7adbb312f04a27c9b07846fbbad2a0c4e8dd9a42ed027de14905e64cfa8476b

oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: 2cf267589e6e6e655a8d63bd718b529effa49aaf56ae66e3e9fc9407736ca5d7

oci-seccomp-bpf-hook-debuginfo-1.2.0-3.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: 6cd530a896e8689c7f472c1882e3d4385eb0bbdce3ff29fd1f1d4dce60b481c1

oci-seccomp-bpf-hook-debugsource-1.2.0-3.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: b58ae53659c6cf85fa348a9d57e5ace44ec03831dee3b4e7de6bc033d3c5c20f

podman-3.0.1-13.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: 6c0b16d5be06c24d359fdeabc8e881964e700d80f40996d465be72abe800baa4

podman-catatonit-3.0.1-13.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: bfbdaa2ce87f3408836e088a144e248d0e896e0f51b19fd0287be7628af23136

podman-catatonit-debuginfo-3.0.1-13.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: 15e0794ec76f886eb1bb24b2848127c8ef1261f90d660f6e156efb1104f60e6d

podman-debuginfo-3.0.1-13.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: 3b3f2aaf9f8f61089a48a8b24d8eeccc9f9601763f0da71dc6959423fac119c1

podman-debugsource-3.0.1-13.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: b2679e275200d6d12e41d4b940afc6b8f105b93441bf327c70fdcc1b912cf72d

podman-plugins-3.0.1-13.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: aaacb6093a9ce26c455cde89bd360440ab3ec172ab6248b89d3a9dc311eb32af

podman-plugins-debuginfo-3.0.1-13.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: 2064dc66c119a20a804ab8ee50d6fe63d30bcffdcbc8290c1d9b796179ca021e

podman-remote-3.0.1-13.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: a95e8de9c7bc9dc9bb4e2cfe313351dea403c287bea00a1e8cba67e2aed64623

podman-remote-debuginfo-3.0.1-13.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: ced72c8e9e6b9f5815f7564d0adc93ff5fbc12d976c75060e134cc26b1a6baa9

podman-tests-3.0.1-13.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: a0f68c79b2a387c2dbbf52087e160de95663c0131d7893804a0c44855e21b233

python3-criu-3.15-1.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: af5bdd24b6b0d86ccb8b6796e66836484eb5ed874dc1836c30f83f8951825a63

runc-1.0.0-73.rc95.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: 2e35a02d4b679b5840b57595d14e4a691f2b1b2519e6f08bfbc68e3118fbb899

runc-debuginfo-1.0.0-73.rc95.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: 364142df231e2a455bb84124214051e858a50c5402c7f29d97837db60703d47d

runc-debugsource-1.0.0-73.rc95.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: f635fee111029be1cf30c152b49847ebfcae496f463265832a5c079315cb6436

skopeo-1.2.4-2.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: 8563546d1edf4b966a3dfb106477729c33acfc229b9fc12aec8deeac9c5f78c9

skopeo-debuginfo-1.2.4-2.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: 5a46d6ea709d1657ed24009a82a47f9fd47f248edf53d0ed1a2e6620ee2e6d41

skopeo-debugsource-1.2.4-2.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: a14825ceb38810d0bcf89bac3c8bb67c345c3fbc563f98f078072e6946265de7

skopeo-tests-1.2.4-2.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: f7196cba06538633851ea9f63b03c7eda8ba4b4b87f83b580dfa40ac382b6cfd

slirp4netns-1.1.8-1.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: 2eaac178acc33b7640fea47996b864a585bbbc9f14c03e0a7f0658bbec83121f

slirp4netns-debuginfo-1.1.8-1.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: d900690e4f06d77c9c6f7a463a73e0dbb75a06dab1eeca96c60c83f97b5814b6

slirp4netns-debugsource-1.1.8-1.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: 40a784cc883bc50d521a43ed557f9ef098061197b61e2e317631a5da39fe6bc5

toolbox-0.0.99.3-1.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: bff1cba27043f6fccb1711035603f9858c58742fe4be77a28ef5531b58b3c05f

toolbox-debuginfo-0.0.99.3-1.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: 527fa7c6b59e3dd430ab7b62cef401f2943fff2207d2f47c3d567514281ed8c0

toolbox-debugsource-0.0.99.3-1.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: 47779643472999f2393d34e90861ed25b6c9a188e2c0b0240c419d1f1331c1f5

toolbox-tests-0.0.99.3-1.module+el8.7.0+16212+65e1b35f.ppc64le.rpm

SHA-256: 2d89e6e50768708858d13dde11cf1040810982a83cfe401a2c504015f5839423

Red Hat Enterprise Linux for ARM 64 8

SRPM

buildah-1.19.9-6.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 92482c45f79d2ce1954ef58459a6dc6e828b495dc65425e358c495d573e5944f

cockpit-podman-29-2.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 0d9465114f469f3fae2737563dbae62b741e0cd399a70375ea5a431ed9b3971d

conmon-2.0.26-3.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 3bb9cff4eb00ee1ba897a327e16686603430df0b9fb75f8539b35489bde3ea6a

container-selinux-2.189.0-1.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 281435cb9c36b21850c2e7d60d8c97abd2d4f2add4812acf64d96b43eb9998e9

containernetworking-plugins-0.9.1-1.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: bd9d0e6c4f203859d722a951e720d37f8e80e77543158070983f09c144a7741b

criu-3.15-1.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 44210b9094e4916b13d794f87de0e6e9a325a2df96e3d5fdf3140ca34572dc0f

crun-0.18-3.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 053858a0fbe4053051e9f785f04aadefcc249636cbe93ac67dc1718f7798174e

fuse-overlayfs-1.4.0-2.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 8db12c5243668889f9f14ad6d06a4e55cd5d2f5a01372bcee4e87d98b45eb272

libslirp-4.3.1-1.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: b08a4f7f27373993fed6470aff4abfb003c659f89cdb5ac9e00b58487b618e8b

oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: d876be54cb15ddcfd481860e95fb2282eb7dd6745da5702c555c633a8ba2c227

podman-3.0.1-13.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 03b89a0934599762cbb5ead2444653610459c9831c6a11ece02d56bf4f15094a

runc-1.0.0-73.rc95.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 1fc8e4adb12b23f6cdbd7c1126951cc15c518371482ab88c44b8e16f948de103

skopeo-1.2.4-2.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: e6069ac41c8e49516e99e7c38ddebc096a86aed97866bf1083792e152f423ef8

slirp4netns-1.1.8-1.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: 06c2adba4671fd064fb748a5facee3edeb75e5e9a16c08315f9df703e261b4c3

toolbox-0.0.99.3-1.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: af04f590b9dbf24f874d3c5038ca3d3dcd42fed501618604b924a82c2c7a5562

udica-0.2.4-1.module+el8.7.0+16212+65e1b35f.src.rpm

SHA-256: fde78987cb47284c795ed39b3728cc171f0c323ef7b85ddf0c855928a084a501

aarch64

cockpit-podman-29-2.module+el8.7.0+16212+65e1b35f.noarch.rpm

SHA-256: cbb4cda08b8f96efc93f782699882e12bd04186178a598b1a9857a6ab4d4fafc

container-selinux-2.189.0-1.module+el8.7.0+16212+65e1b35f.noarch.rpm

SHA-256: cc8a76716aebc587bb21bc1e380306dbfe74a01c37dad7fa27fe6a196178234a

podman-docker-3.0.1-13.module+el8.7.0+16212+65e1b35f.noarch.rpm

SHA-256: 6d334865f301305f759307fad344eda1fbbf242cc76b15d806af0359a1f666f9

udica-0.2.4-1.module+el8.7.0+16212+65e1b35f.noarch.rpm

SHA-256: 2965aa3edd8e81fba5d52482c809db1ffe8d1d7ae975fef62b7330a82d36e943

buildah-1.19.9-6.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: df83fe142eb5817fe8944e6b3f2e0c708c1592c907192cfb6147fde4a1e881f1

buildah-debuginfo-1.19.9-6.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: 5ee13d6492ea25cd3a7f82185551bf7ae66939d9eff6bf19eba45d1d0070c0bf

buildah-debugsource-1.19.9-6.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: 99f63ca9b55fd2a95bca0c9f08d3670e841dbf22fe3f6e313b6a848ef55fdf38

buildah-tests-1.19.9-6.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: a6d62e68443ab7b2ffc10e58c0b470876b16d0f6312621b5d0355d4a2a883628

buildah-tests-debuginfo-1.19.9-6.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: a8e117dd65145ec2339d4314ef057d80846bd6549515de2a6eca70ab4ffcbdad

conmon-2.0.26-3.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: a4cd3872822471056f0fc02725e8a616c620111862c4a4b27dc9c7c5fb597bf7

conmon-debuginfo-2.0.26-3.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: 46e2f066da20a7fc0e40aa8ae489a4859e2f0e301d761a208cd07bfdae90129a

conmon-debugsource-2.0.26-3.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: fe15007fde5e1bdafadf62ad9007efff068940525da05fa750794c71ccf911c1

containernetworking-plugins-0.9.1-1.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: a11a55498fa038a4e99c6b8c78eba53c6c3fcbd68733d2cc949e69eaa8c7f791

containernetworking-plugins-debuginfo-0.9.1-1.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: 5b68e30794f7ffb1f8973da62a56f7e5e79cc0f6cc917c2d5c25c4875b58a0c2

containernetworking-plugins-debugsource-0.9.1-1.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: cfc78c5a6a621bb5d991c1448659e87945ed18a09db661b627a2936ad09d7be0

containers-common-1.2.4-2.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: f764776e066a173adfdf64fcc564e8ee678b0a3f0ed0809b5e473a1437238beb

crit-3.15-1.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: 8c90bfa1a44570dabe35344f7956d87fa7d939c2a3fe8750dd9d4aaff29c147f

criu-3.15-1.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: f5d872ed2dac2ade8c4786775e23886f18b615b5c8256f309753adab6717e33e

criu-debuginfo-3.15-1.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: 48a3525d84c1c8c2406472b771cdc2893fddc72bf30c0702e0ec460f47c16a04

criu-debugsource-3.15-1.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: abe3271b1239df9b1c31b8a15decdadb55fb440b8a8890c3d6ac316ab5f8a583

crun-0.18-3.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: 3e96405e315a00d7aa4a7a085cbf501848a84bc60d511f0bc14fe80f6851ac93

crun-debuginfo-0.18-3.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: d0c699a7d1fa7cc300fb406e090fd3cbf9a6fe83c7bee462fc4445c484d2e8f6

crun-debugsource-0.18-3.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: 51fcd851545314879a9df161ef3ecd5b59bb41439a71244ed3677263bc3b1fd8

fuse-overlayfs-1.4.0-2.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: 12dd629fd51b51b942d970c455b82042c2f70104e2f4bd1c33b0cce2f65c5647

fuse-overlayfs-debuginfo-1.4.0-2.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: b25f6e2588e215c834daf0d80e31482934a9283b5661dd31aebe2b824f8e1ed6

fuse-overlayfs-debugsource-1.4.0-2.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: f2fa972c675628635ee532a4bd2275b5c4600dad210082e0cd25f9eb72baa28c

libslirp-4.3.1-1.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: 649cddae42c19f18dd5dd07fdfe06fdaa7cff79e583f9d53a7ab95fbd998d288

libslirp-debuginfo-4.3.1-1.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: 0cc8bf90b75021c89535544bcafbf015b83a7bfa1815af0225f681e4bc535b5c

libslirp-debugsource-4.3.1-1.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: 2bc0e4d18586e7318d5bbbae168070ffa1b8b29b8af606fd5d1dcaf8af1311fe

libslirp-devel-4.3.1-1.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: 5598c2862b85f276af14a74cdafebf07df419d87dbec316186e85405007dee20

oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: f3410c05fccf3adbefc3b37d868d4186cd0bbdc13237d561cf9a2f08f35f13b6

oci-seccomp-bpf-hook-debuginfo-1.2.0-3.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: 38a96e364f8c04bca5bd82b440ca36e9f478407f9feaae6b14f01477088ea6e2

oci-seccomp-bpf-hook-debugsource-1.2.0-3.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: ac8a94b45d72ebce431b55c6c420f9aac7f4924f68f38a695c863604a255e8be

podman-3.0.1-13.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: 882633ed6d5334cb48a9739338a9ddbd33fcc737ef8e72422c6203aaf26bfb88

podman-catatonit-3.0.1-13.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: c65b7c22b9deef442bbe11bf61ab17578940e2fa8a14a8a932ab72bed7ac4022

podman-catatonit-debuginfo-3.0.1-13.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: 4ec4a560e6fe2303dd2692acc371e9304df77f19fc08741589782d1395dd9d45

podman-debuginfo-3.0.1-13.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: 50229fe3901871b76dd06cc6812b5498be138f81fe36bf6b533303e029ce9e7c

podman-debugsource-3.0.1-13.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: ad01b59f48625a62f236c820282cba35b741d85bc342d0224af02ecd3268aef1

podman-plugins-3.0.1-13.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: d4beb8ece11f38a7b8631c06d8dee00fd1fa013bf5ce8143a25b2e9721a721ea

podman-plugins-debuginfo-3.0.1-13.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: 83c895fbb12fe7f7b0d81905db05277d4727d53381cd688ea5892a623c25862c

podman-remote-3.0.1-13.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: a601d92477ddbb55e8d502c189e285b5dc59cec8cd6f3b29b0c6a22e1eae26b4

podman-remote-debuginfo-3.0.1-13.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: c8c9515c5a145f754f302bfefb2a13217dd657e74bb205da442ddbf08fc845bf

podman-tests-3.0.1-13.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: 8aceb635ead76cfc14f87a6f5a5b1f05ba5939e6013dbe30a60f673e143dd882

python3-criu-3.15-1.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: f67f08be7ded62d7b31b83464eb225d45b867ad6062bac04180f347794445140

runc-1.0.0-73.rc95.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: 5aeecf7e9f137963abbe52897842f89114adb80e8a717909ec183e6116c6d9f9

runc-debuginfo-1.0.0-73.rc95.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: 049be666c3cfb8b9b7e6a762b83a007699abbcc197d803055ee1d5d54db808a2

runc-debugsource-1.0.0-73.rc95.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: e33394e65804e2258d03579ec1abcddf9aca00fadb5f1a39b37d95ae6a599668

skopeo-1.2.4-2.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: b51e90edf1e35317d6374e4d86c95f97f6ddaf86300e1ae597fad4f1638295ac

skopeo-debuginfo-1.2.4-2.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: d40cdf91fd76a8f70d154df7ba3b92a19d24802fa0fa1f99a0e856880b81d96f

skopeo-debugsource-1.2.4-2.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: fe5e4696b15c3941ae3536e31d50f8cf3cdd3776c5e2581619a8c5d05abfa6b1

skopeo-tests-1.2.4-2.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: 6fbe838edd82113d7d484fef14bfa38fe0eaf12933a9f294cb70405ab1d61713

slirp4netns-1.1.8-1.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: 6f1ffc9a457206b6f74a128dd61cc0411867d5572f2d34619af53bf7f0db96dd

slirp4netns-debuginfo-1.1.8-1.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: f1ada19d302f5a44d9243131cd71dbc90318bdb8e7eab0e4278745ad69328874

slirp4netns-debugsource-1.1.8-1.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: 8cbe45ac753c528257f0bb0e8a2015fb921fbdabefdd71021b5a1dc85b0843f7

toolbox-0.0.99.3-1.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: 604da3f2cdc4ce82367ee8733a9df63a45659067e305fba851df7a38df4c6064

toolbox-debuginfo-0.0.99.3-1.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: b9bbf21b68ecc5655ac7951e46a16a6afbb9cad2fa265b6b03c73f7229e2e509

toolbox-debugsource-0.0.99.3-1.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: 30fc26bcaff189c3101a44552d1d3cb1c7a274e3f63898a57852cd95e56c1c88

toolbox-tests-0.0.99.3-1.module+el8.7.0+16212+65e1b35f.aarch64.rpm

SHA-256: 3f648c75517114f51a1cf5b2f74407c0e8bd406ba8261ebf4713644dd8b64bf7

Related news

Red Hat Security Advisory 2024-1433-03

Red Hat Security Advisory 2024-1433-03 - Migration Toolkit for Applications 7.0.2 release.

Ubuntu Security Notice USN-6038-2

Ubuntu Security Notice 6038-2 - USN-6038-1 fixed several vulnerabilities in Go 1.18. This update provides the corresponding updates for Go 1.13 and Go 1.16. CVE-2022-29526 and CVE-2022-30630 only affected Go 1.16. It was discovered that the Go net/http module incorrectly handled Transfer-Encoding headers in the HTTP/1 client. A remote attacker could possibly use this issue to perform an HTTP Request Smuggling attack.

RHSA-2023:5314: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.6 security and bug fix update

OpenShift API for Data Protection (OADP) 1.1.6 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21698: A denial of service attack was found in prometheus/client_golang. This flaw allows an attacker to produce a denial of service attack on an HTTP server by exploiting the InstrumentHandlerCounter function in the version below 1.11.1, resulting in a loss of availability. * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream cou...

Red Hat Security Advisory 2023-3664-01

Red Hat Security Advisory 2023-3664-01 - Release of Security Advisory for the OpenShift Jenkins image and Jenkins agent base image.

RHSA-2023:3642: Red Hat Security Advisory: Red Hat Ceph Storage 6.1 Container security and bug fix update

A new container image for Red Hat Ceph Storage 6.1 is now available in the Red Hat Ecosystem Catalog. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-42581: A flaw was found in the Ramda NPM package that involves prototype poisoning. This flaw allows attackers to supply a crafted object, affecting the integrity or availability of the application. * CVE-2022-1650: A flaw was found in the EventSource NPM Package. The description from the source states the following messa...

RHSA-2023:1326: Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update

Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: A flaw was found in go-yaml. This issue occurs due to unbounded alias chasing, where a maliciously crafted YAML file can cause the system to consume significant system resources. If p...

RHSA-2023:2357: Red Hat Security Advisory: git-lfs security and bug fix update

An update for git-lfs is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: A flaw was found in golang. The HTTP/1 client accepted invalid Transfer-Encoding headers indicating "chunked" encoding. This issue could allow request smuggling, but only if combined with an intermediate server that also improperly accepts the header as invalid. * CVE-2022-2880: A flaw was found in the golang package, where requests forwarded by r...

RHSA-2023:2041: Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update

Migration Toolkit for Applications 6.1.0 release Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3782: A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. An attacker can use this flaw to construct a malicious request to bypass validation and access other URLs and potentially sensitive information within the domain or possibly conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect ...

Red Hat Security Advisory 2023-1275-01

Red Hat Security Advisory 2023-1275-01 - An update for etcd is now available for Red Hat OpenStack Platform. Issues addressed include a denial of service vulnerability.

RHSA-2023:1042: Red Hat Security Advisory: Custom Metrics Autoscaler Operator for Red Hat OpenShift (with security updates)

Custom Metrics Autoscaler Operator for Red Hat OpenShift including security updates. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: A flaw was found in golang. The HTTP/1 client accepted invalid Transfer-Encoding headers indicating "chunked" encoding. This issue could allow request smuggling, but only if combined with an intermediate server that also improperly accepts the header as invalid. * CVE-2022-1962: A flaw was found in the golang standard library, go/par...

Red Hat Security Advisory 2023-0693-01

Red Hat Security Advisory 2023-0693-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Issues addressed include a denial of service vulnerability.

RHSA-2022:9096: Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 7.0.0 [security update]

The components for Red Hat OpenShift support for Windows Container 7.0.0 are now available. This product release includes bug fixes and a moderate security update for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-25749: kubelet: runAsNonRoot logic bypass for Windows containers * CVE-2022-21698: prometheus/client_golang: Denial of service using InstrumentHandlerCounter *...

Red Hat Security Advisory 2023-0407-01

Red Hat Security Advisory 2023-0407-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 4.12.0 RPMs. Issues addressed include denial of service and out of bounds read vulnerabilities.

RHSA-2023:0408: Red Hat Security Advisory: OpenShift Virtualization 4.12.0 Images security update

Red Hat OpenShift Virtualization release 4.12 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2021-44716: golang: net/http: limit growth of header canonicalization cache * CVE-2021-44717: golang: syscall: don't close fd 0 on ForkExec error * CVE-2022-1705: golang: net/http: improper sanitizat...

Red Hat Security Advisory 2022-7399-01

Red Hat Security Advisory 2022-7399-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.0. Issues addressed include denial of service, memory leak, and out of bounds read vulnerabilities.

RHSA-2022:7398: Red Hat Security Advisory: OpenShift Container Platform 4.12.0 packages and security update

Red Hat OpenShift Container Platform release 4.12.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: go-yaml: Denial of Service in go-yaml * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-2995: cri-o: incorrect handlin...

RHSA-2022:9047: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.6 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.6 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30630: golang: io/fs: stack exhaustion in G...

RHSA-2022:8634: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.1 security and bug fix update

OpenShift API for Data Protection (OADP) 1.1.1 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27191: golang: crash in a golang.org/x/crypto/ssh server * CVE-2022-27664: golang: net/http: handle server errors after sending GOAWAY * CVE-2022-30632: golang: path/filepath: stack exhaustion in Glob * CVE-2022-30635: golang: encoding/gob: stack exhaustion in Decoder.Decode * CVE-2022-32190: golang: net/url: JoinPath does not strip relative path components i...

Red Hat Security Advisory 2022-8057-01

Red Hat Security Advisory 2022-8057-01 - Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Issues addressed include cross site request forgery, cross site scripting, denial of service, information leakage, and privilege escalation vulnerabilities.

RHSA-2022:8098: Red Hat Security Advisory: toolbox security and bug fix update

An update for toolbox is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-30630: golang: io/fs: stack exhaustion in Glob * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read * CVE-2022-30632: golang: path/filepath: stack exhaustion in Glob

Red Hat Security Advisory 2022-7529-01

Red Hat Security Advisory 2022-7529-01 - The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Issues addressed include denial of service and memory exhaustion vulnerabilities.

RHSA-2022:7457: Red Hat Security Advisory: container-tools:rhel8 security, bug fix, and enhancement update

An update for the container-tools:rhel8 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-36221: golang: net/http/httputil: panic due to racy read of persistConn after handler panic * CVE-2021-41190: opencontainers: OCI manifest and index parsing confusion * CVE-2022-1708: cri-o: memory exhaustion on the node when access to the kube api * CVE-2022-2990: buildah: possible information disclosure and modification * CVE-...

Red Hat Security Advisory 2022-6517-01

Red Hat Security Advisory 2022-6517-01 - Red Hat OpenStack Platform 16.2 (Train) director operator containers, with several Important security fixes, are available for technology preview.

RHSA-2022:6517: Red Hat Security Advisory: Release of containers for OSP 16.2.z director operator tech preview

Red Hat OpenStack Platform 16.2 (Train) director operator containers, with several Important security fixes, are available for technology preview.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-41103: containerd: insufficiently restricted permissions on container root and plugin directories * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read

Red Hat Security Advisory 2022-6430-01

Red Hat Security Advisory 2022-6430-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-6430-01

Red Hat Security Advisory 2022-6430-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-6430-01

Red Hat Security Advisory 2022-6430-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-6430-01

Red Hat Security Advisory 2022-6430-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-6430-01

Red Hat Security Advisory 2022-6430-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes. Issues addressed include a denial of service vulnerability.

RHSA-2022:6430: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.0.4 security and bug fix update

OpenShift API for Data Protection (OADP) 1.0.4 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-21698: prometheus/client_golang: Denial of service using InstrumentHandlerCounter * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-30629: golang: crypto/tls: session ti...

RHSA-2022:6430: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.0.4 security and bug fix update

OpenShift API for Data Protection (OADP) 1.0.4 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-21698: prometheus/client_golang: Denial of service using InstrumentHandlerCounter * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-30629: golang: crypto/tls: session ti...

RHSA-2022:6430: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.0.4 security and bug fix update

OpenShift API for Data Protection (OADP) 1.0.4 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-21698: prometheus/client_golang: Denial of service using InstrumentHandlerCounter * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-30629: golang: crypto/tls: session ti...

RHSA-2022:6430: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.0.4 security and bug fix update

OpenShift API for Data Protection (OADP) 1.0.4 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-21698: prometheus/client_golang: Denial of service using InstrumentHandlerCounter * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-30629: golang: crypto/tls: session ti...

RHSA-2022:6430: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.0.4 security and bug fix update

OpenShift API for Data Protection (OADP) 1.0.4 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-21698: prometheus/client_golang: Denial of service using InstrumentHandlerCounter * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-30629: golang: crypto/tls: session ti...

Red Hat Security Advisory 2022-6370-01

Red Hat Security Advisory 2022-6370-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.0 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix security issues and several bugs. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-6370-01

Red Hat Security Advisory 2022-6370-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.0 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix security issues and several bugs. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-6370-01

Red Hat Security Advisory 2022-6370-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.0 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix security issues and several bugs. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-6183-01

Red Hat Security Advisory 2022-6183-01 - Logging Subsystem 5.4.5 for Red Hat OpenShift has been released. Issue addressed include a stack exhaustion vulnerability.

Red Hat Security Advisory 2022-6183-01

Red Hat Security Advisory 2022-6183-01 - Logging Subsystem 5.4.5 for Red Hat OpenShift has been released. Issue addressed include a stack exhaustion vulnerability.

Red Hat Security Advisory 2022-6183-01

Red Hat Security Advisory 2022-6183-01 - Logging Subsystem 5.4.5 for Red Hat OpenShift has been released. Issue addressed include a stack exhaustion vulnerability.

Red Hat Security Advisory 2022-6348-01

Red Hat Security Advisory 2022-6348-01 - Gatekeeper is an open source project that applies the OPA Constraint Framework to enforce policies on your Kubernetes clusters. This advisory contains the container images for Gatekeeper that include bug fixes and container upgrades.

Red Hat Security Advisory 2022-6348-01

Red Hat Security Advisory 2022-6348-01 - Gatekeeper is an open source project that applies the OPA Constraint Framework to enforce policies on your Kubernetes clusters. This advisory contains the container images for Gatekeeper that include bug fixes and container upgrades.

Red Hat Security Advisory 2022-6348-01

Red Hat Security Advisory 2022-6348-01 - Gatekeeper is an open source project that applies the OPA Constraint Framework to enforce policies on your Kubernetes clusters. This advisory contains the container images for Gatekeeper that include bug fixes and container upgrades.

Red Hat Security Advisory 2022-6348-01

Red Hat Security Advisory 2022-6348-01 - Gatekeeper is an open source project that applies the OPA Constraint Framework to enforce policies on your Kubernetes clusters. This advisory contains the container images for Gatekeeper that include bug fixes and container upgrades.

RHSA-2022:6370: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.6.0 security updates and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.6.0 General Availability release images, which fix security issues and bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_a...

RHSA-2022:6370: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.6.0 security updates and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.6.0 General Availability release images, which fix security issues and bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_a...

RHSA-2022:6370: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.6.0 security updates and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.6.0 General Availability release images, which fix security issues and bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_a...

RHSA-2022:6370: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.6.0 security updates and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.6.0 General Availability release images, which fix security issues and bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_a...

RHSA-2022:6370: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.6.0 security updates and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.6.0 General Availability release images, which fix security issues and bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_a...

RHSA-2022:6370: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.6.0 security updates and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.6.0 General Availability release images, which fix security issues and bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_a...

RHSA-2022:6344: Red Hat Security Advisory: Logging Subsystem 5.5.1 Security and Bug Fix Update

Logging Subsystem 5.5.1 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read * CVE-2022-32148: golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working

RHSA-2022:6344: Red Hat Security Advisory: Logging Subsystem 5.5.1 Security and Bug Fix Update

Logging Subsystem 5.5.1 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read * CVE-2022-32148: golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working

RHSA-2022:6344: Red Hat Security Advisory: Logging Subsystem 5.5.1 Security and Bug Fix Update

Logging Subsystem 5.5.1 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read * CVE-2022-32148: golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working

RHSA-2022:6348: Red Hat Security Advisory: Gatekeeper Operator v0.2 security and container updates

Gatekeeper Operator v0.2 security updates Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30630: golang: io/fs: stack exhaustion in Glob * CVE-2022-30631: gol...

RHSA-2022:6348: Red Hat Security Advisory: Gatekeeper Operator v0.2 security and container updates

Gatekeeper Operator v0.2 security updates Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30630: golang: io/fs: stack exhaustion in Glob * CVE-2022-30631: gol...

RHSA-2022:6348: Red Hat Security Advisory: Gatekeeper Operator v0.2 security and container updates

Gatekeeper Operator v0.2 security updates Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30630: golang: io/fs: stack exhaustion in Glob * CVE-2022-30631: gol...

RHSA-2022:6348: Red Hat Security Advisory: Gatekeeper Operator v0.2 security and container updates

Gatekeeper Operator v0.2 security updates Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30630: golang: io/fs: stack exhaustion in Glob * CVE-2022-30631: gol...

RHSA-2022:6348: Red Hat Security Advisory: Gatekeeper Operator v0.2 security and container updates

Gatekeeper Operator v0.2 security updates Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30630: golang: io/fs: stack exhaustion in Glob * CVE-2022-30631: gol...

RHSA-2022:6348: Red Hat Security Advisory: Gatekeeper Operator v0.2 security and container updates

Gatekeeper Operator v0.2 security updates Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30630: golang: io/fs: stack exhaustion in Glob * CVE-2022-30631: gol...

RHSA-2022:6348: Red Hat Security Advisory: Gatekeeper Operator v0.2 security and container updates

Gatekeeper Operator v0.2 security updates Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30630: golang: io/fs: stack exhaustion in Glob * CVE-2022-30631: gol...

RHSA-2022:6348: Red Hat Security Advisory: Gatekeeper Operator v0.2 security and container updates

Gatekeeper Operator v0.2 security updates Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30630: golang: io/fs: stack exhaustion in Glob * CVE-2022-30631: gol...

Red Hat Security Advisory 2022-6290-01

Red Hat Security Advisory 2022-6290-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. Issues addressed include a denial of service vulnerability.

RHSA-2022:6152: Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.1.0 security update

Secondary Scheduler Operator for Red Hat OpenShift 1.1.0 Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-28327: golang: crypto/elliptic: panic caused by oversized scalar...

RHSA-2022:6152: Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.1.0 security update

Secondary Scheduler Operator for Red Hat OpenShift 1.1.0 Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-28327: golang: crypto/elliptic: panic caused by oversized scalar...

RHSA-2022:6152: Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.1.0 security update

Secondary Scheduler Operator for Red Hat OpenShift 1.1.0 Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-28327: golang: crypto/elliptic: panic caused by oversized scalar...

RHSA-2022:6152: Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.1.0 security update

Secondary Scheduler Operator for Red Hat OpenShift 1.1.0 Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-28327: golang: crypto/elliptic: panic caused by oversized scalar...

RHSA-2022:6152: Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.1.0 security update

Secondary Scheduler Operator for Red Hat OpenShift 1.1.0 Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-28327: golang: crypto/elliptic: panic caused by oversized scalar...

RHSA-2022:6152: Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.1.0 security update

Secondary Scheduler Operator for Red Hat OpenShift 1.1.0 Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-28327: golang: crypto/elliptic: panic caused by oversized scalar...

RHSA-2022:6152: Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.1.0 security update

Secondary Scheduler Operator for Red Hat OpenShift 1.1.0 Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-28327: golang: crypto/elliptic: panic caused by oversized scalar...

RHSA-2022:6152: Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.1.0 security update

Secondary Scheduler Operator for Red Hat OpenShift 1.1.0 Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-28327: golang: crypto/elliptic: panic caused by oversized scalar...

RHSA-2022:6290: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.0 security and bug fix update

OpenShift API for Data Protection (OADP) 1.1.0 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21698: prometheus/client_golang: Denial of service using InstrumentHandlerCounter * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-28327: golang: crypto/elliptic: panic caused by oversized scalar * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30631: golang: compress/gzip: stack exhaus...

RHSA-2022:6283: Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.2.2 Containers security update

Red Hat OpenShift Service Mesh 2.2.2 Containers Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30630: golang: io/fs: stack exhaustion in Glob * CVE-2022-30632: golang: path/filepath: stack exhaustion in Glob * CVE-2022-30633: golang: encoding/xml: stack exhaustion in Unmarshal * CVE-2022-30635: golang: encoding/gob: stack...

RHSA-2022:6283: Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.2.2 Containers security update

Red Hat OpenShift Service Mesh 2.2.2 Containers Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30630: golang: io/fs: stack exhaustion in Glob * CVE-2022-30632: golang: path/filepath: stack exhaustion in Glob * CVE-2022-30633: golang: encoding/xml: stack exhaustion in Unmarshal * CVE-2022-30635: golang: encoding/gob: stack...

RHSA-2022:6283: Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.2.2 Containers security update

Red Hat OpenShift Service Mesh 2.2.2 Containers Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30630: golang: io/fs: stack exhaustion in Glob * CVE-2022-30632: golang: path/filepath: stack exhaustion in Glob * CVE-2022-30633: golang: encoding/xml: stack exhaustion in Unmarshal * CVE-2022-30635: golang: encoding/gob: stack...

RHSA-2022:6283: Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.2.2 Containers security update

Red Hat OpenShift Service Mesh 2.2.2 Containers Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30630: golang: io/fs: stack exhaustion in Glob * CVE-2022-30632: golang: path/filepath: stack exhaustion in Glob * CVE-2022-30633: golang: encoding/xml: stack exhaustion in Unmarshal * CVE-2022-30635: golang: encoding/gob: stack...

RHSA-2022:6283: Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.2.2 Containers security update

Red Hat OpenShift Service Mesh 2.2.2 Containers Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30630: golang: io/fs: stack exhaustion in Glob * CVE-2022-30632: golang: path/filepath: stack exhaustion in Glob * CVE-2022-30633: golang: encoding/xml: stack exhaustion in Unmarshal * CVE-2022-30635: golang: encoding/gob: stack...

Red Hat Security Advisory 2022-6188-01

Red Hat Security Advisory 2022-6188-01 - This is an updated release of the Node Maintenance Operator. The Node Maintenance Operator cordons off nodes from the rest of the cluster and drains all the pods from the nodes. By placing nodes under maintenance, administrators can proactively power down nodes, move workloads to other parts of the cluster, and ensure that workloads do not get interrupted.

Red Hat Security Advisory 2022-6188-01

Red Hat Security Advisory 2022-6188-01 - This is an updated release of the Node Maintenance Operator. The Node Maintenance Operator cordons off nodes from the rest of the cluster and drains all the pods from the nodes. By placing nodes under maintenance, administrators can proactively power down nodes, move workloads to other parts of the cluster, and ensure that workloads do not get interrupted.

Red Hat Security Advisory 2022-6188-01

Red Hat Security Advisory 2022-6188-01 - This is an updated release of the Node Maintenance Operator. The Node Maintenance Operator cordons off nodes from the rest of the cluster and drains all the pods from the nodes. By placing nodes under maintenance, administrators can proactively power down nodes, move workloads to other parts of the cluster, and ensure that workloads do not get interrupted.

Red Hat Security Advisory 2022-6188-01

Red Hat Security Advisory 2022-6188-01 - This is an updated release of the Node Maintenance Operator. The Node Maintenance Operator cordons off nodes from the rest of the cluster and drains all the pods from the nodes. By placing nodes under maintenance, administrators can proactively power down nodes, move workloads to other parts of the cluster, and ensure that workloads do not get interrupted.

Red Hat Security Advisory 2022-6188-01

Red Hat Security Advisory 2022-6188-01 - This is an updated release of the Node Maintenance Operator. The Node Maintenance Operator cordons off nodes from the rest of the cluster and drains all the pods from the nodes. By placing nodes under maintenance, administrators can proactively power down nodes, move workloads to other parts of the cluster, and ensure that workloads do not get interrupted.

Red Hat Security Advisory 2022-6188-01

Red Hat Security Advisory 2022-6188-01 - This is an updated release of the Node Maintenance Operator. The Node Maintenance Operator cordons off nodes from the rest of the cluster and drains all the pods from the nodes. By placing nodes under maintenance, administrators can proactively power down nodes, move workloads to other parts of the cluster, and ensure that workloads do not get interrupted.

Red Hat Security Advisory 2022-6188-01

Red Hat Security Advisory 2022-6188-01 - This is an updated release of the Node Maintenance Operator. The Node Maintenance Operator cordons off nodes from the rest of the cluster and drains all the pods from the nodes. By placing nodes under maintenance, administrators can proactively power down nodes, move workloads to other parts of the cluster, and ensure that workloads do not get interrupted.

Red Hat Security Advisory 2022-6188-01

Red Hat Security Advisory 2022-6188-01 - This is an updated release of the Node Maintenance Operator. The Node Maintenance Operator cordons off nodes from the rest of the cluster and drains all the pods from the nodes. By placing nodes under maintenance, administrators can proactively power down nodes, move workloads to other parts of the cluster, and ensure that workloads do not get interrupted.

RHSA-2022:6188: Red Hat Security Advisory: Node Maintenance Operator 4.11.1 security update

An update for node-maintenance-must-gather-container, node-maintenance-operator-bundle-container, and node-maintenance-operator-container is now available for Node Maintenance Operator 4.11 for RHEL 8. This Operator is delivered by Red Hat Workload Availability. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-...

RHSA-2022:6188: Red Hat Security Advisory: Node Maintenance Operator 4.11.1 security update

An update for node-maintenance-must-gather-container, node-maintenance-operator-bundle-container, and node-maintenance-operator-container is now available for Node Maintenance Operator 4.11 for RHEL 8. This Operator is delivered by Red Hat Workload Availability. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-...

RHSA-2022:6188: Red Hat Security Advisory: Node Maintenance Operator 4.11.1 security update

An update for node-maintenance-must-gather-container, node-maintenance-operator-bundle-container, and node-maintenance-operator-container is now available for Node Maintenance Operator 4.11 for RHEL 8. This Operator is delivered by Red Hat Workload Availability. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-...

RHSA-2022:6188: Red Hat Security Advisory: Node Maintenance Operator 4.11.1 security update

An update for node-maintenance-must-gather-container, node-maintenance-operator-bundle-container, and node-maintenance-operator-container is now available for Node Maintenance Operator 4.11 for RHEL 8. This Operator is delivered by Red Hat Workload Availability. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-...

RHSA-2022:6188: Red Hat Security Advisory: Node Maintenance Operator 4.11.1 security update

An update for node-maintenance-must-gather-container, node-maintenance-operator-bundle-container, and node-maintenance-operator-container is now available for Node Maintenance Operator 4.11 for RHEL 8. This Operator is delivered by Red Hat Workload Availability. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-...

RHSA-2022:6188: Red Hat Security Advisory: Node Maintenance Operator 4.11.1 security update

An update for node-maintenance-must-gather-container, node-maintenance-operator-bundle-container, and node-maintenance-operator-container is now available for Node Maintenance Operator 4.11 for RHEL 8. This Operator is delivered by Red Hat Workload Availability. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-...

RHSA-2022:6188: Red Hat Security Advisory: Node Maintenance Operator 4.11.1 security update

An update for node-maintenance-must-gather-container, node-maintenance-operator-bundle-container, and node-maintenance-operator-container is now available for Node Maintenance Operator 4.11 for RHEL 8. This Operator is delivered by Red Hat Workload Availability. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-...

RHSA-2022:6188: Red Hat Security Advisory: Node Maintenance Operator 4.11.1 security update

An update for node-maintenance-must-gather-container, node-maintenance-operator-bundle-container, and node-maintenance-operator-container is now available for Node Maintenance Operator 4.11 for RHEL 8. This Operator is delivered by Red Hat Workload Availability. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-...

RHSA-2022:6187: Red Hat Security Advisory: Node Health Check Operator 0.3.1 security update

An update for node-healthcheck-operator-bundle-container and node-healthcheck-operator-container is now available for Node Healthcheck Operator 0.3 for RHEL 8. This Operator is delivered by Red Hat Workload Availability. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-28327: golang: crypto/elliptic: panic caused by oversized scalar * CVE-2022-30631: golang: compress/gzip: stack exhaust...

RHSA-2022:6187: Red Hat Security Advisory: Node Health Check Operator 0.3.1 security update

An update for node-healthcheck-operator-bundle-container and node-healthcheck-operator-container is now available for Node Healthcheck Operator 0.3 for RHEL 8. This Operator is delivered by Red Hat Workload Availability. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-28327: golang: crypto/elliptic: panic caused by oversized scalar * CVE-2022-30631: golang: compress/gzip: stack exhaust...

Red Hat Security Advisory 2022-6051-01

Red Hat Security Advisory 2022-6051-01 - An update is now available for RHOL-5.5-RHEL-8. Issues addressed include denial of service, man-in-the-middle, and out of bounds read vulnerabilities.

RHSA-2022:6051: Red Hat Security Advisory: Logging Subsystem 5.5.0 - Red Hat OpenShift security update

An update is now available for RHOL-5.5-RHEL-8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-0759: kubeclient: kubeconfig parsing error can lead to MITM attacks * CVE-2022-21698: prometheus/client_golang: Denial of service using InstrumentHandlerCounter * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read

Red Hat Security Advisory 2022-6042-01

Red Hat Security Advisory 2022-6042-01 - Red Hat OpenShift Serverless Client kn 1.24.0 provides a CLI to interact with Red Hat OpenShift Serverless 1.24.0. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms. Issues addressed include bypass and denial of service vulnerabilities.

Red Hat Security Advisory 2022-6042-01

Red Hat Security Advisory 2022-6042-01 - Red Hat OpenShift Serverless Client kn 1.24.0 provides a CLI to interact with Red Hat OpenShift Serverless 1.24.0. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms. Issues addressed include bypass and denial of service vulnerabilities.

Red Hat Security Advisory 2022-6042-01

Red Hat Security Advisory 2022-6042-01 - Red Hat OpenShift Serverless Client kn 1.24.0 provides a CLI to interact with Red Hat OpenShift Serverless 1.24.0. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms. Issues addressed include bypass and denial of service vulnerabilities.

Red Hat Security Advisory 2022-6042-01

Red Hat Security Advisory 2022-6042-01 - Red Hat OpenShift Serverless Client kn 1.24.0 provides a CLI to interact with Red Hat OpenShift Serverless 1.24.0. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms. Issues addressed include bypass and denial of service vulnerabilities.

Red Hat Security Advisory 2022-6042-01

Red Hat Security Advisory 2022-6042-01 - Red Hat OpenShift Serverless Client kn 1.24.0 provides a CLI to interact with Red Hat OpenShift Serverless 1.24.0. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms. Issues addressed include bypass and denial of service vulnerabilities.

Red Hat Security Advisory 2022-6042-01

Red Hat Security Advisory 2022-6042-01 - Red Hat OpenShift Serverless Client kn 1.24.0 provides a CLI to interact with Red Hat OpenShift Serverless 1.24.0. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms. Issues addressed include bypass and denial of service vulnerabilities.

Red Hat Security Advisory 2022-6042-01

Red Hat Security Advisory 2022-6042-01 - Red Hat OpenShift Serverless Client kn 1.24.0 provides a CLI to interact with Red Hat OpenShift Serverless 1.24.0. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms. Issues addressed include bypass and denial of service vulnerabilities.

Red Hat Security Advisory 2022-6042-01

Red Hat Security Advisory 2022-6042-01 - Red Hat OpenShift Serverless Client kn 1.24.0 provides a CLI to interact with Red Hat OpenShift Serverless 1.24.0. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms. Issues addressed include bypass and denial of service vulnerabilities.

Red Hat Security Advisory 2022-6042-01

Red Hat Security Advisory 2022-6042-01 - Red Hat OpenShift Serverless Client kn 1.24.0 provides a CLI to interact with Red Hat OpenShift Serverless 1.24.0. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms. Issues addressed include bypass and denial of service vulnerabilities.

CVE-2022-28131: GO-2022-0521 - Go Packages

Uncontrolled recursion in Decoder.Skip in encoding/xml before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a deeply nested XML document.

CVE-2022-1962

Uncontrolled recursion in the Parse functions in go/parser before Go 1.17.12 and Go 1.18.4 allow an attacker to cause a panic due to stack exhaustion via deeply nested types or declarations.

CVE-2022-30632: path/filepath: stack exhaustion in Glob · Issue #53416 · golang/go

Uncontrolled recursion in Glob in path/filepath before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a path containing a large number of path separators.

CVE-2022-30633

Uncontrolled recursion in Unmarshal in encoding/xml before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via unmarshalling an XML document into a Go struct which has a nested field that uses the 'any' field tag.

CVE-2022-28131: [security] Go 1.18.4 and Go 1.17.12 are released

In Decoder.Skip in encoding/xml in Go before 1.17.12 and 1.18.x before 1.18.4, stack exhaustion and a panic can occur via a deeply nested XML document.

Red Hat Security Advisory 2022-5392-01

Red Hat Security Advisory 2022-5392-01 - Red Hat Advanced Cluster Management for Kubernetes 2.3.11 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which resolve security issues and fix several bugs. Issues addressed include a traversal vulnerability.

RHSA-2022:5392: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.3.11 security updates and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.3.11 general availability release images, which provide security updates and bug fixes. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0235: node-fetch: exposure of sensitive information to an unauthorized actor * CVE-2022-0536: follow-redirects: Exposure of Sensitive Information via Authorization Header leak * CVE-2022-21803: nconf: Prototype pollution in memory store * CVE-2022-23806: golang: crypto/elliptic IsOnCurv...

Red Hat Security Advisory 2022-4999-01

Red Hat Security Advisory 2022-4999-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 3.11.715. Issues addressed include a memory exhaustion vulnerability.

RHSA-2022:4999: Red Hat Security Advisory: OpenShift Container Platform 3.11.715 packages and security update

Red Hat OpenShift Container Platform release 3.11.715 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 3.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1708: cri-o: memory exhaustion on the node when access to the kube api

Red Hat Security Advisory 2022-4947-01

Red Hat Security Advisory 2022-4947-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.59. Issues addressed include cross site scripting and memory exhaustion vulnerabilities.

Red Hat Security Advisory 2022-4951-01

Red Hat Security Advisory 2022-4951-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.8.43. Issues addressed include a memory exhaustion vulnerability.

Red Hat Security Advisory 2022-4943-01

Red Hat Security Advisory 2022-4943-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.10.18. Issues addressed include a memory exhaustion vulnerability.

Red Hat Security Advisory 2022-4972-01

Red Hat Security Advisory 2022-4972-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.9.38. Issues addressed include a memory exhaustion vulnerability.

RHSA-2022:4947: Red Hat Security Advisory: OpenShift Container Platform 4.6.59 security update

Red Hat OpenShift Container Platform release 4.6.59 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1708: cri-o: memory exhaustion on the node when access to the kube api * CVE-2022-29036: credentials: Stored XSS vulnerabilities in jenkins plugin * CVE-2022-29046: subversion: Stored XSS vu...

RHSA-2022:4943: Red Hat Security Advisory: OpenShift Container Platform 4.10.18 packages and security update

Red Hat OpenShift Container Platform release 4.10.18 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.10. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1708: cri-o: memory exhaustion on the node when access to the kube api

Red Hat Security Advisory 2022-2281-01

Red Hat Security Advisory 2022-2281-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 3.11.705.

RHSA-2022:2281: Red Hat Security Advisory: OpenShift Container Platform 3.11.705 security update

Red Hat OpenShift Container Platform release 3.11.705 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 3.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1677: openshift/router: route hijacking attack via crafted HAProxy configuration file

RHSA-2022:4667: Red Hat Security Advisory: OpenShift Virtualization 4.10.1 RPMs security and bug fix update

Red Hat OpenShift Virtualization release 4.10.1 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21698: prometheus/client_golang: Denial of service using InstrumentHandlerCounter