Headline
RHSA-2023:3925: Red Hat Security Advisory: Red Hat OpenShift Enterprise security update
Red Hat OpenShift Container Platform release 4.12.23 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.
Synopsis
Moderate: Red Hat OpenShift Enterprise security update
Type/Severity
Security Advisory: Moderate
Topic
Red Hat OpenShift Container Platform release 4.12.23 is now available with updates to packages and images that fix several bugs and add enhancements.
This release includes a security update for Red Hat OpenShift Container Platform 4.12.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Red Hat OpenShift Container Platform is Red Hat’s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.
This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.23. See the following advisory for the RPM packages for this release:
https://access.redhat.com/errata/RHSA-2023:3924
Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:
https://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html Security Fix(es):
- openshift: OCP does not use FIPS-certified cryptography(CVE-2023-3089)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
All OpenShift Container Platform 4.12 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.12/updating/updating-cluster-cli.html
Solution
For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:
https://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html
You can download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests can be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.
The sha values for the release are:
(For x86_64 architecture)
The image digest is sha256:2309578b68c5666dad62aed696f1f9d778ae1a089ee461060ba7b9514b7ca417
(For s390x architecture)
The image digest is sha256:571f9da5ab8ad0291a5fa822bd7b2803d5bf53096b140407ac442acf9dde4a99
(For ppc64le architecture)
The image digest is sha256:9470deef9f3220fa1c05b555f5e10f448d2888e60f40a8e2073424dc6e672fd1
(For aarch64 architecture)
The image digest is sha256:d9998b576ab98dcfd9024927572f698c0f40bf7fe4f8eff287f41ab4fa5e9c93
All OpenShift Container Platform 4.12 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.12/updating/updating-cluster-cli.html
Affected Products
- Red Hat OpenShift Container Platform 4.12 for RHEL 9 x86_64
- Red Hat OpenShift Container Platform 4.12 for RHEL 8 x86_64
- Red Hat OpenShift Container Platform for Power 4.12 for RHEL 9 ppc64le
- Red Hat OpenShift Container Platform for Power 4.12 for RHEL 8 ppc64le
- Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.12 for RHEL 9 s390x
- Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.12 for RHEL 8 s390x
- Red Hat OpenShift Container Platform for ARM 64 4.12 for RHEL 9 aarch64
- Red Hat OpenShift Container Platform for ARM 64 4.12 for RHEL 8 aarch64
Fixes
- BZ - 2212085 - CVE-2023-3089 openshift: OCP & FIPS mode
- OCPBUGS-10386 - [RHOCP 4.12] MetalLB operator should be able to run other than default service account
- OCPBUGS-11199 - Azure: UPI: Fix storage arm template to work with Galleries and MAO
- OCPBUGS-11303 - Incorrect domain resolution by the coredns/Corefile in Vsphere IPI Clusters | openshift-vsphere-infra
- OCPBUGS-13778 - kuryr-controller crashes on KuryrPort cleanup when subport is already gone: Request requires an ID but none was found
- OCPBUGS-13891 - CNO doesn’t handle nodeSelector in HyperShift
- OCPBUGS-13940 - [4.12] Bootimage bump tracker
- OCPBUGS-14041 - Routes are not restored to new vNIC by hybrid-overlay on Windows nodes
- OCPBUGS-14190 - When Creating Sample Devfile from the Samples Page, Topology Icon is not set
- OCPBUGS-14652 - disable debug pporf with unauthenticated port
- OCPBUGS-14664 - When installing SNO with bootstrap in place it takes CVO 6 minutes to acquire the leader lease
- OCPBUGS-14803 - KCM is not aware of the AWS Region ap-southeast-3
- OCPBUGS-14873 - Hypershift operator should honor ‘hostedcluster.spec.configuration.ingress.loadBalancer.platform.aws.type’
- OCPBUGS-14958 - [release-4.12] Stalld continually restarting
- OCPBUGS-15099 - visiting Configurations page returns error Cannot read properties of undefined (reading ‘apiGroup’)
- OCPBUGS-15198 - CPMS: Surface cpms vs machine diff
- OCPBUGS-15269 - External PKI reconcilation deploys broken due to invalid dependency on additional user ca bundles
- OCPBUGS-15309 - Bump to kubernetes 1.25.11
- OCPBUGS-15315 - IngressVIP getting attach to two nodes at once
- OCPBUGS-15377 - [4.12] Cleanup Tech debt: remove unused repo code
- OCPBUGS-15414 - (release-4.12) gather “gateway-mode-config” config map from “openshift-network-operator” namespace
- OCPBUGS-15424 - [4.12z] Duplicate acls cause network policy failure for namespaces with long names (>61 chars)
- OCPBUGS-15429 - [4.12 clone] openshift_ptp_clock_class is not updated in Prometheus metrics when the incomming ptp packets clock class is changed
- OCPBUGS-15459 - [release-4.12] gather podDisruptionBudget only from openshift namespaces
- OCPBUGS-15482 - [CI Watcher] Broken pipeline-plugin e2e tests: PipelineResource CRD isn’t installed anymore
CVEs
- CVE-2022-41717
- CVE-2022-41724
- CVE-2022-41725
- CVE-2022-46663
- CVE-2023-0464
- CVE-2023-0465
- CVE-2023-0466
- CVE-2023-1255
- CVE-2023-2650
- CVE-2023-2700
- CVE-2023-3089
- CVE-2023-24329
- CVE-2023-24534
- CVE-2023-24536
- CVE-2023-24537
- CVE-2023-24538
- CVE-2023-24540
- CVE-2023-27561
- CVE-2023-32067
References
- https://access.redhat.com/security/updates/classification/#moderate
- https://access.redhat.com/security/vulnerabilities/RHSB-2023-001
aarch64
openshift4/metallb-rhel8@sha256:e51399c870d68b27ecc53a35bcd5136062dc5285caa0114c553fb99cd3b90277
openshift-tech-preview/metallb-rhel8@sha256:e51399c870d68b27ecc53a35bcd5136062dc5285caa0114c553fb99cd3b90277
openshift4/cloud-event-proxy-rhel8@sha256:e4574135e363372544a647a76fead73f4d1e28588f52454f7ec65503142e6df2
openshift4/ose-cloud-event-proxy@sha256:e4574135e363372544a647a76fead73f4d1e28588f52454f7ec65503142e6df2
openshift4/cloud-network-config-controller-rhel8@sha256:2248d8cc348b43e791c8f40113a1fdf024e30389be11361b185908e60cbabd99
openshift4/dpu-network-rhel8-operator@sha256:c70cdf2bb542b49ee2b62d2471d55e9bd5721c97b6d8af2acab2483d44ac1f0f
openshift4/driver-toolkit-rhel8@sha256:40472ea3a6469d202add51fffb8868d0024ec85aaecf988b3dea190db540ded5
openshift4/egress-router-cni-rhel8@sha256:8f7d9f6a6bf2efc97bb254352a639c64a1494c56125fc4c9eb126bf2d65c64d5
openshift4/frr-rhel8@sha256:39c74b166e8b44bf05bcb1f55d2cb7440259e66945e9e9cf8528fd22e39ec2fb
openshift4/ingress-node-firewall@sha256:926dfd9dd3542c892c17c2affd62678054a76efa33beaa2d6eefff8c86277d88
openshift4/ingress-node-firewall-rhel8-operator@sha256:f2ada7e231e840f0973b241f022bbcd5ae3337ffb05acf97e1e6539b221587b3
openshift4/kubernetes-nmstate-rhel8-operator@sha256:b7791f3f9e6440b643d2aa6aa7fc238d9274c6b546c80eba64fb93592182504d
openshift4/kubevirt-csi-driver-rhel8@sha256:0918ed439387d939b975f0dc662b143172fe22a0dc93d4b001c79558201aa6c9
openshift4/metallb-rhel8-operator@sha256:a4c8da9a01e53f22773c1370e72e75aa7330c1e79cd71fce15354673ab00c6dc
openshift4/network-tools-rhel8@sha256:24b7ed635d1dcc94e722b6946e483a7425bbaaf280c98bc3c3da95a834bd2e2c
openshift4/openshift-route-controller-manager-rhel8@sha256:b7371e85e47319d718a3815c7961893e4dc22565f7676fc845684321caf0be5e
openshift4/ose-agent-installer-api-server-rhel8@sha256:0da3bdd0fb1ca49f3d2bd5d3a7b03eb53e9712616446d15aeac20a6937c9778c
openshift4/ose-agent-installer-csr-approver-rhel8@sha256:50d88c18eb8171975a65ab8dc13e32925649c846a1942479059a131f3a8dbae5
openshift4/ose-agent-installer-node-agent-rhel8@sha256:8a4aadc8acb5b1580502d836d3d0056ac515d5dc646b3bc9dfb199dcffc8d327
openshift4/ose-agent-installer-orchestrator-rhel8@sha256:a48b521cc97a32bd638ce0eceb81c1c33f2f6623c63871df21c61f9de8e42677
openshift4/ose-ansible-operator@sha256:e8192c9d0284887c143f62bce1807d23f1607bbbd5a9d12dd88b33310bca2bb9
openshift4/ose-apiserver-network-proxy-rhel8@sha256:e77629639c599adbcf65d192c09e3b095b5ee5f8bac4654cc5a73bc8fbddae86
openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:216d29ef0472f646059c4089b14f92ca618f687bf89b9ef2fe28f239c099db36
openshift4/ose-aws-cluster-api-controllers-rhel8@sha256:7b0166c4135f785fe14b9cf91524faaa7625aea692ade830351722db8aa6c1f5
openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6d5d7c9753955f5382fc935e6c836b162dc2f7c2d01c6338ee33e53bfc7af28d
openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:b8af6385b29dd95f97300008a853b0b3ce89817ffe9e3449030001b52414ed17
openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:85c5876c91b2e234159bfd5518585a115725c6fed28e4c20c910debf083507ec
openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:0205977aad6c562528cdaa00612f52b5bb1ba9e4866f840fe3918cd0af8634a0
openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2e42f1c1105bacecd37114cb3c9797255f263e0997477b9e5d74b0b8812864ed
openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:53f5dd6ef64f88d62ea8b2760a237a0c640118a6eb92dc53d52b4ce9c5dc6d42
openshift4/ose-azure-cloud-node-manager-rhel8@sha256:d3ef126c0563c1759e26308d8ec0040b88e249978698abbd15822aeb1dbcfdf9
openshift4/ose-azure-cluster-api-controllers-rhel8@sha256:002d6042a79885e77956b6069c6c22fd979943f6dfcbec77d034ed2d3bc35e44
openshift4/ose-azure-disk-csi-driver-rhel8@sha256:a718b4c4d4aa127954c3b14e7ad191f8e288d8a30b152797a9d45adfc9692741
openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:b32c16b33897f050de009c635f94d68e9a92ffe22a67897f7e2198d984663ec8
openshift4/ose-azure-file-csi-driver-operator-rhel8@sha256:1878d5947c2e2b18ede4eeb1d2a169d0634a64d1f38b8aee394a8d7b8eb02856
openshift4/ose-azure-file-csi-driver-rhel8@sha256:bf2a660d5e0243d2b85022b5f4e6931df632b447f42bcc14df1bcfa715957060
openshift4/ose-baremetal-installer-rhel8@sha256:f0bd497a0b7fa2ff90fed602fde46e3adecadf2379e8a13c0ff1df2df0e9ebbf
openshift4/ose-baremetal-machine-controllers@sha256:a4c955719c94ec0f1d48ce0e16e5aa19845da3db6046fa546b7dcfcdbb030fba
openshift4/ose-baremetal-rhel8-operator@sha256:7b29571f538869b45b9adbf05d3867a86460f82ae083cf83b47b1b02f9eb6b96
openshift4/ose-baremetal-runtimecfg-rhel8@sha256:dcbf4e8c4a40fa96a915333c7f2cfd03383d41540ac7e97eb8d1633e60b0bcb9
openshift4/ose-cli@sha256:b414a28b4d3272f9ff2e399af83c62cd157a189ab1345d91d5f005aa1885d6b1
openshift4/ose-cli-artifacts@sha256:8bc46baf5eac22c74cb02ec25e76659c9b8747e6666cb21780382f4d86ec1eb3
openshift4/ose-cloud-credential-operator@sha256:2b239d4701f4375dc5e18ab86474aee1af754eef3bfbc8b07234a64085642bee
openshift4/ose-cluster-api-rhel8@sha256:e459e4aa8a4077447c2dc332a174170bdab39be432dde0c6571f8036897b79ab
openshift4/ose-cluster-authentication-operator@sha256:883018f5a3ed10a7133c6eae6b2a492a2c4014477b0b1d2436875c6339213575
openshift4/ose-cluster-autoscaler@sha256:03a5f63df0a2d4a0335472dacc300a404eab352028661e63870ac88c97e9c903
openshift4/ose-cluster-autoscaler-operator@sha256:0b9e027d2f90f3313d2ebbbaedbf45bdc9f846df184f5fa3c9222bce14116a75
openshift4/ose-cluster-baremetal-operator-rhel8@sha256:dd3cd71e0bef81a1491684810fdc61118e44aa345d065f6222e83838cb1df0d9
openshift4/ose-cluster-bootstrap@sha256:aeeb403c1928ce5a8d8a20ae275314e4264d2dc7a7333182989ceff716b591b3
openshift4/ose-cluster-capacity@sha256:64cd00733653ddccd80c1f91f6b2af87a9e80c0b7cd0fea50febd686cdf27012
openshift4/ose-cluster-capi-rhel8-operator@sha256:e03150c81c5256609ed1d4752c9f0d2430d2a59bad139310301ba37ac2a7e202
openshift4/ose-cluster-capi-operator-container-rhel8@sha256:e03150c81c5256609ed1d4752c9f0d2430d2a59bad139310301ba37ac2a7e202
openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:cf0f5d9e4283b1770f89010e22e3611022b6777fce2e62d30f14b358b725baf3
openshift4/ose-cluster-config-operator@sha256:f81edd24dcc3cc8ba31a4f6502975f95774048b2597ad84f3913d67e620b81fe
openshift4/ose-cluster-control-plane-machine-set-operator-rhel8@sha256:543fa1c6ab415c04b6cf5483f9f8c5144525b857632d2ba86d057eecefb91f92
openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:1c615bdd77f2ea854f6b93c871f77f726f977cb0686bcc122f20f642e90d85e5
openshift4/ose-cluster-dns-operator@sha256:92dbf9b364d95409b17ff1d43927c0d82534dd9c06c4c932b5a8250c1f8bff9d
openshift4/ose-cluster-etcd-rhel8-operator@sha256:5cb610eceec5485c5d8ce9856afc8993e3a0034ccaa481c3a8e90279d4d99155
openshift4/ose-cluster-image-registry-operator@sha256:ed044fa5aede14522da7dc7dd2a3cde0f1a2fc0526287aa01b66a4f4c7a90113
openshift4/ose-cluster-ingress-operator@sha256:0456cb68b27ed470d9f6755d14b300529f54b432e622de713399ca0fcf6661dc
openshift4/ose-cluster-kube-apiserver-operator@sha256:a9a284954e8514fadb4bf59e8ceab44b813b5515544eebbc7d45796161c540a5
openshift4/ose-cluster-kube-cluster-api-rhel8-operator@sha256:9da36979521b4fdda1075740eb8cec2301aef4d798a85c8ae62b4b3d5d7545ea
openshift4/ose-cluster-kube-controller-manager-operator@sha256:39fe2b7223e9fa6aeafca4a39d3de8f8e49d99f49169e6f2fd98f4e329d10ba0
openshift4/ose-cluster-kube-descheduler-operator@sha256:229ef432b2d10721de8d6179291ee86002d489f7a469854724ccc573b851d794
openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:229ef432b2d10721de8d6179291ee86002d489f7a469854724ccc573b851d794
openshift4/ose-cluster-kube-scheduler-operator@sha256:9346ead9588dfe5b0aadae49dfba084bcd2c62285b8a72072666bfa70fee5a77
openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:14ab959a44655529f9564f7a79b1103b05086154666128def8343d2858d6410a
openshift4/ose-cluster-machine-approver@sha256:381d80e8d52fb440932fc669c8124c8798e20f2300ea5541a1dce18d43806072
openshift4/ose-cluster-monitoring-operator@sha256:7fe0bb3a3ad5868dfc8780bb38f05d3ef6cc5133319a24a2ce1b99cde8fcf9ee
openshift4/ose-cluster-network-operator@sha256:493028ae3890ff620e0423ab9dca20b555dcdfc8ac2df860bb4eacf2264e28ee
openshift4/ose-cluster-nfd-operator@sha256:3f1819ae9c73d13832abe539a9fb020f9d13b98ab3f2390df1b99143a4e958f5
openshift4/ose-cluster-node-tuning-operator@sha256:b78c4db705d6bcd8132869e183e409d849641aa5a13e1ed4b5ec96d886822d98
openshift4/ose-cluster-openshift-apiserver-operator@sha256:399398320e7010339a6264b92bcd7fd9b0d803dc60a22d4735958aea8d983f4a
openshift4/ose-cluster-openshift-controller-manager-operator@sha256:0bf1852870c993fe31888a9f55f9c9885231cc9aadb235f7d2fd713f162b1169
openshift4/ose-cluster-platform-operators-manager-rhel8@sha256:e8c8ac1ec9e47e392f9e86b941efc4546acda470a2133b11a8c1afde02c6e9cd
openshift4/ose-cluster-policy-controller-rhel8@sha256:46059f04e9f06266665a0f84544dad2e6dcdbd3c3b46b8dc9d006b0ca74ca0dc
openshift4/ose-cluster-samples-operator@sha256:fd197e6f3c2df2e5408198c413588b5ac7fa373df1d17f348c1b145a915ff749
openshift4/ose-cluster-storage-operator@sha256:34f8efe8df20578b121085f3ba80545eca519c1b7710869b9d8d7fab084e7961
openshift4/ose-cluster-update-keys@sha256:a754fc4e282cd527bf27e98f815927c2d98491f24cf148a14873ddf8bee3d4ea
openshift4/ose-cluster-version-operator@sha256:1cdf11c2edd36ad438ffb8762a9a135e001670951cd183d9e8154ef8d4972329
openshift4/ose-clusterresourceoverride-rhel8@sha256:e04668ab56b8055051fc82965724cecebb233f461fe1dbdcb3d7729c27fb5c71
openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f61e162acb94c3f85cc3593411a901df4503c8f086404d6a782bcfacf4981d38
openshift4/ose-configmap-reloader@sha256:8ae2419ea483bc13431b58d44fe2b710b07d08c19b0b3252bb9c2956c0b7e870
openshift4/ose-console@sha256:9aecc7cc404756cb8cbb148d09259e7b1ca1f4de5ca0339a07d32fa3db0f7bcc
openshift4/ose-console-operator@sha256:1a3258dba527316e79d4825617290fee5475c55ab25d56fb546896b5d5930231
openshift4/ose-container-networking-plugins-rhel8@sha256:e61d5577cadd84677bfc11fe2183fa421964dc7b9dbf11c86561e2adf020fc04
openshift4/ose-contour-rhel8@sha256:4182bc1f8565e58d4d9c6213c7340c5864d5af3282f5826c6525a57a8c74a3c3
openshift4/ose-coredns@sha256:215bdd692a45ec218bf0d044fb220a58b2691224780a0fcb12a16c68c325ff64
openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:0ea9ccfb9c4925c262f54afa2289931b6a74a2cc6541ede8c88e7f832cbc9548
openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:f0a4c6131f49513174ef2367582bc1cb0624fe1a981766e2b2120e1f7d07797b
openshift4/ose-csi-driver-shared-resource-rhel8@sha256:a12621030c87102c05db663d2a0e1f454d31ac434600612784f7e874cec36d32
openshift4/ose-csi-driver-shared-resource-webhook-rhel8@sha256:0dcde13c2259d09cc925072cda704048d5acfbff459ea4a3c3e9ececec29f56f
openshift4/ose-csi-external-attacher-rhel8@sha256:c1c8f64ee8382ed7652e5873f8e06141c823c344d840d9902774f58bc8882c4c
openshift4/ose-csi-external-attacher@sha256:c1c8f64ee8382ed7652e5873f8e06141c823c344d840d9902774f58bc8882c4c
openshift4/ose-csi-external-provisioner-rhel8@sha256:dbbdc5f5ad273aeba769e9be532e84275de51d2c56e4a9bc13b71a9d1295663e
openshift4/ose-csi-external-provisioner@sha256:dbbdc5f5ad273aeba769e9be532e84275de51d2c56e4a9bc13b71a9d1295663e
openshift4/ose-csi-external-resizer@sha256:1bd1a683ac957afdd40120bc06983bf75eddbc1c9ac4d16bde1456c800ed368a
openshift4/ose-csi-external-resizer-rhel8@sha256:1bd1a683ac957afdd40120bc06983bf75eddbc1c9ac4d16bde1456c800ed368a
openshift4/ose-csi-external-snapshotter-rhel8@sha256:913d7bc56efc64ec70e52aa33b1bdc4e32aec4a7746fddc40027d84cdb529112
openshift4/ose-csi-external-snapshotter@sha256:913d7bc56efc64ec70e52aa33b1bdc4e32aec4a7746fddc40027d84cdb529112
openshift4/ose-csi-livenessprobe-rhel8@sha256:bf8d21ff9a3cc53efced7a196b1c8be2637746e00a91f4ff2917ab4499b346a2
openshift4/ose-csi-livenessprobe@sha256:bf8d21ff9a3cc53efced7a196b1c8be2637746e00a91f4ff2917ab4499b346a2
openshift4/ose-csi-node-driver-registrar@sha256:d077340d80622cfecf98935f3536a96fbd22ad94a6640dcb5f16408b88062b64
openshift4/ose-csi-node-driver-registrar-rhel8@sha256:d077340d80622cfecf98935f3536a96fbd22ad94a6640dcb5f16408b88062b64
openshift4/ose-csi-snapshot-controller-rhel8@sha256:001a7dff404d09f7a5546e8923e0f6f302f35acf08cac54c7d630af81f3ae3e0
openshift4/ose-csi-snapshot-controller@sha256:001a7dff404d09f7a5546e8923e0f6f302f35acf08cac54c7d630af81f3ae3e0
openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:fe6acc6554e90528ccd4341b2d00a041430624c024d63c84df04a936b08cf33d
openshift4/ose-deployer@sha256:2a3e298babdc105e6cc6e528c31ef468f19614f7c732d97747e66bac98b2efac
openshift4/ose-descheduler@sha256:24ba0cafc4a97ed2346f3ed8fa0299800c7956e4dff595ce281040134fc1b68d
openshift4/ose-docker-builder@sha256:6a358f91da5bccfa1dc6f5c75714c05ca3656c11719071f54db128bd2f1cd51d
openshift4/ose-docker-registry@sha256:8cc076c5a533cf80b0610bf2ab1e2c3cf69f192886a479e34f6907e526d96c50
openshift4/ose-egress-dns-proxy@sha256:5e7c0f4c197eadfc1747868e2130d7b08f3e8ddd38336ad8b57247e5ebdf143d
openshift4/ose-egress-http-proxy@sha256:17c64303e42bff0e9b8561fb1412f3eff8941c735642a1ed6f8f0df61b5c8436
openshift4/ose-egress-router@sha256:c20662fa0503610733fbeccdafa5212fa036488f08ddfc753b74afe569f152d0
openshift4/ose-etcd@sha256:1d34a2302795f81990f73f13858fed89edac544f77ea6a46d6c0fe0ee3c58411
openshift4/ose-haproxy-router@sha256:653b7592d7a2f90f7574c7d19d208ce1f7f7b6c9425e28a04e85a6f49eeaa69a
openshift4/ose-helm-operator@sha256:b4483fb2a31342615e09944064ff965309424dd9f4f14e448c37d2e3188a8ecb
openshift4/ose-hyperkube@sha256:a69a7266a3de2358d4cfbfdeb24d5485ca7a95b6a08aedd78bb25f2e15cbe417
openshift4/ose-hypershift-rhel8@sha256:18e7d5e01de6ef2b8f179466f51c13e35ec0093088e6089b0486df201ff0efb2
openshift4/ose-image-customization-controller-rhel8@sha256:51b334fffa419aaf1ae2381183d931ff77cff1343bbcc41d1b834e53b39d186c
openshift4/ose-insights-rhel8-operator@sha256:1f5909ca34d36bc4caee4b84259ad18446a6b30c1af9670c09fa441e6eec2e54
openshift4/ose-installer@sha256:39195e00a8a9a625211fc43f40cb560df427f8af1c64d0676d355498f6b763de
openshift4/ose-installer-artifacts@sha256:9babb8545336b41ecbdde36d0505465bebea3e14f2e0f4749c656f73f436daa2
openshift4/ose-ironic-agent-rhel9@sha256:a5f435852ed959463339be4919b20f512d1f56f631333cf1a3900752e0e37b53
openshift4/ose-ironic-machine-os-downloader-rhel9@sha256:56154f2c283eb5d69c0e2008d5b4c773782a90af415707de5a3dcf678e5cc345
openshift4/ose-ironic-rhel9@sha256:b859a937e3b298bf666caa9e01b26f02c628ba5f40f61f2f0555978ac1635102
openshift4/ose-ironic-static-ip-manager-rhel9@sha256:a5e13a0969d98360d295c105bb6554aa9f8cceb5efd940d569f580c9c4602b7d
openshift4/ose-k8s-prometheus-adapter@sha256:2d4bd18c7f8e51c4f2417cff3f2f485d7e3aa91d0f944ef26b5885481c52b3df
openshift4/ose-keepalived-ipfailover@sha256:eec92aef272b360214bed59e6608b75ca7ed55e925344c77036f48719a089f11
openshift4/ose-kube-proxy@sha256:f4e29f9c6038d3122af91586ee8c7ff43c2fe45b2fa9f008bb707849d5b80426
openshift4/ose-kube-rbac-proxy@sha256:04708f95b3b4417e8564d40eef4d63c3e287dc1d8b38ffbd6b942e65017417b7
openshift4/ose-kube-state-metrics@sha256:821d1a013f1c681e0147abe0d6ff80f10e163d88e56a5cd4c43b67180bdbf5dd
openshift4/ose-kube-storage-version-migrator-rhel8@sha256:bc77d6aa5a9ccea68143d9aa969c9b5423a9197350124ce9aa9609f9b23454f1
openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:2efb8b81b5485a9bf9374f643c9848f8c0b0cf66f75cff5bfe1741e9b05a3d6f
openshift4/ose-kubevirt-cloud-controller-manager-rhel8@sha256:e9c4f9e4b1fee831cf59dcc4dad2e7d264af564c501e6be1583dfb3885ee8a6f
openshift4/ose-libvirt-machine-controllers@sha256:09eb2b04e78e9a281cd2acb34955689a3a1a49680d97aaea28f6b342dbe91b0a
openshift4/ose-local-storage-diskmaker@sha256:9e42c5177b066343d3f2eff44677f5c0b0dc9b2c3314b35d860b490bf2cd1338
openshift4/ose-local-storage-mustgather-rhel8@sha256:e546070501684aeb722fd94feba5abb178d121dc6dd85f87f93609621baf0560
openshift4/ose-local-storage-operator@sha256:c820f665343085defdb29ef22d4c8741b3d884d6d51cd2fd3d424a36a05c51a7
openshift4/ose-machine-api-operator@sha256:606ed18587e269da26ce7a0b34f1ed015cea18350ca8ae31e8e186210bebcb90
openshift4/ose-machine-api-provider-aws-rhel8@sha256:817bcf60842ec09acb99ebded68e7f5e32c7d26369212a9442a4f551334d2669
openshift4/ose-machine-api-provider-azure-rhel8@sha256:98c3768792a6fd3e8501c9d862c70106b2bef8777190f453f539dab3abe3bf2d
openshift4/ose-machine-api-provider-openstack-rhel8@sha256:c9e6cefef0b0011507c9f15a2dce9fe6181c8be7e7f462d9e71ce02c26b1face
openshift4/ose-machine-config-operator@sha256:cc98f386194fbe430df656d2fac8b1d3488c5fc722823ca21649d2e3b0262872
openshift4/ose-machine-os-images-rhel8@sha256:1ce0ac31dc90ce321ec5014c2a44605ca8ad5c53fe29a01ac6516293277918eb
openshift4/ose-multus-admission-controller@sha256:10a6116d7f32d28207fa4baca706475eeb00ef59c727c61640cea67d5383ab4a
openshift4/ose-multus-cni@sha256:192e5f64cb37f5bffe3792055f17b34ca43736354401f5159cc70eb6746acdfb
openshift4/ose-multus-networkpolicy-rhel8@sha256:802cfa45923a4e45f0799d2347fd58130860c694121fc0030492641609746b53
openshift4/ose-multus-route-override-cni-rhel8@sha256:cb6731c04e1eabe86167e00a81a5ef1e6a5d105cb92e499a583cb6d0d6518921
openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9b14e2475ab9f30a392a7584dff70fad17269a6a79b68ab0d9968f40c36d2de
openshift4/ose-must-gather@sha256:18ea00f1643b79bf3763b396104d136f100662f5296c7f281b01263f63e0b0cb
openshift4/ose-network-interface-bond-cni-rhel8@sha256:428d9914e813fed26d626e2abe42d8089658c6fb738faa72865fa2021bd54d13
openshift4/ose-network-metrics-daemon-rhel8@sha256:754abe1c75a02df1b9aec814e811c1fe65d3c3d8f8b737db8b9fa409af948750
openshift4/ose-node-feature-discovery@sha256:0b9827045a4c32c91404c332cf2b422f53a3177f1694d26a553a3afbc9c32669
openshift4/ose-node-problem-detector-rhel8@sha256:4cff77c5de84066db1089bb624b9a3a39326893a7f189a348bd7000a3654db59
openshift4/ose-oauth-apiserver-rhel8@sha256:a17a129426170d9cc8bb7c2ce564ba81ebb7aea2c8e74e26ae4394457e086ac4
openshift4/ose-oauth-proxy@sha256:c005f26863e381c298bdf985f3c51e80d07286f668414bd62780226fda9dab33
openshift4/ose-oauth-server-rhel8@sha256:08296ac93b205c6bf822f006b24495123798d2d25d5cdf722f39346ed526f89f
openshift4/ose-olm-rukpak-rhel8@sha256:bafa989131bd5e49fd27520380bbf2d296361ebaa9d9be9aaa5b870730ba5d73
openshift4/ose-openshift-apiserver-rhel8@sha256:6c0b2a1f2dd6123c0531983c1d242805bbad27f1f90630a2c8291c734f1b32e4
openshift4/ose-openshift-controller-manager-rhel8@sha256:7fbef446a8f9e06142e124d981e65187764219db822b8761f33b4e12fee9964d
openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:a345401fc2ebf36c0ee1cade1e4199eef0291dd365d6a27cb049094f0cfea406
openshift4/ose-openshift-state-metrics-rhel8@sha256:dcead5b495e84420a7904c4dfaacf73d355fcb00f79f15626b7bf1f3cab5754c
openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:905d24e7635f69f718dfc2244ee7fbe5711392d145521e1d1df8d9a0884df125
openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3c30a4532cc1cb91a7add4294490292107a580a1601f8040e6cbf48b5826b3ee
openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:786ad65a0528ceb9b8080462a6e4b46e4e7c2051c5f5fa3706a86853aa49d74f
openshift4/ose-openstack-machine-controllers@sha256:8a96fa862d49c7fb005c3e03c317fd23baaa9abb11a1e4c8584ad6f4dd0dc64f
openshift4/ose-operator-lifecycle-manager@sha256:b8928e0dd34f3be182191a4efb7996af638731113bca2babe351904cb9499b42
openshift4/ose-operator-marketplace@sha256:f720bfc3181988c4b04e4cf283175746fdd199bf2bb9be2fc1e84a4f8fd492ad
openshift4/ose-operator-registry@sha256:25e00b0a63a2b01b06ed9cc7f22580d3617750c462f1e772cc85de4e6f28bf88
openshift4/ose-operator-sdk-rhel8@sha256:3f2875bd48fc0115248ba525b5a60ea413715c9b76efd6d9f0f278ae2c0f5320
openshift4/ose-ovirt-machine-controllers-rhel8@sha256:d557e41d1c3d8c9024f502361ab34866da9e18881ab645111e2c86c40d46e55c
openshift4/ose-ovn-kubernetes@sha256:636be5212d1750145fce1e1c140ae726140fea3ed7ed817e4f5877c5eb389f40
openshift4/ose-ovn-kubernetes-microshift-rhel8@sha256:3883619d09ddb5868727a4fb4131e580a62b20103de694775abd63fd537f3cf0
openshift4/ose-pod@sha256:e997d565ede5a590353e82c0e3bc229be0c215f85260ec7e96cb68cdc6edc989
openshift4/ose-prom-label-proxy@sha256:5830ca84f4c1316b15b62bb9d499a16d91022b608b2e0611f92fdd1e9afe1cb3
openshift4/ose-prometheus@sha256:6549f221048a8d9bd5e16a206ca2ffe0771d272654d229d8b39ed60baa2eac8a
openshift4/ose-prometheus-alertmanager@sha256:79951cd46210ff71d6108a643fb39d55f45ad62acfd7cfd62af235a2f166151a
openshift4/ose-prometheus-config-reloader@sha256:a90d5b52db55e2b57a9e7a63a68d44ab6139939c43245d094560e324d2768db5
openshift4/ose-prometheus-node-exporter@sha256:085e492ee5c307bb9953317d922d67fb2956938f1090458ac208fbb580368723
openshift4/ose-prometheus-operator@sha256:535f7e031d3aec8f32895b3e72e24df305f170753381afbef426266d1b82515b
openshift4/ose-prometheus-operator-admission-webhook-rhel8@sha256:89c981f51e844511b60d9d9249db5b7b317ce5ad1cdf0e9599d29d07eecab94f
openshift4/ose-ptp@sha256:e6b52834c4067123c7a0c96bcef8af555556b8c08afe55ca451742c0be5bbb01
openshift4/ose-ptp-operator@sha256:ea00c4df1ad17da4ac8152f6fb75de359783da3b46571d67c3e419377919497d
openshift4/ose-sdn-rhel8@sha256:f95d8813b5fc100d0670886e12951da82dc576f4322a77953a2425a019397072
openshift4/ose-service-ca-operator@sha256:db078b01e116e73ae91a7fdf746986e48dc595f4e8d145d3e438b2a5136587d7
openshift4/ose-sriov-cni@sha256:086246e0b56304316ae1f00c8d0216c4c62394a74275d8eb79173ccbe46a1489
openshift4/ose-sriov-dp-admission-controller@sha256:a452d8d1a3eb343d6aeafa66756e8938069b2f6e11ef53ad7ffc725bbe7ca380
openshift4/ose-sriov-infiniband-cni@sha256:ef241cb9a15009682764d3900f969df6d0f3f19c35a78f8ffb788371cdfcbf14
openshift4/ose-sriov-network-config-daemon@sha256:a7dc6aad5a8e693f04129211f6ffd7b13e7f758a0e442df09605be89d85d8f9f
openshift4/ose-sriov-network-device-plugin@sha256:fa146895c8299046e4edb186061a78370ed4d46d76d1a07f8de4afeae63817a8
openshift4/ose-sriov-network-operator@sha256:85258d53c837b0c31a6c794c86f8721d2da798710d8257c8aca671d3109f7e52
openshift4/ose-sriov-network-webhook@sha256:a55dbaa4d925ea1fa2ebaf6496733b02eb7e00b3df222a9daad5881bf00ad418
openshift4/ose-telemeter@sha256:aa34310202eeacb82938cfc2849e3aa590615bf04bbb408a2a1f7f82a621a15b
openshift4/ose-tests@sha256:bc6fb3bb51298371023fc30a017d57c55638bba38bfc3c4213e19ac6be5f4d2c
openshift4/ose-thanos-rhel8@sha256:bf30c13e4ec3551cb9171403d5d1469740765698ea1ecd3615f454362c1a845b
openshift4/ose-tools-rhel8@sha256:fe9e21d9273c5cec93c00cdc085aa2961981e65b0f1bd06872328e976386aa77
openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:c3eb0f1c62a059ee824d79daba01fe78d842094eaa55e8c10664743628d7a770
openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:614e061eee317250b061d56b5d176425e1033a248e85c71c66e038683a03f99a
openshift4/ovirt-csi-driver-rhel8@sha256:a28524b59350d31af408415e9f3248c7139553a93c9691b25bf3ec7ef90ef7d1
openshift4/ovirt-csi-driver-rhel7@sha256:a28524b59350d31af408415e9f3248c7139553a93c9691b25bf3ec7ef90ef7d1
openshift4/ovirt-csi-driver-rhel8-operator@sha256:4d7268f202982d267d764538ca5c8894bd9305eade78b68f157ab41166736bd5
openshift4/ptp-must-gather-rhel8@sha256:1b5e16585423ac1ea1e8f461b9e9bb6e734da3a57cdb0391858ae98b29ce81a0
ppc64le
openshift4/metallb-rhel8@sha256:320c76c52150a7c9a521f3fbee87e1a16293a63274a7246acb69831f54d93534
openshift-tech-preview/metallb-rhel8@sha256:320c76c52150a7c9a521f3fbee87e1a16293a63274a7246acb69831f54d93534
openshift4/cloud-event-proxy-rhel8@sha256:a9c047d6ae8fc29685ad8b6c3e8ca6af795f6cfff9bb1a7bbc5f0269604ce4dc
openshift4/ose-cloud-event-proxy@sha256:a9c047d6ae8fc29685ad8b6c3e8ca6af795f6cfff9bb1a7bbc5f0269604ce4dc
openshift4/cloud-network-config-controller-rhel8@sha256:6f99acbcff79405aa04bb51bd0c47650c204490979abdba735979b74d046f477
openshift4/driver-toolkit-rhel8@sha256:e1f5034ff062537afa7805fc0bf8d40981dce89595ff3c923c380c3ca77678c6
openshift4/egress-router-cni-rhel8@sha256:876e7387c7a971eb1d5ed658fd99660c1a0d7f78b8df1379cb490012ed9f8d03
openshift4/frr-rhel8@sha256:fefb21aed145cf4032ac9cba13b7ff489ae76d65656f24a9b69797719c5a3b1b
openshift4/ingress-node-firewall@sha256:644c5aa33f445580a7d785bedba2422736b31b923a1f070f2d53e1f5f2caf3f5
openshift4/ingress-node-firewall-rhel8-operator@sha256:829cccb57dbd0980aa285e45c27c9854f39dfdf5d7b8dc5601f2d4714c952470
openshift4/kubernetes-nmstate-rhel8-operator@sha256:05f471b502e19796eb809f2772a6ccf828c3504f56f9a67cc73d15e35b0d48d5
openshift4/kubevirt-csi-driver-rhel8@sha256:c3857684680f364111b6f497f94fa12e3eba36fd46821bff9a52dbaf66899b02
openshift4/metallb-rhel8-operator@sha256:5847a927e1cc616bb0d01a06273747e687f985127d45bb1c7bf743a3e2d9a06a
openshift4/network-tools-rhel8@sha256:fd2912dc4db356a5794e516cfdd41745cc85f446672eb4fc6cc4ee3a4b388fd6
openshift4/openshift-route-controller-manager-rhel8@sha256:df90dbb940700547d8f607039da6b02722a4032f81500084e875178eaa1b9964
openshift4/ose-agent-installer-api-server-rhel8@sha256:d4568cdcfbcb19114bc14b4286bb1116cbb93d35b0c487eecdf7512d8b1a8971
openshift4/ose-agent-installer-csr-approver-rhel8@sha256:66f15252b1043bc81fe85135c9d48fd55912a0f45d51bf84467f7e35795dcb23
openshift4/ose-agent-installer-node-agent-rhel8@sha256:fe3a8db8c7a1cbb316f129bf6a24c24142e36369d2d4d6e1fee126a0611247af
openshift4/ose-agent-installer-orchestrator-rhel8@sha256:2f4af803949b8de7a5a06244abc7d3f72a2a1e7a4ff6b8a4b1dbff2a5391dead
openshift4/ose-ansible-operator@sha256:55fa3d611e763504fe50e98074f880f7f95af7dc39b128579898814ffeb7f348
openshift4/ose-apiserver-network-proxy-rhel8@sha256:b9f52c8a4c8a790266da17995d5cb2bfaafb8ab2a37b1a49afc81c3a4cec154b
openshift4/ose-baremetal-installer-rhel8@sha256:46ded818fe4fc43607eda059c17a3b1dd3d6390ce1752932c2ea7e52e0335d92
openshift4/ose-baremetal-machine-controllers@sha256:0a85ed703b5bfcc4b34c4a51613474b2403da7e22060f7775816cba1a4b1d9dc
openshift4/ose-baremetal-rhel8-operator@sha256:769cbf6a863a03734ffff4d874a0eac8b5764e123e9c50a63b715d2cf60be2c5
openshift4/ose-baremetal-runtimecfg-rhel8@sha256:bf72cf4530cd03b89a4299417dd7ea70be82985d88cdd95d75f7e36e29a0cb39
openshift4/ose-cli@sha256:af2b35827e77b1df0ed924e85ad40574c4968ccb49ef651f8460459a723f6ecb
openshift4/ose-cli-artifacts@sha256:225c856563c0503081e42309aabae15c5ddda123178b5a23b6eec00463428594
openshift4/ose-cloud-credential-operator@sha256:2a305f41d2e070f052b34740d8cae389e8860bf86cdd873040aa13ea97686de0
openshift4/ose-cluster-api-rhel8@sha256:d7059d73db87495840b5e41a056539b6979ffa929fc1e5a3f0c2e1f9f72b00c9
openshift4/ose-cluster-authentication-operator@sha256:ddf0dd8b7052208ac7ac933635cf847f96e42b99161e5ec42107767d343380c8
openshift4/ose-cluster-autoscaler@sha256:70fb92d532ae7b0d3982820f3ff82efff82de601b9996087849bf49fe35b3d9e
openshift4/ose-cluster-autoscaler-operator@sha256:9a381799324864cf0402352907c8898a808ffe900a760657675b392083ffae3b
openshift4/ose-cluster-baremetal-operator-rhel8@sha256:8467664d9b11d9489029a01d016a0f25d0d8d9e6bd33defbf03663fb031f7779
openshift4/ose-cluster-bootstrap@sha256:0d90eff924a41ce4faa9a7f9d838cf7bc8f4a26950e09d627ec4dad0e647efc0
openshift4/ose-cluster-capacity@sha256:3ceff4ec34de1a8bac671cfac58add3cf59e0304426003a95d7a45d3af6acfff
openshift4/ose-cluster-capi-rhel8-operator@sha256:7bdcd51a77a186ff83bb558e807d100681a4481bc20a2cb13ebc356d62e5004d
openshift4/ose-cluster-capi-operator-container-rhel8@sha256:7bdcd51a77a186ff83bb558e807d100681a4481bc20a2cb13ebc356d62e5004d
openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:f0a22125673c266373b78926c3bfbb9d37b42e43e2722e328122bece51519643
openshift4/ose-cluster-config-operator@sha256:e1e9b868f9fe619756d3248575847e9002ce98e5b51383b1d2fe1ad6ac5dcff9
openshift4/ose-cluster-control-plane-machine-set-operator-rhel8@sha256:dc637be03be1f01342b9b2386c14fb303332ca4e514a2cb9a74e0f145c3f11d6
openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:5195180029a5470de9e4f103e55c70add20cad0e5602668f440b344c05a808a9
openshift4/ose-cluster-dns-operator@sha256:23407c1f4303e637ef894b056d754bcca4c1c1974543a8593899a45e9eb0aee5
openshift4/ose-cluster-etcd-rhel8-operator@sha256:2b7565a3d2cb503dee3aaf573707474401bee68a8c51986815c8ff6f5541905d
openshift4/ose-cluster-image-registry-operator@sha256:c24b0dcaf287e06eb56895283dc076eb8d1731f125ffb9aae72c1ef92cfd370a
openshift4/ose-cluster-ingress-operator@sha256:689807f2aa71bd104898944a136ac358dc083c88b050b78c29e78fa0ab08332d
openshift4/ose-cluster-kube-apiserver-operator@sha256:893754a99d34b4a5005da1aad1058de5602204fd31032398adb941252baf88f2
openshift4/ose-cluster-kube-cluster-api-rhel8-operator@sha256:8df1538913c6d111670ecfce5199f7b795b143175a71b653dc07b3bc705ccf47
openshift4/ose-cluster-kube-controller-manager-operator@sha256:903d75c93ef739d74b7be5ca29f2aa6c44a39cb73185cdddedcc77ce91e8e443
openshift4/ose-cluster-kube-descheduler-operator@sha256:f10fa5dae56ace7ed194a1c621ccfdf0e70f9891e86bdbff7e81457152c3ed79
openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f10fa5dae56ace7ed194a1c621ccfdf0e70f9891e86bdbff7e81457152c3ed79
openshift4/ose-cluster-kube-scheduler-operator@sha256:d34c03f6d97ed8e79413daa6847a875f14e2dbaee793261035c66ba1684bfc28
openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:2161727f112c81034cdd9eebfd145bcd5db94a0fcf28f5e86a7ee21d0193dace
openshift4/ose-cluster-machine-approver@sha256:fef952a892f000802003ca131ccdd8152edefb30a2e99029222ad6d63d1587b5
openshift4/ose-cluster-monitoring-operator@sha256:fc9319dbf04858a35d81dda730ca8beebdaa8e77508db7944aa25c7319a644a4
openshift4/ose-cluster-network-operator@sha256:f362f3b8cb8369d99eb89ab535428db8f6dfc34117407ca1cfd331de68e06d18
openshift4/ose-cluster-nfd-operator@sha256:76d53fe64a19c4e5ee8ba194cfcb4c6c937c973c74a9e5654c0561b2bcef696b
openshift4/ose-cluster-node-tuning-operator@sha256:ebfacc388053ee3e3d1a42f2decce10f605a4147cf1dd5a87e08e251a632e7ea
openshift4/ose-cluster-openshift-apiserver-operator@sha256:22f9c12e883f63a07799f342934f1ce4bdccd428ec85deb4e88a4dfcca090306
openshift4/ose-cluster-openshift-controller-manager-operator@sha256:76f0fc007171c21c6e9be885ac9e7bb3d6b772078c185eca0e2360620923f887
openshift4/ose-cluster-platform-operators-manager-rhel8@sha256:134ec523840b31681203a8e7e0486f8d9ab5490b62b370be9ecafe3694f6d6aa
openshift4/ose-cluster-policy-controller-rhel8@sha256:c68268a4fd3af66c60d1e7c596bcd1528941e894fd0603a8c979f73ea2051e20
openshift4/ose-cluster-samples-operator@sha256:a3df6a48d35cff2515cdc681b00a8ceb4134f55a51eae21139afae1daa70d5ec
openshift4/ose-cluster-storage-operator@sha256:2488ad02827e04b323565c718a80420051a5095db773b306afab25aa370bfe43
openshift4/ose-cluster-update-keys@sha256:031829a5085ca39df25fe5d1dee1217c5de6026e688dd1d53ea44396698c9ebc
openshift4/ose-cluster-version-operator@sha256:db9852a321d3a5ec64f48ce811931d4adcd1cf2db0ecf9658e4d9253e9e8c694
openshift4/ose-clusterresourceoverride-rhel8@sha256:7d603e79d7216d13d7aef59eff0e79c1d9f7019272fa88af83587796f2f136a8
openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:e210c44e85af352af5aa2989629a69a5a38591c19d16858c01ae59be83b80d35
openshift4/ose-configmap-reloader@sha256:84f6de266788072ddfcaa2e58d9ba2fcb285c049c3c2b54c30798136e6ca29d1
openshift4/ose-console@sha256:817bab758dc04b8cc4e136e4e3ba85314b62aea122adf1b957d920231721d486
openshift4/ose-console-operator@sha256:5b59abdf0108a20660f8b525f5fcff17d72a167fa277f3567b29d98e2551f8fe
openshift4/ose-container-networking-plugins-rhel8@sha256:e371b2f582531daa12d96e44cf5703a90b186aabc84dd14feab9fcb8e9cc3da9
openshift4/ose-contour-rhel8@sha256:b28af7dcf71e8cb2e780839ea4c76fc49aadd548ec601257280e8eadd351feac
openshift4/ose-coredns@sha256:6cde8f2223e5e1c0ba754721b92b1637e035764ba3c98185fc06af4c277ad59d
openshift4/ose-csi-driver-manila-rhel8@sha256:20850e51be834963e51ab29211235d2189af89aadbddf7dd19781dfd79c4e58b
openshift4/ose-csi-driver-manila-rhel8-operator@sha256:d7716fdfe682b88be1240a764f2945a2943c93a0c742fcb9e19bde5a13b9e23b
openshift4/ose-csi-driver-nfs-rhel8@sha256:36328cd381f82cac0395b3fbbe62159cf518ec37743e77dad57e193b999f62be
openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:dd5e6834d873195f5b48913adbf3c69ccc229a4ea7a29e9774eb194cec1311a0
openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:cdd181736c545103980a7d4e6331aaeb8f4a5dc725ea5c346a72cd308370f6cd
openshift4/ose-csi-driver-shared-resource-rhel8@sha256:476562b46fe58725d777869d59783a650826fc789399e8ad49a33ffbd69136b7
openshift4/ose-csi-driver-shared-resource-webhook-rhel8@sha256:172c064baace33983569e272ca4698051235bd2ae27ab6919225ca8be9ee1964
openshift4/ose-csi-external-attacher-rhel8@sha256:b30b12ef0b91b96c81dd39e6ca1364d0f8d82e78c61febdfdfaf342833e5327c
openshift4/ose-csi-external-attacher@sha256:b30b12ef0b91b96c81dd39e6ca1364d0f8d82e78c61febdfdfaf342833e5327c
openshift4/ose-csi-external-provisioner-rhel8@sha256:f693f6c2ad128dd9afc2382c9c3b2a017f01f66b3808eb7728ad2ef924ee54b4
openshift4/ose-csi-external-provisioner@sha256:f693f6c2ad128dd9afc2382c9c3b2a017f01f66b3808eb7728ad2ef924ee54b4
openshift4/ose-csi-external-resizer@sha256:92aab9731d33f2a35a19a89eb83e8b9ae75a6a78e4ab7cc40e051a0b03aab6e4
openshift4/ose-csi-external-resizer-rhel8@sha256:92aab9731d33f2a35a19a89eb83e8b9ae75a6a78e4ab7cc40e051a0b03aab6e4
openshift4/ose-csi-external-snapshotter-rhel8@sha256:3cb87ff84d1987c7f2fc231e19d53371734af63cee55ae9818e0572f916bb2a3
openshift4/ose-csi-external-snapshotter@sha256:3cb87ff84d1987c7f2fc231e19d53371734af63cee55ae9818e0572f916bb2a3
openshift4/ose-csi-livenessprobe-rhel8@sha256:d243e5c5b6433d5233df65f73ec9441f6c9edcaf93fdd327f984dd2e0be5572e
openshift4/ose-csi-livenessprobe@sha256:d243e5c5b6433d5233df65f73ec9441f6c9edcaf93fdd327f984dd2e0be5572e
openshift4/ose-csi-node-driver-registrar@sha256:463003870be2d331ad8b35f99d6db022ab8ec0f5b29fd9c5e3a11b15ea3047d0
openshift4/ose-csi-node-driver-registrar-rhel8@sha256:463003870be2d331ad8b35f99d6db022ab8ec0f5b29fd9c5e3a11b15ea3047d0
openshift4/ose-csi-snapshot-controller-rhel8@sha256:e24abecaf810a6f50f2f7164a122825b8cae52392cd568132ca3feb74c7f6748
openshift4/ose-csi-snapshot-controller@sha256:e24abecaf810a6f50f2f7164a122825b8cae52392cd568132ca3feb74c7f6748
openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:eea27b8c4ead94f6c30c497be51be6050361777d080c8d8d30d7d92c24c21d0f
openshift4/ose-deployer@sha256:cecf2d8309bbb68103eafe0d9434d02f7ca547fa0ea62bb78ee5b7cd8a7efbed
openshift4/ose-descheduler@sha256:eab4f330d963b6ba848b36235d5121641e172fee50b8001736655bfda6e241e4
openshift4/ose-docker-builder@sha256:23a61c212d09393c39859a66dcd418958dca50ec049d621a637668db8cceecd2
openshift4/ose-docker-registry@sha256:84089ad143fee4c4dd2f18d34a3cb5e3781ff4e716ff546d20e21aaf8cb1d7eb
openshift4/ose-egress-dns-proxy@sha256:ba199c76acb30822cb438e1f511fc917ef8c076e0741da6c028bc4a572ec2e7f
openshift4/ose-egress-http-proxy@sha256:4df85eb208823f947fbdb7d11b0bdf07f29cd8447c24ccc63d633d7034370120
openshift4/ose-egress-router@sha256:14b7471fc8de52145b65247844cecc7ca56c2568291482add38c7575abf0651f
openshift4/ose-etcd@sha256:8b16a5ad3b8d8683d188113a6a1bc9116f5582c09772eb803087651f39a4cbb5
openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:e42e1af715c1648a7d7e91479be50f69c5ad5a56d3b0c2099831b40342b15b8e
openshift4/ose-gcp-cluster-api-controllers-rhel8@sha256:fa064c0f69267851027fcfa494eb92b4551c9fec490bc66c72e5f10a9de5ba34
openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:c19de710261e6302f613247131b6e2489885e3ea651c96021f843dde97adb8e5
openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:ae7ac5fccd559c03f582705189c6f822665f29a03e95b427e7e6c95153f4218f
openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:db790ef70d94c9a138fc7bb2b688bba1daa27f7dad59876366c0da590561f60e
openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:69b78cd2ec2dd53d8cb0362a95d47c7eec918868a31da42a41ebc5832e48568c
openshift4/ose-haproxy-router@sha256:f96bf2c9c02709e508835a8a5044e084d8088f593697b02e981e96f711c98ba7
openshift4/ose-helm-operator@sha256:c81fabe96fd32a464fc2f9ab3737f1b77f0081028d898b1ef7e8708b47e1979f
openshift4/ose-hyperkube@sha256:2975b26532ebba1eec047721e670d11de0401f9eed2762b0a036e1506821f49c
openshift4/ose-hypershift-rhel8@sha256:e89dc4fb996445595d9ecf250b279e98e153b229ad7090acb59c9302b253482e
openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:da47b11cd21492efcd526b73a22d9ef234b49e73ee29e1c7b59cebeb0a5e4957
openshift4/ose-insights-rhel8-operator@sha256:9ff92ee6308449796f3413fb76500de5a241a5e9e90b8356222bcb381db03086
openshift4/ose-installer@sha256:2c2305557e839dab2a3f6e163e43fa4cbf3f9a03167e87ca8b12ed2b316a58b6
openshift4/ose-installer-artifacts@sha256:7a76424569098187f0caa04eab1a39669c82a31e3a1fb55a2cb85cdac34af99b
openshift4/ose-k8s-prometheus-adapter@sha256:b57a7416f6616e7bda4cc3b49101f8c9fd5b24b3052d638837085d74496f622a
openshift4/ose-keepalived-ipfailover@sha256:96d68dd0a50af4eaaaccde11ba52e0806c98829b3f7c90c79cb34dfa0fa6cbc6
openshift4/ose-kube-proxy@sha256:d38856be79356f69bea85fa665cfa2f07c704c626208ca38d874147e0f87648d
openshift4/ose-kube-rbac-proxy@sha256:08c9e406f11c53e839f6c0ae13e05d8f0b35964d28af128af1ca4f8e4a50b8ed
openshift4/ose-kube-state-metrics@sha256:d5cb7ca94cc2976fca4121a25edce271122801691908f8acf2feff41bd5f2979
openshift4/ose-kube-storage-version-migrator-rhel8@sha256:160c1de5f474a8bd9712dede171a1896f56f9aab87168697ccff58bbf9f8b75e
openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:5a775c3ad24e3151c0a4a8bc21b3a979946b91031a8a509f9ce95a30b7c8b21a
openshift4/ose-kubevirt-cloud-controller-manager-rhel8@sha256:bcff188826fc30fa47cb97e1fd8263f16adcfd42a93f4e9b212b497819b58692
openshift4/ose-kuryr-cni-rhel8@sha256:bc224b7671830e5694704d380fca400e4c08f6a08c761dad062a8bf09a5a0864
openshift4/ose-kuryr-controller-rhel8@sha256:b3e4c0ce7e9858c977f90d6c5c35e3ef7b9ff8a804c5e9073bdf4c5fe04b6296
openshift4/ose-libvirt-machine-controllers@sha256:5c2d5271eb6b1636aaa0b4e202c225ae0e15cded52d7330239f463efb11bfb99
openshift4/ose-local-storage-diskmaker@sha256:f193b3c4535ff586eb56f166646f85184095eaf7ac68898cf6964755415995b6
openshift4/ose-local-storage-mustgather-rhel8@sha256:df976b41485c0c7c9f74289c7dbc6dba13bdfd921a4d68dee28fe2f5172e6fe3
openshift4/ose-local-storage-operator@sha256:b653170d4acf5257bf5c82fd1ada111cf782d1ac41a053541293e96ea05998c1
openshift4/ose-machine-api-operator@sha256:67f700d4f57c7fb69e2a732d7bc6f137b0ff99d40b3bb5be66710fc39fe13bca
openshift4/ose-machine-api-provider-gcp-rhel8@sha256:e5602382e2c14bbdbbbde1e5d4c48462c4105eddcc797fc9ef74cf9751ba436c
openshift4/ose-machine-api-provider-openstack-rhel8@sha256:03067353403b081eb357af4feff20cb63fba3c69166e0b678cc4119623679f9e
openshift4/ose-machine-config-operator@sha256:6d068d75dd80e1582bad77330fa0a78dfe99479cc4a8c971d6dab6ee1b290a4b
openshift4/ose-machine-os-images-rhel8@sha256:3edd9c0edbb6aa9f58cfe519f22e44c02a874268b402e5bdde83c96823210694
openshift4/ose-multus-admission-controller@sha256:fd5e60a5404a53d6524162cb3d49d55d9f55d8d2f0220bce4950945225aa3087
openshift4/ose-multus-cni@sha256:84e706109aca510c4e792fe3bf0d79997aa6e474d91b72e7c60f00ad945bc6fa
openshift4/ose-multus-networkpolicy-rhel8@sha256:7674c102b2e07f930db11308cafe388a1c6c72f9a0cb53185be5bdc448808f8f
openshift4/ose-multus-route-override-cni-rhel8@sha256:18d3b05c5ee2b2d32e5ce9b73978889d54126cec00cc30b49b4145e7c16b4a8c
openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:6aa903c96233efdad89fa08ee166d5438d3b7aee9c3ac0df43ea874011a852ff
openshift4/ose-must-gather@sha256:73be25adf403d1315b0676f227904603c83ffb57fe2c5e6f77c8d26b6a313d8c
openshift4/ose-network-interface-bond-cni-rhel8@sha256:ff75fbb69a8f50cbbf66b179f907fdc136bf5d0d3b2e7f14de927e693b2b7643
openshift4/ose-network-metrics-daemon-rhel8@sha256:50e7759efb4b71ef9e46e382b7604a169f10e3e11b317187400812e077f0a52b
openshift4/ose-node-feature-discovery@sha256:fb2a2dcea80b9a423f03f17a5d19e64025616ef880dcec609588bd844ae82970
openshift4/ose-node-problem-detector-rhel8@sha256:cadbc7dd3e3ea0dc9a461410ace74b5a98946dafe34e44cabf7819b886c2e60c
openshift4/ose-oauth-apiserver-rhel8@sha256:6f046a4f9b0ef2f96dcaf0538914dcd71d8d413cf53e04228102aff371ed7769
openshift4/ose-oauth-proxy@sha256:049cd72a058a5cf80ddb9cedbae17346bd1afb4a350c7cc8368cbb44d3dc22e8
openshift4/ose-oauth-server-rhel8@sha256:ea63f00926964788f0ff76ee2dd473b561f4ba0f543e888ae493b5b1fa2e80a1
openshift4/ose-olm-rukpak-rhel8@sha256:1778d993b3f54e546a11af504dc78962b811e3a2827116938144e5b64ad99a00
openshift4/ose-openshift-apiserver-rhel8@sha256:aa3d7b755e8c59e1ad3b6e4d2039707b987a02fb1cc5e8a85db486a620840b74
openshift4/ose-openshift-controller-manager-rhel8@sha256:3f6e8a645d9b29daa6a3c576f34526a6bbf1f6856a02a16bb4f0481e0db5a0ca
openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:cebbca73ca98d7ec0e37723e8086b942dfcbcb7dbbad1f04e4c50a366cfb9e50
openshift4/ose-openshift-state-metrics-rhel8@sha256:67164212b728d3632b11181c2df9053bc8d897932fc6cce090139a498807a4b6
openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:465d9ff4a45db34ba7558de596900047cec57c193355db59fd51d724e4b662bc
openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:84785d50767479f6cdced0a299e4814f69aeb9b7ae1336b129415b75fd7ae43d
openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:dcaea794fb44daaa71d7e80156ecde4cbbda362292ae269c9ece6692d3f848c3
openshift4/ose-openstack-machine-controllers@sha256:56eee276735dfea6df912fa35ec871ba65662390e9aa60831a3fe8e1571ab06a
openshift4/ose-operator-lifecycle-manager@sha256:8f34c32103f6fb73f28c61ecca66ecd8c77ace5b4b317f19dbb426bc6b72d101
openshift4/ose-operator-marketplace@sha256:e49074b01b6a04f051afbdcdfac5f39279ce581ed53e0ddf364ea2af6894e71b
openshift4/ose-operator-registry@sha256:c3e70b8d9c5b39ad43b2ce16e8d0c2eb5ba25fdd86acc6ee0cea0b9ca636c5b6
openshift4/ose-operator-sdk-rhel8@sha256:ca5c8c1f77654f276bc44db77e1e01f9bd67caad69e80c1b2b78639656aedfb0
openshift4/ose-ovirt-machine-controllers-rhel8@sha256:a8770f2f7b09fe0abfacee5d49a609fd6799916c3cdaaf46a809838851aeb4af
openshift4/ose-ovn-kubernetes@sha256:23b34105511e9e1d6880943ec596e27aee099762fee4a9785e79ee4ef4dc9e27
openshift4/ose-ovn-kubernetes-microshift-rhel8@sha256:c3a62244af180040aca8b714a56d1f70c97c006ed6fb231f08ed5a304fd600d3
openshift4/ose-pod@sha256:ba28b005c893586ea6a4ed42ee9cfdbb973d839ef4b803c31bc50c62b435b164
openshift4/ose-powervs-block-csi-driver-operator-rhel8@sha256:0a86d53795f1455d9c6efc358ed568c659edf38b56d346cb3c57dfb67bb3dea5
openshift4/ose-powervs-block-csi-driver-rhel8@sha256:a893198ea25476e4452af09c02b11fcb83c8c2e1bc221b68bf6b6b89581b0ebe
openshift4/ose-powervs-cloud-controller-manager-rhel8@sha256:960bb1c70419ebc2a30b9e6b10fa8d0ea9526eeb747a87600ec23242bcbef8f7
openshift4/ose-powervs-machine-controllers-rhel8@sha256:d7ba320b9b45cabaf364a281e28a3c71eec80b23af5763efba5b2aee8a73504f
openshift4/ose-prom-label-proxy@sha256:3f649237592e17935ca7c262873857f72415fb7587406f9b93cde452da12d11c
openshift4/ose-prometheus@sha256:cecc3b4f01c1cc9e3c078e365931ea53bc9cc6422b661fd341faabf373fdcabc
openshift4/ose-prometheus-alertmanager@sha256:057f7b084f879cd65739e2ac3f45c1d3692e672849a23467b4300b45e81235be
openshift4/ose-prometheus-config-reloader@sha256:e69218eb29ce484b1ec51ddc17dda693c31b856b7bf0242f5ebb8b43e5c7868a
openshift4/ose-prometheus-node-exporter@sha256:1a9c6ea5b63156889a93dba0fa75d1edce71fc6fcc819a3b77f1210763dc089c
openshift4/ose-prometheus-operator@sha256:6f4ef7412ceb1589f58bfb0ddaf6d6601984aebeedc40692657047dcbdfa66fc
openshift4/ose-prometheus-operator-admission-webhook-rhel8@sha256:b0dbf2debe8e91e9f6d91dab1a23760b4f6f5cc7f455654627268539a81af790
openshift4/ose-ptp@sha256:011f1df5b16c1aa75cf9385ca07862562007d6c15586b169ab93c742d87e5b36
openshift4/ose-ptp-operator@sha256:3069c83de8abc34fc5f6e9d75eaa016a7f7a314891417e91a8b74efebfb1e321
openshift4/ose-sdn-rhel8@sha256:602935c01f4bd4bc208d88d9661b2c23bb19e0906934624b57c3e24b8e91a6a2
openshift4/ose-service-ca-operator@sha256:a1c489215b6e4f303c2b35adc2e9e4d4dcfdebad7357add48e48f4fc8701d419
openshift4/ose-sriov-cni@sha256:ffaf94f4068fad1075fc2598b0da38b3e982fbde425e115c2d25c932fe50df0a
openshift4/ose-sriov-dp-admission-controller@sha256:01165a7c4251400a1fca576ff5300080c329c2b574fa6e0cec0749493b6ba287
openshift4/ose-sriov-infiniband-cni@sha256:96522d47d1c4e706e5fdbdfbb134a014ee48c29915ddd590ccd0872181ad114b
openshift4/ose-sriov-network-config-daemon@sha256:28bd128f53bc7516958a4863efc72a1432e2844e2426bdd57da55877586b295d
openshift4/ose-sriov-network-device-plugin@sha256:184f2f8e4d28d2357c5884d4a89a0e2b4912b4b504c4573e7a3a2a19dbcaba21
openshift4/ose-sriov-network-operator@sha256:33c0eb388d216d7bd32cf6aaaecd96e647ea42161cd0b9e968d83b8408896b4a
openshift4/ose-sriov-network-webhook@sha256:49bb442651d7e989a60fce809223d5c1a005dc9659a9aad20e8a0d22d6742186
openshift4/ose-telemeter@sha256:d7847cc55e764de801a8c11cb7f3d131b32ba4dc6dfa76c5c1c95eb8c35eb555
openshift4/ose-tests@sha256:5479fef03b02d63c48c5eaa1598a807926fdf8ac3e6738b92eebf5055442291c
openshift4/ose-thanos-rhel8@sha256:96e4f178e7aeaef32893f334311cbd0d464a0e809c2bfc96af2a96336e01368f
openshift4/ose-tools-rhel8@sha256:22e841c62ca48d2cb0cce4133c9205d28aeaf96885d347575def13da85fdbe09
openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b478b4a0f47cd995956464c0bedabcb052cf6174c20ba70298081bb2d64f5227
openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:ba2786f6aaf0ad782a7beb0cb47c01d05fd0162e22336baaa194a23a368b11d3
openshift4/ovirt-csi-driver-rhel8@sha256:b86efbb178f4ecb99e3ac5989edf6dbfa4a322c69ca3bf32aeedeca93ad589b8
openshift4/ovirt-csi-driver-rhel7@sha256:b86efbb178f4ecb99e3ac5989edf6dbfa4a322c69ca3bf32aeedeca93ad589b8
openshift4/ovirt-csi-driver-rhel8-operator@sha256:0e49831cb7b72c75ecff973738baf653b82b32958e406c8bc727d28f69487afd
openshift4/ptp-must-gather-rhel8@sha256:b08332c7088fa62b03ea2ea9bd6eb1a4bf4130c921a29158b39b447e169cd548
s390x
openshift4/metallb-rhel8@sha256:ba9f88e9b305c6bbf1fadf76d4d3e7814921a06764b75b24236f725c1bf33a28
openshift-tech-preview/metallb-rhel8@sha256:ba9f88e9b305c6bbf1fadf76d4d3e7814921a06764b75b24236f725c1bf33a28
openshift4/cloud-network-config-controller-rhel8@sha256:1449fbf348fee87b194c309b79b1d6f0d78311e2df518fc2f94bf5e303e57987
openshift4/driver-toolkit-rhel8@sha256:b9c98919d9926a47d89631788718b4d21985a03535a19ea915d4c62daab770ef
openshift4/egress-router-cni-rhel8@sha256:4ac6e3b98c6812c24f7dbd29c6b629f877377a71e11aa5c2bc8416f9d6d6363f
openshift4/frr-rhel8@sha256:1fc4c48774802c837c6ae160b1e489d0413a6c58d28e11402d5e83811eb4ed89
openshift4/ingress-node-firewall@sha256:472f81121506d15010955a686d8793550bb3ee779f0935e48de08d2d37ab2130
openshift4/ingress-node-firewall-rhel8-operator@sha256:ac991ececd24ac2c4e50551fe509e345d9991da4dfaa2143bdfb3850e9d5b065
openshift4/kubernetes-nmstate-rhel8-operator@sha256:93407871e54150ca42e2416c094598e975b13bcb63e817ef3a03fcb6dcc3dd82
openshift4/kubevirt-csi-driver-rhel8@sha256:41dd4d8e65e93f055a589338099add2e64afde34414be1a96455a9cd62a193ca
openshift4/metallb-rhel8-operator@sha256:db00f7d70afd77bd8af3662f8c9475267554968b6337297a159c4bdda0155649
openshift4/network-tools-rhel8@sha256:c8b6edbd7d259424bef5af84da05791269c0be418357d0110c4febdc91085c35
openshift4/openshift-route-controller-manager-rhel8@sha256:1770d6aafd53fc96cadd84b73bbd3f2763b3d1c33b84aa918dc049989da312af
openshift4/ose-agent-installer-api-server-rhel8@sha256:19414fe9d81a824385c689de7f07ee6aa9683a81c5bffd29e2bb44d0ae0de6ba
openshift4/ose-agent-installer-csr-approver-rhel8@sha256:fef3ebd35d9eb166eeb334213c4908df43ee0491e3ad84c3cc7567c9189eabf6
openshift4/ose-agent-installer-node-agent-rhel8@sha256:f68b7fcd30768743a9d98f3bebae8865c4ed3e24d32c7dd9751766ac9bd840be
openshift4/ose-agent-installer-orchestrator-rhel8@sha256:e0c5cd7bba73c9f4357ae41cdc555b0f7444d93300c8f5dd148562053a28af45
openshift4/ose-ansible-operator@sha256:a1e65e526542a0ca56f14c6abb2b246a9a594aec6af7753427f2a54c0b58eeb5
openshift4/ose-apiserver-network-proxy-rhel8@sha256:7aa52d15f6d8a2f3aabcbc064b7c53f6f87f912c1b6c825e98b1f3cad3c83915
openshift4/ose-baremetal-installer-rhel8@sha256:cacf5124d7bdc53f1d964e13fd7df83b8f6b5c9c31e1bd2d1e3903cabe5b8398
openshift4/ose-baremetal-machine-controllers@sha256:d8eba638f6ce8d879f2fd711d98a8fa3ff4054784789de16ff777fe04b076de1
openshift4/ose-baremetal-rhel8-operator@sha256:fc727614992b34a22cc20c8693d1bc57eb0f24b0f6313aecbe07d5f58efdd631
openshift4/ose-baremetal-runtimecfg-rhel8@sha256:a413e6f5b3ebe67f1e735f7c5da703a35947fe7b12f4a56f450d0d07e962c791
openshift4/ose-cli@sha256:c5884671471b0c904c904adef38c3ce95bb0deb88605115f42d0dabf53a0a2d4
openshift4/ose-cli-artifacts@sha256:5116107fcf820ae630dfd5af9e444f0ec4e70282fd17f758f009804280959ef5
openshift4/ose-cloud-credential-operator@sha256:68c4874d05a3acaf0fbec62a411b6e83ce029441be02621b2482c561f98dbc54
openshift4/ose-cluster-api-rhel8@sha256:9395741a824d54a8fd86cb863424d4c801a414e5e645f2af9ede425303f00881
openshift4/ose-cluster-authentication-operator@sha256:94ac540b0329ee801b5f7b54dd1ecb9869ce5113be1b7742cf04d2c8aa37dc9d
openshift4/ose-cluster-autoscaler@sha256:8f9654211eb30e61cafc185fcdfa78089b5f88a1abbc2c59acae4bea1328e898
openshift4/ose-cluster-autoscaler-operator@sha256:18f4d888b9800a4b387942ab1aa1e3fc09dd8469015a2e2d1240af2bbe7cf8ce
openshift4/ose-cluster-baremetal-operator-rhel8@sha256:775fa793fcb4da744d6b961ac32ffcc8b69cb574d1dc0f62999522c195e4c50d
openshift4/ose-cluster-bootstrap@sha256:b7ac7ddd560e129c1b79d4da526722d37439759292d732be9ef2635d49c7a24c
openshift4/ose-cluster-capacity@sha256:792e89444569dbaf6c78505769e3d81a431bc98c202263f3b0a173039fa7f84d
openshift4/ose-cluster-capi-rhel8-operator@sha256:050e43016fe663e9a4ba238dc549fa4283d0f94a626e6f77a8f0e0f060e331e0
openshift4/ose-cluster-capi-operator-container-rhel8@sha256:050e43016fe663e9a4ba238dc549fa4283d0f94a626e6f77a8f0e0f060e331e0
openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:4cb5372fb3efd809d217d8271616205918f7ee3377a44e4c051063c18daeb89b
openshift4/ose-cluster-config-operator@sha256:ede39ac4c7c5aacc409fac65a6d2b59242d7e6a8b429454bd79b67e86060246f
openshift4/ose-cluster-control-plane-machine-set-operator-rhel8@sha256:248ac9f7b8489db2ebbe31f63d367b6a645a04e0b4cd5b7a1fa1ea8d6bd3a5a5
openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:3dd8ca615bcdbf2a1c460256eb3d940785ba47bf1720172c2017c2bfe18f3333
openshift4/ose-cluster-dns-operator@sha256:2c960cb695c9e4527748593abf6918ab947aed6f72dc4f7c6d6cca7b72357682
openshift4/ose-cluster-etcd-rhel8-operator@sha256:6e20bdf93c853d9be3d0cd15ebf9faeb25f0672ae486847fb04fee6528e76c3b
openshift4/ose-cluster-image-registry-operator@sha256:58adfa67499c6341101f1bc54549d05483d2c858b1bf992cef86afab4878846d
openshift4/ose-cluster-ingress-operator@sha256:9976cdc20a43bd264bd61771ca2b31d1ad37b1ec85f398af46f90054a166c5b8
openshift4/ose-cluster-kube-apiserver-operator@sha256:6fd30b96f02404d975086aa0aa34a7f56449a66a8c7b36042bf6283aa2f2c8dd
openshift4/ose-cluster-kube-cluster-api-rhel8-operator@sha256:bcfd7f096faac1a2007bb660b4f0ced14af860c70cc296bf960ae63bf424a599
openshift4/ose-cluster-kube-controller-manager-operator@sha256:a511dd0b59f5d63d33ce5a3ef1071c8ec9f2dc066505a8a1ad04da2353959cda
openshift4/ose-cluster-kube-descheduler-operator@sha256:9c119ffcf0e2748a53b7bf25e8ab0fc951f42b62747fe78cf378bc415b121a94
openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:9c119ffcf0e2748a53b7bf25e8ab0fc951f42b62747fe78cf378bc415b121a94
openshift4/ose-cluster-kube-scheduler-operator@sha256:db37f0aaa244b70bd9e98569d01a5f67257b0fc4d2c714869ddc05e4021b6cda
openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a086de67a903fc7ebaeb99171742c20414e2cf92b4f42792b532a82ddb57f262
openshift4/ose-cluster-machine-approver@sha256:96b1a33a53ad497cece0ed599572a03baa3f733b50ff1b8c2ff246f5ef53fd4d
openshift4/ose-cluster-monitoring-operator@sha256:1da4f46a113397bd1ce56e06482ab8a28ed18651d62cc6a64b74d3dba7721098
openshift4/ose-cluster-network-operator@sha256:3ccd6b7d9bfbe5e9f58471bbd4d5a5ae2d05e01aee3fcb993e052047243c359f
openshift4/ose-cluster-nfd-operator@sha256:8cc33e07ad40fb17f36f752797fbe51549cd0fa5ca1cc02a277dbdf36667b465
openshift4/ose-cluster-node-tuning-operator@sha256:5894b141bf9d64d5f0a4ce20060685645c87b7f81445758572f60e081612f554
openshift4/ose-cluster-openshift-apiserver-operator@sha256:b2bd51e804e8d0da79c29f1a5eeaf487a8c8c9ddcc5da85296d62cd53260f2cb
openshift4/ose-cluster-openshift-controller-manager-operator@sha256:76838191ad62c6ce303d28c86fce54fb51046b1d76d1459d99b72f2430b1a1cb
openshift4/ose-cluster-platform-operators-manager-rhel8@sha256:39126fad72b9bcc925f411016c32a971c95f815f5a1bbbcbe4208c23533ceab5
openshift4/ose-cluster-policy-controller-rhel8@sha256:334988b11afcf8289c554e4d069650ba159bae05fb4e304390bce15bb4302b56
openshift4/ose-cluster-samples-operator@sha256:d7d7caed8add332143cbe0b5db326e6a3117ed8d6dbb2f128845fdc4e5065f65
openshift4/ose-cluster-storage-operator@sha256:4a2f46badb980138eba3c64a1a174e56753fb46084fb9519a94b3c5246812943
openshift4/ose-cluster-update-keys@sha256:83206f1ba21f8c27ac7220b96581ceea78819da0e72d4e2db198db12889f971d
openshift4/ose-cluster-version-operator@sha256:9d6be45541f5eb6ea11110321142f03dd1b6bd2e652cf309858e82a662aba708
openshift4/ose-clusterresourceoverride-rhel8@sha256:944aac96d9d259489b11826d776e0b64c06ffff695f20ff34cc71f13da9914b6
openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:4916a67040d90e75d0f06019db62009a71e257c6e11324ec8bf2c84545374ea3
openshift4/ose-configmap-reloader@sha256:d3cef0a6ea9c30fbde777fbef5c7a21244aa0fbfa34cf95cebc9eb8f43e90cc6
openshift4/ose-console@sha256:1306b7b200bdd26cf054765e3ccc0cf127c4a6d0ddb59a4dc1321bddd3494429
openshift4/ose-console-operator@sha256:4bb0237945ae7eb536729c44b4d93dd7e9438a7fcfee9aa71dfb44bd2f82d2b0
openshift4/ose-container-networking-plugins-rhel8@sha256:eb7531fb6bb4a72533223343e03409de8450a604402de4d0c8c00ce495265e12
openshift4/ose-contour-rhel8@sha256:b3a620ac721d7f41520fc4d64030d0b66e9d3a57d3f43b7ae780d48831965b37
openshift4/ose-coredns@sha256:c473c40944c806006173e985dad88f74389a81fde51fa9d523b74831a6b4ac40
openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:6dc3c4c77cdbb20d8a2695d038f3070308e3cda1e0c26d2d6ac8a7728db58910
openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:bcfda5d0d29f648a708e3f07c658c7331f905773228724270071703b00413790
openshift4/ose-csi-driver-shared-resource-rhel8@sha256:e19c413d5625e24c10a1ac705404317c710e8d82368762015179516dc0c5053d
openshift4/ose-csi-driver-shared-resource-webhook-rhel8@sha256:eb12303280223fa3d110a26097c69ecdb7bc75f444a4f50e31fb4eefbb006781
openshift4/ose-csi-external-attacher-rhel8@sha256:87807079c628ab168f38f6cb486b43ed67ba5555eae4aa154ed904a8693d350b
openshift4/ose-csi-external-attacher@sha256:87807079c628ab168f38f6cb486b43ed67ba5555eae4aa154ed904a8693d350b
openshift4/ose-csi-external-provisioner-rhel8@sha256:a7c3ad6eccc547eb0d2986ebe213cce96fc454473d821808370a322daf378e3c
openshift4/ose-csi-external-provisioner@sha256:a7c3ad6eccc547eb0d2986ebe213cce96fc454473d821808370a322daf378e3c
openshift4/ose-csi-external-resizer@sha256:e04b422b21b521d1c340a711464da9b48fef6b85db7ec9296a22a4bd15269305
openshift4/ose-csi-external-resizer-rhel8@sha256:e04b422b21b521d1c340a711464da9b48fef6b85db7ec9296a22a4bd15269305
openshift4/ose-csi-external-snapshotter-rhel8@sha256:bdfdae45cb89f8334a623f82ed26e6767d6e296e27549d4d074046c48c7965fc
openshift4/ose-csi-external-snapshotter@sha256:bdfdae45cb89f8334a623f82ed26e6767d6e296e27549d4d074046c48c7965fc
openshift4/ose-csi-livenessprobe-rhel8@sha256:989629d5631506d7f7bfcde2d1d2bce1e01a5e0f431b32c151af38bf3716b07f
openshift4/ose-csi-livenessprobe@sha256:989629d5631506d7f7bfcde2d1d2bce1e01a5e0f431b32c151af38bf3716b07f
openshift4/ose-csi-node-driver-registrar@sha256:505628900b93c60f343a67f8889a50b36d52a986aa69e5cc91ce01ccd9790ea6
openshift4/ose-csi-node-driver-registrar-rhel8@sha256:505628900b93c60f343a67f8889a50b36d52a986aa69e5cc91ce01ccd9790ea6
openshift4/ose-csi-snapshot-controller-rhel8@sha256:3bbc910fcaf29318bc4f4672da4b2798ae9abb37fb8244fef64dee9a16f9c2c5
openshift4/ose-csi-snapshot-controller@sha256:3bbc910fcaf29318bc4f4672da4b2798ae9abb37fb8244fef64dee9a16f9c2c5
openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:135cfc51d7017c2264f18883f32e4475f466a0b044325ad0a16eb84f9948526e
openshift4/ose-deployer@sha256:dc40a62f4f9f7123401855da49a779175edd22007b982c017aeeb7c381d815c1
openshift4/ose-descheduler@sha256:682419a1912445d97da8b3105fbd13529702cb86ca5165976aaa9dfa331dde7b
openshift4/ose-docker-builder@sha256:2d186409c4ef56c1da79da154e2f01dfe13cae5e99319da92d700ad91b4b8f7c
openshift4/ose-docker-registry@sha256:acb30d58e154391eb33344eddbfb550d4d6726c177059141b846ae74dde331cc
openshift4/ose-egress-dns-proxy@sha256:743307394c28384a5401aa0b6a6ed0cd0e8683dd96e8a82a011ee2b5da43d258
openshift4/ose-egress-http-proxy@sha256:63a19479d17956bfdc1503238290b6cdda862f2dd9e8ff097fe916fbb8677183
openshift4/ose-egress-router@sha256:93d7e4731b5e13b99a5777d2aca33b3148bcb423444379c18a3ceaf6c8afee09
openshift4/ose-etcd@sha256:6b25dea1d70fd8e641f55d5b384442c323c9e1f78dff35494f07617842e96dbb
openshift4/ose-haproxy-router@sha256:fd4b116c554ae80071a92aca4eac986a0150821ecf80d08b284f2853d0a3945c
openshift4/ose-helm-operator@sha256:54fbe3d8c81f0252fe8001e7d6eaa5c344a878b24125c81474edcafcb85a558d
openshift4/ose-hyperkube@sha256:4b79e850027e244344a05f96896d93a4112e956a07efc5c298d813ff6a11185a
openshift4/ose-hypershift-rhel8@sha256:fe2c69163b9179f502b8459badd5d6b1c89b3637846c464b879f3e105b89b47f
openshift4/ose-insights-rhel8-operator@sha256:f2fba2381902961d6d7e0ef013ad7ccecf4df1dd8ad82fd9d55056bd99aab0ed
openshift4/ose-installer@sha256:baf19453c8f8c0134d0bbaae2629d5aa05fa82215138e8a305acb387c3450395
openshift4/ose-installer-artifacts@sha256:f8da60e286baf69e61b8ec354c246170a09336817bba8532d18266fb37715188
openshift4/ose-k8s-prometheus-adapter@sha256:c0da089fb84f4d16e7776b1a9249c9c64c7a4bfa6048ac614d4e5bb3bb02fa56
openshift4/ose-keepalived-ipfailover@sha256:1dbffbefa265de5d30b5f47285939d17ca4c4de03c6bc05d23009f41622c99dd
openshift4/ose-kube-proxy@sha256:391b0876922cd8f284f204d2b77121d3513e935649d8dc9a6f536b35a9d18c7a
openshift4/ose-kube-rbac-proxy@sha256:f9c0c6e14f3c2227f9ab6f8c62ed6e2d313b606dc199a7625087f16e24f66ba0
openshift4/ose-kube-state-metrics@sha256:65cb591d820f02867a2b407e28b64649c8e21b4ead98bbf632be69ab3c5ae350
openshift4/ose-kube-storage-version-migrator-rhel8@sha256:9cd3effcefffa93bf07868999b7fcefbadfe548c37fe63bf9d55137b1c8929a7
openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:cfcdb92a51e147179ff5a3ae1b1b3267cea533beb182c654b7ac30c804b73662
openshift4/ose-kubevirt-cloud-controller-manager-rhel8@sha256:c8a5f5f016795e60c7c6f61fe2d9fd248df3ffd314247cb333cdc2e18b05ea43
openshift4/ose-libvirt-machine-controllers@sha256:2f8c7111b084067a09e6bafda2f577d4bf6aaaa0a03327f5811fb940ba492929
openshift4/ose-local-storage-diskmaker@sha256:c372a2e25484f66d095a687d077ee0f628e67252edc1ea0e55c8e40a59ff9aa7
openshift4/ose-local-storage-mustgather-rhel8@sha256:a0cabd15f1bd0be0bae5a5a14408a614399f918d9d9f6052c29d218415de147f
openshift4/ose-local-storage-operator@sha256:c68893ea4798dc4f539c60c09235486312c63fd35fa3df8ea6fe0998b62d345f
openshift4/ose-machine-api-operator@sha256:271487817612452705b059eae6e24321ad902129bb9698aaf43703cb113fa68f
openshift4/ose-machine-api-provider-openstack-rhel8@sha256:f259a85410b0590ebadb98c2e2ede4d30b2ef2984f8320023fe35cefe6738daf
openshift4/ose-machine-config-operator@sha256:85e0ecd93f38ac57e31748ceda6ba3451db8abc8acf076900baa519f9364af85
openshift4/ose-multus-admission-controller@sha256:74939a848590684b4527006ffdf92da42a6f5305200e7ce488e506e8b3145444
openshift4/ose-multus-cni@sha256:0d6f0f2b1e1cf7373acc3118b9745b5306e7d5557ac4e56c476205d01a041680
openshift4/ose-multus-networkpolicy-rhel8@sha256:4e03a0049563b7e246d99df6689b6a157928bd10fa33e3ed2aa51e62ce15b191
openshift4/ose-multus-route-override-cni-rhel8@sha256:32a0f3c7e59fb2fe315b62374263465a3120594f205c43427a5e3386b8615b8d
openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8f46e16798a562e52b9cce4759a87fdb96bdfe44ecde56f260312e07f447ca1e
openshift4/ose-must-gather@sha256:84fa2b691ab831b9b616d11d12e75098fa2f6b70edcb4ae42b55e48a204d782f
openshift4/ose-network-interface-bond-cni-rhel8@sha256:ff3f35d3b78fc59e5df5f7f9078bbfd830900b495257efb95a008c31dd1785b6
openshift4/ose-network-metrics-daemon-rhel8@sha256:8746c1b65b842c2e7b65d49a9ad56d0d69646a7d8f4c907cea7c80978788e4d9
openshift4/ose-node-feature-discovery@sha256:3acb17e660b6e74856bef9e297cdded1e3408b033de717d51366308d9cd1cbe1
openshift4/ose-node-problem-detector-rhel8@sha256:196e4948ceca8a7a8a3867d19400307d4a3eff10d5acbe3f58b9aec003459050
openshift4/ose-oauth-apiserver-rhel8@sha256:a51c86766d50b06480a60ec43174d80d47b194a420493b1c3961b8824678d4b2
openshift4/ose-oauth-proxy@sha256:4bb1e324f2d8229b15d5e6071782f792737d49f5726d3409f3d6406ef172f96b
openshift4/ose-oauth-server-rhel8@sha256:4c0c49763a230bc616d96d75c49ae48a892a6305e0aad620a68205d9ff2288ef
openshift4/ose-olm-rukpak-rhel8@sha256:6019f093f2e0709bdc33733df9290d793e9ea229943504acdcdc5cd00d09a2ea
openshift4/ose-openshift-apiserver-rhel8@sha256:5d86376cbc2c571304d1ea07752e207f2ea0a58d9c7268c269737417fc6b2ef0
openshift4/ose-openshift-controller-manager-rhel8@sha256:89372ff839b47c44110b8af2a2f554abfb65a90bcb73519f44458764d2f557bf
openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:43722ce319b49ee6f8fbb05da1cd4081ead98e96295fc193c09c52b8c8869657
openshift4/ose-openshift-state-metrics-rhel8@sha256:44cf66b502f84cb22eba9f389ebcb1317330ed6535ee30a95d7480996f66fd60
openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:6f22bf962af3d703c3e5d9f9b1146b89adf39dfd1bcec5dc3c059ae97ce1d225
openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:aae5d8bb1fa7c00a5b26bf7251d9766f43511d3e32b86207512c1d4d54a059af
openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:abdd13aeffd3b5198f4a622a240f9458a29b22fa98eb5d75c6d53c0317825434
openshift4/ose-openstack-machine-controllers@sha256:f6db0371b2599a612b9815fb1c58b8528643b609b17d88734548a255a70c84bd
openshift4/ose-operator-lifecycle-manager@sha256:58bf9b6793febcdbb89cc9df87849213874fc6243baae124aa450c9118e1cb0f
openshift4/ose-operator-marketplace@sha256:f7f7af9c9b31be7cc1486fd8bd97bee3e04a9b4b64389dec1fa5a92cd09fab75
openshift4/ose-operator-registry@sha256:0834df1f941699e58747e5d158e6bc427863e372c9d7532b980a212cfef66aa3
openshift4/ose-operator-sdk-rhel8@sha256:9022a42c70b2d99bd1fe5c97702e4723ecb1b31f64b8ca35ea530ea7a6a2a940
openshift4/ose-ovirt-machine-controllers-rhel8@sha256:ab8356abb153bb1740fcad2673ff1c70a883045673f9a90e915a31d69cb82be3
openshift4/ose-ovn-kubernetes@sha256:fb7924a2cedff143de6ec6cd5f4f9df048db33c9fbaaa7a21104ea4ff5628eea
openshift4/ose-ovn-kubernetes-microshift-rhel8@sha256:fdef5ae850dcddbd74112619b42a6a11c342a93543cfebd8544affed63f6dedf
openshift4/ose-pod@sha256:d1e0b93cd72a313cd46cf66f042dd5ac50d95661ea1e04cda6565d3fbd027d4b
openshift4/ose-prom-label-proxy@sha256:40a4ac91d32459dc2d9f11ef4274d6d5a1216b283d93f076b6840d2af814992d
openshift4/ose-prometheus@sha256:1d0913ccb0f1849390a94ab3b5c2f46f12fdace8446b096127384814ed5410f5
openshift4/ose-prometheus-alertmanager@sha256:ee47f6044fa7fc2e5b3fa753ccc11044abc27087386c1547e6b3395ba6442d62
openshift4/ose-prometheus-config-reloader@sha256:c193c894205bf3c05113a6b7f4c445c14ed05cd086289b2b3494ece7f1227737
openshift4/ose-prometheus-node-exporter@sha256:27668bb055f9f54cc9efdfa60a58ac2569345917a6443814c2cd357bdcee2dd7
openshift4/ose-prometheus-operator@sha256:0578389212a42b874faeceb9221b6ada6143a872c5562f9014275389202a8fbe
openshift4/ose-prometheus-operator-admission-webhook-rhel8@sha256:39c0db263ddfe30b1a0dbe191c2c52e3ad4e92ea1ab252dfa1af7c56693bb46c
openshift4/ose-sdn-rhel8@sha256:263b5ef9925355b20a3faaa084dcfec723cb5398418d3778c7d9c07bed51ca81
openshift4/ose-service-ca-operator@sha256:c6ab691b7e5dcf8464ea821e87e33c065958f83977bfe199fea056cd41c1c9be
openshift4/ose-telemeter@sha256:411b91360fa8d602f3e91b1b1f8803c41f65a9b43e2b11d52f6720291a4862be
openshift4/ose-tests@sha256:b2b0c219cb9bda1691cf6d4d737f44810c101ef72b975cba68a1e9b9eb97d247
openshift4/ose-thanos-rhel8@sha256:7a573daa64e7beb5d97a626d084ce06dd95186a16f521034a435d073501f5637
openshift4/ose-tools-rhel8@sha256:e4505b5fe97f32413be5cbf39fe616eba51a0eede72aa025c39b5ac90a20ab47
openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:52109044983769b02d774c04e494e46b8bf8a9f07721e0accaba37bda90843c2
openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7ff428bfcda788f3b4c13d4d12347e7d4c9dcbbaa62df5c35c6c83150873b560
openshift4/ovirt-csi-driver-rhel8@sha256:9ac3e6f482b0dcb78c6069d4fe2860d0b9822ebf7f414298aac5e54ecf9cb7ff
openshift4/ovirt-csi-driver-rhel7@sha256:9ac3e6f482b0dcb78c6069d4fe2860d0b9822ebf7f414298aac5e54ecf9cb7ff
openshift4/ovirt-csi-driver-rhel8-operator@sha256:bfe26d5b7eb3950cb0319f59fbaaddab293b5ef0846d3f79943246ddf1bfca0c
x86_64
openshift4/metallb-rhel8@sha256:6900f4c8ca5c3ee1190f423e47e676e704178da1de955c5204bdba6c7b80322d
openshift-tech-preview/metallb-rhel8@sha256:6900f4c8ca5c3ee1190f423e47e676e704178da1de955c5204bdba6c7b80322d
openshift4/cloud-event-proxy-rhel8@sha256:e282aa9e9dc91493d0e0988ee8888485d640b7a956e7076fab2289b16d3ce33f
openshift4/ose-cloud-event-proxy@sha256:e282aa9e9dc91493d0e0988ee8888485d640b7a956e7076fab2289b16d3ce33f
openshift4/cloud-network-config-controller-rhel8@sha256:5c5b4de8d522d388699013dc682c0f6b9618fd4cbce8925986b3070848c4fe9c
openshift4/dpu-network-rhel8-operator@sha256:1e0e9c03c4c0b71e3734e5dad6010b8fb46c764146465dfd2fa8eb0d7a3aa5d8
openshift4/driver-toolkit-rhel8@sha256:e280217aadb71060cb66f22a84d3ae89f240498c91ec7469eff8d8f67d803ed6
openshift4/egress-router-cni-rhel8@sha256:4ebd0bdc34a0d6ee6949ae433717c259d1a5e8505e59c470d8d9d49ab9bc5f9f
openshift4/frr-rhel8@sha256:9dcce8bc61c2a28b551f9091ffc16b65a8c573f9491641416532ca078459f743
openshift4/ingress-node-firewall@sha256:7e4f39063866c51b9164aa3ffdeb9f5a3b917c4ca9df74cbb2062a28b0cbe09f
openshift4/ingress-node-firewall-rhel8-operator@sha256:2c49f3aa826c06c07d2f93c5da269f834114f2c4705e535cc0d320cbf692d13d
openshift4/kubernetes-nmstate-rhel8-operator@sha256:82ea990da51f60ce9b963fdb1247dcccfc61ac5a881239628aa05f6110a0acc6
openshift4/kubevirt-csi-driver-rhel8@sha256:2049df74f75834f16f3754e565cff75c30a7c50c1bcb17392eeb89165f871e0e
openshift4/metallb-rhel8-operator@sha256:c3c73d4572e332be738794d6e6ec7d95af22c77f98d1bebe630e40c8c1f9a836
openshift4/network-tools-rhel8@sha256:c4227d1aaf1953442ef515eef1ad384d1241bbbda6a57ebad4127d85c57a4952
openshift4/oc-mirror-plugin-rhel8@sha256:a9133091e56a539220d16cffb027c661977d09e7883b0d49289f5627e5f879fd
openshift4/openshift-route-controller-manager-rhel8@sha256:4f7ace9aa55db62dabddd657805bdeec5366e2bc0d2f1b9361ecba1c83def4f8
openshift4/ose-agent-installer-api-server-rhel8@sha256:9aafb914d5d7d0dec4edd800d02f811d7383a7d49e500af548eab5d00c1bffdb
openshift4/ose-agent-installer-csr-approver-rhel8@sha256:d57bf6b28bd554f7dcb9158d640da9d419c2487ecd8995cc73e92dacdf16cbc1
openshift4/ose-agent-installer-node-agent-rhel8@sha256:e7b279cbea3c8bad0c8546e040e3723491b1856ffd87ff8b8b93da41674dff86
openshift4/ose-agent-installer-orchestrator-rhel8@sha256:8f39b1748a8e4aba2a7651258b47655251ca96734f76245a84e1d9ff0172161a
openshift4/ose-alibaba-cloud-controller-manager-rhel8@sha256:6cac727dcd4c3b6b43869c258757decaf81649a6c47756b49757a9e952a3c7fa
openshift4/ose-alibaba-cloud-csi-driver-container-rhel8@sha256:5454405d9096af85e71a862354a04fde2bf98d14736a318ecaccfbbd127567bf
openshift4/ose-alibaba-disk-csi-driver-operator-container-rhel8@sha256:23acfd47f7a05d0bf72b4c0132af9927da56dbb563700d95c0690f2ba45dbbdd
openshift4/ose-alibaba-machine-controllers-rhel8@sha256:4b41f8e9cda9736059d331530f08cbe7fc2c9a2532faf031d93cfbc5a6d55d28
openshift4/ose-ansible-operator@sha256:1283425465bc11aea576cc5e27c996dc536439b46cf6cc77f6a3f8e0b043156b
openshift4/ose-apiserver-network-proxy-rhel8@sha256:0c506b8419f2fe534abc1574340ec480105942ad9ad68ba456ea159d705c6841
openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:6af4408b8369f423bc2d61b9fc6b9ac27c851bae9c849c30ecd9d6c3459ca47b
openshift4/ose-aws-cluster-api-controllers-rhel8@sha256:7cd77d57ae2ef5b0a1db704c612c7c5151b25d33f0218bc94f99a36065edc26c
openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6d589bddb55552d41d9b7c3882eca9240fc30739851a46c8be66bc67b60bf932
openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:f10fc483ca58ed1c152f18f612626d64536d1ccfb9dc70f93f4b9c52e009c72d
openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:006033d3cdcfbed5d88b5023c16802d42e319376ee7c56d336c6f18015dd9c91
openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:93735632aadda09b747ab065bb688bc413ffceb32a221bebe5abfbe0f98b4ba9
openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:04e44a663070fa5f9d06ad7cec10dd42bc5f57bc5ce83b43230295ee500c8fca
openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:de3d736a5ca06b046bfa2d625d2c706e933e39144047e384ac18dab584e41787
openshift4/ose-azure-cloud-node-manager-rhel8@sha256:2344a0f009694f4e7937bdef8d437b976507a5cdfff0963a83da26ea5b937bae
openshift4/ose-azure-cluster-api-controllers-rhel8@sha256:5b7e34305ee618985d00d2c93066f28fbb9445de8597da7541d9c3b65a3e7c67
openshift4/ose-azure-disk-csi-driver-rhel8@sha256:aed54aa456f8db265294892a70b3326c178cf3d0385709fb7638f5d2d2937386
openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:69d493257c120c354de1720ec7ebda8fc8bcf86d96d486b5cd147fc85446dfc3
openshift4/ose-azure-file-csi-driver-operator-rhel8@sha256:cd6d4218fd366d47cb99439b772e275d7aa035661447b2ebeb15109346cc8eee
openshift4/ose-azure-file-csi-driver-rhel8@sha256:3697993af0054969f74845aa00cbdde1adabb9bebe9f3568191e6830006d2276
openshift4/ose-baremetal-installer-rhel8@sha256:95855c4425f8bc87ec39d43d6cc1444c14bfb7791b279c836dc6e4aa5b9894b0
openshift4/ose-baremetal-machine-controllers@sha256:a5229ba0fce1c5dc6082103aae536c60b95fb014b6f57e9999f00590280ae9b3
openshift4/ose-baremetal-rhel8-operator@sha256:cc4ae51bc292800f0b75d0bc7006bb334443d47200ed4ebf2b54124f3cedf17b
openshift4/ose-baremetal-runtimecfg-rhel8@sha256:028a1513e6d7b80ca2282792a3f7dcd92e01cf4703e3ce67483a5abb1d40cecf
openshift4/ose-cli@sha256:840f6c28b4c7d71ecff23f0c31d3e833aee39a7eb45a760762f32072bcec86be
openshift4/ose-cli-artifacts@sha256:454cb454c0dcdfc1e7c647cf4326cb194dc2b2de895b84bce4fb36c1ba5fbd4f
openshift4/ose-cloud-credential-operator@sha256:f4f8f4b1b1c95bb7ad5dc71d5c76f6be4191f9b2c6d2765583025528b3b3db93
openshift4/ose-cluster-api-rhel8@sha256:7e73155adfe1dff5e4f3c7bf0e4b290901d58a8a516f8f2c2fb355e86eaf7c52
openshift4/ose-cluster-authentication-operator@sha256:5ab211a32ac9d0156ee1919b90b8b854e7ad189d5df662caf0a79704e2dd2f3e
openshift4/ose-cluster-autoscaler@sha256:cdb37c970615d26784b91ffcb5a1e27127471a9c5e89e140b310db64798b571f
openshift4/ose-cluster-autoscaler-operator@sha256:b0a14eecae16b0a28f39be00cd4f62bd77f1b8e208a51222904a5a631a9805ed
openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5a613c9135b137bc8173f74b14ae0140cef74a3346b6bfc9eafcaba380102e98
openshift4/ose-cluster-bootstrap@sha256:a7f2fc7774b5a6e2137a383203a0fcb1433ed14b14231a9d4b0e5ea605f6ef54
openshift4/ose-cluster-capacity@sha256:46beab260fd4e23491cf066d55b75308abeedcc3d8784c3a84053c49d67e5db6
openshift4/ose-cluster-capi-rhel8-operator@sha256:93a316f82b1b21f5bda60ca9ffebecbc269d6eff1a04bdb6501b604814f72110
openshift4/ose-cluster-capi-operator-container-rhel8@sha256:93a316f82b1b21f5bda60ca9ffebecbc269d6eff1a04bdb6501b604814f72110
openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:50fd3d83d176fc964701e2298dd78fd9d0914c7f9a64552138cb7c3df3bdf1a7
openshift4/ose-cluster-config-operator@sha256:2759bb72644ab1c1c2d3db2f6ce3e6024c97bdf7b4288b121df055adf5417ae0
openshift4/ose-cluster-control-plane-machine-set-operator-rhel8@sha256:cff81edd41a2c4b68c64513796085766bcfeb46eaa9f9ac48179444601a86139
openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:8738ac3c907020c16080708e8811d11d213bbb8bef4852b18d9f15c70abd0e39
openshift4/ose-cluster-dns-operator@sha256:10a863b53f2c96806e8035917a1b0cded306e3d7cac9655818835fc14a9bf5a1
openshift4/ose-cluster-etcd-rhel8-operator@sha256:fa7f4880be55e5316b03837e6de78bd3b8144e31b08aedd91983d9523df72f18
openshift4/ose-cluster-image-registry-operator@sha256:2b302fdfd1c990f0f02232d7431c5fb2db5cbe75791d7a13c8d4d9a92781c5c7
openshift4/ose-cluster-ingress-operator@sha256:feda7305a8cf95c020968d94a0944c4777d6e46b9f0b71f9a3cd17c7782e81ba
openshift4/ose-cluster-kube-apiserver-operator@sha256:abe828734234f1be3eb07ac60c06ae3746bb3a14d7153189660a46419143a167
openshift4/ose-cluster-kube-cluster-api-rhel8-operator@sha256:194590e6bd4932f21f263a02ba3160229e93ec3b0c1cd49e832231fee9168752
openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca87b7d8e43184729caf9d9d6e33c908e06c544533d814f8630ccb34dcb629a2
openshift4/ose-cluster-kube-descheduler-operator@sha256:2e1825ef376199b2ad175420de776efd5a4dcd20d03d57bb2b92d5180cfde479
openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:2e1825ef376199b2ad175420de776efd5a4dcd20d03d57bb2b92d5180cfde479
openshift4/ose-cluster-kube-scheduler-operator@sha256:90257f221e6d0e8e1f985b451ccfaf4b02dc2df5eead6d7a90b3d1f7dc09b19d
openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:8d1ba0d6c53c8fdd6fa67da2d10735aa7b332c7ea94386d2e7dddc18813bb886
openshift4/ose-cluster-machine-approver@sha256:7f9d4454b0015894f00fb4a51e4da08eece6bddbf161c1087ffdef3618ba7f30
openshift4/ose-cluster-monitoring-operator@sha256:d13090066e1f79ad9172ed1f2265e58a956422898fc18afa0fd91d64ce6c6453
openshift4/ose-cluster-network-operator@sha256:211ad4602874c9228efb9edb61fa051856ecbf14d9fd1bb4cac712df30a89e61
openshift4/ose-cluster-nfd-operator@sha256:857e7bec6536e6e9812f232c1f98272c1c8951188c19e53bea832ac3f8fa0e56
openshift4/ose-cluster-node-tuning-operator@sha256:cd7933e6147198a9b85124812daafa1a9528669d72f1e27b4f522efb5a87ab55
openshift4/ose-cluster-openshift-apiserver-operator@sha256:26a98fa0f13f996225a9b76a6b6135ef6350ad40e706100776d6335b78a981e9
openshift4/ose-cluster-openshift-controller-manager-operator@sha256:b2d884639fcb9b73b8e02dade8063f818b9eedab7573b4233affe3a44e1ed4ff
openshift4/ose-cluster-platform-operators-manager-rhel8@sha256:febb4ab5d1f1f7d49a0219602bc71fe7a44524610d6ae7813530c4b56306f285
openshift4/ose-cluster-policy-controller-rhel8@sha256:7e02aa1156316801fe7b8e125584db1db72ef35eaf4690cd553c71cc15447d7e
openshift4/ose-cluster-samples-operator@sha256:ab17a77e17e68b76e8c5ea0d97e4fa970977e8ba4b34807e393cfdba819325bf
openshift4/ose-cluster-storage-operator@sha256:ad90eecc1ddfd03126812cfe0d243f6577827f4c33310888ac564c24c0ca2d08
openshift4/ose-cluster-update-keys@sha256:3fc97c79c5b9b678cb3f389721cf35b1fc74a198d3d5d3fec5767f19debb72cd
openshift4/ose-cluster-version-operator@sha256:1fa63a1a18ea4600a7b0e038beb8f70dfa22fe310d99f0948e607ad4751817b2
openshift4/ose-clusterresourceoverride-rhel8@sha256:de888ecce55360b2bf01e05eec663db17f228d39ca65d71658141b03d4dd5bc8
openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:c54c784359491eab938a7f76afcb70be1afe8e7f2f160ef8905b89f3e98ca828
openshift4/ose-configmap-reloader@sha256:ec5bbffbdd71746c0460bc57c622bc0c8d1f79bf1c33d5debeca6f7dab0617b1
openshift4/ose-console@sha256:64b8bbe5c5327a758e7b81b6b0730ebc522474d0cf6d10231bd05d742176e5a7
openshift4/ose-console-operator@sha256:6623fdb3f786821e10b0bd6ec7039281bb862da1687c270759cc5de835dc6954
openshift4/ose-container-networking-plugins-rhel8@sha256:7e320ee6ff42ff5ca0eef524d8126d71f5cac24e6b7c02a782d5e38d272b667f
openshift4/ose-contour-rhel8@sha256:82e01909338df68f5596273f6e8b5d9280175168beff0c77ebbd5bc9e7f115fd
openshift4/ose-coredns@sha256:95dd3672584bef74a77a559cb92f466410fad0d9f3bf6d6fac2769e46c735292
openshift4/ose-csi-driver-manila-rhel8@sha256:a9241459e2f2a5d48949dbf5c236a97f16711e33a046ec02e9f1d925251d27aa
openshift4/ose-csi-driver-manila-rhel8-operator@sha256:85cc729a536cca5a0262d8f7efd703aa97161ea030e4f403a2b54c8c3bbcf76f
openshift4/ose-csi-driver-nfs-rhel8@sha256:e1ee7978b33ad8559bdc09c8b80ff206a1d21353c9f1d415476414056f4ebd00
openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:39e8eb20041d1e0e6ad78b6be37f21f3013cedcd870f75ab84d258cafba726ec
openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:039216add262950b76931f9c4b47085945ff47faf6553f041e39d966913a31c6
openshift4/ose-csi-driver-shared-resource-rhel8@sha256:9e6c128e7aab8821ea33b9a7141b6a3f1aafd14a0752acb1eb736ebd46fbb87b
openshift4/ose-csi-driver-shared-resource-webhook-rhel8@sha256:6a8b2e132382bbc2898513be7d881fc76d3d46d50bcee8171aad6ba0610f90ac
openshift4/ose-csi-external-attacher-rhel8@sha256:17220817d7d4b2a81636c48727f5c32f22a69e99bd9e994b40c138a53c950038
openshift4/ose-csi-external-attacher@sha256:17220817d7d4b2a81636c48727f5c32f22a69e99bd9e994b40c138a53c950038
openshift4/ose-csi-external-provisioner-rhel8@sha256:c35043de6bfe9c71924332440d2fbfc953fb9705a295f804add8ee8d6a5fec7b
openshift4/ose-csi-external-provisioner@sha256:c35043de6bfe9c71924332440d2fbfc953fb9705a295f804add8ee8d6a5fec7b
openshift4/ose-csi-external-resizer@sha256:6543fea59eb331dbf4d9720c95eafccfb7288826d45e3240a2a2360b96760df4
openshift4/ose-csi-external-resizer-rhel8@sha256:6543fea59eb331dbf4d9720c95eafccfb7288826d45e3240a2a2360b96760df4
openshift4/ose-csi-external-snapshotter-rhel8@sha256:c39828331e7ff79ca6aeb56e54c1c5501b6c7055cd20510b2142badd3901a23a
openshift4/ose-csi-external-snapshotter@sha256:c39828331e7ff79ca6aeb56e54c1c5501b6c7055cd20510b2142badd3901a23a
openshift4/ose-csi-livenessprobe-rhel8@sha256:9830527ac7d918cb69b3f4e693174d7281a52960a14261f09396ba910747c487
openshift4/ose-csi-livenessprobe@sha256:9830527ac7d918cb69b3f4e693174d7281a52960a14261f09396ba910747c487
openshift4/ose-csi-node-driver-registrar@sha256:fe27cfaaea97f006b187a9b76d1a685c81fc03d42a2c55f18344a6d3fb15460a
openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fe27cfaaea97f006b187a9b76d1a685c81fc03d42a2c55f18344a6d3fb15460a
openshift4/ose-csi-snapshot-controller-rhel8@sha256:38626355d4250f932a3fa332f80e68aa9e894dfbdd499a00b8c171f57212b2ac
openshift4/ose-csi-snapshot-controller@sha256:38626355d4250f932a3fa332f80e68aa9e894dfbdd499a00b8c171f57212b2ac
openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:9b51ef34ea6daaf4f6d1bc116882e9fddff68d4ec8dee12335ffcf01e5bb0529
openshift4/ose-deployer@sha256:99a97d61f6c0322d38206fb34c4765784aca9e0174f0d4334290f884b03ff75c
openshift4/ose-descheduler@sha256:f00a02500ce1f58bd3f4c0a40c4f6aec86f2d6ec232d2ef5c82aaf238ee42586
openshift4/ose-docker-builder@sha256:fa9046c8622c11f3e7f8f68d75829ee4f12db693037c66c27efc6b588b2eacb5
openshift4/ose-docker-registry@sha256:53ecc4b2904b68dbd72bef7dd9dfa43d45d7a9da629153c6a57397fe0a565735
openshift4/ose-egress-dns-proxy@sha256:37180868bde6b9d7de87e6e6ded48e09b9aa8bf11b75a6daaf24474b9cfc1615
openshift4/ose-egress-http-proxy@sha256:b2974bf5f0a88c2ff776d96e6455b3730dfa8c3a5502173703b9cc3178053b3c
openshift4/ose-egress-router@sha256:18a2b2fca8c69927a8b457214975a318e14a58e0b2e3ab9271c0fded97457a40
openshift4/ose-etcd@sha256:a7d9172adb485fceeea0cd0129384aceadf0ca23cea7a5ca2f881079f64d830f
openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:a4a39129238a516e2341b9d384642d0fd1090f255ebed4f78749037cfa60ae98
openshift4/ose-gcp-cluster-api-controllers-rhel8@sha256:14fa29b714f69cda6d6fc008a0affd555294ea5d0f7625f00102ceb0e644d693
openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:2d196ad8afca5d85755ce21a057138fed8e786942e9f8560361d1e3f602a9595
openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:f6be1e8330459609b69572df36b9af89fd6736bf353f68ba301e27072c5f52f0
openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:2adcb64a452cb477b9776e9ac0878c063c24935403d50ca30183081632f6d8bb
openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:1580a2289f7198ef0bb4a6d4f73e49d045ca6817d2e69b80f1bd69d5b8e4355d
openshift4/ose-haproxy-router@sha256:c1360e96dd3a7bd06132df6618ef1af32c7282e0ebf1e63f0ef84fab29badcea
openshift4/ose-helm-operator@sha256:2448b1227b0b411192b1da9d187a6bcea95d93c51542adce5f5bc97518df36e9
openshift4/ose-hyperkube@sha256:1e15b08d9993b80bd82bab2981fbc270b05b72e50e0524ee3a43dcf90a496d62
openshift4/ose-hypershift-rhel8@sha256:8cd8c91349a35a3a4d1332d0016fe83b344c4820382d290985748952f4e19da6
openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:63c1e111ecd2b9bd5921d54930e0884d82f4424229e09717fecf12015d495fce
openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:10f9437645df6bc821a70f4da0d65ce06220961465c7c720c3d9cf71cc091e39
openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:f3f4ae7d409c2a79fcedc1d88cc7795a34576acc806ae05f69be7f5a51e002c7
openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:4a9c00a113526b2ffa7c9610bf7a1fcf083bb145ee52c76abac48b5ac1929136
openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:ea656bbd7907106d097fa5968edb6962311fb9cf3aba49374c70a2203301c9a4
openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:54019b4192b085a0251566a51cff89612691b2bd6b00e170fe5a2dcbba42c0e5
openshift4/ose-image-customization-controller-rhel8@sha256:5ffc761ff1ad98852d2006c838fc643fe6ddac46d4d4c779529726c845cf3333
openshift4/ose-insights-rhel8-operator@sha256:f4a01a2486fb5b5052f3742bc2e51e2a799cf8a1ce829ac6b9a5de848e32a28a
openshift4/ose-installer@sha256:f85ec9e38afffaccb3731250a8fad3109d9841b1c8004ad298387be7aef1f2fd
openshift4/ose-installer-artifacts@sha256:4a91bd9473744c0a3e730358cc6a5ef516da952c85fd46add8432782274d49cf
openshift4/ose-ironic-agent-rhel9@sha256:ad32c0e9af2c63cf1f5c906f39b33beeb64f9c9f7a3508b140dd7ff0f4991d49
openshift4/ose-ironic-machine-os-downloader-rhel9@sha256:d6efe96b5829568ad4d15948086823dffc31e66bb85ee01c6d44a3b01bd49517
openshift4/ose-ironic-rhel9@sha256:413cdf0f5bcc67b700179cace7fd893973d791610bc1a3676ef4aa7213d5d1c7
openshift4/ose-ironic-static-ip-manager-rhel9@sha256:6f7db43c6bb1dba00c4ce0e87b38aef38afd316dfd22a067ad95bc8ea83c9b50
openshift4/ose-k8s-prometheus-adapter@sha256:3dca2a8e208ed9ce82d6e3c3b43c33c107eae2104bede086eec98f83ff94a15a
openshift4/ose-keepalived-ipfailover@sha256:bf216d47b8648002b715a97293a23f828d3d0a42ef5a89986b6adcae3b95cd2d
openshift4/ose-kube-proxy@sha256:6962aee4e9309d99e5986e3ab54e9cb4eb4edbd5fdf4012a81d8c7ef03b10b39
openshift4/ose-kube-rbac-proxy@sha256:029a446bb8fbaa69770488a70d19f5b1215fb1a4abdba3a5072efa5d933e52ef
openshift4/ose-kube-state-metrics@sha256:48fe6d1d26708f6f44776b1968ec1c0b415c0e759be81010b01994db4d9a21b5
openshift4/ose-kube-storage-version-migrator-rhel8@sha256:db07ce6476e5712c2e2ca5461c057fe8652cb761efc6ec02467d90b244027859
openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:9ff4f61a479b76d36f72c7830cd16b3dd895d88b42478359c41677dae3ddf268
openshift4/ose-kubevirt-cloud-controller-manager-rhel8@sha256:3f0721800ecf460036e9b9bb4574fa332099b8b95f3f83d8e7b3a65eecc402e2
openshift4/ose-kuryr-cni-rhel8@sha256:32d60c1f253e90422b2744eecd076838d95e7072a1feb21c39b229a082f39f88
openshift4/ose-kuryr-controller-rhel8@sha256:6ca3fdd6e4b366433a2e6ccd32afcf3f98696a261dd7e16dafc65ab11786292d
openshift4/ose-libvirt-machine-controllers@sha256:8a49898e5865a6866e11e593e3b36c00515967c75a16f4fb5e21b2b9b7f1cbad
openshift4/ose-local-storage-diskmaker@sha256:e794c8f14a7c96869586378fac6271c958799bd6d92fb47acc488f4eb73e131a
openshift4/ose-local-storage-mustgather-rhel8@sha256:30581e93cacf07752ed659932b2e0dc39c304aa81cab9fd1097fcc38b1a4253f
openshift4/ose-local-storage-operator@sha256:0763d728ef3d0367551287549721f59777b919d00faea4ece849d8da8a6563ff
openshift4/ose-machine-api-operator@sha256:890cdab08c598dc051a4551b65776f0d74fc517043018ec263f5cad6089ff6bd
openshift4/ose-machine-api-provider-aws-rhel8@sha256:28a511d4641cfa9fae6c33be1cd92f5c69376a1a17b41de0f02023945189350a
openshift4/ose-machine-api-provider-azure-rhel8@sha256:badaeb5eb07725bf2b18b901dd14368bdfb821e6dbcfb1205b89f87dead5fc83
openshift4/ose-machine-api-provider-gcp-rhel8@sha256:818a536c30c80bcca764eaedcaeaf76b62c9716b8e33d1bbdf4f9b05b9110370
openshift4/ose-machine-api-provider-openstack-rhel8@sha256:0749389103a800a88cd40897adf41857c73331e8a28396315a9c2108b499ec58
openshift4/ose-machine-config-operator@sha256:aeb43d9a6646958e73807321fcd609d4caeeeeafeb8f330a43ce56454e06a601
openshift4/ose-machine-os-images-rhel8@sha256:e79087f3603696a5f800bae7d6cfa0f6168397b20374b346c50a1c5ad39353ac
openshift4/ose-multus-admission-controller@sha256:c5539f1e7c1e77d6ccd6f9d29264b75260c75e121019049b265f71971adeb99a
openshift4/ose-multus-cni@sha256:9303b8bd8ab58a0b6e12639b1af7d8ffa0909eb83a71d6d2b8e0d20d4f7a5f1d
openshift4/ose-multus-networkpolicy-rhel8@sha256:267bbceb068c516090693b4993eb93b1f56c238653c585a8716b03626ce87c27
openshift4/ose-multus-route-override-cni-rhel8@sha256:5fdc7af919824d0da020367edacbefce64f888d89042bbba8fe971af1c81405a
openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78af3f50156b9d8086be236356c881f14d8736fe4efbb73d961919c049565225
openshift4/ose-must-gather@sha256:2eddfe6b31b4275d681e16a21c8d0db983f7fe6a86f6cf309b8c1a06c03ba63d
openshift4/ose-network-interface-bond-cni-rhel8@sha256:8e59385e42380f7ec31c903a79d9facf50c13d5085b695d9bdf2910f1c8a1559
openshift4/ose-network-metrics-daemon-rhel8@sha256:4530360619bb0fcee988d14e5f7c3e35f6531371fa54eae37a98eefabce9b350
openshift4/ose-node-feature-discovery@sha256:2f38172c786928a8b932a54264d599bbcf70399474e99552227424143cd810a1
openshift4/ose-node-problem-detector-rhel8@sha256:71983002c31b51d982bab9d46d2b955a36788404d910c3426df2d546d1cf2e66
openshift4/ose-nutanix-machine-controllers-rhel8@sha256:723ed61852a0f3ab7e738f800e3dccd2ae6f500eca8132e503aa42a239a0a5fc
openshift4/ose-oauth-apiserver-rhel8@sha256:bf9f6fdd018bd5761aac97d5e8829fb7c3ecea7032886b80133db0f943448294
openshift4/ose-oauth-proxy@sha256:4734c5bb510bd658a084059136e2df0d267696699dc093f265678170d66f58d2
openshift4/ose-oauth-server-rhel8@sha256:4dd20c72fe346e0550dbb8c54e80fe3f4b8830c2486849c6d1ae82e676e784ab
openshift4/ose-olm-rukpak-rhel8@sha256:8ba327b0aa6d385c26bb6a2493936a5b630d91b6e864212c6db24952bed73eb9
openshift4/ose-openshift-apiserver-rhel8@sha256:6350e5e62d69d07dad760a3d6c4780a2aa57a686b77003e9ff8e997ba2b6fba7
openshift4/ose-openshift-controller-manager-rhel8@sha256:4344a11b5b91679f98d18ca1040bae371bbf2339a827c1ad99de6b038854a3a7
openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0cfc04cc33a653a66ec2182305df7f7c47604f157218cc0d0ebef06823311e42
openshift4/ose-openshift-state-metrics-rhel8@sha256:dfc8c3544982ae445a5a22d56404198668a6d5c9f229352a61f1f7cbf6469663
openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:328fb55b1a52fd535bff392bcb254cbfdf45c611a5d9472f13c8dc90c4c268b0
openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:662f77d8347c20533b560e07b8f0821097badf1aad691e9cdd450e85b63784e6
openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:712b1ed8ca348f23bc319abb48fe02215eaae33e6a00c08bb7153c1ced236119
openshift4/ose-openstack-machine-controllers@sha256:6538a5408fee0bc60f6e5fff83291803151a7f183bf9e5c823360f22211f5c0d
openshift4/ose-operator-lifecycle-manager@sha256:51db0beed2302ace1f748a2b6341fe29fd237c2f00b467b8729ad20c594b361f
openshift4/ose-operator-marketplace@sha256:5d47c5ebe151eed24e22d596f33dbf49c12840923ebdf160fe0a0da5a4488901
openshift4/ose-operator-registry@sha256:26fc94055b3dfe4a7ec268e2e8aa5a66a35f70863f6c48523df3775653b9380b
openshift4/ose-operator-sdk-rhel8@sha256:ddf749535eabc7ac592a8e8dd3368e1c6cc29041e5f69085f8987269a604fb32
openshift4/ose-ovirt-machine-controllers-rhel8@sha256:0e3a228f67175bdc4f27292fc23b725c83689a37859b773aca21f4bfbcb865a5
openshift4/ose-ovn-kubernetes@sha256:4c0f7687f514138eb1067e3cb00d49774932dff13b3a7682167be4b7662b02fe
openshift4/ose-ovn-kubernetes-microshift-rhel8@sha256:f089a420a01c77bdcd2cd8065496e6922eee9852c793d9e521aed1ff21a677c1
openshift4/ose-pod@sha256:6109f2a453f037b0a468e0694d9b5f44d3f69a931f0804abc1cf318e62d48148
openshift4/ose-powervs-block-csi-driver-operator-rhel8@sha256:c91bdab2d50b2dbacd9bea181d0baa35a168af275b216b1bf377b45f661d2f43
openshift4/ose-powervs-block-csi-driver-rhel8@sha256:f243e124caefaeb6fcaac1e749a7accb54ea3f152cdfd31b53de8b3ce849227d
openshift4/ose-powervs-cloud-controller-manager-rhel8@sha256:93a571de93bdabcd315086ca4247f7f339774a45262dda7bfa414c4ecb39b323
openshift4/ose-powervs-machine-controllers-rhel8@sha256:d7575ca6be5007758173e3e41311e69689eb6f50fabcec7948efa873e17f2135
openshift4/ose-prom-label-proxy@sha256:a778d14159894f47289ef8d92ed6ae4b7eb533717c812f988a68282dcca8cf60
openshift4/ose-prometheus@sha256:b71cf039176e8b32e7963ba2aae2d4a997cf1e313350d8dab08c0678188d9071
openshift4/ose-prometheus-alertmanager@sha256:f524571705bfc20c9e51e7872b4c75b78a181b5093c41d41848947455050a844
openshift4/ose-prometheus-config-reloader@sha256:1dee62467a15940ef63088df693702d81c1abab75d0ca3c04a446c730c3a4805
openshift4/ose-prometheus-node-exporter@sha256:581c874acf7f051c5aa2b0a8b16d5fa42eca78c2210bd37096d8765fdadcf964
openshift4/ose-prometheus-operator@sha256:7a08679ceaf6cc684a22f6a99eed17f42652b5f1aea88fdddc35a984475feb5d
openshift4/ose-prometheus-operator-admission-webhook-rhel8@sha256:7d913f0ed8df6b21633168ab79a2a3991c2a749c605f6c563680c47cc0d20656
openshift4/ose-ptp@sha256:a2ad39ac299a67a24c15cda9f88beaf26b3d7908c552395efe49cd02727bed0b
openshift4/ose-ptp-operator@sha256:415a68ab4a266661deee7ded3a5eeb7bba32eb806e1e7899f0bef0232fded612
openshift4/ose-sdn-rhel8@sha256:ec01edc5854c024b87e323f0ab25ea7fa422330538612d216b03a3d9af061fa8
openshift4/ose-service-ca-operator@sha256:bfbcbd8aab1b2d2e43efd85df3ea537098f36754b75b2ce5ca92f358e19c4222
openshift4/ose-sriov-cni@sha256:9561991c3f96a4190b0cc9716f63e62146fcb0ddccee7a52bd230e9abfc653fc
openshift4/ose-sriov-dp-admission-controller@sha256:73c036f7fce18eda82abc586b88293ed9e7d3f554bba2468461ab674ff4caf57
openshift4/ose-sriov-infiniband-cni@sha256:1f1b17c941e657b07cc4035c852d3a1e2a664621e63dbc447f146daa1267b407
openshift4/ose-sriov-network-config-daemon@sha256:8f86f8b12576da8ec188fdfcd27bb64afc2619efb7c714dbaff351a990205cce
openshift4/ose-sriov-network-device-plugin@sha256:a70a681c2d852f8710f79d3ac1debdd60523e3f6a918158b9e7361d9892ce006
openshift4/ose-sriov-network-operator@sha256:59dc6a2274e04c269b092ce303bbf25efd4d59ae0f4148f67a36d568c367016c
openshift4/ose-sriov-network-webhook@sha256:6b7e6c36597b2b010231c0e9906223ab3adf499cac7c1534fd32a3a7242b1a6e
openshift4/ose-telemeter@sha256:ddce0472c91042821382a504be80543066f79fea876c444ac6b180fdb3c4aeaf
openshift4/ose-tests@sha256:b4d96fe272c122fa0258230414c38e78bb30737b7592aa199574d4012e5875f5
openshift4/ose-thanos-rhel8@sha256:552e0e9e6d02f43bdea2559934c592ce959dab854dfad2282561207a9fd822f7
openshift4/ose-tools-rhel8@sha256:0fee58857d7dd90830f7d3acab6507a2d59450ec2cdbe9e614db0ecfbcab2b62
openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f4968667d07849c9714f20e60562727b88afa1f95e47d0a7792417ac89b21621
openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:ab496f5ff6b0537955aced2bd28a333770f1ed0ac789129f2c1d0826aff9190a
openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:f227306a00544e8d4bee07fbf4a9fb3549ea3bf3feb72ee300b2241cd5c13a32
openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:f227306a00544e8d4bee07fbf4a9fb3549ea3bf3feb72ee300b2241cd5c13a32
openshift4/ose-vsphere-csi-driver-rhel8@sha256:908a3100c4a8ffb2bf9297f8a3dc008f19dfdd5df00653bb73932be2ede2bfcb
openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:908a3100c4a8ffb2bf9297f8a3dc008f19dfdd5df00653bb73932be2ede2bfcb
openshift4/ose-vsphere-cloud-controller-manager-rhel8@sha256:ea12cdc4966710225132fb402c768e43d6951afd6ed3feb21c1606e280673b59
openshift4/ose-vsphere-cluster-api-controllers-rhel8@sha256:f5209b95632be5ce5805ebdb0ca4c528ccd8a07580c864a57e75973a52bf25ae
openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:610711953eb65adad06a0fbe5c2fb466052e397ebc5cea380b7258799bb0b8dc
openshift4/ose-vsphere-problem-detector-rhel8@sha256:63d0ee8705e6945f1fa12b3a6179f18c2f9c1f9676d51feebfe059298b139ca8
openshift4/ovirt-csi-driver-rhel8@sha256:c28f29eee61fb5465471ad8a93fa85b8a1572ff80c1c65dbf939555bf76741b5
openshift4/ovirt-csi-driver-rhel7@sha256:c28f29eee61fb5465471ad8a93fa85b8a1572ff80c1c65dbf939555bf76741b5
openshift4/ovirt-csi-driver-rhel8-operator@sha256:fd6fa79402cea88a2d49b303e51f7cf533a32cd5a76ab8528c3309c6b511a2ac
openshift4/ptp-must-gather-rhel8@sha256:3053228c7e9a65631662f5ef9a5f2d06cd5de041b0d2910a00da815970a49130
Related news
Ubuntu Security Notice 6672-1 - Morgan Jones discovered that Node.js incorrectly handled certain inputs that leads to false positive errors during some cryptographic operations. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 23.10. It was discovered that Node.js incorrectly handled certain inputs leaded to a untrusted search path vulnerability. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to perform a privilege escalation.
Gentoo Linux Security Advisory 202402-8 - Multiple vulnerabilities have been found in OpenSSL, the worst of which could result in denial of service. Versions greater than or equal to 3.0.10 are affected.
Red Hat Security Advisory 2023-7626-03 - Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 2 is now available. Issues addressed include buffer overflow, denial of service, information leakage, and integer overflow vulnerabilities.
Red Hat Security Advisory 2023-7625-03 - An update is now available for Red Hat JBoss Core Services. Issues addressed include buffer overflow, denial of service, and information leakage vulnerabilities.
Red Hat Security Advisory 2023-7623-03 - Red Hat JBoss Web Server 5.7.7 zip release is now available for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, Red Hat Enterprise Linux 9, and Windows Server. Issues addressed include denial of service and open redirection vulnerabilities.
Red Hat Security Advisory 2023-7672-03 - Red Hat OpenShift Virtualization release 4.14.1 is now available with updates to packages and images that fix several bugs and add enhancements. Issues addressed include a denial of service vulnerability.
IBM QRadar WinCollect Agent 10.0 through 10.1.7 could allow a privileged user to obtain sensitive information due to missing best practices. IBM X-Force ID: 213551.
An issue in Mintty v.3.6.4 and before allows a remote attacker to execute arbitrary code via crafted commands to the terminal.
Under certain conditions, Nessus Network Monitor could allow a low privileged user to escalate privileges to NT AUTHORITY\SYSTEM on Windows hosts by replacing a specially crafted file.
Red Hat Security Advisory 2023-5976-01 - An update is now available for Service Telemetry Framework 1.5.2. Issues addressed include a denial of service vulnerability.
Vulnerability in the Sun ZFS Storage Appliance product of Oracle Systems (component: Core). The supported version that is affected is 8.8.60. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Sun ZFS Storage Appliance. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Sun ZFS Storage Appliance. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
Gentoo Linux Security Advisory 202310-11 - A filtering bypass in less may allow denial of service. Versions greater than or equal to 608-r2 are affected.
Red Hat Advanced Cluster Management for Kubernetes 2.8.2 General Availability release images, which provide security updates and fix bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41721: A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead read the body of the HTTP request, which could be att...
Docker Desktop before 4.12.0 is vulnerable to RCE via a crafted extension description or changelog. This issue affects Docker Desktop: before 4.12.0.
Docker Desktop before 4.23.0 allows Access Token theft via a crafted extension icon URL. This issue affects Docker Desktop: before 4.23.0.
Red Hat Security Advisory 2023-4980-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.7 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a bypass vulnerability.
Red Hat Security Advisory 2023-4972-01 - Multicluster Engine for Kubernetes 2.1.8 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy. Issues addressed include a bypass vulnerability.
Red Hat Security Advisory 2023-4875-01 - Red Hat Advanced Cluster Management for Kubernetes 2.8.1 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which provide security updates and fix several bugs. Issues addressed include bypass and privilege escalation vulnerabilities.
Red Hat Security Advisory 2023-4657-01 - Secondary Scheduler Operator for Red Hat OpenShift 1.1.2. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-4664-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 4.13.3 images. Issues addressed include a denial of service vulnerability.
Red Hat OpenShift Virtualization release 4.13.3 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of requests. * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Con...
Red Hat Security Advisory 2023-4627-01 - Migration Toolkit for Applications 6.2.0 Images. Issues addressed include a denial of service vulnerability.
Migration Toolkit for Applications 6.2.0 release Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46877: A flaw was found in Jackson Databind. This issue may allow a malicious user to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization. * CVE-2022-4492: A flaw was found in undertow. The undertow client is not checking the server identity the server certificate presents in HTTPS connections. This is a...
Red Hat OpenShift Container Platform release 4.13.8 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number...
cert-manager Operator for Red Hat OpenShift 1.10.3 Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specia...
Red Hat Security Advisory 2023-4475-01 - Gatekeeper is an open source project that applies the OPA Constraint Framework to enforce policies on your Kubernetes clusters. This advisory contains the container images for Gatekeeper that include bug fixes and container upgrades.
Red Hat Security Advisory 2023-4471-01 - Red Hat OpenShift Serverless Client kn 1.29.1 provides a CLI to interact with Red Hat OpenShift Serverless 1.29.1. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms. This release includes security and bug fixes, and enhancements.
Red Hat OpenShift Serverless version 1.29.1 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated. * CVE-2023-24539: A flaw was found in golang where angle brackets (<>) were not considered dangerous characters when inserted into CSS contexts. Templates containin...
Updated images that fix several bugs are now available for Red Hat OpenShift Data Foundation 4.13.1 on Red Hat Enterprise Linux 8 from Red Hat Container Registry. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.
Categories: Exploits and vulnerabilities Categories: News Tags: Zimbra Tags: ZCS Tags: CVE-2023-38750 Tags: CISA Tags: CVE-2023-0464 Tags: TAG Tags: XSS Tags: JSP Tags: XML Tags: Zimbra has released ZCS 10.0.2 that fixes two security issues, including the known bug that could lead to exposure of internal JSP and XML files. (Read more...) The post Zimbra issues awaited patch for actively exploited vulnerability appeared first on Malwarebytes Labs.
Red Hat Security Advisory 2023-4226-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.6.
Red Hat Security Advisory 2023-4225-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.6.
Red Hat Security Advisory 2023-4290-01 - OpenShift sandboxed containers 1.4.1 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.
Red Hat OpenShift Container Platform release 4.13.6 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number...
OpenShift sandboxed containers 1.4.1 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.
Red Hat Security Advisory 2023-4276-01 - An update is now available for Red Hat DevWorkspace Operator. Red Hat Product Security has rated this update as having a security impact of Moderate.
Red Hat Security Advisory 2023-4093-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.5. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-4091-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.5. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-4090-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.5.
Red Hat OpenShift Container Platform release 4.13.5 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1260: An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions "update, patch" the "po...
Red Hat OpenShift Container Platform release 4.13.5 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server c...
Red Hat OpenShift Container Platform release 4.13.5 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server c...
Updated images that fix several bugs are now available for Red Hat OpenShift Data Foundation 4.11.9 on Red Hat Enterprise Linux 8 from Red Hat Container Registry. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.
Red Hat Security Advisory 2023-4204-01 - VolSync is a Kubernetes operator that enables asynchronous replication of persistent volumes within a cluster, or across clusters. After deploying the VolSync operator, it can create and maintain copies of your persistent data.
Vulnerability in the Oracle Hyperion Financial Reporting product of Oracle Hyperion (component: Repository). The supported version that is affected is 11.2.13.0.000. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hyperion Financial Reporting. While the vulnerability is in Oracle Hyperion Financial Reporting, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hyperion Financial Reporting accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Hyperion Financial Reporting. CVSS 3.1 Base Score 8.5 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L).
Red Hat OpenShift Service Mesh 2.3.5 Containers Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptog...
Red Hat OpenShift Service Mesh 2.2.8 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modu...
Red Hat OpenShift Service Mesh 2.4.1 Containers Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.
Red Hat Security Advisory 2023-4033-01 - Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-4035-01 - Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Issues addressed include buffer overflow and denial of service vulnerabilities.
An update for the nodejs:18 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4904: A flaw was found in the c-ares package. The ares_set_sortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confidentiality and integrity. * CVE-2023-31124: A flaw was found in c-ares. This issue occurs...
An update for rh-nodejs14-nodejs is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-31124: A flaw was found in c-ares. This issue occurs when cross-compiling c-ares and using the autotools build system, CARES_RANDOM_FILE will not be set, as seen when cross-compiling aarch64 android. As a result, it will downgrade to rand(), which could allow an attacker to utilize the lack of entropy by not using a CSPRNG. * CVE-2023-3113...
Red Hat Security Advisory 2023-4003-01 - As a Kubernetes user, I cannot connect easily connect services from one cluster with services on another cluster. Red Hat Application Interconnect enables me to create a service network and it allows geographically distributed services to connect as if they were all running in the same site. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-3925-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.23.
Red Hat Security Advisory 2023-3924-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.12.23.
Red Hat OpenShift Container Platform release 4.12.23 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-...
Red Hat Security Advisory 2023-3915-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.44.
Red Hat Security Advisory 2023-3914-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.11.44.
Red Hat Security Advisory 2023-3911-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.63.
Red Hat Security Advisory 2023-3910-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.10.63.
Red Hat OpenShift Container Platform release 4.10.63 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.10. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server...
Red Hat OpenShift Container Platform release 4.11.44 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-23772: A flaw was found in the big package of the math library in golang. The Rat.SetString could cause an overflow, and if left unhandled, it could lead to excessive memory use. This issu...
Red Hat OpenShift Container Platform release 4.11.44 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS...
A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.
Red Hat Security Advisory 2023-3932-01 - Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL. Issues addressed include a bypass vulnerability.
OpenShift API for Data Protection (OADP) 1.1.5 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in H...
OpenShift API for Data Protection (OADP) 1.1.5 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in H...
OpenShift API for Data Protection (OADP) 1.1.5 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in H...
OpenShift API for Data Protection (OADP) 1.1.5 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in H...
Network Observability 1.3.0 for OpenShift Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24539: A flaw was found in golang where angle brackets (<>) were not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character could result in unexpectedly closing the CSS context and allowing for the injection of unexpected HMTL if executed with untrusted input. * CVE-2023-24540: A flaw was found in golang,...
Network Observability 1.3.0 for OpenShift Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24539: A flaw was found in golang where angle brackets (<>) were not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character could result in unexpectedly closing the CSS context and allowing for the injection of unexpected HMTL if executed with untrusted input. * CVE-2023-24540: A flaw was found in golang,...
Network Observability 1.3.0 for OpenShift Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24539: A flaw was found in golang where angle brackets (<>) were not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character could result in unexpectedly closing the CSS context and allowing for the injection of unexpected HMTL if executed with untrusted input. * CVE-2023-24540: A flaw was found in golang,...
Network Observability 1.3.0 for OpenShift Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24539: A flaw was found in golang where angle brackets (<>) were not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character could result in unexpectedly closing the CSS context and allowing for the injection of unexpected HMTL if executed with untrusted input. * CVE-2023-24540: A flaw was found in golang,...
Network Observability 1.3.0 for OpenShift Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24539: A flaw was found in golang where angle brackets (<>) were not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character could result in unexpectedly closing the CSS context and allowing for the injection of unexpected HMTL if executed with untrusted input. * CVE-2023-24540: A flaw was found in golang,...
Red Hat Security Advisory 2023-3796-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a bypass vulnerability.
Red Hat Security Advisory 2023-3781-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a bypass vulnerability.
Red Hat Security Advisory 2023-3614-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.4.
Red Hat Security Advisory 2023-3612-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.4. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-3612-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.4. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-3612-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.4. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-3612-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.4. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-3612-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.4. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-3742-02 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. Issues addressed include bypass, denial of service, and remote SQL injection vulnerabilities.
Ubuntu Security Notice 6188-1 - Matt Caswell discovered that OpenSSL incorrectly handled certain ASN.1 object identifiers. A remote attacker could possibly use this issue to cause OpenSSL to consume resources, resulting in a denial of service.
Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction.
Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction.
Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction.
Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction.
Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction.
Red Hat OpenShift Container Platform release 4.13.4 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number...
Red Hat Security Advisory 2023-3741-01 - The c-ares C library defines asynchronous DNS requests and provides name resolving API. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-3715-01 - The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. Issues addressed include a memory leak vulnerability.
Red Hat Security Advisory 2023-3725-01 - The "less" utility is a text file browser that resembles "more", but allows users to move backwards in the file as well as forwards. Since "less" does not read the entire input file at startup, it also starts more quickly than ordinary text editors.
Red Hat Security Advisory 2023-3722-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library. Issues addressed include buffer over-read and denial of service vulnerabilities.
Red Hat Security Advisory 2023-3722-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library. Issues addressed include buffer over-read and denial of service vulnerabilities.
Red Hat Security Advisory 2023-3722-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library. Issues addressed include buffer over-read and denial of service vulnerabilities.
Red Hat Security Advisory 2023-3722-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library. Issues addressed include buffer over-read and denial of service vulnerabilities.
Red Hat Security Advisory 2023-3722-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library. Issues addressed include buffer over-read and denial of service vulnerabilities.
Updated images that include numerous enhancements, security, and bug fixes are now available in Red Hat Container Registry for Red Hat OpenShift Data Foundation 4.13.0 on Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-16250: A flaw was found in Vault and Vault Enterprise (“Vault”). In the affected versions of Vault, with the AWS Auth Method configured and under certain circumstances, the values relied upon by Vault to validate AWS IAM ident...
An update for c-ares is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-32067: A vulnerability was found in c-ares. This issue occurs due to a 0-byte UDP payload that can cause a Denial of Service.
An update for less is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-46663: A vulnerability was found in less. This flaw allows crafted data to result in "less -R" not filtering ANSI escape sequences sent to the terminal.
Red Hat Security Advisory 2023-3677-01 - The c-ares C library defines asynchronous DNS requests and provides name resolving API. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-3665-01 - The c-ares C library defines asynchronous DNS requests and provides name resolving API. Issues addressed include a denial of service vulnerability.
An update for c-ares is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-32067: A vulnerability was found in c-ares. This issue occurs due to a 0-byte UDP payload that can cause a Denial of Service.
Red Hat Security Advisory 2023-3660-01 - The c-ares C library defines asynchronous DNS requests and provides name resolving API. Issues addressed include a denial of service vulnerability.
An update for c-ares is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-32067: c-ares is an asynchronous resolver library. c-ares is vulnerable to denial of service. If a target resolver sends a query, the attacker forges a malformed UDP packet with a length of 0 and r...
Red Hat Security Advisory 2023-3644-01 - Red Hat OpenShift Service Mesh is the Red Hat distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation. This advisory covers container images for the release.
Red Hat Security Advisory 2023-3624-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Issues addressed include a denial of service vulnerability.
Red Hat OpenShift Service Mesh Containers for 2.4.0 Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24540: A flaw was found in golang, where not all valid JavaScript white-space characters were considered white space. Due to this issue, templates containing white-space characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution.
Red Hat Security Advisory 2023-3540-01 - Red Hat build of MicroShift is Red Hat's light-weight Kubernetes orchestration solution designed for edge device deployments and is built from the edge capabilities of Red Hat OpenShift. MicroShift is an application that is deployed on top of Red Hat Enterprise Linux devices at the edge, providing an efficient way to operate single-node clusters in these low-resource environments. This advisory contains the RPM packages for Red Hat build of MicroShift 4.13.3. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-3540-01 - Red Hat build of MicroShift is Red Hat's light-weight Kubernetes orchestration solution designed for edge device deployments and is built from the edge capabilities of Red Hat OpenShift. MicroShift is an application that is deployed on top of Red Hat Enterprise Linux devices at the edge, providing an efficient way to operate single-node clusters in these low-resource environments. This advisory contains the RPM packages for Red Hat build of MicroShift 4.13.3. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-3559-01 - The c-ares C library defines asynchronous DNS requests and provides name resolving API. Issues addressed include a denial of service vulnerability.
The Migration Toolkit for Containers (MTC) 1.7.10 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service. * CVE-2023-24536: A flaw was found in Golang Go, where it is vulnerable to a denial of service cause...
The Migration Toolkit for Containers (MTC) 1.7.10 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service. * CVE-2023-24536: A flaw was found in Golang Go, where it is vulnerable to a denial of service cause...
The Migration Toolkit for Containers (MTC) 1.7.10 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service. * CVE-2023-24536: A flaw was found in Golang Go, where it is vulnerable to a denial of service cause...
The Migration Toolkit for Containers (MTC) 1.7.10 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service. * CVE-2023-24536: A flaw was found in Golang Go, where it is vulnerable to a denial of service cause...
The Migration Toolkit for Containers (MTC) 1.7.10 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service. * CVE-2023-24536: A flaw was found in Golang Go, where it is vulnerable to a denial of service cause...
An update for c-ares is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-32067: c-ares is an asynchronous resolver library. c-ares is vulnerable to denial of service. If a target resolver sends a query, the attacker forges a malformed UDP packet with a length of 0 and returns them to the target resolver. The target resolver erroneously interprets the 0 length as a graceful shutdown of the connection. This issue has been patc...
An update for c-ares is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-32067: c-ares is an asynchronous resolver library. c-ares is vulnerable to denial of service. If a target resolver sends a query, the attacker forges a malformed UDP packet with a length of 0 and returns them to the target resolver. The target resolver erroneously interprets the 0 length as a graceful shutdown of the connection...
Red Hat OpenShift Container Platform release 4.13.3 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service. * CVE-2023-24536: A ...
Red Hat Security Advisory 2023-3555-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a bypass vulnerability.
An update for python3 is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24329: A flaw was found in the Python package. An issue in the urllib.parse component could allow attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.This may lead to compromised Integrity.
Red Hat Security Advisory 2023-3410-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.20.
Ubuntu Security Notice 6140-1 - It was discovered that Go did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a panic resulting in a denial of service. This issue only affected golang-1.19 on Ubuntu 22.10. It was discovered that Go did not properly validate the amount of memory and disk files ReadForm can consume. An attacker could possibly use this issue to cause a panic resulting in a denial of service. This issue only affected golang-1.19 on Ubuntu 22.10.
Ubuntu Security Notice 6140-1 - It was discovered that Go did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a panic resulting in a denial of service. This issue only affected golang-1.19 on Ubuntu 22.10. It was discovered that Go did not properly validate the amount of memory and disk files ReadForm can consume. An attacker could possibly use this issue to cause a panic resulting in a denial of service. This issue only affected golang-1.19 on Ubuntu 22.10.
Ubuntu Security Notice 6140-1 - It was discovered that Go did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a panic resulting in a denial of service. This issue only affected golang-1.19 on Ubuntu 22.10. It was discovered that Go did not properly validate the amount of memory and disk files ReadForm can consume. An attacker could possibly use this issue to cause a panic resulting in a denial of service. This issue only affected golang-1.19 on Ubuntu 22.10.
Red Hat Security Advisory 2023-3445-01 - An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-3445-01 - An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-3445-01 - An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-3445-01 - An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-3445-01 - An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Issues addressed include a denial of service vulnerability.
OpenShift Serverless version 1.29.0 contains a moderate security impact. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker ...
OpenShift Serverless version 1.29.0 contains a moderate security impact. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker ...
An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-28235: A flaw was found in etcd, where etc-io could allow a remote attacker to gain elevated privileges on the system caused by a vulnerability in the debug function. By sending a specially crafted request, an attacker can gain elevated privileges. * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause e...
An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-28235: A flaw was found in etcd, where etc-io could allow a remote attacker to gain elevated privileges on the system caused by a vulnerability in the debug function. By sending a specially crafted request, an attacker can gain elevated privileges. * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause e...
An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-28235: A flaw was found in etcd, where etc-io could allow a remote attacker to gain elevated privileges on the system caused by a vulnerability in the debug function. By sending a specially crafted request, an attacker can gain elevated privileges. * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause e...
An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-28235: A flaw was found in etcd, where etc-io could allow a remote attacker to gain elevated privileges on the system caused by a vulnerability in the debug function. By sending a specially crafted request, an attacker can gain elevated privileges. * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause e...
Red Hat Security Advisory 2023-3303-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.1.
OpenShift Serverless 1.29.0 has been released. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of serv...
OpenShift Serverless 1.29.0 has been released. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of serv...
OpenShift Serverless 1.29.0 has been released. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of serv...
OpenShift Serverless 1.29.0 has been released. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of serv...
OpenShift Serverless 1.29.0 has been released. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of serv...
Dell SCG 5.14 contains an information disclosure vulnerability during the SRS to SCG upgrade path. A remote low privileged malicious user could potentially exploit this vulnerability to retrieve the plain text.
Dell SCG 5.14 contains an information disclosure vulnerability during the SRS to SCG upgrade path. A remote low privileged malicious user could potentially exploit this vulnerability to retrieve the plain text.
Dell SCG 5.14 contains an information disclosure vulnerability during the SRS to SCG upgrade path. A remote low privileged malicious user could potentially exploit this vulnerability to retrieve the plain text.
Dell SCG 5.14 contains an information disclosure vulnerability during the SRS to SCG upgrade path. A remote low privileged malicious user could potentially exploit this vulnerability to retrieve the plain text.
Debian Linux Security Advisory 5417-1 - Multiple vulnerabilities have been discovered in OpenSSL, a Secure Sockets Layer toolkit.
Debian Linux Security Advisory 5417-1 - Multiple vulnerabilities have been discovered in OpenSSL, a Secure Sockets Layer toolkit.
Debian Linux Security Advisory 5417-1 - Multiple vulnerabilities have been discovered in OpenSSL, a Secure Sockets Layer toolkit.
Debian Linux Security Advisory 5417-1 - Multiple vulnerabilities have been discovered in OpenSSL, a Secure Sockets Layer toolkit.
Ubuntu Security Notice 6126-1 - It was discovered that libvirt incorrectly handled the nwfilter driver. A local attacker could possibly use this issue to cause libvirt to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS. It was discovered that libvirt incorrectly handled queries for the SR-IOV PCI device capabilities. A local attacker could possibly use this issue to cause libvirt to consume resources, leading to a denial of service.
Red Hat OpenShift Container Platform release 4.13.1 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a ...
Ubuntu Security Notice 6119-1 - Matt Caswell discovered that OpenSSL incorrectly handled certain ASN.1 object identifiers. A remote attacker could possibly use this issue to cause OpenSSL to consume resources, resulting in a denial of service. Anton Romanov discovered that OpenSSL incorrectly handled AES-XTS cipher decryption on 64-bit ARM platforms. An attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04.
Ubuntu Security Notice 6119-1 - Matt Caswell discovered that OpenSSL incorrectly handled certain ASN.1 object identifiers. A remote attacker could possibly use this issue to cause OpenSSL to consume resources, resulting in a denial of service. Anton Romanov discovered that OpenSSL incorrectly handled AES-XTS cipher decryption on 64-bit ARM platforms. An attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04.
Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience notable to very long delays when processing those messages, which may lead to a Denial of Service. An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers - most of which have no size limit. OBJ_obj2txt() may be used to translate an ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL type ASN1_OBJECT) to its canonical numeric text form, which are the sub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by periods. When one of the sub-identifiers in the OBJECT IDENTIFIER is very large (these are sizes that are seen as absurdly large, taking up tens or hundreds of KiBs), the translation to a decimal number in text may take a very long time. T...
Red Hat Security Advisory 2023-3323-01 - Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
Red Hat Security Advisory 2023-3323-01 - Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
An update for go-toolset-1.19 and go-toolset-1.19-golang is now available for Red Hat Developer Tools. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24537: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by an infinite loop due to integer overflow when calling any of the Parse functions. By sending a specially crafted input, a remote attacker can cause a denial of service. * CVE-2023-24538: A flaw was found in Golang Go. This flaw ...
An update for go-toolset-1.19 and go-toolset-1.19-golang is now available for Red Hat Developer Tools. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24537: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by an infinite loop due to integer overflow when calling any of the Parse functions. By sending a specially crafted input, a remote attacker can cause a denial of service. * CVE-2023-24538: A flaw was found in Golang Go. This flaw ...
An update for go-toolset and golang is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24540: A flaw was found in golang, where not all valid JavaScript white-space characters were considered white space. Due to this issue, templates containing white-space characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution.
Red Hat Security Advisory 2023-3167-01 - New Red Hat build of Cryostat 2.3.0 on RHEL 8 container images have been released, adding a variety of features and bug fixes. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-3167-01 - New Red Hat build of Cryostat 2.3.0 on RHEL 8 container images have been released, adding a variety of features and bug fixes. Issues addressed include a denial of service vulnerability.
Ubuntu Security Notice 6088-1 - It was discovered that runC incorrectly made /sys/fs/cgroup writable when in rootless mode. An attacker could possibly use this issue to escalate privileges. It was discovered that runC incorrectly performed access control when mounting /proc to non-directories. An attacker could possibly use this issue to escalate privileges. It was discovered that runC incorrectly handled /proc and /sys mounts inside a container. An attacker could possibly use this issue to bypass AppArmor, and potentially SELinux.
Red Hat Security Advisory 2023-1325-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.0. Issues addressed include bypass, denial of service, and information leakage vulnerabilities.
Red Hat Security Advisory 2023-1328-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include denial of service and out of bounds read vulnerabilities.
Red Hat Security Advisory 2023-1326-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.0. Issues addressed include bypass, denial of service, information leakage, out of bounds read, and remote SQL injection vulnerabilities.
New Red Hat build of Cryostat 2.3.0 on RHEL 8 container images are now availableThis content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition. * CVE-2022-41725: A flaw was found in Go, where it is vulnerable to a denial of service caused by an excessive resource consumption...
Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: A flaw was found in go-yaml. This issue occurs due to unbounded alias chasing, where a maliciously crafted YAML file can cause the system to consume significant system resources. If p...
Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: A flaw was found in go-yaml. This issue occurs due to unbounded alias chasing, where a maliciously crafted YAML file can cause the system to consume significant system resources. If p...
Red Hat Security Advisory 2023-1327-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.0.
Red Hat Security Advisory 2023-1327-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.0.
An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition. * CVE-2022-41725: A flaw was found in Go, where it is vulnerable to a den...
An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition. * CVE-2022-41725: A flaw was found in Go, where it is vulnerable to a den...
A vulnerability was found in libvirt. This security flaw ouccers due to repeatedly querying an SR-IOV PCI device's capabilities that exposes a memory leak caused by a failure to free the virPCIVirtualFunction array within the parent struct's g_autoptr cleanup.
Not all valid JavaScript whitespace characters are considered to be whitespace. Templates containing whitespace characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution.
Red Hat Security Advisory 2023-2728-01 - The Red Hat OpenShift Distributed Tracing 2.8 container images have been updated. CVE-2022-41717 was fixed as part of this release. Users of Red Hat OpenShift Distributed Tracing 2.8 container images are advised to upgrade to these updated images, which contain backported patches to correct these security issues, fix these bugs, and add these enhancements.
Ubuntu Security Notice 6039-1 - It was discovered that OpenSSL was not properly managing file locks when processing policy constraints. If a user or automated system were tricked into processing a certificate chain with specially crafted policy constraints, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 22.10. David Benjamin discovered that OpenSSL was not properly performing the verification of X.509 certificate chains that include policy constraints, which could lead to excessive resource consumption. If a user or automated system were tricked into processing a specially crafted X.509 certificate chain that includes policy constraints, a remote attacker could possibly use this issue to cause a denial of service.
Ubuntu Security Notice 6039-1 - It was discovered that OpenSSL was not properly managing file locks when processing policy constraints. If a user or automated system were tricked into processing a certificate chain with specially crafted policy constraints, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 22.10. David Benjamin discovered that OpenSSL was not properly performing the verification of X.509 certificate chains that include policy constraints, which could lead to excessive resource consumption. If a user or automated system were tricked into processing a specially crafted X.509 certificate chain that includes policy constraints, a remote attacker could possibly use this issue to cause a denial of service.
Ubuntu Security Notice 6039-1 - It was discovered that OpenSSL was not properly managing file locks when processing policy constraints. If a user or automated system were tricked into processing a certificate chain with specially crafted policy constraints, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 22.10. David Benjamin discovered that OpenSSL was not properly performing the verification of X.509 certificate chains that include policy constraints, which could lead to excessive resource consumption. If a user or automated system were tricked into processing a specially crafted X.509 certificate chain that includes policy constraints, a remote attacker could possibly use this issue to cause a denial of service.
Ubuntu Security Notice 6038-1 - It was discovered that the Go net/http module incorrectly handled Transfer-Encoding headers in the HTTP/1 client. A remote attacker could possibly use this issue to perform an HTTP Request Smuggling attack. It was discovered that Go did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a panic resulting into a denial of service.
Issue summary: The AES-XTS cipher decryption implementation for 64 bit ARM platform contains a bug that could cause it to read past the input buffer, leading to a crash. Impact summary: Applications that use the AES-XTS algorithm on the 64 bit ARM platform can crash in rare circumstances. The AES-XTS algorithm is usually used for disk encryption. The AES-XTS cipher decryption implementation for 64 bit ARM platform will read past the end of the ciphertext buffer if the ciphertext size is 4 mod 5, e.g. 144 bytes or 1024 bytes. If the memory after the ciphertext buffer is unmapped, this will trigger a crash which results in a denial of service. If an attacker can control the size and location of the ciphertext buffer being decrypted by an application using AES-XTS on 64 bit ARM, the application is affected. This is fairly unlikely making this issue a Low severity one.
Templates do not properly consider backticks (`) as Javascript string delimiters, and do not escape them as expected. Backticks are used, since ES6, for JS template literals. If a template contains a Go template action within a Javascript template literal, the contents of the action can be used to terminate the literal, injecting arbitrary Javascript code into the Go template. As ES6 template literals are rather complex, and themselves can do string interpolation, the decision was made to simply disallow Go template actions from being used inside of them (e.g. "var a = {{.}}"), since there is no obviously safe way to allow this behavior. This takes the same approach as github.com/google/safehtml. With fix, Template.Parse returns an Error when it encounters templates like this, with an ErrorCode of value 12. This ErrorCode is currently unexported, but will be exported in the release of Go 1.21. Users who rely on the previous behavior can re-enable it using the GODEBUG flag jstmpllitinte...
Calling any of the Parse functions on Go source code which contains //line directives with very large line numbers can cause an infinite loop due to integer overflow.
Multipart form parsing can consume large amounts of CPU and memory when processing form inputs containing very large numbers of parts. This stems from several causes: 1. mime/multipart.Reader.ReadForm limits the total memory a parsed multipart form can consume. ReadForm can undercount the amount of memory consumed, leading it to accept larger inputs than intended. 2. Limiting total memory does not account for increased pressure on the garbage collector from large numbers of small allocations in forms with many parts. 3. ReadForm can allocate a large number of short-lived buffers, further increasing pressure on the garbage collector. The combination of these factors can permit an attacker to cause an program that parses multipart forms to consume large amounts of CPU and memory, potentially resulting in a denial of service. This affects programs that use mime/multipart.Reader.ReadForm, as well as form parsing in the net/http package with the Request methods FormFile, FormValue, ParseMul...
Red Hat Security Advisory 2023-1639-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-1639-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes. Issues addressed include a denial of service vulnerability.
OpenShift API for Data Protection (OADP) 1.1.3 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition. * CVE-2022-41725: A flaw was found in Go, where it is vulnerable to a denial of service caused by a...
OpenShift API for Data Protection (OADP) 1.1.3 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition. * CVE-2022-41725: A flaw was found in Go, where it is vulnerable to a denial of service caused by a...
runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked `/proc`. See PR #3785 for details. users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image.
The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.
Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.
A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.
Ubuntu Security Notice 5960-1 - Yebo Cao discovered that Python incorrectly handled certain URLs. An attacker could possibly use this issue to bypass blocklisting methods by supplying a URL that starts with blank characters.
Red Hat Security Advisory 2023-1154-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.54.
Red Hat OpenShift Container Platform release 4.10.54 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4238: A flaw was found in goutils where randomly generated alphanumeric strings contain significantly less entropy than expected. Both the `RandomAlphaNumeric` and `CryptoRandomAlphaNumeric` functions always return strings containing at least one digit from 0 to 9. This issu...
Red Hat Security Advisory 2023-1179-01 - Red Hat OpenShift Serverless Client kn 1.27.1 provides a CLI to interact with Red Hat OpenShift Serverless 1.27.1. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms. This release includes security and bug fixes, and enhancements.
Red Hat Security Advisory 2023-0930-01 - Update information for Logging Subsystem 5.5.8 in Red Hat OpenShift. Red Hat Product Security has rated this update as having a security impact of Moderate.
runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression.
Red Hat Security Advisory 2023-0899-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.10.53.
Red Hat OpenShift Container Platform release 4.10.53 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.10. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4238: A flaw was found in goutils where randomly generated alphanumeric strings contain significantly less entropy than expected. Both the `RandomAlphaNumeric` and `CryptoRandomAlphaNumeri...
Large handshake records may cause panics in crypto/tls. Both clients and servers may send large TLS handshake records which cause servers and clients, respectively, to panic when attempting to construct responses. This affects all TLS 1.3 clients, TLS 1.2 clients which explicitly enable session resumption (by setting Config.ClientSessionCache to a non-nil value), and TLS 1.3 servers which request client certificates (by setting Config.ClientAuth >= RequestClientCert).
A denial of service is possible from excessive resource consumption in net/http and mime/multipart. Multipart form parsing with mime/multipart.Reader.ReadForm can consume largely unlimited amounts of memory and disk files. This also affects form parsing in the net/http package with the Request methods FormFile, FormValue, ParseMultipartForm, and PostFormValue. ReadForm takes a maxMemory parameter, and is documented as storing "up to maxMemory bytes +10MB (reserved for non-file parts) in memory". File parts which cannot be stored in memory are stored on disk in temporary files. The unconfigurable 10MB reserved for non-file parts is excessively large and can potentially open a denial of service vector on its own. However, ReadForm did not properly account for all memory consumed by a parsed form, such as map entry overhead, part names, and MIME headers, permitting a maliciously crafted form to consume well over 10MB. In addition, ReadForm contained no limit on the number of disk files cr...
Large handshake records may cause panics in crypto/tls. Both clients and servers may send large TLS handshake records which cause servers and clients, respectively, to panic when attempting to construct responses. This affects all TLS 1.3 clients, TLS 1.2 clients which explicitly enable session resumption (by setting Config.ClientSessionCache to a non-nil value), and TLS 1.3 servers which request client certificates (by setting Config.ClientAuth >= RequestClientCert).
Red Hat OpenShift Container Platform release 4.12.3 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4238: A flaw was found in goutils where randomly generated alphanumeric strings contain significantly less entropy than expected. Both the `RandomAlphaNumeric` and `CryptoRandomAlphaNumeric...
An update is now available for the Logging subsystem for Red Hat OpenShift 5.4. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30123: A flaw was found in ruby gem-rack. This flaw allows a malicious actor to craft requests that can cause shell escape sequences to be written to the terminal via rack's `Lint` middleware and `CommonLogger` middleware. This issue can leverage these escape sequences to execute commands in the victim's terminal. * CVE-2022-41717: A flaw was f...
Ubuntu Security Notice 5848-1 - David Leadbeater discovered that less was not properly handling escape sequences when displaying raw control characters. A maliciously formed OSC 8 hyperlink could possibly be used by an attacker to cause a denial of service.
In GNU Less before 609, crafted data can result in "less -R" not filtering ANSI escape sequences sent to the terminal.
On Windows, restricted files can be accessed via os.DirFS and http.Dir. The os.DirFS function and http.Dir type provide access to a tree of files rooted at a given directory. These functions permit access to Windows device files under that root. For example, os.DirFS("C:/tmp").Open("COM1") opens the COM1 device. Both os.DirFS and http.Dir only provide read-only filesystem access. In addition, on Windows, an os.DirFS for the directory (the root of the current drive) can permit a maliciously crafted path to escape from the drive and access any path on the system. With fix applied, the behavior of os.DirFS("") has changed. Previously, an empty root was treated equivalently to "/", so os.DirFS("").Open("tmp") would open the path "/tmp". This now returns an error.