Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:3925: Red Hat Security Advisory: Red Hat OpenShift Enterprise security update

Red Hat OpenShift Container Platform release 4.12.23 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.
Red Hat Security Data
#vulnerability#web#mac#windows#linux#red_hat#kubernetes#vmware#aws#alibaba#oauth#auth#ibm#rpm#docker

Synopsis

Moderate: Red Hat OpenShift Enterprise security update

Type/Severity

Security Advisory: Moderate

Topic

Red Hat OpenShift Container Platform release 4.12.23 is now available with updates to packages and images that fix several bugs and add enhancements.

This release includes a security update for Red Hat OpenShift Container Platform 4.12.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Red Hat OpenShift Container Platform is Red Hat’s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.

This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.23. See the following advisory for the RPM packages for this release:

https://access.redhat.com/errata/RHSA-2023:3924

Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:

https://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html Security Fix(es):

  • openshift: OCP does not use FIPS-certified cryptography(CVE-2023-3089)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

All OpenShift Container Platform 4.12 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.12/updating/updating-cluster-cli.html

Solution

For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:

https://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html

You can download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests can be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.

The sha values for the release are:

(For x86_64 architecture)
The image digest is sha256:2309578b68c5666dad62aed696f1f9d778ae1a089ee461060ba7b9514b7ca417

(For s390x architecture)
The image digest is sha256:571f9da5ab8ad0291a5fa822bd7b2803d5bf53096b140407ac442acf9dde4a99

(For ppc64le architecture)
The image digest is sha256:9470deef9f3220fa1c05b555f5e10f448d2888e60f40a8e2073424dc6e672fd1

(For aarch64 architecture)
The image digest is sha256:d9998b576ab98dcfd9024927572f698c0f40bf7fe4f8eff287f41ab4fa5e9c93

All OpenShift Container Platform 4.12 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.12/updating/updating-cluster-cli.html

Affected Products

  • Red Hat OpenShift Container Platform 4.12 for RHEL 9 x86_64
  • Red Hat OpenShift Container Platform 4.12 for RHEL 8 x86_64
  • Red Hat OpenShift Container Platform for Power 4.12 for RHEL 9 ppc64le
  • Red Hat OpenShift Container Platform for Power 4.12 for RHEL 8 ppc64le
  • Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.12 for RHEL 9 s390x
  • Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.12 for RHEL 8 s390x
  • Red Hat OpenShift Container Platform for ARM 64 4.12 for RHEL 9 aarch64
  • Red Hat OpenShift Container Platform for ARM 64 4.12 for RHEL 8 aarch64

Fixes

  • BZ - 2212085 - CVE-2023-3089 openshift: OCP & FIPS mode
  • OCPBUGS-10386 - [RHOCP 4.12] MetalLB operator should be able to run other than default service account
  • OCPBUGS-11199 - Azure: UPI: Fix storage arm template to work with Galleries and MAO
  • OCPBUGS-11303 - Incorrect domain resolution by the coredns/Corefile in Vsphere IPI Clusters | openshift-vsphere-infra
  • OCPBUGS-13778 - kuryr-controller crashes on KuryrPort cleanup when subport is already gone: Request requires an ID but none was found
  • OCPBUGS-13891 - CNO doesn’t handle nodeSelector in HyperShift
  • OCPBUGS-13940 - [4.12] Bootimage bump tracker
  • OCPBUGS-14041 - Routes are not restored to new vNIC by hybrid-overlay on Windows nodes
  • OCPBUGS-14190 - When Creating Sample Devfile from the Samples Page, Topology Icon is not set
  • OCPBUGS-14652 - disable debug pporf with unauthenticated port
  • OCPBUGS-14664 - When installing SNO with bootstrap in place it takes CVO 6 minutes to acquire the leader lease
  • OCPBUGS-14803 - KCM is not aware of the AWS Region ap-southeast-3
  • OCPBUGS-14873 - Hypershift operator should honor ‘hostedcluster.spec.configuration.ingress.loadBalancer.platform.aws.type’
  • OCPBUGS-14958 - [release-4.12] Stalld continually restarting
  • OCPBUGS-15099 - visiting Configurations page returns error Cannot read properties of undefined (reading ‘apiGroup’)
  • OCPBUGS-15198 - CPMS: Surface cpms vs machine diff
  • OCPBUGS-15269 - External PKI reconcilation deploys broken due to invalid dependency on additional user ca bundles
  • OCPBUGS-15309 - Bump to kubernetes 1.25.11
  • OCPBUGS-15315 - IngressVIP getting attach to two nodes at once
  • OCPBUGS-15377 - [4.12] Cleanup Tech debt: remove unused repo code
  • OCPBUGS-15414 - (release-4.12) gather “gateway-mode-config” config map from “openshift-network-operator” namespace
  • OCPBUGS-15424 - [4.12z] Duplicate acls cause network policy failure for namespaces with long names (>61 chars)
  • OCPBUGS-15429 - [4.12 clone] openshift_ptp_clock_class is not updated in Prometheus metrics when the incomming ptp packets clock class is changed
  • OCPBUGS-15459 - [release-4.12] gather podDisruptionBudget only from openshift namespaces
  • OCPBUGS-15482 - [CI Watcher] Broken pipeline-plugin e2e tests: PipelineResource CRD isn’t installed anymore

CVEs

  • CVE-2022-41717
  • CVE-2022-41724
  • CVE-2022-41725
  • CVE-2022-46663
  • CVE-2023-0464
  • CVE-2023-0465
  • CVE-2023-0466
  • CVE-2023-1255
  • CVE-2023-2650
  • CVE-2023-2700
  • CVE-2023-3089
  • CVE-2023-24329
  • CVE-2023-24534
  • CVE-2023-24536
  • CVE-2023-24537
  • CVE-2023-24538
  • CVE-2023-24540
  • CVE-2023-27561
  • CVE-2023-32067

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • https://access.redhat.com/security/vulnerabilities/RHSB-2023-001

aarch64

openshift4/metallb-rhel8@sha256:e51399c870d68b27ecc53a35bcd5136062dc5285caa0114c553fb99cd3b90277

openshift-tech-preview/metallb-rhel8@sha256:e51399c870d68b27ecc53a35bcd5136062dc5285caa0114c553fb99cd3b90277

openshift4/cloud-event-proxy-rhel8@sha256:e4574135e363372544a647a76fead73f4d1e28588f52454f7ec65503142e6df2

openshift4/ose-cloud-event-proxy@sha256:e4574135e363372544a647a76fead73f4d1e28588f52454f7ec65503142e6df2

openshift4/cloud-network-config-controller-rhel8@sha256:2248d8cc348b43e791c8f40113a1fdf024e30389be11361b185908e60cbabd99

openshift4/dpu-network-rhel8-operator@sha256:c70cdf2bb542b49ee2b62d2471d55e9bd5721c97b6d8af2acab2483d44ac1f0f

openshift4/driver-toolkit-rhel8@sha256:40472ea3a6469d202add51fffb8868d0024ec85aaecf988b3dea190db540ded5

openshift4/egress-router-cni-rhel8@sha256:8f7d9f6a6bf2efc97bb254352a639c64a1494c56125fc4c9eb126bf2d65c64d5

openshift4/frr-rhel8@sha256:39c74b166e8b44bf05bcb1f55d2cb7440259e66945e9e9cf8528fd22e39ec2fb

openshift4/ingress-node-firewall@sha256:926dfd9dd3542c892c17c2affd62678054a76efa33beaa2d6eefff8c86277d88

openshift4/ingress-node-firewall-rhel8-operator@sha256:f2ada7e231e840f0973b241f022bbcd5ae3337ffb05acf97e1e6539b221587b3

openshift4/kubernetes-nmstate-rhel8-operator@sha256:b7791f3f9e6440b643d2aa6aa7fc238d9274c6b546c80eba64fb93592182504d

openshift4/kubevirt-csi-driver-rhel8@sha256:0918ed439387d939b975f0dc662b143172fe22a0dc93d4b001c79558201aa6c9

openshift4/metallb-rhel8-operator@sha256:a4c8da9a01e53f22773c1370e72e75aa7330c1e79cd71fce15354673ab00c6dc

openshift4/network-tools-rhel8@sha256:24b7ed635d1dcc94e722b6946e483a7425bbaaf280c98bc3c3da95a834bd2e2c

openshift4/openshift-route-controller-manager-rhel8@sha256:b7371e85e47319d718a3815c7961893e4dc22565f7676fc845684321caf0be5e

openshift4/ose-agent-installer-api-server-rhel8@sha256:0da3bdd0fb1ca49f3d2bd5d3a7b03eb53e9712616446d15aeac20a6937c9778c

openshift4/ose-agent-installer-csr-approver-rhel8@sha256:50d88c18eb8171975a65ab8dc13e32925649c846a1942479059a131f3a8dbae5

openshift4/ose-agent-installer-node-agent-rhel8@sha256:8a4aadc8acb5b1580502d836d3d0056ac515d5dc646b3bc9dfb199dcffc8d327

openshift4/ose-agent-installer-orchestrator-rhel8@sha256:a48b521cc97a32bd638ce0eceb81c1c33f2f6623c63871df21c61f9de8e42677

openshift4/ose-ansible-operator@sha256:e8192c9d0284887c143f62bce1807d23f1607bbbd5a9d12dd88b33310bca2bb9

openshift4/ose-apiserver-network-proxy-rhel8@sha256:e77629639c599adbcf65d192c09e3b095b5ee5f8bac4654cc5a73bc8fbddae86

openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:216d29ef0472f646059c4089b14f92ca618f687bf89b9ef2fe28f239c099db36

openshift4/ose-aws-cluster-api-controllers-rhel8@sha256:7b0166c4135f785fe14b9cf91524faaa7625aea692ade830351722db8aa6c1f5

openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6d5d7c9753955f5382fc935e6c836b162dc2f7c2d01c6338ee33e53bfc7af28d

openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:b8af6385b29dd95f97300008a853b0b3ce89817ffe9e3449030001b52414ed17

openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:85c5876c91b2e234159bfd5518585a115725c6fed28e4c20c910debf083507ec

openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:0205977aad6c562528cdaa00612f52b5bb1ba9e4866f840fe3918cd0af8634a0

openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:2e42f1c1105bacecd37114cb3c9797255f263e0997477b9e5d74b0b8812864ed

openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:53f5dd6ef64f88d62ea8b2760a237a0c640118a6eb92dc53d52b4ce9c5dc6d42

openshift4/ose-azure-cloud-node-manager-rhel8@sha256:d3ef126c0563c1759e26308d8ec0040b88e249978698abbd15822aeb1dbcfdf9

openshift4/ose-azure-cluster-api-controllers-rhel8@sha256:002d6042a79885e77956b6069c6c22fd979943f6dfcbec77d034ed2d3bc35e44

openshift4/ose-azure-disk-csi-driver-rhel8@sha256:a718b4c4d4aa127954c3b14e7ad191f8e288d8a30b152797a9d45adfc9692741

openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:b32c16b33897f050de009c635f94d68e9a92ffe22a67897f7e2198d984663ec8

openshift4/ose-azure-file-csi-driver-operator-rhel8@sha256:1878d5947c2e2b18ede4eeb1d2a169d0634a64d1f38b8aee394a8d7b8eb02856

openshift4/ose-azure-file-csi-driver-rhel8@sha256:bf2a660d5e0243d2b85022b5f4e6931df632b447f42bcc14df1bcfa715957060

openshift4/ose-baremetal-installer-rhel8@sha256:f0bd497a0b7fa2ff90fed602fde46e3adecadf2379e8a13c0ff1df2df0e9ebbf

openshift4/ose-baremetal-machine-controllers@sha256:a4c955719c94ec0f1d48ce0e16e5aa19845da3db6046fa546b7dcfcdbb030fba

openshift4/ose-baremetal-rhel8-operator@sha256:7b29571f538869b45b9adbf05d3867a86460f82ae083cf83b47b1b02f9eb6b96

openshift4/ose-baremetal-runtimecfg-rhel8@sha256:dcbf4e8c4a40fa96a915333c7f2cfd03383d41540ac7e97eb8d1633e60b0bcb9

openshift4/ose-cli@sha256:b414a28b4d3272f9ff2e399af83c62cd157a189ab1345d91d5f005aa1885d6b1

openshift4/ose-cli-artifacts@sha256:8bc46baf5eac22c74cb02ec25e76659c9b8747e6666cb21780382f4d86ec1eb3

openshift4/ose-cloud-credential-operator@sha256:2b239d4701f4375dc5e18ab86474aee1af754eef3bfbc8b07234a64085642bee

openshift4/ose-cluster-api-rhel8@sha256:e459e4aa8a4077447c2dc332a174170bdab39be432dde0c6571f8036897b79ab

openshift4/ose-cluster-authentication-operator@sha256:883018f5a3ed10a7133c6eae6b2a492a2c4014477b0b1d2436875c6339213575

openshift4/ose-cluster-autoscaler@sha256:03a5f63df0a2d4a0335472dacc300a404eab352028661e63870ac88c97e9c903

openshift4/ose-cluster-autoscaler-operator@sha256:0b9e027d2f90f3313d2ebbbaedbf45bdc9f846df184f5fa3c9222bce14116a75

openshift4/ose-cluster-baremetal-operator-rhel8@sha256:dd3cd71e0bef81a1491684810fdc61118e44aa345d065f6222e83838cb1df0d9

openshift4/ose-cluster-bootstrap@sha256:aeeb403c1928ce5a8d8a20ae275314e4264d2dc7a7333182989ceff716b591b3

openshift4/ose-cluster-capacity@sha256:64cd00733653ddccd80c1f91f6b2af87a9e80c0b7cd0fea50febd686cdf27012

openshift4/ose-cluster-capi-rhel8-operator@sha256:e03150c81c5256609ed1d4752c9f0d2430d2a59bad139310301ba37ac2a7e202

openshift4/ose-cluster-capi-operator-container-rhel8@sha256:e03150c81c5256609ed1d4752c9f0d2430d2a59bad139310301ba37ac2a7e202

openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:cf0f5d9e4283b1770f89010e22e3611022b6777fce2e62d30f14b358b725baf3

openshift4/ose-cluster-config-operator@sha256:f81edd24dcc3cc8ba31a4f6502975f95774048b2597ad84f3913d67e620b81fe

openshift4/ose-cluster-control-plane-machine-set-operator-rhel8@sha256:543fa1c6ab415c04b6cf5483f9f8c5144525b857632d2ba86d057eecefb91f92

openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:1c615bdd77f2ea854f6b93c871f77f726f977cb0686bcc122f20f642e90d85e5

openshift4/ose-cluster-dns-operator@sha256:92dbf9b364d95409b17ff1d43927c0d82534dd9c06c4c932b5a8250c1f8bff9d

openshift4/ose-cluster-etcd-rhel8-operator@sha256:5cb610eceec5485c5d8ce9856afc8993e3a0034ccaa481c3a8e90279d4d99155

openshift4/ose-cluster-image-registry-operator@sha256:ed044fa5aede14522da7dc7dd2a3cde0f1a2fc0526287aa01b66a4f4c7a90113

openshift4/ose-cluster-ingress-operator@sha256:0456cb68b27ed470d9f6755d14b300529f54b432e622de713399ca0fcf6661dc

openshift4/ose-cluster-kube-apiserver-operator@sha256:a9a284954e8514fadb4bf59e8ceab44b813b5515544eebbc7d45796161c540a5

openshift4/ose-cluster-kube-cluster-api-rhel8-operator@sha256:9da36979521b4fdda1075740eb8cec2301aef4d798a85c8ae62b4b3d5d7545ea

openshift4/ose-cluster-kube-controller-manager-operator@sha256:39fe2b7223e9fa6aeafca4a39d3de8f8e49d99f49169e6f2fd98f4e329d10ba0

openshift4/ose-cluster-kube-descheduler-operator@sha256:229ef432b2d10721de8d6179291ee86002d489f7a469854724ccc573b851d794

openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:229ef432b2d10721de8d6179291ee86002d489f7a469854724ccc573b851d794

openshift4/ose-cluster-kube-scheduler-operator@sha256:9346ead9588dfe5b0aadae49dfba084bcd2c62285b8a72072666bfa70fee5a77

openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:14ab959a44655529f9564f7a79b1103b05086154666128def8343d2858d6410a

openshift4/ose-cluster-machine-approver@sha256:381d80e8d52fb440932fc669c8124c8798e20f2300ea5541a1dce18d43806072

openshift4/ose-cluster-monitoring-operator@sha256:7fe0bb3a3ad5868dfc8780bb38f05d3ef6cc5133319a24a2ce1b99cde8fcf9ee

openshift4/ose-cluster-network-operator@sha256:493028ae3890ff620e0423ab9dca20b555dcdfc8ac2df860bb4eacf2264e28ee

openshift4/ose-cluster-nfd-operator@sha256:3f1819ae9c73d13832abe539a9fb020f9d13b98ab3f2390df1b99143a4e958f5

openshift4/ose-cluster-node-tuning-operator@sha256:b78c4db705d6bcd8132869e183e409d849641aa5a13e1ed4b5ec96d886822d98

openshift4/ose-cluster-openshift-apiserver-operator@sha256:399398320e7010339a6264b92bcd7fd9b0d803dc60a22d4735958aea8d983f4a

openshift4/ose-cluster-openshift-controller-manager-operator@sha256:0bf1852870c993fe31888a9f55f9c9885231cc9aadb235f7d2fd713f162b1169

openshift4/ose-cluster-platform-operators-manager-rhel8@sha256:e8c8ac1ec9e47e392f9e86b941efc4546acda470a2133b11a8c1afde02c6e9cd

openshift4/ose-cluster-policy-controller-rhel8@sha256:46059f04e9f06266665a0f84544dad2e6dcdbd3c3b46b8dc9d006b0ca74ca0dc

openshift4/ose-cluster-samples-operator@sha256:fd197e6f3c2df2e5408198c413588b5ac7fa373df1d17f348c1b145a915ff749

openshift4/ose-cluster-storage-operator@sha256:34f8efe8df20578b121085f3ba80545eca519c1b7710869b9d8d7fab084e7961

openshift4/ose-cluster-update-keys@sha256:a754fc4e282cd527bf27e98f815927c2d98491f24cf148a14873ddf8bee3d4ea

openshift4/ose-cluster-version-operator@sha256:1cdf11c2edd36ad438ffb8762a9a135e001670951cd183d9e8154ef8d4972329

openshift4/ose-clusterresourceoverride-rhel8@sha256:e04668ab56b8055051fc82965724cecebb233f461fe1dbdcb3d7729c27fb5c71

openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:f61e162acb94c3f85cc3593411a901df4503c8f086404d6a782bcfacf4981d38

openshift4/ose-configmap-reloader@sha256:8ae2419ea483bc13431b58d44fe2b710b07d08c19b0b3252bb9c2956c0b7e870

openshift4/ose-console@sha256:9aecc7cc404756cb8cbb148d09259e7b1ca1f4de5ca0339a07d32fa3db0f7bcc

openshift4/ose-console-operator@sha256:1a3258dba527316e79d4825617290fee5475c55ab25d56fb546896b5d5930231

openshift4/ose-container-networking-plugins-rhel8@sha256:e61d5577cadd84677bfc11fe2183fa421964dc7b9dbf11c86561e2adf020fc04

openshift4/ose-contour-rhel8@sha256:4182bc1f8565e58d4d9c6213c7340c5864d5af3282f5826c6525a57a8c74a3c3

openshift4/ose-coredns@sha256:215bdd692a45ec218bf0d044fb220a58b2691224780a0fcb12a16c68c325ff64

openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:0ea9ccfb9c4925c262f54afa2289931b6a74a2cc6541ede8c88e7f832cbc9548

openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:f0a4c6131f49513174ef2367582bc1cb0624fe1a981766e2b2120e1f7d07797b

openshift4/ose-csi-driver-shared-resource-rhel8@sha256:a12621030c87102c05db663d2a0e1f454d31ac434600612784f7e874cec36d32

openshift4/ose-csi-driver-shared-resource-webhook-rhel8@sha256:0dcde13c2259d09cc925072cda704048d5acfbff459ea4a3c3e9ececec29f56f

openshift4/ose-csi-external-attacher-rhel8@sha256:c1c8f64ee8382ed7652e5873f8e06141c823c344d840d9902774f58bc8882c4c

openshift4/ose-csi-external-attacher@sha256:c1c8f64ee8382ed7652e5873f8e06141c823c344d840d9902774f58bc8882c4c

openshift4/ose-csi-external-provisioner-rhel8@sha256:dbbdc5f5ad273aeba769e9be532e84275de51d2c56e4a9bc13b71a9d1295663e

openshift4/ose-csi-external-provisioner@sha256:dbbdc5f5ad273aeba769e9be532e84275de51d2c56e4a9bc13b71a9d1295663e

openshift4/ose-csi-external-resizer@sha256:1bd1a683ac957afdd40120bc06983bf75eddbc1c9ac4d16bde1456c800ed368a

openshift4/ose-csi-external-resizer-rhel8@sha256:1bd1a683ac957afdd40120bc06983bf75eddbc1c9ac4d16bde1456c800ed368a

openshift4/ose-csi-external-snapshotter-rhel8@sha256:913d7bc56efc64ec70e52aa33b1bdc4e32aec4a7746fddc40027d84cdb529112

openshift4/ose-csi-external-snapshotter@sha256:913d7bc56efc64ec70e52aa33b1bdc4e32aec4a7746fddc40027d84cdb529112

openshift4/ose-csi-livenessprobe-rhel8@sha256:bf8d21ff9a3cc53efced7a196b1c8be2637746e00a91f4ff2917ab4499b346a2

openshift4/ose-csi-livenessprobe@sha256:bf8d21ff9a3cc53efced7a196b1c8be2637746e00a91f4ff2917ab4499b346a2

openshift4/ose-csi-node-driver-registrar@sha256:d077340d80622cfecf98935f3536a96fbd22ad94a6640dcb5f16408b88062b64

openshift4/ose-csi-node-driver-registrar-rhel8@sha256:d077340d80622cfecf98935f3536a96fbd22ad94a6640dcb5f16408b88062b64

openshift4/ose-csi-snapshot-controller-rhel8@sha256:001a7dff404d09f7a5546e8923e0f6f302f35acf08cac54c7d630af81f3ae3e0

openshift4/ose-csi-snapshot-controller@sha256:001a7dff404d09f7a5546e8923e0f6f302f35acf08cac54c7d630af81f3ae3e0

openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:fe6acc6554e90528ccd4341b2d00a041430624c024d63c84df04a936b08cf33d

openshift4/ose-deployer@sha256:2a3e298babdc105e6cc6e528c31ef468f19614f7c732d97747e66bac98b2efac

openshift4/ose-descheduler@sha256:24ba0cafc4a97ed2346f3ed8fa0299800c7956e4dff595ce281040134fc1b68d

openshift4/ose-docker-builder@sha256:6a358f91da5bccfa1dc6f5c75714c05ca3656c11719071f54db128bd2f1cd51d

openshift4/ose-docker-registry@sha256:8cc076c5a533cf80b0610bf2ab1e2c3cf69f192886a479e34f6907e526d96c50

openshift4/ose-egress-dns-proxy@sha256:5e7c0f4c197eadfc1747868e2130d7b08f3e8ddd38336ad8b57247e5ebdf143d

openshift4/ose-egress-http-proxy@sha256:17c64303e42bff0e9b8561fb1412f3eff8941c735642a1ed6f8f0df61b5c8436

openshift4/ose-egress-router@sha256:c20662fa0503610733fbeccdafa5212fa036488f08ddfc753b74afe569f152d0

openshift4/ose-etcd@sha256:1d34a2302795f81990f73f13858fed89edac544f77ea6a46d6c0fe0ee3c58411

openshift4/ose-haproxy-router@sha256:653b7592d7a2f90f7574c7d19d208ce1f7f7b6c9425e28a04e85a6f49eeaa69a

openshift4/ose-helm-operator@sha256:b4483fb2a31342615e09944064ff965309424dd9f4f14e448c37d2e3188a8ecb

openshift4/ose-hyperkube@sha256:a69a7266a3de2358d4cfbfdeb24d5485ca7a95b6a08aedd78bb25f2e15cbe417

openshift4/ose-hypershift-rhel8@sha256:18e7d5e01de6ef2b8f179466f51c13e35ec0093088e6089b0486df201ff0efb2

openshift4/ose-image-customization-controller-rhel8@sha256:51b334fffa419aaf1ae2381183d931ff77cff1343bbcc41d1b834e53b39d186c

openshift4/ose-insights-rhel8-operator@sha256:1f5909ca34d36bc4caee4b84259ad18446a6b30c1af9670c09fa441e6eec2e54

openshift4/ose-installer@sha256:39195e00a8a9a625211fc43f40cb560df427f8af1c64d0676d355498f6b763de

openshift4/ose-installer-artifacts@sha256:9babb8545336b41ecbdde36d0505465bebea3e14f2e0f4749c656f73f436daa2

openshift4/ose-ironic-agent-rhel9@sha256:a5f435852ed959463339be4919b20f512d1f56f631333cf1a3900752e0e37b53

openshift4/ose-ironic-machine-os-downloader-rhel9@sha256:56154f2c283eb5d69c0e2008d5b4c773782a90af415707de5a3dcf678e5cc345

openshift4/ose-ironic-rhel9@sha256:b859a937e3b298bf666caa9e01b26f02c628ba5f40f61f2f0555978ac1635102

openshift4/ose-ironic-static-ip-manager-rhel9@sha256:a5e13a0969d98360d295c105bb6554aa9f8cceb5efd940d569f580c9c4602b7d

openshift4/ose-k8s-prometheus-adapter@sha256:2d4bd18c7f8e51c4f2417cff3f2f485d7e3aa91d0f944ef26b5885481c52b3df

openshift4/ose-keepalived-ipfailover@sha256:eec92aef272b360214bed59e6608b75ca7ed55e925344c77036f48719a089f11

openshift4/ose-kube-proxy@sha256:f4e29f9c6038d3122af91586ee8c7ff43c2fe45b2fa9f008bb707849d5b80426

openshift4/ose-kube-rbac-proxy@sha256:04708f95b3b4417e8564d40eef4d63c3e287dc1d8b38ffbd6b942e65017417b7

openshift4/ose-kube-state-metrics@sha256:821d1a013f1c681e0147abe0d6ff80f10e163d88e56a5cd4c43b67180bdbf5dd

openshift4/ose-kube-storage-version-migrator-rhel8@sha256:bc77d6aa5a9ccea68143d9aa969c9b5423a9197350124ce9aa9609f9b23454f1

openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:2efb8b81b5485a9bf9374f643c9848f8c0b0cf66f75cff5bfe1741e9b05a3d6f

openshift4/ose-kubevirt-cloud-controller-manager-rhel8@sha256:e9c4f9e4b1fee831cf59dcc4dad2e7d264af564c501e6be1583dfb3885ee8a6f

openshift4/ose-libvirt-machine-controllers@sha256:09eb2b04e78e9a281cd2acb34955689a3a1a49680d97aaea28f6b342dbe91b0a

openshift4/ose-local-storage-diskmaker@sha256:9e42c5177b066343d3f2eff44677f5c0b0dc9b2c3314b35d860b490bf2cd1338

openshift4/ose-local-storage-mustgather-rhel8@sha256:e546070501684aeb722fd94feba5abb178d121dc6dd85f87f93609621baf0560

openshift4/ose-local-storage-operator@sha256:c820f665343085defdb29ef22d4c8741b3d884d6d51cd2fd3d424a36a05c51a7

openshift4/ose-machine-api-operator@sha256:606ed18587e269da26ce7a0b34f1ed015cea18350ca8ae31e8e186210bebcb90

openshift4/ose-machine-api-provider-aws-rhel8@sha256:817bcf60842ec09acb99ebded68e7f5e32c7d26369212a9442a4f551334d2669

openshift4/ose-machine-api-provider-azure-rhel8@sha256:98c3768792a6fd3e8501c9d862c70106b2bef8777190f453f539dab3abe3bf2d

openshift4/ose-machine-api-provider-openstack-rhel8@sha256:c9e6cefef0b0011507c9f15a2dce9fe6181c8be7e7f462d9e71ce02c26b1face

openshift4/ose-machine-config-operator@sha256:cc98f386194fbe430df656d2fac8b1d3488c5fc722823ca21649d2e3b0262872

openshift4/ose-machine-os-images-rhel8@sha256:1ce0ac31dc90ce321ec5014c2a44605ca8ad5c53fe29a01ac6516293277918eb

openshift4/ose-multus-admission-controller@sha256:10a6116d7f32d28207fa4baca706475eeb00ef59c727c61640cea67d5383ab4a

openshift4/ose-multus-cni@sha256:192e5f64cb37f5bffe3792055f17b34ca43736354401f5159cc70eb6746acdfb

openshift4/ose-multus-networkpolicy-rhel8@sha256:802cfa45923a4e45f0799d2347fd58130860c694121fc0030492641609746b53

openshift4/ose-multus-route-override-cni-rhel8@sha256:cb6731c04e1eabe86167e00a81a5ef1e6a5d105cb92e499a583cb6d0d6518921

openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:b9b14e2475ab9f30a392a7584dff70fad17269a6a79b68ab0d9968f40c36d2de

openshift4/ose-must-gather@sha256:18ea00f1643b79bf3763b396104d136f100662f5296c7f281b01263f63e0b0cb

openshift4/ose-network-interface-bond-cni-rhel8@sha256:428d9914e813fed26d626e2abe42d8089658c6fb738faa72865fa2021bd54d13

openshift4/ose-network-metrics-daemon-rhel8@sha256:754abe1c75a02df1b9aec814e811c1fe65d3c3d8f8b737db8b9fa409af948750

openshift4/ose-node-feature-discovery@sha256:0b9827045a4c32c91404c332cf2b422f53a3177f1694d26a553a3afbc9c32669

openshift4/ose-node-problem-detector-rhel8@sha256:4cff77c5de84066db1089bb624b9a3a39326893a7f189a348bd7000a3654db59

openshift4/ose-oauth-apiserver-rhel8@sha256:a17a129426170d9cc8bb7c2ce564ba81ebb7aea2c8e74e26ae4394457e086ac4

openshift4/ose-oauth-proxy@sha256:c005f26863e381c298bdf985f3c51e80d07286f668414bd62780226fda9dab33

openshift4/ose-oauth-server-rhel8@sha256:08296ac93b205c6bf822f006b24495123798d2d25d5cdf722f39346ed526f89f

openshift4/ose-olm-rukpak-rhel8@sha256:bafa989131bd5e49fd27520380bbf2d296361ebaa9d9be9aaa5b870730ba5d73

openshift4/ose-openshift-apiserver-rhel8@sha256:6c0b2a1f2dd6123c0531983c1d242805bbad27f1f90630a2c8291c734f1b32e4

openshift4/ose-openshift-controller-manager-rhel8@sha256:7fbef446a8f9e06142e124d981e65187764219db822b8761f33b4e12fee9964d

openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:a345401fc2ebf36c0ee1cade1e4199eef0291dd365d6a27cb049094f0cfea406

openshift4/ose-openshift-state-metrics-rhel8@sha256:dcead5b495e84420a7904c4dfaacf73d355fcb00f79f15626b7bf1f3cab5754c

openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:905d24e7635f69f718dfc2244ee7fbe5711392d145521e1d1df8d9a0884df125

openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:3c30a4532cc1cb91a7add4294490292107a580a1601f8040e6cbf48b5826b3ee

openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:786ad65a0528ceb9b8080462a6e4b46e4e7c2051c5f5fa3706a86853aa49d74f

openshift4/ose-openstack-machine-controllers@sha256:8a96fa862d49c7fb005c3e03c317fd23baaa9abb11a1e4c8584ad6f4dd0dc64f

openshift4/ose-operator-lifecycle-manager@sha256:b8928e0dd34f3be182191a4efb7996af638731113bca2babe351904cb9499b42

openshift4/ose-operator-marketplace@sha256:f720bfc3181988c4b04e4cf283175746fdd199bf2bb9be2fc1e84a4f8fd492ad

openshift4/ose-operator-registry@sha256:25e00b0a63a2b01b06ed9cc7f22580d3617750c462f1e772cc85de4e6f28bf88

openshift4/ose-operator-sdk-rhel8@sha256:3f2875bd48fc0115248ba525b5a60ea413715c9b76efd6d9f0f278ae2c0f5320

openshift4/ose-ovirt-machine-controllers-rhel8@sha256:d557e41d1c3d8c9024f502361ab34866da9e18881ab645111e2c86c40d46e55c

openshift4/ose-ovn-kubernetes@sha256:636be5212d1750145fce1e1c140ae726140fea3ed7ed817e4f5877c5eb389f40

openshift4/ose-ovn-kubernetes-microshift-rhel8@sha256:3883619d09ddb5868727a4fb4131e580a62b20103de694775abd63fd537f3cf0

openshift4/ose-pod@sha256:e997d565ede5a590353e82c0e3bc229be0c215f85260ec7e96cb68cdc6edc989

openshift4/ose-prom-label-proxy@sha256:5830ca84f4c1316b15b62bb9d499a16d91022b608b2e0611f92fdd1e9afe1cb3

openshift4/ose-prometheus@sha256:6549f221048a8d9bd5e16a206ca2ffe0771d272654d229d8b39ed60baa2eac8a

openshift4/ose-prometheus-alertmanager@sha256:79951cd46210ff71d6108a643fb39d55f45ad62acfd7cfd62af235a2f166151a

openshift4/ose-prometheus-config-reloader@sha256:a90d5b52db55e2b57a9e7a63a68d44ab6139939c43245d094560e324d2768db5

openshift4/ose-prometheus-node-exporter@sha256:085e492ee5c307bb9953317d922d67fb2956938f1090458ac208fbb580368723

openshift4/ose-prometheus-operator@sha256:535f7e031d3aec8f32895b3e72e24df305f170753381afbef426266d1b82515b

openshift4/ose-prometheus-operator-admission-webhook-rhel8@sha256:89c981f51e844511b60d9d9249db5b7b317ce5ad1cdf0e9599d29d07eecab94f

openshift4/ose-ptp@sha256:e6b52834c4067123c7a0c96bcef8af555556b8c08afe55ca451742c0be5bbb01

openshift4/ose-ptp-operator@sha256:ea00c4df1ad17da4ac8152f6fb75de359783da3b46571d67c3e419377919497d

openshift4/ose-sdn-rhel8@sha256:f95d8813b5fc100d0670886e12951da82dc576f4322a77953a2425a019397072

openshift4/ose-service-ca-operator@sha256:db078b01e116e73ae91a7fdf746986e48dc595f4e8d145d3e438b2a5136587d7

openshift4/ose-sriov-cni@sha256:086246e0b56304316ae1f00c8d0216c4c62394a74275d8eb79173ccbe46a1489

openshift4/ose-sriov-dp-admission-controller@sha256:a452d8d1a3eb343d6aeafa66756e8938069b2f6e11ef53ad7ffc725bbe7ca380

openshift4/ose-sriov-infiniband-cni@sha256:ef241cb9a15009682764d3900f969df6d0f3f19c35a78f8ffb788371cdfcbf14

openshift4/ose-sriov-network-config-daemon@sha256:a7dc6aad5a8e693f04129211f6ffd7b13e7f758a0e442df09605be89d85d8f9f

openshift4/ose-sriov-network-device-plugin@sha256:fa146895c8299046e4edb186061a78370ed4d46d76d1a07f8de4afeae63817a8

openshift4/ose-sriov-network-operator@sha256:85258d53c837b0c31a6c794c86f8721d2da798710d8257c8aca671d3109f7e52

openshift4/ose-sriov-network-webhook@sha256:a55dbaa4d925ea1fa2ebaf6496733b02eb7e00b3df222a9daad5881bf00ad418

openshift4/ose-telemeter@sha256:aa34310202eeacb82938cfc2849e3aa590615bf04bbb408a2a1f7f82a621a15b

openshift4/ose-tests@sha256:bc6fb3bb51298371023fc30a017d57c55638bba38bfc3c4213e19ac6be5f4d2c

openshift4/ose-thanos-rhel8@sha256:bf30c13e4ec3551cb9171403d5d1469740765698ea1ecd3615f454362c1a845b

openshift4/ose-tools-rhel8@sha256:fe9e21d9273c5cec93c00cdc085aa2961981e65b0f1bd06872328e976386aa77

openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:c3eb0f1c62a059ee824d79daba01fe78d842094eaa55e8c10664743628d7a770

openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:614e061eee317250b061d56b5d176425e1033a248e85c71c66e038683a03f99a

openshift4/ovirt-csi-driver-rhel8@sha256:a28524b59350d31af408415e9f3248c7139553a93c9691b25bf3ec7ef90ef7d1

openshift4/ovirt-csi-driver-rhel7@sha256:a28524b59350d31af408415e9f3248c7139553a93c9691b25bf3ec7ef90ef7d1

openshift4/ovirt-csi-driver-rhel8-operator@sha256:4d7268f202982d267d764538ca5c8894bd9305eade78b68f157ab41166736bd5

openshift4/ptp-must-gather-rhel8@sha256:1b5e16585423ac1ea1e8f461b9e9bb6e734da3a57cdb0391858ae98b29ce81a0

ppc64le

openshift4/metallb-rhel8@sha256:320c76c52150a7c9a521f3fbee87e1a16293a63274a7246acb69831f54d93534

openshift-tech-preview/metallb-rhel8@sha256:320c76c52150a7c9a521f3fbee87e1a16293a63274a7246acb69831f54d93534

openshift4/cloud-event-proxy-rhel8@sha256:a9c047d6ae8fc29685ad8b6c3e8ca6af795f6cfff9bb1a7bbc5f0269604ce4dc

openshift4/ose-cloud-event-proxy@sha256:a9c047d6ae8fc29685ad8b6c3e8ca6af795f6cfff9bb1a7bbc5f0269604ce4dc

openshift4/cloud-network-config-controller-rhel8@sha256:6f99acbcff79405aa04bb51bd0c47650c204490979abdba735979b74d046f477

openshift4/driver-toolkit-rhel8@sha256:e1f5034ff062537afa7805fc0bf8d40981dce89595ff3c923c380c3ca77678c6

openshift4/egress-router-cni-rhel8@sha256:876e7387c7a971eb1d5ed658fd99660c1a0d7f78b8df1379cb490012ed9f8d03

openshift4/frr-rhel8@sha256:fefb21aed145cf4032ac9cba13b7ff489ae76d65656f24a9b69797719c5a3b1b

openshift4/ingress-node-firewall@sha256:644c5aa33f445580a7d785bedba2422736b31b923a1f070f2d53e1f5f2caf3f5

openshift4/ingress-node-firewall-rhel8-operator@sha256:829cccb57dbd0980aa285e45c27c9854f39dfdf5d7b8dc5601f2d4714c952470

openshift4/kubernetes-nmstate-rhel8-operator@sha256:05f471b502e19796eb809f2772a6ccf828c3504f56f9a67cc73d15e35b0d48d5

openshift4/kubevirt-csi-driver-rhel8@sha256:c3857684680f364111b6f497f94fa12e3eba36fd46821bff9a52dbaf66899b02

openshift4/metallb-rhel8-operator@sha256:5847a927e1cc616bb0d01a06273747e687f985127d45bb1c7bf743a3e2d9a06a

openshift4/network-tools-rhel8@sha256:fd2912dc4db356a5794e516cfdd41745cc85f446672eb4fc6cc4ee3a4b388fd6

openshift4/openshift-route-controller-manager-rhel8@sha256:df90dbb940700547d8f607039da6b02722a4032f81500084e875178eaa1b9964

openshift4/ose-agent-installer-api-server-rhel8@sha256:d4568cdcfbcb19114bc14b4286bb1116cbb93d35b0c487eecdf7512d8b1a8971

openshift4/ose-agent-installer-csr-approver-rhel8@sha256:66f15252b1043bc81fe85135c9d48fd55912a0f45d51bf84467f7e35795dcb23

openshift4/ose-agent-installer-node-agent-rhel8@sha256:fe3a8db8c7a1cbb316f129bf6a24c24142e36369d2d4d6e1fee126a0611247af

openshift4/ose-agent-installer-orchestrator-rhel8@sha256:2f4af803949b8de7a5a06244abc7d3f72a2a1e7a4ff6b8a4b1dbff2a5391dead

openshift4/ose-ansible-operator@sha256:55fa3d611e763504fe50e98074f880f7f95af7dc39b128579898814ffeb7f348

openshift4/ose-apiserver-network-proxy-rhel8@sha256:b9f52c8a4c8a790266da17995d5cb2bfaafb8ab2a37b1a49afc81c3a4cec154b

openshift4/ose-baremetal-installer-rhel8@sha256:46ded818fe4fc43607eda059c17a3b1dd3d6390ce1752932c2ea7e52e0335d92

openshift4/ose-baremetal-machine-controllers@sha256:0a85ed703b5bfcc4b34c4a51613474b2403da7e22060f7775816cba1a4b1d9dc

openshift4/ose-baremetal-rhel8-operator@sha256:769cbf6a863a03734ffff4d874a0eac8b5764e123e9c50a63b715d2cf60be2c5

openshift4/ose-baremetal-runtimecfg-rhel8@sha256:bf72cf4530cd03b89a4299417dd7ea70be82985d88cdd95d75f7e36e29a0cb39

openshift4/ose-cli@sha256:af2b35827e77b1df0ed924e85ad40574c4968ccb49ef651f8460459a723f6ecb

openshift4/ose-cli-artifacts@sha256:225c856563c0503081e42309aabae15c5ddda123178b5a23b6eec00463428594

openshift4/ose-cloud-credential-operator@sha256:2a305f41d2e070f052b34740d8cae389e8860bf86cdd873040aa13ea97686de0

openshift4/ose-cluster-api-rhel8@sha256:d7059d73db87495840b5e41a056539b6979ffa929fc1e5a3f0c2e1f9f72b00c9

openshift4/ose-cluster-authentication-operator@sha256:ddf0dd8b7052208ac7ac933635cf847f96e42b99161e5ec42107767d343380c8

openshift4/ose-cluster-autoscaler@sha256:70fb92d532ae7b0d3982820f3ff82efff82de601b9996087849bf49fe35b3d9e

openshift4/ose-cluster-autoscaler-operator@sha256:9a381799324864cf0402352907c8898a808ffe900a760657675b392083ffae3b

openshift4/ose-cluster-baremetal-operator-rhel8@sha256:8467664d9b11d9489029a01d016a0f25d0d8d9e6bd33defbf03663fb031f7779

openshift4/ose-cluster-bootstrap@sha256:0d90eff924a41ce4faa9a7f9d838cf7bc8f4a26950e09d627ec4dad0e647efc0

openshift4/ose-cluster-capacity@sha256:3ceff4ec34de1a8bac671cfac58add3cf59e0304426003a95d7a45d3af6acfff

openshift4/ose-cluster-capi-rhel8-operator@sha256:7bdcd51a77a186ff83bb558e807d100681a4481bc20a2cb13ebc356d62e5004d

openshift4/ose-cluster-capi-operator-container-rhel8@sha256:7bdcd51a77a186ff83bb558e807d100681a4481bc20a2cb13ebc356d62e5004d

openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:f0a22125673c266373b78926c3bfbb9d37b42e43e2722e328122bece51519643

openshift4/ose-cluster-config-operator@sha256:e1e9b868f9fe619756d3248575847e9002ce98e5b51383b1d2fe1ad6ac5dcff9

openshift4/ose-cluster-control-plane-machine-set-operator-rhel8@sha256:dc637be03be1f01342b9b2386c14fb303332ca4e514a2cb9a74e0f145c3f11d6

openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:5195180029a5470de9e4f103e55c70add20cad0e5602668f440b344c05a808a9

openshift4/ose-cluster-dns-operator@sha256:23407c1f4303e637ef894b056d754bcca4c1c1974543a8593899a45e9eb0aee5

openshift4/ose-cluster-etcd-rhel8-operator@sha256:2b7565a3d2cb503dee3aaf573707474401bee68a8c51986815c8ff6f5541905d

openshift4/ose-cluster-image-registry-operator@sha256:c24b0dcaf287e06eb56895283dc076eb8d1731f125ffb9aae72c1ef92cfd370a

openshift4/ose-cluster-ingress-operator@sha256:689807f2aa71bd104898944a136ac358dc083c88b050b78c29e78fa0ab08332d

openshift4/ose-cluster-kube-apiserver-operator@sha256:893754a99d34b4a5005da1aad1058de5602204fd31032398adb941252baf88f2

openshift4/ose-cluster-kube-cluster-api-rhel8-operator@sha256:8df1538913c6d111670ecfce5199f7b795b143175a71b653dc07b3bc705ccf47

openshift4/ose-cluster-kube-controller-manager-operator@sha256:903d75c93ef739d74b7be5ca29f2aa6c44a39cb73185cdddedcc77ce91e8e443

openshift4/ose-cluster-kube-descheduler-operator@sha256:f10fa5dae56ace7ed194a1c621ccfdf0e70f9891e86bdbff7e81457152c3ed79

openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f10fa5dae56ace7ed194a1c621ccfdf0e70f9891e86bdbff7e81457152c3ed79

openshift4/ose-cluster-kube-scheduler-operator@sha256:d34c03f6d97ed8e79413daa6847a875f14e2dbaee793261035c66ba1684bfc28

openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:2161727f112c81034cdd9eebfd145bcd5db94a0fcf28f5e86a7ee21d0193dace

openshift4/ose-cluster-machine-approver@sha256:fef952a892f000802003ca131ccdd8152edefb30a2e99029222ad6d63d1587b5

openshift4/ose-cluster-monitoring-operator@sha256:fc9319dbf04858a35d81dda730ca8beebdaa8e77508db7944aa25c7319a644a4

openshift4/ose-cluster-network-operator@sha256:f362f3b8cb8369d99eb89ab535428db8f6dfc34117407ca1cfd331de68e06d18

openshift4/ose-cluster-nfd-operator@sha256:76d53fe64a19c4e5ee8ba194cfcb4c6c937c973c74a9e5654c0561b2bcef696b

openshift4/ose-cluster-node-tuning-operator@sha256:ebfacc388053ee3e3d1a42f2decce10f605a4147cf1dd5a87e08e251a632e7ea

openshift4/ose-cluster-openshift-apiserver-operator@sha256:22f9c12e883f63a07799f342934f1ce4bdccd428ec85deb4e88a4dfcca090306

openshift4/ose-cluster-openshift-controller-manager-operator@sha256:76f0fc007171c21c6e9be885ac9e7bb3d6b772078c185eca0e2360620923f887

openshift4/ose-cluster-platform-operators-manager-rhel8@sha256:134ec523840b31681203a8e7e0486f8d9ab5490b62b370be9ecafe3694f6d6aa

openshift4/ose-cluster-policy-controller-rhel8@sha256:c68268a4fd3af66c60d1e7c596bcd1528941e894fd0603a8c979f73ea2051e20

openshift4/ose-cluster-samples-operator@sha256:a3df6a48d35cff2515cdc681b00a8ceb4134f55a51eae21139afae1daa70d5ec

openshift4/ose-cluster-storage-operator@sha256:2488ad02827e04b323565c718a80420051a5095db773b306afab25aa370bfe43

openshift4/ose-cluster-update-keys@sha256:031829a5085ca39df25fe5d1dee1217c5de6026e688dd1d53ea44396698c9ebc

openshift4/ose-cluster-version-operator@sha256:db9852a321d3a5ec64f48ce811931d4adcd1cf2db0ecf9658e4d9253e9e8c694

openshift4/ose-clusterresourceoverride-rhel8@sha256:7d603e79d7216d13d7aef59eff0e79c1d9f7019272fa88af83587796f2f136a8

openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:e210c44e85af352af5aa2989629a69a5a38591c19d16858c01ae59be83b80d35

openshift4/ose-configmap-reloader@sha256:84f6de266788072ddfcaa2e58d9ba2fcb285c049c3c2b54c30798136e6ca29d1

openshift4/ose-console@sha256:817bab758dc04b8cc4e136e4e3ba85314b62aea122adf1b957d920231721d486

openshift4/ose-console-operator@sha256:5b59abdf0108a20660f8b525f5fcff17d72a167fa277f3567b29d98e2551f8fe

openshift4/ose-container-networking-plugins-rhel8@sha256:e371b2f582531daa12d96e44cf5703a90b186aabc84dd14feab9fcb8e9cc3da9

openshift4/ose-contour-rhel8@sha256:b28af7dcf71e8cb2e780839ea4c76fc49aadd548ec601257280e8eadd351feac

openshift4/ose-coredns@sha256:6cde8f2223e5e1c0ba754721b92b1637e035764ba3c98185fc06af4c277ad59d

openshift4/ose-csi-driver-manila-rhel8@sha256:20850e51be834963e51ab29211235d2189af89aadbddf7dd19781dfd79c4e58b

openshift4/ose-csi-driver-manila-rhel8-operator@sha256:d7716fdfe682b88be1240a764f2945a2943c93a0c742fcb9e19bde5a13b9e23b

openshift4/ose-csi-driver-nfs-rhel8@sha256:36328cd381f82cac0395b3fbbe62159cf518ec37743e77dad57e193b999f62be

openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:dd5e6834d873195f5b48913adbf3c69ccc229a4ea7a29e9774eb194cec1311a0

openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:cdd181736c545103980a7d4e6331aaeb8f4a5dc725ea5c346a72cd308370f6cd

openshift4/ose-csi-driver-shared-resource-rhel8@sha256:476562b46fe58725d777869d59783a650826fc789399e8ad49a33ffbd69136b7

openshift4/ose-csi-driver-shared-resource-webhook-rhel8@sha256:172c064baace33983569e272ca4698051235bd2ae27ab6919225ca8be9ee1964

openshift4/ose-csi-external-attacher-rhel8@sha256:b30b12ef0b91b96c81dd39e6ca1364d0f8d82e78c61febdfdfaf342833e5327c

openshift4/ose-csi-external-attacher@sha256:b30b12ef0b91b96c81dd39e6ca1364d0f8d82e78c61febdfdfaf342833e5327c

openshift4/ose-csi-external-provisioner-rhel8@sha256:f693f6c2ad128dd9afc2382c9c3b2a017f01f66b3808eb7728ad2ef924ee54b4

openshift4/ose-csi-external-provisioner@sha256:f693f6c2ad128dd9afc2382c9c3b2a017f01f66b3808eb7728ad2ef924ee54b4

openshift4/ose-csi-external-resizer@sha256:92aab9731d33f2a35a19a89eb83e8b9ae75a6a78e4ab7cc40e051a0b03aab6e4

openshift4/ose-csi-external-resizer-rhel8@sha256:92aab9731d33f2a35a19a89eb83e8b9ae75a6a78e4ab7cc40e051a0b03aab6e4

openshift4/ose-csi-external-snapshotter-rhel8@sha256:3cb87ff84d1987c7f2fc231e19d53371734af63cee55ae9818e0572f916bb2a3

openshift4/ose-csi-external-snapshotter@sha256:3cb87ff84d1987c7f2fc231e19d53371734af63cee55ae9818e0572f916bb2a3

openshift4/ose-csi-livenessprobe-rhel8@sha256:d243e5c5b6433d5233df65f73ec9441f6c9edcaf93fdd327f984dd2e0be5572e

openshift4/ose-csi-livenessprobe@sha256:d243e5c5b6433d5233df65f73ec9441f6c9edcaf93fdd327f984dd2e0be5572e

openshift4/ose-csi-node-driver-registrar@sha256:463003870be2d331ad8b35f99d6db022ab8ec0f5b29fd9c5e3a11b15ea3047d0

openshift4/ose-csi-node-driver-registrar-rhel8@sha256:463003870be2d331ad8b35f99d6db022ab8ec0f5b29fd9c5e3a11b15ea3047d0

openshift4/ose-csi-snapshot-controller-rhel8@sha256:e24abecaf810a6f50f2f7164a122825b8cae52392cd568132ca3feb74c7f6748

openshift4/ose-csi-snapshot-controller@sha256:e24abecaf810a6f50f2f7164a122825b8cae52392cd568132ca3feb74c7f6748

openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:eea27b8c4ead94f6c30c497be51be6050361777d080c8d8d30d7d92c24c21d0f

openshift4/ose-deployer@sha256:cecf2d8309bbb68103eafe0d9434d02f7ca547fa0ea62bb78ee5b7cd8a7efbed

openshift4/ose-descheduler@sha256:eab4f330d963b6ba848b36235d5121641e172fee50b8001736655bfda6e241e4

openshift4/ose-docker-builder@sha256:23a61c212d09393c39859a66dcd418958dca50ec049d621a637668db8cceecd2

openshift4/ose-docker-registry@sha256:84089ad143fee4c4dd2f18d34a3cb5e3781ff4e716ff546d20e21aaf8cb1d7eb

openshift4/ose-egress-dns-proxy@sha256:ba199c76acb30822cb438e1f511fc917ef8c076e0741da6c028bc4a572ec2e7f

openshift4/ose-egress-http-proxy@sha256:4df85eb208823f947fbdb7d11b0bdf07f29cd8447c24ccc63d633d7034370120

openshift4/ose-egress-router@sha256:14b7471fc8de52145b65247844cecc7ca56c2568291482add38c7575abf0651f

openshift4/ose-etcd@sha256:8b16a5ad3b8d8683d188113a6a1bc9116f5582c09772eb803087651f39a4cbb5

openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:e42e1af715c1648a7d7e91479be50f69c5ad5a56d3b0c2099831b40342b15b8e

openshift4/ose-gcp-cluster-api-controllers-rhel8@sha256:fa064c0f69267851027fcfa494eb92b4551c9fec490bc66c72e5f10a9de5ba34

openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:c19de710261e6302f613247131b6e2489885e3ea651c96021f843dde97adb8e5

openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:ae7ac5fccd559c03f582705189c6f822665f29a03e95b427e7e6c95153f4218f

openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:db790ef70d94c9a138fc7bb2b688bba1daa27f7dad59876366c0da590561f60e

openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:69b78cd2ec2dd53d8cb0362a95d47c7eec918868a31da42a41ebc5832e48568c

openshift4/ose-haproxy-router@sha256:f96bf2c9c02709e508835a8a5044e084d8088f593697b02e981e96f711c98ba7

openshift4/ose-helm-operator@sha256:c81fabe96fd32a464fc2f9ab3737f1b77f0081028d898b1ef7e8708b47e1979f

openshift4/ose-hyperkube@sha256:2975b26532ebba1eec047721e670d11de0401f9eed2762b0a036e1506821f49c

openshift4/ose-hypershift-rhel8@sha256:e89dc4fb996445595d9ecf250b279e98e153b229ad7090acb59c9302b253482e

openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:da47b11cd21492efcd526b73a22d9ef234b49e73ee29e1c7b59cebeb0a5e4957

openshift4/ose-insights-rhel8-operator@sha256:9ff92ee6308449796f3413fb76500de5a241a5e9e90b8356222bcb381db03086

openshift4/ose-installer@sha256:2c2305557e839dab2a3f6e163e43fa4cbf3f9a03167e87ca8b12ed2b316a58b6

openshift4/ose-installer-artifacts@sha256:7a76424569098187f0caa04eab1a39669c82a31e3a1fb55a2cb85cdac34af99b

openshift4/ose-k8s-prometheus-adapter@sha256:b57a7416f6616e7bda4cc3b49101f8c9fd5b24b3052d638837085d74496f622a

openshift4/ose-keepalived-ipfailover@sha256:96d68dd0a50af4eaaaccde11ba52e0806c98829b3f7c90c79cb34dfa0fa6cbc6

openshift4/ose-kube-proxy@sha256:d38856be79356f69bea85fa665cfa2f07c704c626208ca38d874147e0f87648d

openshift4/ose-kube-rbac-proxy@sha256:08c9e406f11c53e839f6c0ae13e05d8f0b35964d28af128af1ca4f8e4a50b8ed

openshift4/ose-kube-state-metrics@sha256:d5cb7ca94cc2976fca4121a25edce271122801691908f8acf2feff41bd5f2979

openshift4/ose-kube-storage-version-migrator-rhel8@sha256:160c1de5f474a8bd9712dede171a1896f56f9aab87168697ccff58bbf9f8b75e

openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:5a775c3ad24e3151c0a4a8bc21b3a979946b91031a8a509f9ce95a30b7c8b21a

openshift4/ose-kubevirt-cloud-controller-manager-rhel8@sha256:bcff188826fc30fa47cb97e1fd8263f16adcfd42a93f4e9b212b497819b58692

openshift4/ose-kuryr-cni-rhel8@sha256:bc224b7671830e5694704d380fca400e4c08f6a08c761dad062a8bf09a5a0864

openshift4/ose-kuryr-controller-rhel8@sha256:b3e4c0ce7e9858c977f90d6c5c35e3ef7b9ff8a804c5e9073bdf4c5fe04b6296

openshift4/ose-libvirt-machine-controllers@sha256:5c2d5271eb6b1636aaa0b4e202c225ae0e15cded52d7330239f463efb11bfb99

openshift4/ose-local-storage-diskmaker@sha256:f193b3c4535ff586eb56f166646f85184095eaf7ac68898cf6964755415995b6

openshift4/ose-local-storage-mustgather-rhel8@sha256:df976b41485c0c7c9f74289c7dbc6dba13bdfd921a4d68dee28fe2f5172e6fe3

openshift4/ose-local-storage-operator@sha256:b653170d4acf5257bf5c82fd1ada111cf782d1ac41a053541293e96ea05998c1

openshift4/ose-machine-api-operator@sha256:67f700d4f57c7fb69e2a732d7bc6f137b0ff99d40b3bb5be66710fc39fe13bca

openshift4/ose-machine-api-provider-gcp-rhel8@sha256:e5602382e2c14bbdbbbde1e5d4c48462c4105eddcc797fc9ef74cf9751ba436c

openshift4/ose-machine-api-provider-openstack-rhel8@sha256:03067353403b081eb357af4feff20cb63fba3c69166e0b678cc4119623679f9e

openshift4/ose-machine-config-operator@sha256:6d068d75dd80e1582bad77330fa0a78dfe99479cc4a8c971d6dab6ee1b290a4b

openshift4/ose-machine-os-images-rhel8@sha256:3edd9c0edbb6aa9f58cfe519f22e44c02a874268b402e5bdde83c96823210694

openshift4/ose-multus-admission-controller@sha256:fd5e60a5404a53d6524162cb3d49d55d9f55d8d2f0220bce4950945225aa3087

openshift4/ose-multus-cni@sha256:84e706109aca510c4e792fe3bf0d79997aa6e474d91b72e7c60f00ad945bc6fa

openshift4/ose-multus-networkpolicy-rhel8@sha256:7674c102b2e07f930db11308cafe388a1c6c72f9a0cb53185be5bdc448808f8f

openshift4/ose-multus-route-override-cni-rhel8@sha256:18d3b05c5ee2b2d32e5ce9b73978889d54126cec00cc30b49b4145e7c16b4a8c

openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:6aa903c96233efdad89fa08ee166d5438d3b7aee9c3ac0df43ea874011a852ff

openshift4/ose-must-gather@sha256:73be25adf403d1315b0676f227904603c83ffb57fe2c5e6f77c8d26b6a313d8c

openshift4/ose-network-interface-bond-cni-rhel8@sha256:ff75fbb69a8f50cbbf66b179f907fdc136bf5d0d3b2e7f14de927e693b2b7643

openshift4/ose-network-metrics-daemon-rhel8@sha256:50e7759efb4b71ef9e46e382b7604a169f10e3e11b317187400812e077f0a52b

openshift4/ose-node-feature-discovery@sha256:fb2a2dcea80b9a423f03f17a5d19e64025616ef880dcec609588bd844ae82970

openshift4/ose-node-problem-detector-rhel8@sha256:cadbc7dd3e3ea0dc9a461410ace74b5a98946dafe34e44cabf7819b886c2e60c

openshift4/ose-oauth-apiserver-rhel8@sha256:6f046a4f9b0ef2f96dcaf0538914dcd71d8d413cf53e04228102aff371ed7769

openshift4/ose-oauth-proxy@sha256:049cd72a058a5cf80ddb9cedbae17346bd1afb4a350c7cc8368cbb44d3dc22e8

openshift4/ose-oauth-server-rhel8@sha256:ea63f00926964788f0ff76ee2dd473b561f4ba0f543e888ae493b5b1fa2e80a1

openshift4/ose-olm-rukpak-rhel8@sha256:1778d993b3f54e546a11af504dc78962b811e3a2827116938144e5b64ad99a00

openshift4/ose-openshift-apiserver-rhel8@sha256:aa3d7b755e8c59e1ad3b6e4d2039707b987a02fb1cc5e8a85db486a620840b74

openshift4/ose-openshift-controller-manager-rhel8@sha256:3f6e8a645d9b29daa6a3c576f34526a6bbf1f6856a02a16bb4f0481e0db5a0ca

openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:cebbca73ca98d7ec0e37723e8086b942dfcbcb7dbbad1f04e4c50a366cfb9e50

openshift4/ose-openshift-state-metrics-rhel8@sha256:67164212b728d3632b11181c2df9053bc8d897932fc6cce090139a498807a4b6

openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:465d9ff4a45db34ba7558de596900047cec57c193355db59fd51d724e4b662bc

openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:84785d50767479f6cdced0a299e4814f69aeb9b7ae1336b129415b75fd7ae43d

openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:dcaea794fb44daaa71d7e80156ecde4cbbda362292ae269c9ece6692d3f848c3

openshift4/ose-openstack-machine-controllers@sha256:56eee276735dfea6df912fa35ec871ba65662390e9aa60831a3fe8e1571ab06a

openshift4/ose-operator-lifecycle-manager@sha256:8f34c32103f6fb73f28c61ecca66ecd8c77ace5b4b317f19dbb426bc6b72d101

openshift4/ose-operator-marketplace@sha256:e49074b01b6a04f051afbdcdfac5f39279ce581ed53e0ddf364ea2af6894e71b

openshift4/ose-operator-registry@sha256:c3e70b8d9c5b39ad43b2ce16e8d0c2eb5ba25fdd86acc6ee0cea0b9ca636c5b6

openshift4/ose-operator-sdk-rhel8@sha256:ca5c8c1f77654f276bc44db77e1e01f9bd67caad69e80c1b2b78639656aedfb0

openshift4/ose-ovirt-machine-controllers-rhel8@sha256:a8770f2f7b09fe0abfacee5d49a609fd6799916c3cdaaf46a809838851aeb4af

openshift4/ose-ovn-kubernetes@sha256:23b34105511e9e1d6880943ec596e27aee099762fee4a9785e79ee4ef4dc9e27

openshift4/ose-ovn-kubernetes-microshift-rhel8@sha256:c3a62244af180040aca8b714a56d1f70c97c006ed6fb231f08ed5a304fd600d3

openshift4/ose-pod@sha256:ba28b005c893586ea6a4ed42ee9cfdbb973d839ef4b803c31bc50c62b435b164

openshift4/ose-powervs-block-csi-driver-operator-rhel8@sha256:0a86d53795f1455d9c6efc358ed568c659edf38b56d346cb3c57dfb67bb3dea5

openshift4/ose-powervs-block-csi-driver-rhel8@sha256:a893198ea25476e4452af09c02b11fcb83c8c2e1bc221b68bf6b6b89581b0ebe

openshift4/ose-powervs-cloud-controller-manager-rhel8@sha256:960bb1c70419ebc2a30b9e6b10fa8d0ea9526eeb747a87600ec23242bcbef8f7

openshift4/ose-powervs-machine-controllers-rhel8@sha256:d7ba320b9b45cabaf364a281e28a3c71eec80b23af5763efba5b2aee8a73504f

openshift4/ose-prom-label-proxy@sha256:3f649237592e17935ca7c262873857f72415fb7587406f9b93cde452da12d11c

openshift4/ose-prometheus@sha256:cecc3b4f01c1cc9e3c078e365931ea53bc9cc6422b661fd341faabf373fdcabc

openshift4/ose-prometheus-alertmanager@sha256:057f7b084f879cd65739e2ac3f45c1d3692e672849a23467b4300b45e81235be

openshift4/ose-prometheus-config-reloader@sha256:e69218eb29ce484b1ec51ddc17dda693c31b856b7bf0242f5ebb8b43e5c7868a

openshift4/ose-prometheus-node-exporter@sha256:1a9c6ea5b63156889a93dba0fa75d1edce71fc6fcc819a3b77f1210763dc089c

openshift4/ose-prometheus-operator@sha256:6f4ef7412ceb1589f58bfb0ddaf6d6601984aebeedc40692657047dcbdfa66fc

openshift4/ose-prometheus-operator-admission-webhook-rhel8@sha256:b0dbf2debe8e91e9f6d91dab1a23760b4f6f5cc7f455654627268539a81af790

openshift4/ose-ptp@sha256:011f1df5b16c1aa75cf9385ca07862562007d6c15586b169ab93c742d87e5b36

openshift4/ose-ptp-operator@sha256:3069c83de8abc34fc5f6e9d75eaa016a7f7a314891417e91a8b74efebfb1e321

openshift4/ose-sdn-rhel8@sha256:602935c01f4bd4bc208d88d9661b2c23bb19e0906934624b57c3e24b8e91a6a2

openshift4/ose-service-ca-operator@sha256:a1c489215b6e4f303c2b35adc2e9e4d4dcfdebad7357add48e48f4fc8701d419

openshift4/ose-sriov-cni@sha256:ffaf94f4068fad1075fc2598b0da38b3e982fbde425e115c2d25c932fe50df0a

openshift4/ose-sriov-dp-admission-controller@sha256:01165a7c4251400a1fca576ff5300080c329c2b574fa6e0cec0749493b6ba287

openshift4/ose-sriov-infiniband-cni@sha256:96522d47d1c4e706e5fdbdfbb134a014ee48c29915ddd590ccd0872181ad114b

openshift4/ose-sriov-network-config-daemon@sha256:28bd128f53bc7516958a4863efc72a1432e2844e2426bdd57da55877586b295d

openshift4/ose-sriov-network-device-plugin@sha256:184f2f8e4d28d2357c5884d4a89a0e2b4912b4b504c4573e7a3a2a19dbcaba21

openshift4/ose-sriov-network-operator@sha256:33c0eb388d216d7bd32cf6aaaecd96e647ea42161cd0b9e968d83b8408896b4a

openshift4/ose-sriov-network-webhook@sha256:49bb442651d7e989a60fce809223d5c1a005dc9659a9aad20e8a0d22d6742186

openshift4/ose-telemeter@sha256:d7847cc55e764de801a8c11cb7f3d131b32ba4dc6dfa76c5c1c95eb8c35eb555

openshift4/ose-tests@sha256:5479fef03b02d63c48c5eaa1598a807926fdf8ac3e6738b92eebf5055442291c

openshift4/ose-thanos-rhel8@sha256:96e4f178e7aeaef32893f334311cbd0d464a0e809c2bfc96af2a96336e01368f

openshift4/ose-tools-rhel8@sha256:22e841c62ca48d2cb0cce4133c9205d28aeaf96885d347575def13da85fdbe09

openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b478b4a0f47cd995956464c0bedabcb052cf6174c20ba70298081bb2d64f5227

openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:ba2786f6aaf0ad782a7beb0cb47c01d05fd0162e22336baaa194a23a368b11d3

openshift4/ovirt-csi-driver-rhel8@sha256:b86efbb178f4ecb99e3ac5989edf6dbfa4a322c69ca3bf32aeedeca93ad589b8

openshift4/ovirt-csi-driver-rhel7@sha256:b86efbb178f4ecb99e3ac5989edf6dbfa4a322c69ca3bf32aeedeca93ad589b8

openshift4/ovirt-csi-driver-rhel8-operator@sha256:0e49831cb7b72c75ecff973738baf653b82b32958e406c8bc727d28f69487afd

openshift4/ptp-must-gather-rhel8@sha256:b08332c7088fa62b03ea2ea9bd6eb1a4bf4130c921a29158b39b447e169cd548

s390x

openshift4/metallb-rhel8@sha256:ba9f88e9b305c6bbf1fadf76d4d3e7814921a06764b75b24236f725c1bf33a28

openshift-tech-preview/metallb-rhel8@sha256:ba9f88e9b305c6bbf1fadf76d4d3e7814921a06764b75b24236f725c1bf33a28

openshift4/cloud-network-config-controller-rhel8@sha256:1449fbf348fee87b194c309b79b1d6f0d78311e2df518fc2f94bf5e303e57987

openshift4/driver-toolkit-rhel8@sha256:b9c98919d9926a47d89631788718b4d21985a03535a19ea915d4c62daab770ef

openshift4/egress-router-cni-rhel8@sha256:4ac6e3b98c6812c24f7dbd29c6b629f877377a71e11aa5c2bc8416f9d6d6363f

openshift4/frr-rhel8@sha256:1fc4c48774802c837c6ae160b1e489d0413a6c58d28e11402d5e83811eb4ed89

openshift4/ingress-node-firewall@sha256:472f81121506d15010955a686d8793550bb3ee779f0935e48de08d2d37ab2130

openshift4/ingress-node-firewall-rhel8-operator@sha256:ac991ececd24ac2c4e50551fe509e345d9991da4dfaa2143bdfb3850e9d5b065

openshift4/kubernetes-nmstate-rhel8-operator@sha256:93407871e54150ca42e2416c094598e975b13bcb63e817ef3a03fcb6dcc3dd82

openshift4/kubevirt-csi-driver-rhel8@sha256:41dd4d8e65e93f055a589338099add2e64afde34414be1a96455a9cd62a193ca

openshift4/metallb-rhel8-operator@sha256:db00f7d70afd77bd8af3662f8c9475267554968b6337297a159c4bdda0155649

openshift4/network-tools-rhel8@sha256:c8b6edbd7d259424bef5af84da05791269c0be418357d0110c4febdc91085c35

openshift4/openshift-route-controller-manager-rhel8@sha256:1770d6aafd53fc96cadd84b73bbd3f2763b3d1c33b84aa918dc049989da312af

openshift4/ose-agent-installer-api-server-rhel8@sha256:19414fe9d81a824385c689de7f07ee6aa9683a81c5bffd29e2bb44d0ae0de6ba

openshift4/ose-agent-installer-csr-approver-rhel8@sha256:fef3ebd35d9eb166eeb334213c4908df43ee0491e3ad84c3cc7567c9189eabf6

openshift4/ose-agent-installer-node-agent-rhel8@sha256:f68b7fcd30768743a9d98f3bebae8865c4ed3e24d32c7dd9751766ac9bd840be

openshift4/ose-agent-installer-orchestrator-rhel8@sha256:e0c5cd7bba73c9f4357ae41cdc555b0f7444d93300c8f5dd148562053a28af45

openshift4/ose-ansible-operator@sha256:a1e65e526542a0ca56f14c6abb2b246a9a594aec6af7753427f2a54c0b58eeb5

openshift4/ose-apiserver-network-proxy-rhel8@sha256:7aa52d15f6d8a2f3aabcbc064b7c53f6f87f912c1b6c825e98b1f3cad3c83915

openshift4/ose-baremetal-installer-rhel8@sha256:cacf5124d7bdc53f1d964e13fd7df83b8f6b5c9c31e1bd2d1e3903cabe5b8398

openshift4/ose-baremetal-machine-controllers@sha256:d8eba638f6ce8d879f2fd711d98a8fa3ff4054784789de16ff777fe04b076de1

openshift4/ose-baremetal-rhel8-operator@sha256:fc727614992b34a22cc20c8693d1bc57eb0f24b0f6313aecbe07d5f58efdd631

openshift4/ose-baremetal-runtimecfg-rhel8@sha256:a413e6f5b3ebe67f1e735f7c5da703a35947fe7b12f4a56f450d0d07e962c791

openshift4/ose-cli@sha256:c5884671471b0c904c904adef38c3ce95bb0deb88605115f42d0dabf53a0a2d4

openshift4/ose-cli-artifacts@sha256:5116107fcf820ae630dfd5af9e444f0ec4e70282fd17f758f009804280959ef5

openshift4/ose-cloud-credential-operator@sha256:68c4874d05a3acaf0fbec62a411b6e83ce029441be02621b2482c561f98dbc54

openshift4/ose-cluster-api-rhel8@sha256:9395741a824d54a8fd86cb863424d4c801a414e5e645f2af9ede425303f00881

openshift4/ose-cluster-authentication-operator@sha256:94ac540b0329ee801b5f7b54dd1ecb9869ce5113be1b7742cf04d2c8aa37dc9d

openshift4/ose-cluster-autoscaler@sha256:8f9654211eb30e61cafc185fcdfa78089b5f88a1abbc2c59acae4bea1328e898

openshift4/ose-cluster-autoscaler-operator@sha256:18f4d888b9800a4b387942ab1aa1e3fc09dd8469015a2e2d1240af2bbe7cf8ce

openshift4/ose-cluster-baremetal-operator-rhel8@sha256:775fa793fcb4da744d6b961ac32ffcc8b69cb574d1dc0f62999522c195e4c50d

openshift4/ose-cluster-bootstrap@sha256:b7ac7ddd560e129c1b79d4da526722d37439759292d732be9ef2635d49c7a24c

openshift4/ose-cluster-capacity@sha256:792e89444569dbaf6c78505769e3d81a431bc98c202263f3b0a173039fa7f84d

openshift4/ose-cluster-capi-rhel8-operator@sha256:050e43016fe663e9a4ba238dc549fa4283d0f94a626e6f77a8f0e0f060e331e0

openshift4/ose-cluster-capi-operator-container-rhel8@sha256:050e43016fe663e9a4ba238dc549fa4283d0f94a626e6f77a8f0e0f060e331e0

openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:4cb5372fb3efd809d217d8271616205918f7ee3377a44e4c051063c18daeb89b

openshift4/ose-cluster-config-operator@sha256:ede39ac4c7c5aacc409fac65a6d2b59242d7e6a8b429454bd79b67e86060246f

openshift4/ose-cluster-control-plane-machine-set-operator-rhel8@sha256:248ac9f7b8489db2ebbe31f63d367b6a645a04e0b4cd5b7a1fa1ea8d6bd3a5a5

openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:3dd8ca615bcdbf2a1c460256eb3d940785ba47bf1720172c2017c2bfe18f3333

openshift4/ose-cluster-dns-operator@sha256:2c960cb695c9e4527748593abf6918ab947aed6f72dc4f7c6d6cca7b72357682

openshift4/ose-cluster-etcd-rhel8-operator@sha256:6e20bdf93c853d9be3d0cd15ebf9faeb25f0672ae486847fb04fee6528e76c3b

openshift4/ose-cluster-image-registry-operator@sha256:58adfa67499c6341101f1bc54549d05483d2c858b1bf992cef86afab4878846d

openshift4/ose-cluster-ingress-operator@sha256:9976cdc20a43bd264bd61771ca2b31d1ad37b1ec85f398af46f90054a166c5b8

openshift4/ose-cluster-kube-apiserver-operator@sha256:6fd30b96f02404d975086aa0aa34a7f56449a66a8c7b36042bf6283aa2f2c8dd

openshift4/ose-cluster-kube-cluster-api-rhel8-operator@sha256:bcfd7f096faac1a2007bb660b4f0ced14af860c70cc296bf960ae63bf424a599

openshift4/ose-cluster-kube-controller-manager-operator@sha256:a511dd0b59f5d63d33ce5a3ef1071c8ec9f2dc066505a8a1ad04da2353959cda

openshift4/ose-cluster-kube-descheduler-operator@sha256:9c119ffcf0e2748a53b7bf25e8ab0fc951f42b62747fe78cf378bc415b121a94

openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:9c119ffcf0e2748a53b7bf25e8ab0fc951f42b62747fe78cf378bc415b121a94

openshift4/ose-cluster-kube-scheduler-operator@sha256:db37f0aaa244b70bd9e98569d01a5f67257b0fc4d2c714869ddc05e4021b6cda

openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:a086de67a903fc7ebaeb99171742c20414e2cf92b4f42792b532a82ddb57f262

openshift4/ose-cluster-machine-approver@sha256:96b1a33a53ad497cece0ed599572a03baa3f733b50ff1b8c2ff246f5ef53fd4d

openshift4/ose-cluster-monitoring-operator@sha256:1da4f46a113397bd1ce56e06482ab8a28ed18651d62cc6a64b74d3dba7721098

openshift4/ose-cluster-network-operator@sha256:3ccd6b7d9bfbe5e9f58471bbd4d5a5ae2d05e01aee3fcb993e052047243c359f

openshift4/ose-cluster-nfd-operator@sha256:8cc33e07ad40fb17f36f752797fbe51549cd0fa5ca1cc02a277dbdf36667b465

openshift4/ose-cluster-node-tuning-operator@sha256:5894b141bf9d64d5f0a4ce20060685645c87b7f81445758572f60e081612f554

openshift4/ose-cluster-openshift-apiserver-operator@sha256:b2bd51e804e8d0da79c29f1a5eeaf487a8c8c9ddcc5da85296d62cd53260f2cb

openshift4/ose-cluster-openshift-controller-manager-operator@sha256:76838191ad62c6ce303d28c86fce54fb51046b1d76d1459d99b72f2430b1a1cb

openshift4/ose-cluster-platform-operators-manager-rhel8@sha256:39126fad72b9bcc925f411016c32a971c95f815f5a1bbbcbe4208c23533ceab5

openshift4/ose-cluster-policy-controller-rhel8@sha256:334988b11afcf8289c554e4d069650ba159bae05fb4e304390bce15bb4302b56

openshift4/ose-cluster-samples-operator@sha256:d7d7caed8add332143cbe0b5db326e6a3117ed8d6dbb2f128845fdc4e5065f65

openshift4/ose-cluster-storage-operator@sha256:4a2f46badb980138eba3c64a1a174e56753fb46084fb9519a94b3c5246812943

openshift4/ose-cluster-update-keys@sha256:83206f1ba21f8c27ac7220b96581ceea78819da0e72d4e2db198db12889f971d

openshift4/ose-cluster-version-operator@sha256:9d6be45541f5eb6ea11110321142f03dd1b6bd2e652cf309858e82a662aba708

openshift4/ose-clusterresourceoverride-rhel8@sha256:944aac96d9d259489b11826d776e0b64c06ffff695f20ff34cc71f13da9914b6

openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:4916a67040d90e75d0f06019db62009a71e257c6e11324ec8bf2c84545374ea3

openshift4/ose-configmap-reloader@sha256:d3cef0a6ea9c30fbde777fbef5c7a21244aa0fbfa34cf95cebc9eb8f43e90cc6

openshift4/ose-console@sha256:1306b7b200bdd26cf054765e3ccc0cf127c4a6d0ddb59a4dc1321bddd3494429

openshift4/ose-console-operator@sha256:4bb0237945ae7eb536729c44b4d93dd7e9438a7fcfee9aa71dfb44bd2f82d2b0

openshift4/ose-container-networking-plugins-rhel8@sha256:eb7531fb6bb4a72533223343e03409de8450a604402de4d0c8c00ce495265e12

openshift4/ose-contour-rhel8@sha256:b3a620ac721d7f41520fc4d64030d0b66e9d3a57d3f43b7ae780d48831965b37

openshift4/ose-coredns@sha256:c473c40944c806006173e985dad88f74389a81fde51fa9d523b74831a6b4ac40

openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:6dc3c4c77cdbb20d8a2695d038f3070308e3cda1e0c26d2d6ac8a7728db58910

openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:bcfda5d0d29f648a708e3f07c658c7331f905773228724270071703b00413790

openshift4/ose-csi-driver-shared-resource-rhel8@sha256:e19c413d5625e24c10a1ac705404317c710e8d82368762015179516dc0c5053d

openshift4/ose-csi-driver-shared-resource-webhook-rhel8@sha256:eb12303280223fa3d110a26097c69ecdb7bc75f444a4f50e31fb4eefbb006781

openshift4/ose-csi-external-attacher-rhel8@sha256:87807079c628ab168f38f6cb486b43ed67ba5555eae4aa154ed904a8693d350b

openshift4/ose-csi-external-attacher@sha256:87807079c628ab168f38f6cb486b43ed67ba5555eae4aa154ed904a8693d350b

openshift4/ose-csi-external-provisioner-rhel8@sha256:a7c3ad6eccc547eb0d2986ebe213cce96fc454473d821808370a322daf378e3c

openshift4/ose-csi-external-provisioner@sha256:a7c3ad6eccc547eb0d2986ebe213cce96fc454473d821808370a322daf378e3c

openshift4/ose-csi-external-resizer@sha256:e04b422b21b521d1c340a711464da9b48fef6b85db7ec9296a22a4bd15269305

openshift4/ose-csi-external-resizer-rhel8@sha256:e04b422b21b521d1c340a711464da9b48fef6b85db7ec9296a22a4bd15269305

openshift4/ose-csi-external-snapshotter-rhel8@sha256:bdfdae45cb89f8334a623f82ed26e6767d6e296e27549d4d074046c48c7965fc

openshift4/ose-csi-external-snapshotter@sha256:bdfdae45cb89f8334a623f82ed26e6767d6e296e27549d4d074046c48c7965fc

openshift4/ose-csi-livenessprobe-rhel8@sha256:989629d5631506d7f7bfcde2d1d2bce1e01a5e0f431b32c151af38bf3716b07f

openshift4/ose-csi-livenessprobe@sha256:989629d5631506d7f7bfcde2d1d2bce1e01a5e0f431b32c151af38bf3716b07f

openshift4/ose-csi-node-driver-registrar@sha256:505628900b93c60f343a67f8889a50b36d52a986aa69e5cc91ce01ccd9790ea6

openshift4/ose-csi-node-driver-registrar-rhel8@sha256:505628900b93c60f343a67f8889a50b36d52a986aa69e5cc91ce01ccd9790ea6

openshift4/ose-csi-snapshot-controller-rhel8@sha256:3bbc910fcaf29318bc4f4672da4b2798ae9abb37fb8244fef64dee9a16f9c2c5

openshift4/ose-csi-snapshot-controller@sha256:3bbc910fcaf29318bc4f4672da4b2798ae9abb37fb8244fef64dee9a16f9c2c5

openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:135cfc51d7017c2264f18883f32e4475f466a0b044325ad0a16eb84f9948526e

openshift4/ose-deployer@sha256:dc40a62f4f9f7123401855da49a779175edd22007b982c017aeeb7c381d815c1

openshift4/ose-descheduler@sha256:682419a1912445d97da8b3105fbd13529702cb86ca5165976aaa9dfa331dde7b

openshift4/ose-docker-builder@sha256:2d186409c4ef56c1da79da154e2f01dfe13cae5e99319da92d700ad91b4b8f7c

openshift4/ose-docker-registry@sha256:acb30d58e154391eb33344eddbfb550d4d6726c177059141b846ae74dde331cc

openshift4/ose-egress-dns-proxy@sha256:743307394c28384a5401aa0b6a6ed0cd0e8683dd96e8a82a011ee2b5da43d258

openshift4/ose-egress-http-proxy@sha256:63a19479d17956bfdc1503238290b6cdda862f2dd9e8ff097fe916fbb8677183

openshift4/ose-egress-router@sha256:93d7e4731b5e13b99a5777d2aca33b3148bcb423444379c18a3ceaf6c8afee09

openshift4/ose-etcd@sha256:6b25dea1d70fd8e641f55d5b384442c323c9e1f78dff35494f07617842e96dbb

openshift4/ose-haproxy-router@sha256:fd4b116c554ae80071a92aca4eac986a0150821ecf80d08b284f2853d0a3945c

openshift4/ose-helm-operator@sha256:54fbe3d8c81f0252fe8001e7d6eaa5c344a878b24125c81474edcafcb85a558d

openshift4/ose-hyperkube@sha256:4b79e850027e244344a05f96896d93a4112e956a07efc5c298d813ff6a11185a

openshift4/ose-hypershift-rhel8@sha256:fe2c69163b9179f502b8459badd5d6b1c89b3637846c464b879f3e105b89b47f

openshift4/ose-insights-rhel8-operator@sha256:f2fba2381902961d6d7e0ef013ad7ccecf4df1dd8ad82fd9d55056bd99aab0ed

openshift4/ose-installer@sha256:baf19453c8f8c0134d0bbaae2629d5aa05fa82215138e8a305acb387c3450395

openshift4/ose-installer-artifacts@sha256:f8da60e286baf69e61b8ec354c246170a09336817bba8532d18266fb37715188

openshift4/ose-k8s-prometheus-adapter@sha256:c0da089fb84f4d16e7776b1a9249c9c64c7a4bfa6048ac614d4e5bb3bb02fa56

openshift4/ose-keepalived-ipfailover@sha256:1dbffbefa265de5d30b5f47285939d17ca4c4de03c6bc05d23009f41622c99dd

openshift4/ose-kube-proxy@sha256:391b0876922cd8f284f204d2b77121d3513e935649d8dc9a6f536b35a9d18c7a

openshift4/ose-kube-rbac-proxy@sha256:f9c0c6e14f3c2227f9ab6f8c62ed6e2d313b606dc199a7625087f16e24f66ba0

openshift4/ose-kube-state-metrics@sha256:65cb591d820f02867a2b407e28b64649c8e21b4ead98bbf632be69ab3c5ae350

openshift4/ose-kube-storage-version-migrator-rhel8@sha256:9cd3effcefffa93bf07868999b7fcefbadfe548c37fe63bf9d55137b1c8929a7

openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:cfcdb92a51e147179ff5a3ae1b1b3267cea533beb182c654b7ac30c804b73662

openshift4/ose-kubevirt-cloud-controller-manager-rhel8@sha256:c8a5f5f016795e60c7c6f61fe2d9fd248df3ffd314247cb333cdc2e18b05ea43

openshift4/ose-libvirt-machine-controllers@sha256:2f8c7111b084067a09e6bafda2f577d4bf6aaaa0a03327f5811fb940ba492929

openshift4/ose-local-storage-diskmaker@sha256:c372a2e25484f66d095a687d077ee0f628e67252edc1ea0e55c8e40a59ff9aa7

openshift4/ose-local-storage-mustgather-rhel8@sha256:a0cabd15f1bd0be0bae5a5a14408a614399f918d9d9f6052c29d218415de147f

openshift4/ose-local-storage-operator@sha256:c68893ea4798dc4f539c60c09235486312c63fd35fa3df8ea6fe0998b62d345f

openshift4/ose-machine-api-operator@sha256:271487817612452705b059eae6e24321ad902129bb9698aaf43703cb113fa68f

openshift4/ose-machine-api-provider-openstack-rhel8@sha256:f259a85410b0590ebadb98c2e2ede4d30b2ef2984f8320023fe35cefe6738daf

openshift4/ose-machine-config-operator@sha256:85e0ecd93f38ac57e31748ceda6ba3451db8abc8acf076900baa519f9364af85

openshift4/ose-multus-admission-controller@sha256:74939a848590684b4527006ffdf92da42a6f5305200e7ce488e506e8b3145444

openshift4/ose-multus-cni@sha256:0d6f0f2b1e1cf7373acc3118b9745b5306e7d5557ac4e56c476205d01a041680

openshift4/ose-multus-networkpolicy-rhel8@sha256:4e03a0049563b7e246d99df6689b6a157928bd10fa33e3ed2aa51e62ce15b191

openshift4/ose-multus-route-override-cni-rhel8@sha256:32a0f3c7e59fb2fe315b62374263465a3120594f205c43427a5e3386b8615b8d

openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:8f46e16798a562e52b9cce4759a87fdb96bdfe44ecde56f260312e07f447ca1e

openshift4/ose-must-gather@sha256:84fa2b691ab831b9b616d11d12e75098fa2f6b70edcb4ae42b55e48a204d782f

openshift4/ose-network-interface-bond-cni-rhel8@sha256:ff3f35d3b78fc59e5df5f7f9078bbfd830900b495257efb95a008c31dd1785b6

openshift4/ose-network-metrics-daemon-rhel8@sha256:8746c1b65b842c2e7b65d49a9ad56d0d69646a7d8f4c907cea7c80978788e4d9

openshift4/ose-node-feature-discovery@sha256:3acb17e660b6e74856bef9e297cdded1e3408b033de717d51366308d9cd1cbe1

openshift4/ose-node-problem-detector-rhel8@sha256:196e4948ceca8a7a8a3867d19400307d4a3eff10d5acbe3f58b9aec003459050

openshift4/ose-oauth-apiserver-rhel8@sha256:a51c86766d50b06480a60ec43174d80d47b194a420493b1c3961b8824678d4b2

openshift4/ose-oauth-proxy@sha256:4bb1e324f2d8229b15d5e6071782f792737d49f5726d3409f3d6406ef172f96b

openshift4/ose-oauth-server-rhel8@sha256:4c0c49763a230bc616d96d75c49ae48a892a6305e0aad620a68205d9ff2288ef

openshift4/ose-olm-rukpak-rhel8@sha256:6019f093f2e0709bdc33733df9290d793e9ea229943504acdcdc5cd00d09a2ea

openshift4/ose-openshift-apiserver-rhel8@sha256:5d86376cbc2c571304d1ea07752e207f2ea0a58d9c7268c269737417fc6b2ef0

openshift4/ose-openshift-controller-manager-rhel8@sha256:89372ff839b47c44110b8af2a2f554abfb65a90bcb73519f44458764d2f557bf

openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:43722ce319b49ee6f8fbb05da1cd4081ead98e96295fc193c09c52b8c8869657

openshift4/ose-openshift-state-metrics-rhel8@sha256:44cf66b502f84cb22eba9f389ebcb1317330ed6535ee30a95d7480996f66fd60

openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:6f22bf962af3d703c3e5d9f9b1146b89adf39dfd1bcec5dc3c059ae97ce1d225

openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:aae5d8bb1fa7c00a5b26bf7251d9766f43511d3e32b86207512c1d4d54a059af

openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:abdd13aeffd3b5198f4a622a240f9458a29b22fa98eb5d75c6d53c0317825434

openshift4/ose-openstack-machine-controllers@sha256:f6db0371b2599a612b9815fb1c58b8528643b609b17d88734548a255a70c84bd

openshift4/ose-operator-lifecycle-manager@sha256:58bf9b6793febcdbb89cc9df87849213874fc6243baae124aa450c9118e1cb0f

openshift4/ose-operator-marketplace@sha256:f7f7af9c9b31be7cc1486fd8bd97bee3e04a9b4b64389dec1fa5a92cd09fab75

openshift4/ose-operator-registry@sha256:0834df1f941699e58747e5d158e6bc427863e372c9d7532b980a212cfef66aa3

openshift4/ose-operator-sdk-rhel8@sha256:9022a42c70b2d99bd1fe5c97702e4723ecb1b31f64b8ca35ea530ea7a6a2a940

openshift4/ose-ovirt-machine-controllers-rhel8@sha256:ab8356abb153bb1740fcad2673ff1c70a883045673f9a90e915a31d69cb82be3

openshift4/ose-ovn-kubernetes@sha256:fb7924a2cedff143de6ec6cd5f4f9df048db33c9fbaaa7a21104ea4ff5628eea

openshift4/ose-ovn-kubernetes-microshift-rhel8@sha256:fdef5ae850dcddbd74112619b42a6a11c342a93543cfebd8544affed63f6dedf

openshift4/ose-pod@sha256:d1e0b93cd72a313cd46cf66f042dd5ac50d95661ea1e04cda6565d3fbd027d4b

openshift4/ose-prom-label-proxy@sha256:40a4ac91d32459dc2d9f11ef4274d6d5a1216b283d93f076b6840d2af814992d

openshift4/ose-prometheus@sha256:1d0913ccb0f1849390a94ab3b5c2f46f12fdace8446b096127384814ed5410f5

openshift4/ose-prometheus-alertmanager@sha256:ee47f6044fa7fc2e5b3fa753ccc11044abc27087386c1547e6b3395ba6442d62

openshift4/ose-prometheus-config-reloader@sha256:c193c894205bf3c05113a6b7f4c445c14ed05cd086289b2b3494ece7f1227737

openshift4/ose-prometheus-node-exporter@sha256:27668bb055f9f54cc9efdfa60a58ac2569345917a6443814c2cd357bdcee2dd7

openshift4/ose-prometheus-operator@sha256:0578389212a42b874faeceb9221b6ada6143a872c5562f9014275389202a8fbe

openshift4/ose-prometheus-operator-admission-webhook-rhel8@sha256:39c0db263ddfe30b1a0dbe191c2c52e3ad4e92ea1ab252dfa1af7c56693bb46c

openshift4/ose-sdn-rhel8@sha256:263b5ef9925355b20a3faaa084dcfec723cb5398418d3778c7d9c07bed51ca81

openshift4/ose-service-ca-operator@sha256:c6ab691b7e5dcf8464ea821e87e33c065958f83977bfe199fea056cd41c1c9be

openshift4/ose-telemeter@sha256:411b91360fa8d602f3e91b1b1f8803c41f65a9b43e2b11d52f6720291a4862be

openshift4/ose-tests@sha256:b2b0c219cb9bda1691cf6d4d737f44810c101ef72b975cba68a1e9b9eb97d247

openshift4/ose-thanos-rhel8@sha256:7a573daa64e7beb5d97a626d084ce06dd95186a16f521034a435d073501f5637

openshift4/ose-tools-rhel8@sha256:e4505b5fe97f32413be5cbf39fe616eba51a0eede72aa025c39b5ac90a20ab47

openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:52109044983769b02d774c04e494e46b8bf8a9f07721e0accaba37bda90843c2

openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:7ff428bfcda788f3b4c13d4d12347e7d4c9dcbbaa62df5c35c6c83150873b560

openshift4/ovirt-csi-driver-rhel8@sha256:9ac3e6f482b0dcb78c6069d4fe2860d0b9822ebf7f414298aac5e54ecf9cb7ff

openshift4/ovirt-csi-driver-rhel7@sha256:9ac3e6f482b0dcb78c6069d4fe2860d0b9822ebf7f414298aac5e54ecf9cb7ff

openshift4/ovirt-csi-driver-rhel8-operator@sha256:bfe26d5b7eb3950cb0319f59fbaaddab293b5ef0846d3f79943246ddf1bfca0c

x86_64

openshift4/metallb-rhel8@sha256:6900f4c8ca5c3ee1190f423e47e676e704178da1de955c5204bdba6c7b80322d

openshift-tech-preview/metallb-rhel8@sha256:6900f4c8ca5c3ee1190f423e47e676e704178da1de955c5204bdba6c7b80322d

openshift4/cloud-event-proxy-rhel8@sha256:e282aa9e9dc91493d0e0988ee8888485d640b7a956e7076fab2289b16d3ce33f

openshift4/ose-cloud-event-proxy@sha256:e282aa9e9dc91493d0e0988ee8888485d640b7a956e7076fab2289b16d3ce33f

openshift4/cloud-network-config-controller-rhel8@sha256:5c5b4de8d522d388699013dc682c0f6b9618fd4cbce8925986b3070848c4fe9c

openshift4/dpu-network-rhel8-operator@sha256:1e0e9c03c4c0b71e3734e5dad6010b8fb46c764146465dfd2fa8eb0d7a3aa5d8

openshift4/driver-toolkit-rhel8@sha256:e280217aadb71060cb66f22a84d3ae89f240498c91ec7469eff8d8f67d803ed6

openshift4/egress-router-cni-rhel8@sha256:4ebd0bdc34a0d6ee6949ae433717c259d1a5e8505e59c470d8d9d49ab9bc5f9f

openshift4/frr-rhel8@sha256:9dcce8bc61c2a28b551f9091ffc16b65a8c573f9491641416532ca078459f743

openshift4/ingress-node-firewall@sha256:7e4f39063866c51b9164aa3ffdeb9f5a3b917c4ca9df74cbb2062a28b0cbe09f

openshift4/ingress-node-firewall-rhel8-operator@sha256:2c49f3aa826c06c07d2f93c5da269f834114f2c4705e535cc0d320cbf692d13d

openshift4/kubernetes-nmstate-rhel8-operator@sha256:82ea990da51f60ce9b963fdb1247dcccfc61ac5a881239628aa05f6110a0acc6

openshift4/kubevirt-csi-driver-rhel8@sha256:2049df74f75834f16f3754e565cff75c30a7c50c1bcb17392eeb89165f871e0e

openshift4/metallb-rhel8-operator@sha256:c3c73d4572e332be738794d6e6ec7d95af22c77f98d1bebe630e40c8c1f9a836

openshift4/network-tools-rhel8@sha256:c4227d1aaf1953442ef515eef1ad384d1241bbbda6a57ebad4127d85c57a4952

openshift4/oc-mirror-plugin-rhel8@sha256:a9133091e56a539220d16cffb027c661977d09e7883b0d49289f5627e5f879fd

openshift4/openshift-route-controller-manager-rhel8@sha256:4f7ace9aa55db62dabddd657805bdeec5366e2bc0d2f1b9361ecba1c83def4f8

openshift4/ose-agent-installer-api-server-rhel8@sha256:9aafb914d5d7d0dec4edd800d02f811d7383a7d49e500af548eab5d00c1bffdb

openshift4/ose-agent-installer-csr-approver-rhel8@sha256:d57bf6b28bd554f7dcb9158d640da9d419c2487ecd8995cc73e92dacdf16cbc1

openshift4/ose-agent-installer-node-agent-rhel8@sha256:e7b279cbea3c8bad0c8546e040e3723491b1856ffd87ff8b8b93da41674dff86

openshift4/ose-agent-installer-orchestrator-rhel8@sha256:8f39b1748a8e4aba2a7651258b47655251ca96734f76245a84e1d9ff0172161a

openshift4/ose-alibaba-cloud-controller-manager-rhel8@sha256:6cac727dcd4c3b6b43869c258757decaf81649a6c47756b49757a9e952a3c7fa

openshift4/ose-alibaba-cloud-csi-driver-container-rhel8@sha256:5454405d9096af85e71a862354a04fde2bf98d14736a318ecaccfbbd127567bf

openshift4/ose-alibaba-disk-csi-driver-operator-container-rhel8@sha256:23acfd47f7a05d0bf72b4c0132af9927da56dbb563700d95c0690f2ba45dbbdd

openshift4/ose-alibaba-machine-controllers-rhel8@sha256:4b41f8e9cda9736059d331530f08cbe7fc2c9a2532faf031d93cfbc5a6d55d28

openshift4/ose-ansible-operator@sha256:1283425465bc11aea576cc5e27c996dc536439b46cf6cc77f6a3f8e0b043156b

openshift4/ose-apiserver-network-proxy-rhel8@sha256:0c506b8419f2fe534abc1574340ec480105942ad9ad68ba456ea159d705c6841

openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:6af4408b8369f423bc2d61b9fc6b9ac27c851bae9c849c30ecd9d6c3459ca47b

openshift4/ose-aws-cluster-api-controllers-rhel8@sha256:7cd77d57ae2ef5b0a1db704c612c7c5151b25d33f0218bc94f99a36065edc26c

openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6d589bddb55552d41d9b7c3882eca9240fc30739851a46c8be66bc67b60bf932

openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:f10fc483ca58ed1c152f18f612626d64536d1ccfb9dc70f93f4b9c52e009c72d

openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:006033d3cdcfbed5d88b5023c16802d42e319376ee7c56d336c6f18015dd9c91

openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:93735632aadda09b747ab065bb688bc413ffceb32a221bebe5abfbe0f98b4ba9

openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:04e44a663070fa5f9d06ad7cec10dd42bc5f57bc5ce83b43230295ee500c8fca

openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:de3d736a5ca06b046bfa2d625d2c706e933e39144047e384ac18dab584e41787

openshift4/ose-azure-cloud-node-manager-rhel8@sha256:2344a0f009694f4e7937bdef8d437b976507a5cdfff0963a83da26ea5b937bae

openshift4/ose-azure-cluster-api-controllers-rhel8@sha256:5b7e34305ee618985d00d2c93066f28fbb9445de8597da7541d9c3b65a3e7c67

openshift4/ose-azure-disk-csi-driver-rhel8@sha256:aed54aa456f8db265294892a70b3326c178cf3d0385709fb7638f5d2d2937386

openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:69d493257c120c354de1720ec7ebda8fc8bcf86d96d486b5cd147fc85446dfc3

openshift4/ose-azure-file-csi-driver-operator-rhel8@sha256:cd6d4218fd366d47cb99439b772e275d7aa035661447b2ebeb15109346cc8eee

openshift4/ose-azure-file-csi-driver-rhel8@sha256:3697993af0054969f74845aa00cbdde1adabb9bebe9f3568191e6830006d2276

openshift4/ose-baremetal-installer-rhel8@sha256:95855c4425f8bc87ec39d43d6cc1444c14bfb7791b279c836dc6e4aa5b9894b0

openshift4/ose-baremetal-machine-controllers@sha256:a5229ba0fce1c5dc6082103aae536c60b95fb014b6f57e9999f00590280ae9b3

openshift4/ose-baremetal-rhel8-operator@sha256:cc4ae51bc292800f0b75d0bc7006bb334443d47200ed4ebf2b54124f3cedf17b

openshift4/ose-baremetal-runtimecfg-rhel8@sha256:028a1513e6d7b80ca2282792a3f7dcd92e01cf4703e3ce67483a5abb1d40cecf

openshift4/ose-cli@sha256:840f6c28b4c7d71ecff23f0c31d3e833aee39a7eb45a760762f32072bcec86be

openshift4/ose-cli-artifacts@sha256:454cb454c0dcdfc1e7c647cf4326cb194dc2b2de895b84bce4fb36c1ba5fbd4f

openshift4/ose-cloud-credential-operator@sha256:f4f8f4b1b1c95bb7ad5dc71d5c76f6be4191f9b2c6d2765583025528b3b3db93

openshift4/ose-cluster-api-rhel8@sha256:7e73155adfe1dff5e4f3c7bf0e4b290901d58a8a516f8f2c2fb355e86eaf7c52

openshift4/ose-cluster-authentication-operator@sha256:5ab211a32ac9d0156ee1919b90b8b854e7ad189d5df662caf0a79704e2dd2f3e

openshift4/ose-cluster-autoscaler@sha256:cdb37c970615d26784b91ffcb5a1e27127471a9c5e89e140b310db64798b571f

openshift4/ose-cluster-autoscaler-operator@sha256:b0a14eecae16b0a28f39be00cd4f62bd77f1b8e208a51222904a5a631a9805ed

openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5a613c9135b137bc8173f74b14ae0140cef74a3346b6bfc9eafcaba380102e98

openshift4/ose-cluster-bootstrap@sha256:a7f2fc7774b5a6e2137a383203a0fcb1433ed14b14231a9d4b0e5ea605f6ef54

openshift4/ose-cluster-capacity@sha256:46beab260fd4e23491cf066d55b75308abeedcc3d8784c3a84053c49d67e5db6

openshift4/ose-cluster-capi-rhel8-operator@sha256:93a316f82b1b21f5bda60ca9ffebecbc269d6eff1a04bdb6501b604814f72110

openshift4/ose-cluster-capi-operator-container-rhel8@sha256:93a316f82b1b21f5bda60ca9ffebecbc269d6eff1a04bdb6501b604814f72110

openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:50fd3d83d176fc964701e2298dd78fd9d0914c7f9a64552138cb7c3df3bdf1a7

openshift4/ose-cluster-config-operator@sha256:2759bb72644ab1c1c2d3db2f6ce3e6024c97bdf7b4288b121df055adf5417ae0

openshift4/ose-cluster-control-plane-machine-set-operator-rhel8@sha256:cff81edd41a2c4b68c64513796085766bcfeb46eaa9f9ac48179444601a86139

openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:8738ac3c907020c16080708e8811d11d213bbb8bef4852b18d9f15c70abd0e39

openshift4/ose-cluster-dns-operator@sha256:10a863b53f2c96806e8035917a1b0cded306e3d7cac9655818835fc14a9bf5a1

openshift4/ose-cluster-etcd-rhel8-operator@sha256:fa7f4880be55e5316b03837e6de78bd3b8144e31b08aedd91983d9523df72f18

openshift4/ose-cluster-image-registry-operator@sha256:2b302fdfd1c990f0f02232d7431c5fb2db5cbe75791d7a13c8d4d9a92781c5c7

openshift4/ose-cluster-ingress-operator@sha256:feda7305a8cf95c020968d94a0944c4777d6e46b9f0b71f9a3cd17c7782e81ba

openshift4/ose-cluster-kube-apiserver-operator@sha256:abe828734234f1be3eb07ac60c06ae3746bb3a14d7153189660a46419143a167

openshift4/ose-cluster-kube-cluster-api-rhel8-operator@sha256:194590e6bd4932f21f263a02ba3160229e93ec3b0c1cd49e832231fee9168752

openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca87b7d8e43184729caf9d9d6e33c908e06c544533d814f8630ccb34dcb629a2

openshift4/ose-cluster-kube-descheduler-operator@sha256:2e1825ef376199b2ad175420de776efd5a4dcd20d03d57bb2b92d5180cfde479

openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:2e1825ef376199b2ad175420de776efd5a4dcd20d03d57bb2b92d5180cfde479

openshift4/ose-cluster-kube-scheduler-operator@sha256:90257f221e6d0e8e1f985b451ccfaf4b02dc2df5eead6d7a90b3d1f7dc09b19d

openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:8d1ba0d6c53c8fdd6fa67da2d10735aa7b332c7ea94386d2e7dddc18813bb886

openshift4/ose-cluster-machine-approver@sha256:7f9d4454b0015894f00fb4a51e4da08eece6bddbf161c1087ffdef3618ba7f30

openshift4/ose-cluster-monitoring-operator@sha256:d13090066e1f79ad9172ed1f2265e58a956422898fc18afa0fd91d64ce6c6453

openshift4/ose-cluster-network-operator@sha256:211ad4602874c9228efb9edb61fa051856ecbf14d9fd1bb4cac712df30a89e61

openshift4/ose-cluster-nfd-operator@sha256:857e7bec6536e6e9812f232c1f98272c1c8951188c19e53bea832ac3f8fa0e56

openshift4/ose-cluster-node-tuning-operator@sha256:cd7933e6147198a9b85124812daafa1a9528669d72f1e27b4f522efb5a87ab55

openshift4/ose-cluster-openshift-apiserver-operator@sha256:26a98fa0f13f996225a9b76a6b6135ef6350ad40e706100776d6335b78a981e9

openshift4/ose-cluster-openshift-controller-manager-operator@sha256:b2d884639fcb9b73b8e02dade8063f818b9eedab7573b4233affe3a44e1ed4ff

openshift4/ose-cluster-platform-operators-manager-rhel8@sha256:febb4ab5d1f1f7d49a0219602bc71fe7a44524610d6ae7813530c4b56306f285

openshift4/ose-cluster-policy-controller-rhel8@sha256:7e02aa1156316801fe7b8e125584db1db72ef35eaf4690cd553c71cc15447d7e

openshift4/ose-cluster-samples-operator@sha256:ab17a77e17e68b76e8c5ea0d97e4fa970977e8ba4b34807e393cfdba819325bf

openshift4/ose-cluster-storage-operator@sha256:ad90eecc1ddfd03126812cfe0d243f6577827f4c33310888ac564c24c0ca2d08

openshift4/ose-cluster-update-keys@sha256:3fc97c79c5b9b678cb3f389721cf35b1fc74a198d3d5d3fec5767f19debb72cd

openshift4/ose-cluster-version-operator@sha256:1fa63a1a18ea4600a7b0e038beb8f70dfa22fe310d99f0948e607ad4751817b2

openshift4/ose-clusterresourceoverride-rhel8@sha256:de888ecce55360b2bf01e05eec663db17f228d39ca65d71658141b03d4dd5bc8

openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:c54c784359491eab938a7f76afcb70be1afe8e7f2f160ef8905b89f3e98ca828

openshift4/ose-configmap-reloader@sha256:ec5bbffbdd71746c0460bc57c622bc0c8d1f79bf1c33d5debeca6f7dab0617b1

openshift4/ose-console@sha256:64b8bbe5c5327a758e7b81b6b0730ebc522474d0cf6d10231bd05d742176e5a7

openshift4/ose-console-operator@sha256:6623fdb3f786821e10b0bd6ec7039281bb862da1687c270759cc5de835dc6954

openshift4/ose-container-networking-plugins-rhel8@sha256:7e320ee6ff42ff5ca0eef524d8126d71f5cac24e6b7c02a782d5e38d272b667f

openshift4/ose-contour-rhel8@sha256:82e01909338df68f5596273f6e8b5d9280175168beff0c77ebbd5bc9e7f115fd

openshift4/ose-coredns@sha256:95dd3672584bef74a77a559cb92f466410fad0d9f3bf6d6fac2769e46c735292

openshift4/ose-csi-driver-manila-rhel8@sha256:a9241459e2f2a5d48949dbf5c236a97f16711e33a046ec02e9f1d925251d27aa

openshift4/ose-csi-driver-manila-rhel8-operator@sha256:85cc729a536cca5a0262d8f7efd703aa97161ea030e4f403a2b54c8c3bbcf76f

openshift4/ose-csi-driver-nfs-rhel8@sha256:e1ee7978b33ad8559bdc09c8b80ff206a1d21353c9f1d415476414056f4ebd00

openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:39e8eb20041d1e0e6ad78b6be37f21f3013cedcd870f75ab84d258cafba726ec

openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:039216add262950b76931f9c4b47085945ff47faf6553f041e39d966913a31c6

openshift4/ose-csi-driver-shared-resource-rhel8@sha256:9e6c128e7aab8821ea33b9a7141b6a3f1aafd14a0752acb1eb736ebd46fbb87b

openshift4/ose-csi-driver-shared-resource-webhook-rhel8@sha256:6a8b2e132382bbc2898513be7d881fc76d3d46d50bcee8171aad6ba0610f90ac

openshift4/ose-csi-external-attacher-rhel8@sha256:17220817d7d4b2a81636c48727f5c32f22a69e99bd9e994b40c138a53c950038

openshift4/ose-csi-external-attacher@sha256:17220817d7d4b2a81636c48727f5c32f22a69e99bd9e994b40c138a53c950038

openshift4/ose-csi-external-provisioner-rhel8@sha256:c35043de6bfe9c71924332440d2fbfc953fb9705a295f804add8ee8d6a5fec7b

openshift4/ose-csi-external-provisioner@sha256:c35043de6bfe9c71924332440d2fbfc953fb9705a295f804add8ee8d6a5fec7b

openshift4/ose-csi-external-resizer@sha256:6543fea59eb331dbf4d9720c95eafccfb7288826d45e3240a2a2360b96760df4

openshift4/ose-csi-external-resizer-rhel8@sha256:6543fea59eb331dbf4d9720c95eafccfb7288826d45e3240a2a2360b96760df4

openshift4/ose-csi-external-snapshotter-rhel8@sha256:c39828331e7ff79ca6aeb56e54c1c5501b6c7055cd20510b2142badd3901a23a

openshift4/ose-csi-external-snapshotter@sha256:c39828331e7ff79ca6aeb56e54c1c5501b6c7055cd20510b2142badd3901a23a

openshift4/ose-csi-livenessprobe-rhel8@sha256:9830527ac7d918cb69b3f4e693174d7281a52960a14261f09396ba910747c487

openshift4/ose-csi-livenessprobe@sha256:9830527ac7d918cb69b3f4e693174d7281a52960a14261f09396ba910747c487

openshift4/ose-csi-node-driver-registrar@sha256:fe27cfaaea97f006b187a9b76d1a685c81fc03d42a2c55f18344a6d3fb15460a

openshift4/ose-csi-node-driver-registrar-rhel8@sha256:fe27cfaaea97f006b187a9b76d1a685c81fc03d42a2c55f18344a6d3fb15460a

openshift4/ose-csi-snapshot-controller-rhel8@sha256:38626355d4250f932a3fa332f80e68aa9e894dfbdd499a00b8c171f57212b2ac

openshift4/ose-csi-snapshot-controller@sha256:38626355d4250f932a3fa332f80e68aa9e894dfbdd499a00b8c171f57212b2ac

openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:9b51ef34ea6daaf4f6d1bc116882e9fddff68d4ec8dee12335ffcf01e5bb0529

openshift4/ose-deployer@sha256:99a97d61f6c0322d38206fb34c4765784aca9e0174f0d4334290f884b03ff75c

openshift4/ose-descheduler@sha256:f00a02500ce1f58bd3f4c0a40c4f6aec86f2d6ec232d2ef5c82aaf238ee42586

openshift4/ose-docker-builder@sha256:fa9046c8622c11f3e7f8f68d75829ee4f12db693037c66c27efc6b588b2eacb5

openshift4/ose-docker-registry@sha256:53ecc4b2904b68dbd72bef7dd9dfa43d45d7a9da629153c6a57397fe0a565735

openshift4/ose-egress-dns-proxy@sha256:37180868bde6b9d7de87e6e6ded48e09b9aa8bf11b75a6daaf24474b9cfc1615

openshift4/ose-egress-http-proxy@sha256:b2974bf5f0a88c2ff776d96e6455b3730dfa8c3a5502173703b9cc3178053b3c

openshift4/ose-egress-router@sha256:18a2b2fca8c69927a8b457214975a318e14a58e0b2e3ab9271c0fded97457a40

openshift4/ose-etcd@sha256:a7d9172adb485fceeea0cd0129384aceadf0ca23cea7a5ca2f881079f64d830f

openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:a4a39129238a516e2341b9d384642d0fd1090f255ebed4f78749037cfa60ae98

openshift4/ose-gcp-cluster-api-controllers-rhel8@sha256:14fa29b714f69cda6d6fc008a0affd555294ea5d0f7625f00102ceb0e644d693

openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:2d196ad8afca5d85755ce21a057138fed8e786942e9f8560361d1e3f602a9595

openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:f6be1e8330459609b69572df36b9af89fd6736bf353f68ba301e27072c5f52f0

openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:2adcb64a452cb477b9776e9ac0878c063c24935403d50ca30183081632f6d8bb

openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:1580a2289f7198ef0bb4a6d4f73e49d045ca6817d2e69b80f1bd69d5b8e4355d

openshift4/ose-haproxy-router@sha256:c1360e96dd3a7bd06132df6618ef1af32c7282e0ebf1e63f0ef84fab29badcea

openshift4/ose-helm-operator@sha256:2448b1227b0b411192b1da9d187a6bcea95d93c51542adce5f5bc97518df36e9

openshift4/ose-hyperkube@sha256:1e15b08d9993b80bd82bab2981fbc270b05b72e50e0524ee3a43dcf90a496d62

openshift4/ose-hypershift-rhel8@sha256:8cd8c91349a35a3a4d1332d0016fe83b344c4820382d290985748952f4e19da6

openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:63c1e111ecd2b9bd5921d54930e0884d82f4424229e09717fecf12015d495fce

openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:10f9437645df6bc821a70f4da0d65ce06220961465c7c720c3d9cf71cc091e39

openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:f3f4ae7d409c2a79fcedc1d88cc7795a34576acc806ae05f69be7f5a51e002c7

openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:4a9c00a113526b2ffa7c9610bf7a1fcf083bb145ee52c76abac48b5ac1929136

openshift4/ose-ibmcloud-cluster-api-controllers-rhel8@sha256:ea656bbd7907106d097fa5968edb6962311fb9cf3aba49374c70a2203301c9a4

openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:54019b4192b085a0251566a51cff89612691b2bd6b00e170fe5a2dcbba42c0e5

openshift4/ose-image-customization-controller-rhel8@sha256:5ffc761ff1ad98852d2006c838fc643fe6ddac46d4d4c779529726c845cf3333

openshift4/ose-insights-rhel8-operator@sha256:f4a01a2486fb5b5052f3742bc2e51e2a799cf8a1ce829ac6b9a5de848e32a28a

openshift4/ose-installer@sha256:f85ec9e38afffaccb3731250a8fad3109d9841b1c8004ad298387be7aef1f2fd

openshift4/ose-installer-artifacts@sha256:4a91bd9473744c0a3e730358cc6a5ef516da952c85fd46add8432782274d49cf

openshift4/ose-ironic-agent-rhel9@sha256:ad32c0e9af2c63cf1f5c906f39b33beeb64f9c9f7a3508b140dd7ff0f4991d49

openshift4/ose-ironic-machine-os-downloader-rhel9@sha256:d6efe96b5829568ad4d15948086823dffc31e66bb85ee01c6d44a3b01bd49517

openshift4/ose-ironic-rhel9@sha256:413cdf0f5bcc67b700179cace7fd893973d791610bc1a3676ef4aa7213d5d1c7

openshift4/ose-ironic-static-ip-manager-rhel9@sha256:6f7db43c6bb1dba00c4ce0e87b38aef38afd316dfd22a067ad95bc8ea83c9b50

openshift4/ose-k8s-prometheus-adapter@sha256:3dca2a8e208ed9ce82d6e3c3b43c33c107eae2104bede086eec98f83ff94a15a

openshift4/ose-keepalived-ipfailover@sha256:bf216d47b8648002b715a97293a23f828d3d0a42ef5a89986b6adcae3b95cd2d

openshift4/ose-kube-proxy@sha256:6962aee4e9309d99e5986e3ab54e9cb4eb4edbd5fdf4012a81d8c7ef03b10b39

openshift4/ose-kube-rbac-proxy@sha256:029a446bb8fbaa69770488a70d19f5b1215fb1a4abdba3a5072efa5d933e52ef

openshift4/ose-kube-state-metrics@sha256:48fe6d1d26708f6f44776b1968ec1c0b415c0e759be81010b01994db4d9a21b5

openshift4/ose-kube-storage-version-migrator-rhel8@sha256:db07ce6476e5712c2e2ca5461c057fe8652cb761efc6ec02467d90b244027859

openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:9ff4f61a479b76d36f72c7830cd16b3dd895d88b42478359c41677dae3ddf268

openshift4/ose-kubevirt-cloud-controller-manager-rhel8@sha256:3f0721800ecf460036e9b9bb4574fa332099b8b95f3f83d8e7b3a65eecc402e2

openshift4/ose-kuryr-cni-rhel8@sha256:32d60c1f253e90422b2744eecd076838d95e7072a1feb21c39b229a082f39f88

openshift4/ose-kuryr-controller-rhel8@sha256:6ca3fdd6e4b366433a2e6ccd32afcf3f98696a261dd7e16dafc65ab11786292d

openshift4/ose-libvirt-machine-controllers@sha256:8a49898e5865a6866e11e593e3b36c00515967c75a16f4fb5e21b2b9b7f1cbad

openshift4/ose-local-storage-diskmaker@sha256:e794c8f14a7c96869586378fac6271c958799bd6d92fb47acc488f4eb73e131a

openshift4/ose-local-storage-mustgather-rhel8@sha256:30581e93cacf07752ed659932b2e0dc39c304aa81cab9fd1097fcc38b1a4253f

openshift4/ose-local-storage-operator@sha256:0763d728ef3d0367551287549721f59777b919d00faea4ece849d8da8a6563ff

openshift4/ose-machine-api-operator@sha256:890cdab08c598dc051a4551b65776f0d74fc517043018ec263f5cad6089ff6bd

openshift4/ose-machine-api-provider-aws-rhel8@sha256:28a511d4641cfa9fae6c33be1cd92f5c69376a1a17b41de0f02023945189350a

openshift4/ose-machine-api-provider-azure-rhel8@sha256:badaeb5eb07725bf2b18b901dd14368bdfb821e6dbcfb1205b89f87dead5fc83

openshift4/ose-machine-api-provider-gcp-rhel8@sha256:818a536c30c80bcca764eaedcaeaf76b62c9716b8e33d1bbdf4f9b05b9110370

openshift4/ose-machine-api-provider-openstack-rhel8@sha256:0749389103a800a88cd40897adf41857c73331e8a28396315a9c2108b499ec58

openshift4/ose-machine-config-operator@sha256:aeb43d9a6646958e73807321fcd609d4caeeeeafeb8f330a43ce56454e06a601

openshift4/ose-machine-os-images-rhel8@sha256:e79087f3603696a5f800bae7d6cfa0f6168397b20374b346c50a1c5ad39353ac

openshift4/ose-multus-admission-controller@sha256:c5539f1e7c1e77d6ccd6f9d29264b75260c75e121019049b265f71971adeb99a

openshift4/ose-multus-cni@sha256:9303b8bd8ab58a0b6e12639b1af7d8ffa0909eb83a71d6d2b8e0d20d4f7a5f1d

openshift4/ose-multus-networkpolicy-rhel8@sha256:267bbceb068c516090693b4993eb93b1f56c238653c585a8716b03626ce87c27

openshift4/ose-multus-route-override-cni-rhel8@sha256:5fdc7af919824d0da020367edacbefce64f888d89042bbba8fe971af1c81405a

openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:78af3f50156b9d8086be236356c881f14d8736fe4efbb73d961919c049565225

openshift4/ose-must-gather@sha256:2eddfe6b31b4275d681e16a21c8d0db983f7fe6a86f6cf309b8c1a06c03ba63d

openshift4/ose-network-interface-bond-cni-rhel8@sha256:8e59385e42380f7ec31c903a79d9facf50c13d5085b695d9bdf2910f1c8a1559

openshift4/ose-network-metrics-daemon-rhel8@sha256:4530360619bb0fcee988d14e5f7c3e35f6531371fa54eae37a98eefabce9b350

openshift4/ose-node-feature-discovery@sha256:2f38172c786928a8b932a54264d599bbcf70399474e99552227424143cd810a1

openshift4/ose-node-problem-detector-rhel8@sha256:71983002c31b51d982bab9d46d2b955a36788404d910c3426df2d546d1cf2e66

openshift4/ose-nutanix-machine-controllers-rhel8@sha256:723ed61852a0f3ab7e738f800e3dccd2ae6f500eca8132e503aa42a239a0a5fc

openshift4/ose-oauth-apiserver-rhel8@sha256:bf9f6fdd018bd5761aac97d5e8829fb7c3ecea7032886b80133db0f943448294

openshift4/ose-oauth-proxy@sha256:4734c5bb510bd658a084059136e2df0d267696699dc093f265678170d66f58d2

openshift4/ose-oauth-server-rhel8@sha256:4dd20c72fe346e0550dbb8c54e80fe3f4b8830c2486849c6d1ae82e676e784ab

openshift4/ose-olm-rukpak-rhel8@sha256:8ba327b0aa6d385c26bb6a2493936a5b630d91b6e864212c6db24952bed73eb9

openshift4/ose-openshift-apiserver-rhel8@sha256:6350e5e62d69d07dad760a3d6c4780a2aa57a686b77003e9ff8e997ba2b6fba7

openshift4/ose-openshift-controller-manager-rhel8@sha256:4344a11b5b91679f98d18ca1040bae371bbf2339a827c1ad99de6b038854a3a7

openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0cfc04cc33a653a66ec2182305df7f7c47604f157218cc0d0ebef06823311e42

openshift4/ose-openshift-state-metrics-rhel8@sha256:dfc8c3544982ae445a5a22d56404198668a6d5c9f229352a61f1f7cbf6469663

openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:328fb55b1a52fd535bff392bcb254cbfdf45c611a5d9472f13c8dc90c4c268b0

openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:662f77d8347c20533b560e07b8f0821097badf1aad691e9cdd450e85b63784e6

openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:712b1ed8ca348f23bc319abb48fe02215eaae33e6a00c08bb7153c1ced236119

openshift4/ose-openstack-machine-controllers@sha256:6538a5408fee0bc60f6e5fff83291803151a7f183bf9e5c823360f22211f5c0d

openshift4/ose-operator-lifecycle-manager@sha256:51db0beed2302ace1f748a2b6341fe29fd237c2f00b467b8729ad20c594b361f

openshift4/ose-operator-marketplace@sha256:5d47c5ebe151eed24e22d596f33dbf49c12840923ebdf160fe0a0da5a4488901

openshift4/ose-operator-registry@sha256:26fc94055b3dfe4a7ec268e2e8aa5a66a35f70863f6c48523df3775653b9380b

openshift4/ose-operator-sdk-rhel8@sha256:ddf749535eabc7ac592a8e8dd3368e1c6cc29041e5f69085f8987269a604fb32

openshift4/ose-ovirt-machine-controllers-rhel8@sha256:0e3a228f67175bdc4f27292fc23b725c83689a37859b773aca21f4bfbcb865a5

openshift4/ose-ovn-kubernetes@sha256:4c0f7687f514138eb1067e3cb00d49774932dff13b3a7682167be4b7662b02fe

openshift4/ose-ovn-kubernetes-microshift-rhel8@sha256:f089a420a01c77bdcd2cd8065496e6922eee9852c793d9e521aed1ff21a677c1

openshift4/ose-pod@sha256:6109f2a453f037b0a468e0694d9b5f44d3f69a931f0804abc1cf318e62d48148

openshift4/ose-powervs-block-csi-driver-operator-rhel8@sha256:c91bdab2d50b2dbacd9bea181d0baa35a168af275b216b1bf377b45f661d2f43

openshift4/ose-powervs-block-csi-driver-rhel8@sha256:f243e124caefaeb6fcaac1e749a7accb54ea3f152cdfd31b53de8b3ce849227d

openshift4/ose-powervs-cloud-controller-manager-rhel8@sha256:93a571de93bdabcd315086ca4247f7f339774a45262dda7bfa414c4ecb39b323

openshift4/ose-powervs-machine-controllers-rhel8@sha256:d7575ca6be5007758173e3e41311e69689eb6f50fabcec7948efa873e17f2135

openshift4/ose-prom-label-proxy@sha256:a778d14159894f47289ef8d92ed6ae4b7eb533717c812f988a68282dcca8cf60

openshift4/ose-prometheus@sha256:b71cf039176e8b32e7963ba2aae2d4a997cf1e313350d8dab08c0678188d9071

openshift4/ose-prometheus-alertmanager@sha256:f524571705bfc20c9e51e7872b4c75b78a181b5093c41d41848947455050a844

openshift4/ose-prometheus-config-reloader@sha256:1dee62467a15940ef63088df693702d81c1abab75d0ca3c04a446c730c3a4805

openshift4/ose-prometheus-node-exporter@sha256:581c874acf7f051c5aa2b0a8b16d5fa42eca78c2210bd37096d8765fdadcf964

openshift4/ose-prometheus-operator@sha256:7a08679ceaf6cc684a22f6a99eed17f42652b5f1aea88fdddc35a984475feb5d

openshift4/ose-prometheus-operator-admission-webhook-rhel8@sha256:7d913f0ed8df6b21633168ab79a2a3991c2a749c605f6c563680c47cc0d20656

openshift4/ose-ptp@sha256:a2ad39ac299a67a24c15cda9f88beaf26b3d7908c552395efe49cd02727bed0b

openshift4/ose-ptp-operator@sha256:415a68ab4a266661deee7ded3a5eeb7bba32eb806e1e7899f0bef0232fded612

openshift4/ose-sdn-rhel8@sha256:ec01edc5854c024b87e323f0ab25ea7fa422330538612d216b03a3d9af061fa8

openshift4/ose-service-ca-operator@sha256:bfbcbd8aab1b2d2e43efd85df3ea537098f36754b75b2ce5ca92f358e19c4222

openshift4/ose-sriov-cni@sha256:9561991c3f96a4190b0cc9716f63e62146fcb0ddccee7a52bd230e9abfc653fc

openshift4/ose-sriov-dp-admission-controller@sha256:73c036f7fce18eda82abc586b88293ed9e7d3f554bba2468461ab674ff4caf57

openshift4/ose-sriov-infiniband-cni@sha256:1f1b17c941e657b07cc4035c852d3a1e2a664621e63dbc447f146daa1267b407

openshift4/ose-sriov-network-config-daemon@sha256:8f86f8b12576da8ec188fdfcd27bb64afc2619efb7c714dbaff351a990205cce

openshift4/ose-sriov-network-device-plugin@sha256:a70a681c2d852f8710f79d3ac1debdd60523e3f6a918158b9e7361d9892ce006

openshift4/ose-sriov-network-operator@sha256:59dc6a2274e04c269b092ce303bbf25efd4d59ae0f4148f67a36d568c367016c

openshift4/ose-sriov-network-webhook@sha256:6b7e6c36597b2b010231c0e9906223ab3adf499cac7c1534fd32a3a7242b1a6e

openshift4/ose-telemeter@sha256:ddce0472c91042821382a504be80543066f79fea876c444ac6b180fdb3c4aeaf

openshift4/ose-tests@sha256:b4d96fe272c122fa0258230414c38e78bb30737b7592aa199574d4012e5875f5

openshift4/ose-thanos-rhel8@sha256:552e0e9e6d02f43bdea2559934c592ce959dab854dfad2282561207a9fd822f7

openshift4/ose-tools-rhel8@sha256:0fee58857d7dd90830f7d3acab6507a2d59450ec2cdbe9e614db0ecfbcab2b62

openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:f4968667d07849c9714f20e60562727b88afa1f95e47d0a7792417ac89b21621

openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:ab496f5ff6b0537955aced2bd28a333770f1ed0ac789129f2c1d0826aff9190a

openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:f227306a00544e8d4bee07fbf4a9fb3549ea3bf3feb72ee300b2241cd5c13a32

openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:f227306a00544e8d4bee07fbf4a9fb3549ea3bf3feb72ee300b2241cd5c13a32

openshift4/ose-vsphere-csi-driver-rhel8@sha256:908a3100c4a8ffb2bf9297f8a3dc008f19dfdd5df00653bb73932be2ede2bfcb

openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:908a3100c4a8ffb2bf9297f8a3dc008f19dfdd5df00653bb73932be2ede2bfcb

openshift4/ose-vsphere-cloud-controller-manager-rhel8@sha256:ea12cdc4966710225132fb402c768e43d6951afd6ed3feb21c1606e280673b59

openshift4/ose-vsphere-cluster-api-controllers-rhel8@sha256:f5209b95632be5ce5805ebdb0ca4c528ccd8a07580c864a57e75973a52bf25ae

openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:610711953eb65adad06a0fbe5c2fb466052e397ebc5cea380b7258799bb0b8dc

openshift4/ose-vsphere-problem-detector-rhel8@sha256:63d0ee8705e6945f1fa12b3a6179f18c2f9c1f9676d51feebfe059298b139ca8

openshift4/ovirt-csi-driver-rhel8@sha256:c28f29eee61fb5465471ad8a93fa85b8a1572ff80c1c65dbf939555bf76741b5

openshift4/ovirt-csi-driver-rhel7@sha256:c28f29eee61fb5465471ad8a93fa85b8a1572ff80c1c65dbf939555bf76741b5

openshift4/ovirt-csi-driver-rhel8-operator@sha256:fd6fa79402cea88a2d49b303e51f7cf533a32cd5a76ab8528c3309c6b511a2ac

openshift4/ptp-must-gather-rhel8@sha256:3053228c7e9a65631662f5ef9a5f2d06cd5de041b0d2910a00da815970a49130

Related news

Ubuntu Security Notice USN-7111-1

Ubuntu Security Notice 7111-1 - Philippe Antoine discovered that Go incorrectly handled crafted HTTP/2 streams. An attacker could possibly use this issue to cause a denial of service. Marten Seemann discovered that Go did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a panic resulting in a denial of service. Ameya Darshan and Jakob Ackermann discovered that Go did not properly validate the amount of memory and disk files ReadForm can consume. An attacker could possibly use this issue to cause a panic resulting in a denial of service.

Ubuntu Security Notice USN-6672-1

Ubuntu Security Notice 6672-1 - Morgan Jones discovered that Node.js incorrectly handled certain inputs that leads to false positive errors during some cryptographic operations. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 23.10. It was discovered that Node.js incorrectly handled certain inputs leaded to a untrusted search path vulnerability. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to perform a privilege escalation.

Gentoo Linux Security Advisory 202402-08

Gentoo Linux Security Advisory 202402-8 - Multiple vulnerabilities have been found in OpenSSL, the worst of which could result in denial of service. Versions greater than or equal to 3.0.10 are affected.

Red Hat Security Advisory 2023-7626-03

Red Hat Security Advisory 2023-7626-03 - Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 2 is now available. Issues addressed include buffer overflow, denial of service, information leakage, and integer overflow vulnerabilities.

Red Hat Security Advisory 2023-7625-03

Red Hat Security Advisory 2023-7625-03 - An update is now available for Red Hat JBoss Core Services. Issues addressed include buffer overflow, denial of service, and information leakage vulnerabilities.

Red Hat Security Advisory 2023-7623-03

Red Hat Security Advisory 2023-7623-03 - Red Hat JBoss Web Server 5.7.7 zip release is now available for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, Red Hat Enterprise Linux 9, and Windows Server. Issues addressed include denial of service and open redirection vulnerabilities.

Red Hat Security Advisory 2023-7672-03

Red Hat Security Advisory 2023-7672-03 - Red Hat OpenShift Virtualization release 4.14.1 is now available with updates to packages and images that fix several bugs and add enhancements. Issues addressed include a denial of service vulnerability.

CVE-2021-39008: Security Bulletin: IBM QRadar Wincollect is vulnerable to using components with known vulnerabilities

IBM QRadar WinCollect Agent 10.0 through 10.1.7 could allow a privileged user to obtain sensitive information due to missing best practices. IBM X-Force ID: 213551.

CVE-2023-5622: [R1] Nessus Network Monitor 6.3.0 Fixes Multiple Vulnerabilities

Under certain conditions, Nessus Network Monitor could allow a low privileged user to escalate privileges to NT AUTHORITY\SYSTEM on Windows hosts by replacing a specially crafted file.

Red Hat Security Advisory 2023-5976-01

Red Hat Security Advisory 2023-5976-01 - An update is now available for Service Telemetry Framework 1.5.2. Issues addressed include a denial of service vulnerability.

CVE-2023-22130: Oracle Critical Patch Update Advisory - October 2023

Vulnerability in the Sun ZFS Storage Appliance product of Oracle Systems (component: Core). The supported version that is affected is 8.8.60. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Sun ZFS Storage Appliance. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Sun ZFS Storage Appliance. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).

Gentoo Linux Security Advisory 202310-11

Gentoo Linux Security Advisory 202310-11 - A filtering bypass in less may allow denial of service. Versions greater than or equal to 608-r2 are affected.

RHSA-2023:5442: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.8.2 security and bug fix updates

Red Hat Advanced Cluster Management for Kubernetes 2.8.2 General Availability release images, which provide security updates and fix bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41721: A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead read the body of the HTTP request, which could be att...

Red Hat Security Advisory 2023-4980-01

Red Hat Security Advisory 2023-4980-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.7 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a bypass vulnerability.

Red Hat Security Advisory 2023-4972-01

Red Hat Security Advisory 2023-4972-01 - Multicluster Engine for Kubernetes 2.1.8 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy. Issues addressed include a bypass vulnerability.

Red Hat Security Advisory 2023-4875-01

Red Hat Security Advisory 2023-4875-01 - Red Hat Advanced Cluster Management for Kubernetes 2.8.1 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which provide security updates and fix several bugs. Issues addressed include bypass and privilege escalation vulnerabilities.

Red Hat Security Advisory 2023-4657-01

Red Hat Security Advisory 2023-4657-01 - Secondary Scheduler Operator for Red Hat OpenShift 1.1.2. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-4664-01

Red Hat Security Advisory 2023-4664-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 4.13.3 images. Issues addressed include a denial of service vulnerability.

RHSA-2023:4664: Red Hat Security Advisory: OpenShift Virtualization 4.13.3 Images security and bug fix update

Red Hat OpenShift Virtualization release 4.13.3 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of requests. * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Con...

Red Hat Security Advisory 2023-4627-01

Red Hat Security Advisory 2023-4627-01 - Migration Toolkit for Applications 6.2.0 Images. Issues addressed include a denial of service vulnerability.

RHSA-2023:4627: Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update

Migration Toolkit for Applications 6.2.0 release Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46877: A flaw was found in Jackson Databind. This issue may allow a malicious user to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization. * CVE-2022-4492: A flaw was found in undertow. The undertow client is not checking the server identity the server certificate presents in HTTPS connections. This is a...

RHSA-2023:4456: Red Hat Security Advisory: OpenShift Container Platform 4.13.8 bug fix and security update

Red Hat OpenShift Container Platform release 4.13.8 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number...

RHSA-2023:4335: Red Hat Security Advisory: Security Update for cert-manager Operator for Red Hat OpenShift 1.10.3

cert-manager Operator for Red Hat OpenShift 1.10.3 Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specia...

Red Hat Security Advisory 2023-4475-01

Red Hat Security Advisory 2023-4475-01 - Gatekeeper is an open source project that applies the OPA Constraint Framework to enforce policies on your Kubernetes clusters. This advisory contains the container images for Gatekeeper that include bug fixes and container upgrades.

Red Hat Security Advisory 2023-4471-01

Red Hat Security Advisory 2023-4471-01 - Red Hat OpenShift Serverless Client kn 1.29.1 provides a CLI to interact with Red Hat OpenShift Serverless 1.29.1. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms. This release includes security and bug fixes, and enhancements.

RHSA-2023:4472: Red Hat Security Advisory: Release of OpenShift Serverless 1.29.1

Red Hat OpenShift Serverless version 1.29.1 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated. * CVE-2023-24539: A flaw was found in golang where angle brackets (<>) were not considered dangerous characters when inserted into CSS contexts. Templates containin...

RHSA-2023:4437: Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.13.1 security and bug fix update

Updated images that fix several bugs are now available for Red Hat OpenShift Data Foundation 4.13.1 on Red Hat Enterprise Linux 8 from Red Hat Container Registry. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.

Zimbra issues awaited patch for actively exploited vulnerability

Categories: Exploits and vulnerabilities Categories: News Tags: Zimbra Tags: ZCS Tags: CVE-2023-38750 Tags: CISA Tags: CVE-2023-0464 Tags: TAG Tags: XSS Tags: JSP Tags: XML Tags: Zimbra has released ZCS 10.0.2 that fixes two security issues, including the known bug that could lead to exposure of internal JSP and XML files. (Read more...) The post Zimbra issues awaited patch for actively exploited vulnerability appeared first on Malwarebytes Labs.

Red Hat Security Advisory 2023-4226-01

Red Hat Security Advisory 2023-4226-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.6.

Red Hat Security Advisory 2023-4225-01

Red Hat Security Advisory 2023-4225-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.6.

Red Hat Security Advisory 2023-4290-01

Red Hat Security Advisory 2023-4290-01 - OpenShift sandboxed containers 1.4.1 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.

RHSA-2023:4226: Red Hat Security Advisory: OpenShift Container Platform 4.13.6 bug fix and security update

Red Hat OpenShift Container Platform release 4.13.6 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number...

RHSA-2023:4290: Red Hat Security Advisory: OpenShift sandboxed containers 1.4.1 security update

OpenShift sandboxed containers 1.4.1 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.

Red Hat Security Advisory 2023-4276-01

Red Hat Security Advisory 2023-4276-01 - An update is now available for Red Hat DevWorkspace Operator. Red Hat Product Security has rated this update as having a security impact of Moderate.

Red Hat Security Advisory 2023-4093-01

Red Hat Security Advisory 2023-4093-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.5. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-4091-01

Red Hat Security Advisory 2023-4091-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.5. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-4090-01

Red Hat Security Advisory 2023-4090-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.5.

RHSA-2023:4093: Red Hat Security Advisory: OpenShift Container Platform 4.13.5 security update

Red Hat OpenShift Container Platform release 4.13.5 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1260: An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions "update, patch" the "po...

RHSA-2023:4091: Red Hat Security Advisory: OpenShift Container Platform 4.13.5 security update

Red Hat OpenShift Container Platform release 4.13.5 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server c...

RHSA-2023:4090: Red Hat Security Advisory: OpenShift Container Platform 4.13.5 security update

Red Hat OpenShift Container Platform release 4.13.5 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server c...

RHSA-2023:4238: Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.11.9 security and bug fix update

Updated images that fix several bugs are now available for Red Hat OpenShift Data Foundation 4.11.9 on Red Hat Enterprise Linux 8 from Red Hat Container Registry. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.

Red Hat Security Advisory 2023-4204-01

Red Hat Security Advisory 2023-4204-01 - VolSync is a Kubernetes operator that enables asynchronous replication of persistent volumes within a cluster, or across clusters. After deploying the VolSync operator, it can create and maintain copies of your persistent data.

CVE-2023-22062: Oracle Critical Patch Update Advisory - July 2023

Vulnerability in the Oracle Hyperion Financial Reporting product of Oracle Hyperion (component: Repository). The supported version that is affected is 11.2.13.0.000. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hyperion Financial Reporting. While the vulnerability is in Oracle Hyperion Financial Reporting, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hyperion Financial Reporting accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Hyperion Financial Reporting. CVSS 3.1 Base Score 8.5 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L).

RHSA-2023:4112: Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.2.8 security update

Red Hat OpenShift Service Mesh 2.2.8 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modu...

RHSA-2023:4113: Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.3.5 security update

Red Hat OpenShift Service Mesh 2.3.5 Containers Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptog...

RHSA-2023:4114: Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.1 security update

Red Hat OpenShift Service Mesh 2.4.1 Containers Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.

Red Hat Security Advisory 2023-4033-01

Red Hat Security Advisory 2023-4033-01 - Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-4035-01

Red Hat Security Advisory 2023-4035-01 - Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Issues addressed include buffer overflow and denial of service vulnerabilities.

RHSA-2023:4035: Red Hat Security Advisory: nodejs:18 security update

An update for the nodejs:18 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4904: A flaw was found in the c-ares package. The ares_set_sortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confidentiality and integrity. * CVE-2023-31124: A flaw was found in c-ares. This issue occurs...

RHSA-2023:4039: Red Hat Security Advisory: rh-nodejs14-nodejs security update

An update for rh-nodejs14-nodejs is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-31124: A flaw was found in c-ares. This issue occurs when cross-compiling c-ares and using the autotools build system, CARES_RANDOM_FILE will not be set, as seen when cross-compiling aarch64 android. As a result, it will downgrade to rand(), which could allow an attacker to utilize the lack of entropy by not using a CSPRNG. * CVE-2023-3113...

Red Hat Security Advisory 2023-4003-01

Red Hat Security Advisory 2023-4003-01 - As a Kubernetes user, I cannot connect easily connect services from one cluster with services on another cluster. Red Hat Application Interconnect enables me to create a service network and it allows geographically distributed services to connect as if they were all running in the same site. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3925-01

Red Hat Security Advisory 2023-3925-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.23.

Red Hat Security Advisory 2023-3924-01

Red Hat Security Advisory 2023-3924-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.12.23.

RHSA-2023:3924: Red Hat Security Advisory: OpenShift Container Platform 4.12.23 security update

Red Hat OpenShift Container Platform release 4.12.23 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-...

Red Hat Security Advisory 2023-3915-01

Red Hat Security Advisory 2023-3915-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.44.

Red Hat Security Advisory 2023-3914-01

Red Hat Security Advisory 2023-3914-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.11.44.

Red Hat Security Advisory 2023-3911-01

Red Hat Security Advisory 2023-3911-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.63.

Red Hat Security Advisory 2023-3910-01

Red Hat Security Advisory 2023-3910-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.10.63.

RHSA-2023:3910: Red Hat Security Advisory: Red Hat OpenShift Enterprise security update

Red Hat OpenShift Container Platform release 4.10.63 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.10. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server...

RHSA-2023:3914: Red Hat Security Advisory: Red Hat OpenShift Enterprise security update

Red Hat OpenShift Container Platform release 4.11.44 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-23772: A flaw was found in the big package of the math library in golang. The Rat.SetString could cause an overflow, and if left unhandled, it could lead to excessive memory use. This issu...

RHSA-2023:3915: Red Hat Security Advisory: OpenShift Container Platform 4.11.44 bug fix and security update

Red Hat OpenShift Container Platform release 4.11.44 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS...

CVE-2023-3089: cve-details

A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.

Red Hat Security Advisory 2023-3932-01

Red Hat Security Advisory 2023-3932-01 - Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL. Issues addressed include a bypass vulnerability.

RHSA-2023:3918: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.5 security and bug fix update

OpenShift API for Data Protection (OADP) 1.1.5 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in H...

RHSA-2023:3918: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.5 security and bug fix update

OpenShift API for Data Protection (OADP) 1.1.5 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in H...

RHSA-2023:3918: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.5 security and bug fix update

OpenShift API for Data Protection (OADP) 1.1.5 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in H...

RHSA-2023:3918: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.5 security and bug fix update

OpenShift API for Data Protection (OADP) 1.1.5 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in H...

RHSA-2023:3905: Red Hat Security Advisory: Network observability 1.3.0 for Openshift

Network Observability 1.3.0 for OpenShift Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24539: A flaw was found in golang where angle brackets (<>) were not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character could result in unexpectedly closing the CSS context and allowing for the injection of unexpected HMTL if executed with untrusted input. * CVE-2023-24540: A flaw was found in golang,...

RHSA-2023:3905: Red Hat Security Advisory: Network observability 1.3.0 for Openshift

Network Observability 1.3.0 for OpenShift Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24539: A flaw was found in golang where angle brackets (<>) were not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character could result in unexpectedly closing the CSS context and allowing for the injection of unexpected HMTL if executed with untrusted input. * CVE-2023-24540: A flaw was found in golang,...

RHSA-2023:3905: Red Hat Security Advisory: Network observability 1.3.0 for Openshift

Network Observability 1.3.0 for OpenShift Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24539: A flaw was found in golang where angle brackets (<>) were not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character could result in unexpectedly closing the CSS context and allowing for the injection of unexpected HMTL if executed with untrusted input. * CVE-2023-24540: A flaw was found in golang,...

RHSA-2023:3905: Red Hat Security Advisory: Network observability 1.3.0 for Openshift

Network Observability 1.3.0 for OpenShift Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24539: A flaw was found in golang where angle brackets (<>) were not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character could result in unexpectedly closing the CSS context and allowing for the injection of unexpected HMTL if executed with untrusted input. * CVE-2023-24540: A flaw was found in golang,...

RHSA-2023:3905: Red Hat Security Advisory: Network observability 1.3.0 for Openshift

Network Observability 1.3.0 for OpenShift Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24539: A flaw was found in golang where angle brackets (<>) were not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character could result in unexpectedly closing the CSS context and allowing for the injection of unexpected HMTL if executed with untrusted input. * CVE-2023-24540: A flaw was found in golang,...

Red Hat Security Advisory 2023-3796-01

Red Hat Security Advisory 2023-3796-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a bypass vulnerability.

Red Hat Security Advisory 2023-3781-01

Red Hat Security Advisory 2023-3781-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a bypass vulnerability.

Red Hat Security Advisory 2023-3614-01

Red Hat Security Advisory 2023-3614-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.4.

Red Hat Security Advisory 2023-3612-01

Red Hat Security Advisory 2023-3612-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.4. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3612-01

Red Hat Security Advisory 2023-3612-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.4. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3612-01

Red Hat Security Advisory 2023-3612-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.4. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3612-01

Red Hat Security Advisory 2023-3612-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.4. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3612-01

Red Hat Security Advisory 2023-3612-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.4. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3742-02

Red Hat Security Advisory 2023-3742-02 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. Issues addressed include bypass, denial of service, and remote SQL injection vulnerabilities.

Ubuntu Security Notice USN-6188-1

Ubuntu Security Notice 6188-1 - Matt Caswell discovered that OpenSSL incorrectly handled certain ASN.1 object identifiers. A remote attacker could possibly use this issue to cause OpenSSL to consume resources, resulting in a denial of service.

CVE-2023-32463: DSA-2023-200: Security Update for Dell VxRail for Multiple Third-Party Component Vulnerabilities

Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction.

CVE-2023-32463: DSA-2023-200: Security Update for Dell VxRail for Multiple Third-Party Component Vulnerabilities

Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction.

CVE-2023-32463: DSA-2023-200: Security Update for Dell VxRail for Multiple Third-Party Component Vulnerabilities

Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction.

CVE-2023-32463: DSA-2023-200: Security Update for Dell VxRail for Multiple Third-Party Component Vulnerabilities

Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction.

CVE-2023-32463: DSA-2023-200: Security Update for Dell VxRail for Multiple Third-Party Component Vulnerabilities

Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction.

RHSA-2023:3614: Red Hat Security Advisory: OpenShift Container Platform 4.13.4 bug fix and security update

Red Hat OpenShift Container Platform release 4.13.4 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number...

Red Hat Security Advisory 2023-3741-01

Red Hat Security Advisory 2023-3741-01 - The c-ares C library defines asynchronous DNS requests and provides name resolving API. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3715-01

Red Hat Security Advisory 2023-3715-01 - The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. Issues addressed include a memory leak vulnerability.

Red Hat Security Advisory 2023-3725-01

Red Hat Security Advisory 2023-3725-01 - The "less" utility is a text file browser that resembles "more", but allows users to move backwards in the file as well as forwards. Since "less" does not read the entire input file at startup, it also starts more quickly than ordinary text editors.

Red Hat Security Advisory 2023-3722-01

Red Hat Security Advisory 2023-3722-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library. Issues addressed include buffer over-read and denial of service vulnerabilities.

Red Hat Security Advisory 2023-3722-01

Red Hat Security Advisory 2023-3722-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library. Issues addressed include buffer over-read and denial of service vulnerabilities.

Red Hat Security Advisory 2023-3722-01

Red Hat Security Advisory 2023-3722-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library. Issues addressed include buffer over-read and denial of service vulnerabilities.

Red Hat Security Advisory 2023-3722-01

Red Hat Security Advisory 2023-3722-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library. Issues addressed include buffer over-read and denial of service vulnerabilities.

Red Hat Security Advisory 2023-3722-01

Red Hat Security Advisory 2023-3722-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library. Issues addressed include buffer over-read and denial of service vulnerabilities.

RHSA-2023:3742: Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.13.0 security and bug fix update

Updated images that include numerous enhancements, security, and bug fixes are now available in Red Hat Container Registry for Red Hat OpenShift Data Foundation 4.13.0 on Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-16250: A flaw was found in Vault and Vault Enterprise (“Vault”). In the affected versions of Vault, with the AWS Auth Method configured and under certain circumstances, the values relied upon by Vault to validate AWS IAM ident...

RHSA-2023:3741: Red Hat Security Advisory: c-ares security update

An update for c-ares is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-32067: A vulnerability was found in c-ares. This issue occurs due to a 0-byte UDP payload that can cause a Denial of Service.

RHSA-2023:3725: Red Hat Security Advisory: less security update

An update for less is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-46663: A vulnerability was found in less. This flaw allows crafted data to result in "less -R" not filtering ANSI escape sequences sent to the terminal.

Red Hat Security Advisory 2023-3677-01

Red Hat Security Advisory 2023-3677-01 - The c-ares C library defines asynchronous DNS requests and provides name resolving API. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3665-01

Red Hat Security Advisory 2023-3665-01 - The c-ares C library defines asynchronous DNS requests and provides name resolving API. Issues addressed include a denial of service vulnerability.

RHSA-2023:3677: Red Hat Security Advisory: c-ares security update

An update for c-ares is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-32067: A vulnerability was found in c-ares. This issue occurs due to a 0-byte UDP payload that can cause a Denial of Service.

Red Hat Security Advisory 2023-3660-01

Red Hat Security Advisory 2023-3660-01 - The c-ares C library defines asynchronous DNS requests and provides name resolving API. Issues addressed include a denial of service vulnerability.

RHSA-2023:3660: Red Hat Security Advisory: c-ares security update

An update for c-ares is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-32067: c-ares is an asynchronous resolver library. c-ares is vulnerable to denial of service. If a target resolver sends a query, the attacker forges a malformed UDP packet with a length of 0 and r...

Red Hat Security Advisory 2023-3644-01

Red Hat Security Advisory 2023-3644-01 - Red Hat OpenShift Service Mesh is the Red Hat distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation. This advisory covers container images for the release.

Red Hat Security Advisory 2023-3624-01

Red Hat Security Advisory 2023-3624-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Issues addressed include a denial of service vulnerability.

RHSA-2023:3644: Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.0

Red Hat OpenShift Service Mesh Containers for 2.4.0 Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24540: A flaw was found in golang, where not all valid JavaScript white-space characters were considered white space. Due to this issue, templates containing white-space characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution.

Red Hat Security Advisory 2023-3540-01

Red Hat Security Advisory 2023-3540-01 - Red Hat build of MicroShift is Red Hat's light-weight Kubernetes orchestration solution designed for edge device deployments and is built from the edge capabilities of Red Hat OpenShift. MicroShift is an application that is deployed on top of Red Hat Enterprise Linux devices at the edge, providing an efficient way to operate single-node clusters in these low-resource environments. This advisory contains the RPM packages for Red Hat build of MicroShift 4.13.3. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3540-01

Red Hat Security Advisory 2023-3540-01 - Red Hat build of MicroShift is Red Hat's light-weight Kubernetes orchestration solution designed for edge device deployments and is built from the edge capabilities of Red Hat OpenShift. MicroShift is an application that is deployed on top of Red Hat Enterprise Linux devices at the edge, providing an efficient way to operate single-node clusters in these low-resource environments. This advisory contains the RPM packages for Red Hat build of MicroShift 4.13.3. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3559-01

Red Hat Security Advisory 2023-3559-01 - The c-ares C library defines asynchronous DNS requests and provides name resolving API. Issues addressed include a denial of service vulnerability.

RHSA-2023:3624: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.10 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.10 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service. * CVE-2023-24536: A flaw was found in Golang Go, where it is vulnerable to a denial of service cause...

RHSA-2023:3624: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.10 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.10 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service. * CVE-2023-24536: A flaw was found in Golang Go, where it is vulnerable to a denial of service cause...

RHSA-2023:3624: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.10 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.10 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service. * CVE-2023-24536: A flaw was found in Golang Go, where it is vulnerable to a denial of service cause...

RHSA-2023:3624: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.10 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.10 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service. * CVE-2023-24536: A flaw was found in Golang Go, where it is vulnerable to a denial of service cause...

RHSA-2023:3624: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.10 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.10 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service. * CVE-2023-24536: A flaw was found in Golang Go, where it is vulnerable to a denial of service cause...

RHSA-2023:3584: Red Hat Security Advisory: c-ares security update

An update for c-ares is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-32067: c-ares is an asynchronous resolver library. c-ares is vulnerable to denial of service. If a target resolver sends a query, the attacker forges a malformed UDP packet with a length of 0 and returns them to the target resolver. The target resolver erroneously interprets the 0 length as a graceful shutdown of the connection. This issue has been patc...

RHSA-2023:3583: Red Hat Security Advisory: c-ares security update

An update for c-ares is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-32067: c-ares is an asynchronous resolver library. c-ares is vulnerable to denial of service. If a target resolver sends a query, the attacker forges a malformed UDP packet with a length of 0 and returns them to the target resolver. The target resolver erroneously interprets the 0 length as a graceful shutdown of the connection...

RHSA-2023:3540: Red Hat Security Advisory: OpenShift Container Platform 4.13.3 bug fix and security update

Red Hat OpenShift Container Platform release 4.13.3 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service. * CVE-2023-24536: A ...

Red Hat Security Advisory 2023-3555-01

Red Hat Security Advisory 2023-3555-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a bypass vulnerability.

RHSA-2023:3556: Red Hat Security Advisory: python3 security update

An update for python3 is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24329: A flaw was found in the Python package. An issue in the urllib.parse component could allow attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.This may lead to compromised Integrity.

Red Hat Security Advisory 2023-3410-01

Red Hat Security Advisory 2023-3410-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.20.

Ubuntu Security Notice USN-6140-1

Ubuntu Security Notice 6140-1 - It was discovered that Go did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a panic resulting in a denial of service. This issue only affected golang-1.19 on Ubuntu 22.10. It was discovered that Go did not properly validate the amount of memory and disk files ReadForm can consume. An attacker could possibly use this issue to cause a panic resulting in a denial of service. This issue only affected golang-1.19 on Ubuntu 22.10.

Ubuntu Security Notice USN-6140-1

Ubuntu Security Notice 6140-1 - It was discovered that Go did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a panic resulting in a denial of service. This issue only affected golang-1.19 on Ubuntu 22.10. It was discovered that Go did not properly validate the amount of memory and disk files ReadForm can consume. An attacker could possibly use this issue to cause a panic resulting in a denial of service. This issue only affected golang-1.19 on Ubuntu 22.10.

Ubuntu Security Notice USN-6140-1

Ubuntu Security Notice 6140-1 - It was discovered that Go did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a panic resulting in a denial of service. This issue only affected golang-1.19 on Ubuntu 22.10. It was discovered that Go did not properly validate the amount of memory and disk files ReadForm can consume. An attacker could possibly use this issue to cause a panic resulting in a denial of service. This issue only affected golang-1.19 on Ubuntu 22.10.

Red Hat Security Advisory 2023-3445-01

Red Hat Security Advisory 2023-3445-01 - An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3445-01

Red Hat Security Advisory 2023-3445-01 - An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3445-01

Red Hat Security Advisory 2023-3445-01 - An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3445-01

Red Hat Security Advisory 2023-3445-01 - An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3445-01

Red Hat Security Advisory 2023-3445-01 - An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Issues addressed include a denial of service vulnerability.

RHSA-2023:3455: Red Hat Security Advisory: Release of OpenShift Serverless 1.29.0

OpenShift Serverless version 1.29.0 contains a moderate security impact. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker ...

RHSA-2023:3455: Red Hat Security Advisory: Release of OpenShift Serverless 1.29.0

OpenShift Serverless version 1.29.0 contains a moderate security impact. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker ...

RHSA-2023:3445: Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update

An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-28235: A flaw was found in etcd, where etc-io could allow a remote attacker to gain elevated privileges on the system caused by a vulnerability in the debug function. By sending a specially crafted request, an attacker can gain elevated privileges. * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause e...

RHSA-2023:3445: Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update

An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-28235: A flaw was found in etcd, where etc-io could allow a remote attacker to gain elevated privileges on the system caused by a vulnerability in the debug function. By sending a specially crafted request, an attacker can gain elevated privileges. * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause e...

RHSA-2023:3445: Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update

An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-28235: A flaw was found in etcd, where etc-io could allow a remote attacker to gain elevated privileges on the system caused by a vulnerability in the debug function. By sending a specially crafted request, an attacker can gain elevated privileges. * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause e...

RHSA-2023:3445: Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update

An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-28235: A flaw was found in etcd, where etc-io could allow a remote attacker to gain elevated privileges on the system caused by a vulnerability in the debug function. By sending a specially crafted request, an attacker can gain elevated privileges. * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause e...

Red Hat Security Advisory 2023-3303-01

Red Hat Security Advisory 2023-3303-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.1.

RHSA-2023:3450: Red Hat Security Advisory: OpenShift Serverless Client kn 1.29.0 release

OpenShift Serverless 1.29.0 has been released. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of serv...

RHSA-2023:3450: Red Hat Security Advisory: OpenShift Serverless Client kn 1.29.0 release

OpenShift Serverless 1.29.0 has been released. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of serv...

RHSA-2023:3450: Red Hat Security Advisory: OpenShift Serverless Client kn 1.29.0 release

OpenShift Serverless 1.29.0 has been released. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of serv...

RHSA-2023:3450: Red Hat Security Advisory: OpenShift Serverless Client kn 1.29.0 release

OpenShift Serverless 1.29.0 has been released. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of serv...

RHSA-2023:3450: Red Hat Security Advisory: OpenShift Serverless Client kn 1.29.0 release

OpenShift Serverless 1.29.0 has been released. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of serv...

CVE-2023-28043: DSA-2023-164: Dell Secure Connect Gateway Security Update for Multiple Vulnerabilities

Dell SCG 5.14 contains an information disclosure vulnerability during the SRS to SCG upgrade path. A remote low privileged malicious user could potentially exploit this vulnerability to retrieve the plain text.

CVE-2023-28043: DSA-2023-164: Dell Secure Connect Gateway Security Update for Multiple Vulnerabilities

Dell SCG 5.14 contains an information disclosure vulnerability during the SRS to SCG upgrade path. A remote low privileged malicious user could potentially exploit this vulnerability to retrieve the plain text.

CVE-2023-28043: DSA-2023-164: Dell Secure Connect Gateway Security Update for Multiple Vulnerabilities

Dell SCG 5.14 contains an information disclosure vulnerability during the SRS to SCG upgrade path. A remote low privileged malicious user could potentially exploit this vulnerability to retrieve the plain text.

CVE-2023-28043: DSA-2023-164: Dell Secure Connect Gateway Security Update for Multiple Vulnerabilities

Dell SCG 5.14 contains an information disclosure vulnerability during the SRS to SCG upgrade path. A remote low privileged malicious user could potentially exploit this vulnerability to retrieve the plain text.

Debian Security Advisory 5417-1

Debian Linux Security Advisory 5417-1 - Multiple vulnerabilities have been discovered in OpenSSL, a Secure Sockets Layer toolkit.

Debian Security Advisory 5417-1

Debian Linux Security Advisory 5417-1 - Multiple vulnerabilities have been discovered in OpenSSL, a Secure Sockets Layer toolkit.

Debian Security Advisory 5417-1

Debian Linux Security Advisory 5417-1 - Multiple vulnerabilities have been discovered in OpenSSL, a Secure Sockets Layer toolkit.

Debian Security Advisory 5417-1

Debian Linux Security Advisory 5417-1 - Multiple vulnerabilities have been discovered in OpenSSL, a Secure Sockets Layer toolkit.

Ubuntu Security Notice USN-6126-1

Ubuntu Security Notice 6126-1 - It was discovered that libvirt incorrectly handled the nwfilter driver. A local attacker could possibly use this issue to cause libvirt to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS. It was discovered that libvirt incorrectly handled queries for the SR-IOV PCI device capabilities. A local attacker could possibly use this issue to cause libvirt to consume resources, leading to a denial of service.

RHSA-2023:3303: Red Hat Security Advisory: OpenShift Container Platform 4.13.1 packages and security update

Red Hat OpenShift Container Platform release 4.13.1 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a ...

Ubuntu Security Notice USN-6119-1

Ubuntu Security Notice 6119-1 - Matt Caswell discovered that OpenSSL incorrectly handled certain ASN.1 object identifiers. A remote attacker could possibly use this issue to cause OpenSSL to consume resources, resulting in a denial of service. Anton Romanov discovered that OpenSSL incorrectly handled AES-XTS cipher decryption on 64-bit ARM platforms. An attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04.

Ubuntu Security Notice USN-6119-1

Ubuntu Security Notice 6119-1 - Matt Caswell discovered that OpenSSL incorrectly handled certain ASN.1 object identifiers. A remote attacker could possibly use this issue to cause OpenSSL to consume resources, resulting in a denial of service. Anton Romanov discovered that OpenSSL incorrectly handled AES-XTS cipher decryption on 64-bit ARM platforms. An attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04.

CVE-2023-2650

Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience notable to very long delays when processing those messages, which may lead to a Denial of Service. An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers - most of which have no size limit. OBJ_obj2txt() may be used to translate an ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL type ASN1_OBJECT) to its canonical numeric text form, which are the sub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by periods. When one of the sub-identifiers in the OBJECT IDENTIFIER is very large (these are sizes that are seen as absurdly large, taking up tens or hundreds of KiBs), the translation to a decimal number in text may take a very long time. T...

Red Hat Security Advisory 2023-3323-01

Red Hat Security Advisory 2023-3323-01 - Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.

Red Hat Security Advisory 2023-3323-01

Red Hat Security Advisory 2023-3323-01 - Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.

RHSA-2023:3323: Red Hat Security Advisory: go-toolset-1.19 and go-toolset-1.19-golang security update

An update for go-toolset-1.19 and go-toolset-1.19-golang is now available for Red Hat Developer Tools. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24537: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by an infinite loop due to integer overflow when calling any of the Parse functions. By sending a specially crafted input, a remote attacker can cause a denial of service. * CVE-2023-24538: A flaw was found in Golang Go. This flaw ...

RHSA-2023:3323: Red Hat Security Advisory: go-toolset-1.19 and go-toolset-1.19-golang security update

An update for go-toolset-1.19 and go-toolset-1.19-golang is now available for Red Hat Developer Tools. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24537: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by an infinite loop due to integer overflow when calling any of the Parse functions. By sending a specially crafted input, a remote attacker can cause a denial of service. * CVE-2023-24538: A flaw was found in Golang Go. This flaw ...

RHSA-2023:3318: Red Hat Security Advisory: go-toolset and golang security update

An update for go-toolset and golang is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24540: A flaw was found in golang, where not all valid JavaScript white-space characters were considered white space. Due to this issue, templates containing white-space characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution.

Red Hat Security Advisory 2023-3167-01

Red Hat Security Advisory 2023-3167-01 - New Red Hat build of Cryostat 2.3.0 on RHEL 8 container images have been released, adding a variety of features and bug fixes. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3167-01

Red Hat Security Advisory 2023-3167-01 - New Red Hat build of Cryostat 2.3.0 on RHEL 8 container images have been released, adding a variety of features and bug fixes. Issues addressed include a denial of service vulnerability.

Ubuntu Security Notice USN-6088-1

Ubuntu Security Notice 6088-1 - It was discovered that runC incorrectly made /sys/fs/cgroup writable when in rootless mode. An attacker could possibly use this issue to escalate privileges. It was discovered that runC incorrectly performed access control when mounting /proc to non-directories. An attacker could possibly use this issue to escalate privileges. It was discovered that runC incorrectly handled /proc and /sys mounts inside a container. An attacker could possibly use this issue to bypass AppArmor, and potentially SELinux.

Red Hat Security Advisory 2023-1325-01

Red Hat Security Advisory 2023-1325-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.0. Issues addressed include bypass, denial of service, and information leakage vulnerabilities.

Red Hat Security Advisory 2023-1328-01

Red Hat Security Advisory 2023-1328-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include denial of service and out of bounds read vulnerabilities.

Red Hat Security Advisory 2023-1326-01

Red Hat Security Advisory 2023-1326-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.0. Issues addressed include bypass, denial of service, information leakage, out of bounds read, and remote SQL injection vulnerabilities.

RHSA-2023:3167: Red Hat Security Advisory: Red Hat build of Cryostat 2.3.0: new RHEL 8 container images

New Red Hat build of Cryostat 2.3.0 on RHEL 8 container images are now availableThis content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition. * CVE-2022-41725: A flaw was found in Go, where it is vulnerable to a denial of service caused by an excessive resource consumption...

RHSA-2023:1326: Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update

Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: A flaw was found in go-yaml. This issue occurs due to unbounded alias chasing, where a maliciously crafted YAML file can cause the system to consume significant system resources. If p...

RHSA-2023:1326: Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update

Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: A flaw was found in go-yaml. This issue occurs due to unbounded alias chasing, where a maliciously crafted YAML file can cause the system to consume significant system resources. If p...

Red Hat Security Advisory 2023-1327-01

Red Hat Security Advisory 2023-1327-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.0.

Red Hat Security Advisory 2023-1327-01

Red Hat Security Advisory 2023-1327-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.0.

RHSA-2023:3083: Red Hat Security Advisory: go-toolset:rhel8 security and bug fix update

An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition. * CVE-2022-41725: A flaw was found in Go, where it is vulnerable to a den...

RHSA-2023:3083: Red Hat Security Advisory: go-toolset:rhel8 security and bug fix update

An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition. * CVE-2022-41725: A flaw was found in Go, where it is vulnerable to a den...

CVE-2023-2700: Invalid Bug ID

A vulnerability was found in libvirt. This security flaw ouccers due to repeatedly querying an SR-IOV PCI device's capabilities that exposes a memory leak caused by a failure to free the virPCIVirtualFunction array within the parent struct's g_autoptr cleanup.

CVE-2023-24540: [security] Go 1.20.4 and Go 1.19.9 are released

Not all valid JavaScript whitespace characters are considered to be whitespace. Templates containing whitespace characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution.

Red Hat Security Advisory 2023-2728-01

Red Hat Security Advisory 2023-2728-01 - The Red Hat OpenShift Distributed Tracing 2.8 container images have been updated. CVE-2022-41717 was fixed as part of this release. Users of Red Hat OpenShift Distributed Tracing 2.8 container images are advised to upgrade to these updated images, which contain backported patches to correct these security issues, fix these bugs, and add these enhancements.

Ubuntu Security Notice USN-6039-1

Ubuntu Security Notice 6039-1 - It was discovered that OpenSSL was not properly managing file locks when processing policy constraints. If a user or automated system were tricked into processing a certificate chain with specially crafted policy constraints, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 22.10. David Benjamin discovered that OpenSSL was not properly performing the verification of X.509 certificate chains that include policy constraints, which could lead to excessive resource consumption. If a user or automated system were tricked into processing a specially crafted X.509 certificate chain that includes policy constraints, a remote attacker could possibly use this issue to cause a denial of service.

Ubuntu Security Notice USN-6039-1

Ubuntu Security Notice 6039-1 - It was discovered that OpenSSL was not properly managing file locks when processing policy constraints. If a user or automated system were tricked into processing a certificate chain with specially crafted policy constraints, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 22.10. David Benjamin discovered that OpenSSL was not properly performing the verification of X.509 certificate chains that include policy constraints, which could lead to excessive resource consumption. If a user or automated system were tricked into processing a specially crafted X.509 certificate chain that includes policy constraints, a remote attacker could possibly use this issue to cause a denial of service.

Ubuntu Security Notice USN-6039-1

Ubuntu Security Notice 6039-1 - It was discovered that OpenSSL was not properly managing file locks when processing policy constraints. If a user or automated system were tricked into processing a certificate chain with specially crafted policy constraints, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 22.10. David Benjamin discovered that OpenSSL was not properly performing the verification of X.509 certificate chains that include policy constraints, which could lead to excessive resource consumption. If a user or automated system were tricked into processing a specially crafted X.509 certificate chain that includes policy constraints, a remote attacker could possibly use this issue to cause a denial of service.

Ubuntu Security Notice USN-6038-1

Ubuntu Security Notice 6038-1 - It was discovered that the Go net/http module incorrectly handled Transfer-Encoding headers in the HTTP/1 client. A remote attacker could possibly use this issue to perform an HTTP Request Smuggling attack. It was discovered that Go did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a panic resulting into a denial of service.

CVE-2023-1255

Issue summary: The AES-XTS cipher decryption implementation for 64 bit ARM platform contains a bug that could cause it to read past the input buffer, leading to a crash. Impact summary: Applications that use the AES-XTS algorithm on the 64 bit ARM platform can crash in rare circumstances. The AES-XTS algorithm is usually used for disk encryption. The AES-XTS cipher decryption implementation for 64 bit ARM platform will read past the end of the ciphertext buffer if the ciphertext size is 4 mod 5, e.g. 144 bytes or 1024 bytes. If the memory after the ciphertext buffer is unmapped, this will trigger a crash which results in a denial of service. If an attacker can control the size and location of the ciphertext buffer being decrypted by an application using AES-XTS on 64 bit ARM, the application is affected. This is fairly unlikely making this issue a Low severity one.

CVE-2023-24536

Multipart form parsing can consume large amounts of CPU and memory when processing form inputs containing very large numbers of parts. This stems from several causes: 1. mime/multipart.Reader.ReadForm limits the total memory a parsed multipart form can consume. ReadForm can undercount the amount of memory consumed, leading it to accept larger inputs than intended. 2. Limiting total memory does not account for increased pressure on the garbage collector from large numbers of small allocations in forms with many parts. 3. ReadForm can allocate a large number of short-lived buffers, further increasing pressure on the garbage collector. The combination of these factors can permit an attacker to cause an program that parses multipart forms to consume large amounts of CPU and memory, potentially resulting in a denial of service. This affects programs that use mime/multipart.Reader.ReadForm, as well as form parsing in the net/http package with the Request methods FormFile, FormValue, ParseMul...

CVE-2023-24537

Calling any of the Parse functions on Go source code which contains //line directives with very large line numbers can cause an infinite loop due to integer overflow.

CVE-2023-24538

Templates do not properly consider backticks (`) as Javascript string delimiters, and do not escape them as expected. Backticks are used, since ES6, for JS template literals. If a template contains a Go template action within a Javascript template literal, the contents of the action can be used to terminate the literal, injecting arbitrary Javascript code into the Go template. As ES6 template literals are rather complex, and themselves can do string interpolation, the decision was made to simply disallow Go template actions from being used inside of them (e.g. "var a = {{.}}"), since there is no obviously safe way to allow this behavior. This takes the same approach as github.com/google/safehtml. With fix, Template.Parse returns an Error when it encounters templates like this, with an ErrorCode of value 12. This ErrorCode is currently unexported, but will be exported in the release of Go 1.21. Users who rely on the previous behavior can re-enable it using the GODEBUG flag jstmpllitinte...

Red Hat Security Advisory 2023-1639-01

Red Hat Security Advisory 2023-1639-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-1639-01

Red Hat Security Advisory 2023-1639-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes. Issues addressed include a denial of service vulnerability.

RHSA-2023:1639: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.3 security and bug fix update

OpenShift API for Data Protection (OADP) 1.1.3 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition. * CVE-2022-41725: A flaw was found in Go, where it is vulnerable to a denial of service caused by a...

RHSA-2023:1639: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.3 security and bug fix update

OpenShift API for Data Protection (OADP) 1.1.3 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition. * CVE-2022-41725: A flaw was found in Go, where it is vulnerable to a denial of service caused by a...

CVE-2023-28642: AppArmor/SELinux bypass with symlinked /proc

runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked `/proc`. See PR #3785 for details. users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image.

CVE-2023-0465

Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVE-2023-0466

The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.

CVE-2023-0464

A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

Ubuntu Security Notice USN-5960-1

Ubuntu Security Notice 5960-1 - Yebo Cao discovered that Python incorrectly handled certain URLs. An attacker could possibly use this issue to bypass blocklisting methods by supplying a URL that starts with blank characters.

Red Hat Security Advisory 2023-1154-01

Red Hat Security Advisory 2023-1154-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.54.

RHSA-2023:1154: Red Hat Security Advisory: OpenShift Container Platform 4.10.54 security update

Red Hat OpenShift Container Platform release 4.10.54 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4238: A flaw was found in goutils where randomly generated alphanumeric strings contain significantly less entropy than expected. Both the `RandomAlphaNumeric` and `CryptoRandomAlphaNumeric` functions always return strings containing at least one digit from 0 to 9. This issu...

Red Hat Security Advisory 2023-1179-01

Red Hat Security Advisory 2023-1179-01 - Red Hat OpenShift Serverless Client kn 1.27.1 provides a CLI to interact with Red Hat OpenShift Serverless 1.27.1. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms. This release includes security and bug fixes, and enhancements.

Red Hat Security Advisory 2023-0930-01

Red Hat Security Advisory 2023-0930-01 - Update information for Logging Subsystem 5.5.8 in Red Hat OpenShift. Red Hat Product Security has rated this update as having a security impact of Moderate.

CVE-2023-27561: CVE-2019-19921 re-introduction/regression · Issue #3751 · opencontainers/runc

runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression.

Red Hat Security Advisory 2023-0899-01

Red Hat Security Advisory 2023-0899-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.10.53.

RHSA-2023:0899: Red Hat Security Advisory: OpenShift Container Platform 4.10.53 bug fix and security update

Red Hat OpenShift Container Platform release 4.10.53 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.10. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4238: A flaw was found in goutils where randomly generated alphanumeric strings contain significantly less entropy than expected. Both the `RandomAlphaNumeric` and `CryptoRandomAlphaNumeri...

CVE-2022-41725: net/http, mime/multipart: denial of service from excessive resource consumption (CVE-2022-41725) · Issue #58006 · golang/go

A denial of service is possible from excessive resource consumption in net/http and mime/multipart. Multipart form parsing with mime/multipart.Reader.ReadForm can consume largely unlimited amounts of memory and disk files. This also affects form parsing in the net/http package with the Request methods FormFile, FormValue, ParseMultipartForm, and PostFormValue. ReadForm takes a maxMemory parameter, and is documented as storing "up to maxMemory bytes +10MB (reserved for non-file parts) in memory". File parts which cannot be stored in memory are stored on disk in temporary files. The unconfigurable 10MB reserved for non-file parts is excessively large and can potentially open a denial of service vector on its own. However, ReadForm did not properly account for all memory consumed by a parsed form, such as map entry overhead, part names, and MIME headers, permitting a maliciously crafted form to consume well over 10MB. In addition, ReadForm contained no limit on the number of disk files cr...

CVE-2022-41724: [security] Go 1.20.1 and Go 1.19.6 are released

Large handshake records may cause panics in crypto/tls. Both clients and servers may send large TLS handshake records which cause servers and clients, respectively, to panic when attempting to construct responses. This affects all TLS 1.3 clients, TLS 1.2 clients which explicitly enable session resumption (by setting Config.ClientSessionCache to a non-nil value), and TLS 1.3 servers which request client certificates (by setting Config.ClientAuth >= RequestClientCert).

CVE-2022-41724: [security] Go 1.20.1 and Go 1.19.6 are released

Large handshake records may cause panics in crypto/tls. Both clients and servers may send large TLS handshake records which cause servers and clients, respectively, to panic when attempting to construct responses. This affects all TLS 1.3 clients, TLS 1.2 clients which explicitly enable session resumption (by setting Config.ClientSessionCache to a non-nil value), and TLS 1.3 servers which request client certificates (by setting Config.ClientAuth >= RequestClientCert).

RHSA-2023:0728: Red Hat Security Advisory: OpenShift Container Platform 4.12.3 security update

Red Hat OpenShift Container Platform release 4.12.3 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4238: A flaw was found in goutils where randomly generated alphanumeric strings contain significantly less entropy than expected. Both the `RandomAlphaNumeric` and `CryptoRandomAlphaNumeric...

RHSA-2023:0632: Red Hat Security Advisory: Red Hat OpenShift (Logging Subsystem) security update

An update is now available for the Logging subsystem for Red Hat OpenShift 5.4. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30123: A flaw was found in ruby gem-rack. This flaw allows a malicious actor to craft requests that can cause shell escape sequences to be written to the terminal via rack's `Lint` middleware and `CommonLogger` middleware. This issue can leverage these escape sequences to execute commands in the victim's terminal. * CVE-2022-41717: A flaw was f...

Ubuntu Security Notice USN-5848-1

Ubuntu Security Notice 5848-1 - David Leadbeater discovered that less was not properly handling escape sequences when displaying raw control characters. A maliciously formed OSC 8 hyperlink could possibly be used by an attacker to cause a denial of service.

CVE-2022-46663: End OSC8 hyperlink on invalid embedded escape sequence. · gwsw/less@a78e135

In GNU Less before 609, crafted data can result in "less -R" not filtering ANSI escape sequences sent to the terminal.

CVE-2022-41720: [security] Go 1.19.4 and Go 1.18.9 are released

On Windows, restricted files can be accessed via os.DirFS and http.Dir. The os.DirFS function and http.Dir type provide access to a tree of files rooted at a given directory. These functions permit access to Windows device files under that root. For example, os.DirFS("C:/tmp").Open("COM1") opens the COM1 device. Both os.DirFS and http.Dir only provide read-only filesystem access. In addition, on Windows, an os.DirFS for the directory (the root of the current drive) can permit a maliciously crafted path to escape from the drive and access any path on the system. With fix applied, the behavior of os.DirFS("") has changed. Previously, an empty root was treated equivalently to "/", so os.DirFS("").Open("tmp") would open the path "/tmp". This now returns an error.