Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:3910: Red Hat Security Advisory: Red Hat OpenShift Enterprise security update

Red Hat OpenShift Container Platform release 4.10.63 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.10. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.
  • CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.
  • CVE-2023-24540: A flaw was found in golang, where not all valid JavaScript white-space characters were considered white space. Due to this issue, templates containing white-space characters outside of the character set “\t\n\f\r\u0020\u2028\u2029” in JavaScript contexts that also contain actions may not be properly sanitized during execution.
Red Hat Security Data
#vulnerability#web#linux#red_hat#redis#java#kubernetes#perl#ibm#rpm#docker

Synopsis

Important: Red Hat OpenShift Enterprise security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Red Hat OpenShift Container Platform release 4.10.63 is now available with
updates to packages and images that fix several bugs and add enhancements.

This release includes a security update for Red Hat OpenShift Container
Platform 4.10.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

Description

Red Hat OpenShift Container Platform is Red Hat’s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.

This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.10.63. See the following advisory for the container images for this release:

https://access.redhat.com/errata/RHSA-2023:3911

Security Fix(es):

  • openshift: OCP & FIPS mode (CVE-2023-3089)
  • golang: html/template: improper handling of JavaScript whitespace (CVE-2023-24540)
  • golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

All OpenShift Container Platform 4.10 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html

Affected Products

  • Red Hat OpenShift Container Platform 4.10 for RHEL 8 x86_64
  • Red Hat OpenShift Container Platform 4.10 for RHEL 7 x86_64
  • Red Hat OpenShift Container Platform for Power 4.10 for RHEL 8 ppc64le
  • Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.10 for RHEL 8 s390x
  • Red Hat OpenShift Container Platform for ARM 64 4.10 aarch64

Fixes

  • BZ - 2161274 - CVE-2022-41717 golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
  • BZ - 2196027 - CVE-2023-24540 golang: html/template: improper handling of JavaScript whitespace
  • BZ - 2212085 - CVE-2023-3089 openshift: OCP & FIPS mode

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://access.redhat.com/security/vulnerabilities/RHSB-2023-001

Red Hat OpenShift Container Platform 4.10 for RHEL 8

SRPM

buildah-1.19.9-1.1.el8.src.rpm

SHA-256: 555a156ba09cefad6b8f242cdeecc002d65fa8b4bf0d0ad9bccaf10b0cab3d1b

jenkins-2-plugins-4.10.1687341544-1.el8.src.rpm

SHA-256: 7836ee37c9fc93f46c1b8e412711faedecb20a5fe4dd93606dea66d61cf47389

jenkins-2.401.1.1687268694-1.el8.src.rpm

SHA-256: c6a841ccb711ebbaaf1dadce31b7ebc358bead2f611847deb942b8221ce4d886

kernel-4.18.0-305.95.1.el8_4.src.rpm

SHA-256: aacd435f65d78cca1ae4c9e2f8c6c91858936a880971587586236a9d6144cc48

kernel-rt-4.18.0-305.95.1.rt7.170.el8_4.src.rpm

SHA-256: 5d141d889bcb7e7b458bfcedb1bae5bd2969e6afaebb52ecf56343489309dbd2

openshift-4.10.0-202306170106.p0.g16bcd69.assembly.stream.el8.src.rpm

SHA-256: 4958bca30f0b6d33f3c6a6bc893ab917b61af00b59e9769111bf3bb81afaf990

openshift-ansible-4.10.0-202306170106.p0.g72c7be6.assembly.stream.el8.src.rpm

SHA-256: 31097ebe7e9fd0b32afaf7fc9a5fd0a2c695f56339cb8ea2059f126581bee214

openshift-clients-4.10.0-202306261054.p0.g22cf04a.assembly.stream.el8.src.rpm

SHA-256: c4d85a65d9bd3adbb4a8341eeb3f1725d52b27d2002820cb8441a165bd25155c

openshift-kuryr-4.10.0-202306170106.p0.g8e4df8b.assembly.stream.el8.src.rpm

SHA-256: 394b35f9d4c67366157f0988972014b5244385ac7723d0bef398653927530f23

podman-3.2.3-1.1.rhaos4.10.el8.src.rpm

SHA-256: c57f38830d81f1befef8f686b93c1530f9ea341b7f8f842a88a695ddbbdd6308

skopeo-1.2.4-1.1.el8.src.rpm

SHA-256: 5bf55cf968b0b1312cf99235ccd3d696dde325c7ec72513b32362fae9573a1bd

x86_64

bpftool-4.18.0-305.95.1.el8_4.x86_64.rpm

SHA-256: 2a288bca04be41ce3a6867fe671691bff3087ef0f87b483047d92fc934f4f09b

bpftool-debuginfo-4.18.0-305.95.1.el8_4.x86_64.rpm

SHA-256: 46a7d47d1a9be8687d2e6f9876c8463d02608c4940a4007dfa5838ea74c5e310

buildah-1.19.9-1.1.el8.x86_64.rpm

SHA-256: fa90e3c32aac8363a58fa86f9a963844438f5343958d3a488c06cc06808e248c

buildah-debuginfo-1.19.9-1.1.el8.x86_64.rpm

SHA-256: 9ef90793a7d60444857d4fa1724128d2eeb5538ec102599ffcaf82cdec5d2e90

buildah-debugsource-1.19.9-1.1.el8.x86_64.rpm

SHA-256: b05fbaac9449b1124d92f58393e38068d7528d67572dfd129c92902f9330958e

buildah-tests-1.19.9-1.1.el8.x86_64.rpm

SHA-256: ac9469b3c9c45bb369d9eb3cbbf4d079a4ef0e8dd1acd3846b5dda7712abe6d7

buildah-tests-debuginfo-1.19.9-1.1.el8.x86_64.rpm

SHA-256: 1a6f21551177e10a9b4e5c5ece44f74b78d4fc9d64dbe5a641bdd1ef5004c5f3

containers-common-1.2.4-1.1.el8.x86_64.rpm

SHA-256: a0247fec80b028d6467f092d0141cb51a47b495e67a496c79b8fcaa012140aaf

jenkins-2-plugins-4.10.1687341544-1.el8.noarch.rpm

SHA-256: 02e0411765bf43a5023118431a0740f410bc1e78a23e6cc5acf6e02b238f1bd1

jenkins-2.401.1.1687268694-1.el8.noarch.rpm

SHA-256: 3570e33bc0efc0fb7ae09c65e209cd2047004fbc9512879a35124c95c13beb3a

kernel-4.18.0-305.95.1.el8_4.x86_64.rpm

SHA-256: a19e7ad835a8c8990dab507e16f0b4cf7d1da8d4c51b7db603173b64b3f5e385

kernel-core-4.18.0-305.95.1.el8_4.x86_64.rpm

SHA-256: 2ccdb3779f9e60c2598563e5d344d61679d2b448e44f061c3e04b43eaf16978c

kernel-cross-headers-4.18.0-305.95.1.el8_4.x86_64.rpm

SHA-256: de64de40566a830519eb4a055c632e8a741703f79d5677f594cba3894ebc6c4d

kernel-debug-4.18.0-305.95.1.el8_4.x86_64.rpm

SHA-256: a5ff196ca114571421e797548835db3322bfc37a2fc4fc2d6af07b2efd18d8e1

kernel-debug-core-4.18.0-305.95.1.el8_4.x86_64.rpm

SHA-256: 43f4d2fa1b187be907f4fa7fe7815d3c1cab70ff139d3a361f1abf5e514e2283

kernel-debug-debuginfo-4.18.0-305.95.1.el8_4.x86_64.rpm

SHA-256: 9de296cdd75e4cc8c43018e85ef548a7fb1967b12d1c2047bb4d41055399fe5d

kernel-debug-devel-4.18.0-305.95.1.el8_4.x86_64.rpm

SHA-256: e0c1dea16810c9c6b16eff097c869f083b0bf792d698c5a8e40dcc7017350b19

kernel-debug-modules-4.18.0-305.95.1.el8_4.x86_64.rpm

SHA-256: 01391fa07f3a58660657b1998ea9c125a58dce36331fd31b9443a92c321b81fa

kernel-debug-modules-extra-4.18.0-305.95.1.el8_4.x86_64.rpm

SHA-256: 74c2b96a6cdec487430d1ca6e4c1ffdfe992686109e80ede0b2349d7fa497074

kernel-debug-modules-internal-4.18.0-305.95.1.el8_4.x86_64.rpm

SHA-256: 14e56b7cefe5fff5c11c4fd4458af86ca01fd0ee84a139fd7f77abc3265ac4af

kernel-debuginfo-4.18.0-305.95.1.el8_4.x86_64.rpm

SHA-256: 657c095454cb1a9742d9533fe052f8ef067157d45531cae11b1843cbbd07d01d

kernel-debuginfo-common-x86_64-4.18.0-305.95.1.el8_4.x86_64.rpm

SHA-256: df4fc8b38173916ce379d9befa47dedcc4dce6e25d9cec3984c363f1e7e04e28

kernel-devel-4.18.0-305.95.1.el8_4.x86_64.rpm

SHA-256: 5a8c3b380822d24086733cfff5a242e9506c82aae7c7084845647985bb71d52a

kernel-doc-4.18.0-305.95.1.el8_4.noarch.rpm

SHA-256: 86a6834fce4d782e09392ac73f19232df8ed846462d9f184c18f38dc33f6b89c

kernel-headers-4.18.0-305.95.1.el8_4.x86_64.rpm

SHA-256: 3c405cec747f88a3f9615cd56c9c1207cfdfa1e519ad7d3dabdb4e05d8226fd9

kernel-ipaclones-internal-4.18.0-305.95.1.el8_4.x86_64.rpm

SHA-256: 566c75aba9d3682a01b10e4e8a3cf9c201302160ff31484e7d32cfdcbb83a00a

kernel-modules-4.18.0-305.95.1.el8_4.x86_64.rpm

SHA-256: e5f818c5fdd27184761dee0113a490ba7413d5e821d1f278783a38a7333db470

kernel-modules-extra-4.18.0-305.95.1.el8_4.x86_64.rpm

SHA-256: 85083ccaae92e40b0e4ddb676fca072082954ed0063f67d0f4eac3fcfc46ffa5

kernel-modules-internal-4.18.0-305.95.1.el8_4.x86_64.rpm

SHA-256: 1a3d875a51e7b7fc52f7c502f09bb5afcf4a4bf4712824196b84d28a29e70b9f

kernel-rt-4.18.0-305.95.1.rt7.170.el8_4.x86_64.rpm

SHA-256: 7bab034a3fe3125bb745c836f9a38b28fc2baa627466226e362e6688c0474d40

kernel-rt-core-4.18.0-305.95.1.rt7.170.el8_4.x86_64.rpm

SHA-256: d2649e57b10e427c4075706bd55d837469fec1358f3205f22296e92961f06eab

kernel-rt-debug-4.18.0-305.95.1.rt7.170.el8_4.x86_64.rpm

SHA-256: 1f8e8a8a331eace9abea5b501c264d7f9441734c1a8fc239054d7ca0286d383d

kernel-rt-debug-core-4.18.0-305.95.1.rt7.170.el8_4.x86_64.rpm

SHA-256: 7984e9f977cafd5b9e807647c545f982516eb1bce87548165c180bb6e9e23a2d

kernel-rt-debug-debuginfo-4.18.0-305.95.1.rt7.170.el8_4.x86_64.rpm

SHA-256: d7c83dc525e2992619c77a70743e0b6d23709c5fe4b7451cdf527e3edf656b9a

kernel-rt-debug-devel-4.18.0-305.95.1.rt7.170.el8_4.x86_64.rpm

SHA-256: 78c8a94140ba53bd4ec9bcbfd659afeedb868d337a28586aa789873e520952e9

kernel-rt-debug-kvm-4.18.0-305.95.1.rt7.170.el8_4.x86_64.rpm

SHA-256: 595aa69bc81ed7c4b9f2eeae95831c758824719e7e7ef2e10ae5b6b3ef411e3f

kernel-rt-debug-modules-4.18.0-305.95.1.rt7.170.el8_4.x86_64.rpm

SHA-256: 9f68e4cacd36432acfafc35651e613e47fe40f9ea1e219ba1a95c9971fe819e2

kernel-rt-debug-modules-extra-4.18.0-305.95.1.rt7.170.el8_4.x86_64.rpm

SHA-256: a9adffeca4cd0a50cba945a8901fd3df1a4e1200f451971f81c286a1678b2e29

kernel-rt-debug-modules-internal-4.18.0-305.95.1.rt7.170.el8_4.x86_64.rpm

SHA-256: eae55a33bbee368e68f387caa25cbe6cf9d79a84abe3178b79b4b6fc10eefb17

kernel-rt-debuginfo-4.18.0-305.95.1.rt7.170.el8_4.x86_64.rpm

SHA-256: a8dc481fc81dcc97ab15f76d7eafe0463d02ba634fada0f1a22e5e266ef4bc51

kernel-rt-debuginfo-common-x86_64-4.18.0-305.95.1.rt7.170.el8_4.x86_64.rpm

SHA-256: 9df84c470de79d2ff66107a09af9edb0a3bc3661b59500e1e141f819a83db775

kernel-rt-devel-4.18.0-305.95.1.rt7.170.el8_4.x86_64.rpm

SHA-256: 7f0d3f3a2c583da186a11b383dec121bbc080e006ffd4a59090023d372163d43

kernel-rt-kvm-4.18.0-305.95.1.rt7.170.el8_4.x86_64.rpm

SHA-256: 82d604c01ea1b84d7cb3a69e8cb7d31c606ef4d7aa8dae218d1831f07e7e06b2

kernel-rt-modules-4.18.0-305.95.1.rt7.170.el8_4.x86_64.rpm

SHA-256: e916c1669432175296a11f74a0309770b9e694490b614cf55b8823cf6a557917

kernel-rt-modules-extra-4.18.0-305.95.1.rt7.170.el8_4.x86_64.rpm

SHA-256: 2255a5525a1044afe9d9b5e6143819240b71c4ad583c95e617f0a4f6335cedf7

kernel-rt-modules-internal-4.18.0-305.95.1.rt7.170.el8_4.x86_64.rpm

SHA-256: f70365c8b69f018257fb0e2df50162d4ebf62b1cbb86f8cf0c7fcf9b4cfde09a

kernel-rt-selftests-internal-4.18.0-305.95.1.rt7.170.el8_4.x86_64.rpm

SHA-256: fa994d548a4a63e521a045714d0108bc637dff5cc0493c9a30f1d8075ee1976a

kernel-selftests-internal-4.18.0-305.95.1.el8_4.x86_64.rpm

SHA-256: 77eb916c879c704a70603990625b88d25989f9d50246ac826f210a439c5e1856

kernel-tools-4.18.0-305.95.1.el8_4.x86_64.rpm

SHA-256: 798fd5137178a569cee095dfa97bc13b777e7789266ea0f061bb7508406d53d0

kernel-tools-debuginfo-4.18.0-305.95.1.el8_4.x86_64.rpm

SHA-256: 176e81dfb56cdd71636721838f33b99f245dcbedbaebbd7ebeb75fe4a2d9f2ce

kernel-tools-libs-4.18.0-305.95.1.el8_4.x86_64.rpm

SHA-256: b04ecdf030d4b9153b7ebb2438cd754fa6a7a5450851194b95a97c37a62d320e

kernel-tools-libs-devel-4.18.0-305.95.1.el8_4.x86_64.rpm

SHA-256: 874516a0a39b783170eeda97f2992a22974ee3ec66f1961b4bbc6b9c90b30e92

openshift-ansible-4.10.0-202306170106.p0.g72c7be6.assembly.stream.el8.noarch.rpm

SHA-256: d1ef00bd48542771dbf87522f3fd64e23a853703ba867917ce96955035a8a512

openshift-ansible-test-4.10.0-202306170106.p0.g72c7be6.assembly.stream.el8.noarch.rpm

SHA-256: 5c896ac0718322b2300431448bc70d6e1fd7378c8c245919a3cf59100e134481

openshift-clients-4.10.0-202306261054.p0.g22cf04a.assembly.stream.el8.x86_64.rpm

SHA-256: 99dcc3a5b7d7fbd04195ba4e45425127d6b27e04885e4836a4c9ece7bf8fd662

openshift-clients-redistributable-4.10.0-202306261054.p0.g22cf04a.assembly.stream.el8.x86_64.rpm

SHA-256: 74597d6421b40b51b3714ee0e524baf12402595b970ca73d9fae22ac313ae104

openshift-hyperkube-4.10.0-202306170106.p0.g16bcd69.assembly.stream.el8.x86_64.rpm

SHA-256: 5d74cf63ec8092ea8a654fa0d870301f6986d36a8e9bfe6efe5d3e11aab29473

openshift-kuryr-cni-4.10.0-202306170106.p0.g8e4df8b.assembly.stream.el8.noarch.rpm

SHA-256: 5ac8aae5c74478e053896b7dc2af8298bc1c9dc9daf371abb2b6d53ca393f573

openshift-kuryr-common-4.10.0-202306170106.p0.g8e4df8b.assembly.stream.el8.noarch.rpm

SHA-256: 047ca6058439de4ebc71e63fdd6f88678a2d0c56b486795d4954682ca0e67830

openshift-kuryr-controller-4.10.0-202306170106.p0.g8e4df8b.assembly.stream.el8.noarch.rpm

SHA-256: 337bc08e7208b9807d0bd7870ecad78b5e271a6b78d5b94bd417693634f0a7da

perf-4.18.0-305.95.1.el8_4.x86_64.rpm

SHA-256: 2845e31db1a689b7e9dcb3c3897e41d19d9070d70f0d066d614aa6a385fae3e6

perf-debuginfo-4.18.0-305.95.1.el8_4.x86_64.rpm

SHA-256: ed5c26e9d697b610c451f2da5a14c857a5fb864fe42b3d657650a4c4107e99ab

podman-3.2.3-1.1.rhaos4.10.el8.x86_64.rpm

SHA-256: 5b9e39ea8f6d6543287fcdc3e0b91c123cd9a5fd7dbb6b6a9d57c53d29841475

podman-catatonit-3.2.3-1.1.rhaos4.10.el8.x86_64.rpm

SHA-256: fe631653d097e7660c9f5d6023116cb8cbaa5ece1ff3f07cc9dd3dca3d7272a0

podman-catatonit-debuginfo-3.2.3-1.1.rhaos4.10.el8.x86_64.rpm

SHA-256: ec046d69e2c58a51ea3d002419215f15bf337062f9d19cb43285f1c9b6e04fce

podman-debuginfo-3.2.3-1.1.rhaos4.10.el8.x86_64.rpm

SHA-256: 05a8d8ce9676bdbb0287787f7b8f2163d0b3519021360abe2a0bbff33a5957da

podman-debugsource-3.2.3-1.1.rhaos4.10.el8.x86_64.rpm

SHA-256: 9aea1e8478f01ac9b9b393995c034f1a43ebd589717d4c0d7c0aae909c2dcf97

podman-docker-3.2.3-1.1.rhaos4.10.el8.noarch.rpm

SHA-256: 347acbd05acc37c822e7e34e197840c0a19848253c0d3b636b64623e06f25c7c

podman-plugins-3.2.3-1.1.rhaos4.10.el8.x86_64.rpm

SHA-256: 750369ce59a84c076ea803f9e1273c53a0d832ae5036bd36ff39c3ff842ede3a

podman-plugins-debuginfo-3.2.3-1.1.rhaos4.10.el8.x86_64.rpm

SHA-256: 41c1493ca1b12dd90dea26c6031de1bf63efa4755bd65ed8f697855a6e6510cf

podman-remote-3.2.3-1.1.rhaos4.10.el8.x86_64.rpm

SHA-256: e2db05efdf8c8b9d6ee57e867cf1421279422de0ed0de2ac090fbd53d6970412

podman-remote-debuginfo-3.2.3-1.1.rhaos4.10.el8.x86_64.rpm

SHA-256: 374bd3125e602362728a3d253138a43288988e69a6a639415913323d12aeff23

podman-tests-3.2.3-1.1.rhaos4.10.el8.x86_64.rpm

SHA-256: ad55e204d2c562ccba0683559e2adafe2c7cb43d445a3dae1dd2dbd810e4e639

python3-kuryr-kubernetes-4.10.0-202306170106.p0.g8e4df8b.assembly.stream.el8.noarch.rpm

SHA-256: a9c6a5517887782e278b7c1cb0bbd6d08047a573aef688121936533dd1323785

python3-perf-4.18.0-305.95.1.el8_4.x86_64.rpm

SHA-256: 63912794e5cfd074dfcd7b914dbd5ea6bfeace48d80cb4c6fcdd385a991e6ad4

python3-perf-debuginfo-4.18.0-305.95.1.el8_4.x86_64.rpm

SHA-256: 8cc7f2bf438b7cec7d700a2d8767e8b20e6aece1c7180d72416428564b9dc2c9

skopeo-1.2.4-1.1.el8.x86_64.rpm

SHA-256: 816d90a344ed8a7f89cb73fb1b530a60a251c483417e09146e5700db1e9a2101

skopeo-debuginfo-1.2.4-1.1.el8.x86_64.rpm

SHA-256: 5baf6ee1704912cca3e26a05378e8daa1f1db75d7820c48d0bd9fd9e6bcdc1bb

skopeo-debugsource-1.2.4-1.1.el8.x86_64.rpm

SHA-256: db3aa1156b657cffe02036a5151dcf076fe30502710fff527f6a855debb541eb

skopeo-tests-1.2.4-1.1.el8.x86_64.rpm

SHA-256: f2a91798c93fa868eba87c091a781004634a94ec987662bf9aa1ca1f52919dc1

Red Hat OpenShift Container Platform 4.10 for RHEL 7

SRPM

openshift-4.10.0-202306170106.p0.g16bcd69.assembly.stream.el7.src.rpm

SHA-256: af4f5287dad3278325250c7c241b29fa46223fcfe85e26159c40697d3426fcc8

openshift-ansible-4.10.0-202306170106.p0.g72c7be6.assembly.stream.el7.src.rpm

SHA-256: 3b411075130f3210ab3df2326b4104ad03ccdd64b4c519daeadaad3f47cc86fe

openshift-clients-4.10.0-202306261054.p0.g22cf04a.assembly.stream.el7.src.rpm

SHA-256: da5a0b1ae9a5f55dca29fed5be60752f7888e1ca1d86e27646239ee091d439c9

x86_64

openshift-ansible-4.10.0-202306170106.p0.g72c7be6.assembly.stream.el7.noarch.rpm

SHA-256: 3a5f40cca874303d1c5c7f20d5503aa8a613df4542478d725dc878394f833726

openshift-ansible-test-4.10.0-202306170106.p0.g72c7be6.assembly.stream.el7.noarch.rpm

SHA-256: 19bfd633d1506f9fdb3b0646939880a35db851ce4825268b7acb53751bf6d22c

openshift-clients-4.10.0-202306261054.p0.g22cf04a.assembly.stream.el7.x86_64.rpm

SHA-256: 57f176be2a12606e1d2e982c13f3b12286fee4f6f2e562748f262b48202b32ed

openshift-clients-redistributable-4.10.0-202306261054.p0.g22cf04a.assembly.stream.el7.x86_64.rpm

SHA-256: 6e1876cca2e7a8db22f7982f630b6aa671e57ce46d51bde6253024c2d66354f9

openshift-hyperkube-4.10.0-202306170106.p0.g16bcd69.assembly.stream.el7.x86_64.rpm

SHA-256: 0ec15302d7a0aff452409ea846b17b036d5648414927388979126be9ef98d281

Red Hat OpenShift Container Platform for Power 4.10 for RHEL 8

SRPM

buildah-1.19.9-1.1.el8.src.rpm

SHA-256: 555a156ba09cefad6b8f242cdeecc002d65fa8b4bf0d0ad9bccaf10b0cab3d1b

jenkins-2-plugins-4.10.1687341544-1.el8.src.rpm

SHA-256: 7836ee37c9fc93f46c1b8e412711faedecb20a5fe4dd93606dea66d61cf47389

jenkins-2.401.1.1687268694-1.el8.src.rpm

SHA-256: c6a841ccb711ebbaaf1dadce31b7ebc358bead2f611847deb942b8221ce4d886

kernel-4.18.0-305.95.1.el8_4.src.rpm

SHA-256: aacd435f65d78cca1ae4c9e2f8c6c91858936a880971587586236a9d6144cc48

openshift-4.10.0-202306170106.p0.g16bcd69.assembly.stream.el8.src.rpm

SHA-256: 4958bca30f0b6d33f3c6a6bc893ab917b61af00b59e9769111bf3bb81afaf990

openshift-ansible-4.10.0-202306170106.p0.g72c7be6.assembly.stream.el8.src.rpm

SHA-256: 31097ebe7e9fd0b32afaf7fc9a5fd0a2c695f56339cb8ea2059f126581bee214

openshift-clients-4.10.0-202306261054.p0.g22cf04a.assembly.stream.el8.src.rpm

SHA-256: c4d85a65d9bd3adbb4a8341eeb3f1725d52b27d2002820cb8441a165bd25155c

openshift-kuryr-4.10.0-202306170106.p0.g8e4df8b.assembly.stream.el8.src.rpm

SHA-256: 394b35f9d4c67366157f0988972014b5244385ac7723d0bef398653927530f23

podman-3.2.3-1.1.rhaos4.10.el8.src.rpm

SHA-256: c57f38830d81f1befef8f686b93c1530f9ea341b7f8f842a88a695ddbbdd6308

skopeo-1.2.4-1.1.el8.src.rpm

SHA-256: 5bf55cf968b0b1312cf99235ccd3d696dde325c7ec72513b32362fae9573a1bd

ppc64le

bpftool-4.18.0-305.95.1.el8_4.ppc64le.rpm

SHA-256: 5c69d355fa30308c80c6d69160503e03457908885122348de6e21b9d63c70a0c

bpftool-debuginfo-4.18.0-305.95.1.el8_4.ppc64le.rpm

SHA-256: 5d6cd01650bb42cddb02c034f4d54285ebb944bcc125f4221fe8e3a0c1834f29

buildah-1.19.9-1.1.el8.ppc64le.rpm

SHA-256: a36fcff517e2c84fd32955d337ac2493e151b6c77fca8d1eca1656466aa5c248

buildah-debuginfo-1.19.9-1.1.el8.ppc64le.rpm

SHA-256: c3a0af3bcc989a92c0d20a487bebf2c886ea8b593a6b7c15a2252b021a63ab28

buildah-debugsource-1.19.9-1.1.el8.ppc64le.rpm

SHA-256: afce6dd5248d8ba5aa6cb7b5a1394e1fe47174a08a9e98bf9cc3895676bde723

buildah-tests-1.19.9-1.1.el8.ppc64le.rpm

SHA-256: 68735d822978b49e07725236fc0a092e40467168ff097ecdb68f6fc37eede867

buildah-tests-debuginfo-1.19.9-1.1.el8.ppc64le.rpm

SHA-256: ef0f70962a15fcafd5c4f7d46a3ddb7dee9bdcf79a1f70b5f3b99c4d88480255

containers-common-1.2.4-1.1.el8.ppc64le.rpm

SHA-256: 96f14487a41a7d1dbc950f2e504a22952c0acc2e31742410e36df6cbb0763414

jenkins-2-plugins-4.10.1687341544-1.el8.noarch.rpm

SHA-256: 02e0411765bf43a5023118431a0740f410bc1e78a23e6cc5acf6e02b238f1bd1

jenkins-2.401.1.1687268694-1.el8.noarch.rpm

SHA-256: 3570e33bc0efc0fb7ae09c65e209cd2047004fbc9512879a35124c95c13beb3a

kernel-4.18.0-305.95.1.el8_4.ppc64le.rpm

SHA-256: e5ae75fc48ef088b953becf5408a33ac955dc3a00a1aa5dd70841667dbc06f0c

kernel-core-4.18.0-305.95.1.el8_4.ppc64le.rpm

SHA-256: f63c1e612f91649cf9a8917911bd3b17d79e0889c7088e1eceac132649b6d16e

kernel-cross-headers-4.18.0-305.95.1.el8_4.ppc64le.rpm

SHA-256: b23a35a73f6a3fbfd56a17955fbc6bccba057ab06d2482ac83affe83783a7b20

kernel-debug-4.18.0-305.95.1.el8_4.ppc64le.rpm

SHA-256: 3160c7d9d5f6cee42b9915d03b3fe6a8a95a8f2f38535cd2c4d0f58d06a64a37

kernel-debug-core-4.18.0-305.95.1.el8_4.ppc64le.rpm

SHA-256: 2efd288fbe4c9bdddb52f9c16c47d97c9a9b763864b17563a4fc8b7cfdf668ba

kernel-debug-debuginfo-4.18.0-305.95.1.el8_4.ppc64le.rpm

SHA-256: 3835fefeadc0041ad991349dee3b34b001442bb5c2062f02d1b996391a1efbc8

kernel-debug-devel-4.18.0-305.95.1.el8_4.ppc64le.rpm

SHA-256: 57ef9d8b1fd1ccdf1e91bbeb173d68ae476586e7ff26a31fe73c041901a0bba8

kernel-debug-modules-4.18.0-305.95.1.el8_4.ppc64le.rpm

SHA-256: 15eda70447b9ed187e5c67f399ce81eebedc59359a6f98292aec1e6e0cd9d23f

kernel-debug-modules-extra-4.18.0-305.95.1.el8_4.ppc64le.rpm

SHA-256: fa493abe9f94dbd60d887abdfcc75c0447fa843327f52902f5ac5bf30fef0525

kernel-debug-modules-internal-4.18.0-305.95.1.el8_4.ppc64le.rpm

SHA-256: b631347b9b6bb88da7cfb7a46bf49ed79d3ad6903b2ab5f0d9b2bd40638d0f1e

kernel-debuginfo-4.18.0-305.95.1.el8_4.ppc64le.rpm

SHA-256: 03b468d68de338b14d91ce6667b111873df00f06e201de99564f4c45f66b2de6

kernel-debuginfo-common-ppc64le-4.18.0-305.95.1.el8_4.ppc64le.rpm

SHA-256: f417e47f65b089b1e3b57827f8c523bab979aa18c48c489c4e7ef0a0dbe593ed

kernel-devel-4.18.0-305.95.1.el8_4.ppc64le.rpm

SHA-256: 8db5cd9e1bee9a01ee71c6bab0ab8ae6b32161e178a8d8de7f125d5a63fe0fbf

kernel-doc-4.18.0-305.95.1.el8_4.noarch.rpm

SHA-256: 86a6834fce4d782e09392ac73f19232df8ed846462d9f184c18f38dc33f6b89c

kernel-headers-4.18.0-305.95.1.el8_4.ppc64le.rpm

SHA-256: 6f54dfadb2363d29cdc3d81d7a799f329261614ba92da5611609cebc1cbf1a41

kernel-ipaclones-internal-4.18.0-305.95.1.el8_4.ppc64le.rpm

SHA-256: 83478e73737951a26777226d3782ee2c2cc1b7bef4d3a87feef8c86b0800f8c7

kernel-modules-4.18.0-305.95.1.el8_4.ppc64le.rpm

SHA-256: 525cbcdd781cebfde6755e3ed0b86441430da466165952cc89635d459aae86ec

kernel-modules-extra-4.18.0-305.95.1.el8_4.ppc64le.rpm

SHA-256: 467dd31d11cb064d1053c226442e54860d80957605b9386bf90d74035bcd4770

kernel-modules-internal-4.18.0-305.95.1.el8_4.ppc64le.rpm

SHA-256: 24a74a274b7f2077501a93abcf0a7aa37af9fbdf4f1ff9732e96349a3239f71c

kernel-selftests-internal-4.18.0-305.95.1.el8_4.ppc64le.rpm

SHA-256: bf03756360046e7994881eefe4ac60eb3dc031325106457f22e01582965076b6

kernel-tools-4.18.0-305.95.1.el8_4.ppc64le.rpm

SHA-256: 1042ce393208fe4e7534864fa4b9a413729dfab5fe6b4a4137c1d174ceab3068

kernel-tools-debuginfo-4.18.0-305.95.1.el8_4.ppc64le.rpm

SHA-256: 0190bddad86544709a5df42c28ddef614388443c143b68a10f3b968c2cd5b4f1

kernel-tools-libs-4.18.0-305.95.1.el8_4.ppc64le.rpm

SHA-256: 716940327099ea0b3c1f0117ff7d2a3dbb65e74be6bc114df556764df6bf6f99

kernel-tools-libs-devel-4.18.0-305.95.1.el8_4.ppc64le.rpm

SHA-256: 74e3eb08658abe50dbd089f230365ee4198122e0cea9b90967aa4ea75007e244

openshift-ansible-4.10.0-202306170106.p0.g72c7be6.assembly.stream.el8.noarch.rpm

SHA-256: d1ef00bd48542771dbf87522f3fd64e23a853703ba867917ce96955035a8a512

openshift-ansible-test-4.10.0-202306170106.p0.g72c7be6.assembly.stream.el8.noarch.rpm

SHA-256: 5c896ac0718322b2300431448bc70d6e1fd7378c8c245919a3cf59100e134481

openshift-clients-4.10.0-202306261054.p0.g22cf04a.assembly.stream.el8.ppc64le.rpm

SHA-256: 73f7e7998439d4e05e7772cca44b400d6a8807e63fd46d103fbff90edf89188d

openshift-hyperkube-4.10.0-202306170106.p0.g16bcd69.assembly.stream.el8.ppc64le.rpm

SHA-256: 2474adbf2b33ac91a3bbe42a376ebb87fb518187e2927bcf1634bc9b6a188441

openshift-kuryr-cni-4.10.0-202306170106.p0.g8e4df8b.assembly.stream.el8.noarch.rpm

SHA-256: 5ac8aae5c74478e053896b7dc2af8298bc1c9dc9daf371abb2b6d53ca393f573

openshift-kuryr-common-4.10.0-202306170106.p0.g8e4df8b.assembly.stream.el8.noarch.rpm

SHA-256: 047ca6058439de4ebc71e63fdd6f88678a2d0c56b486795d4954682ca0e67830

openshift-kuryr-controller-4.10.0-202306170106.p0.g8e4df8b.assembly.stream.el8.noarch.rpm

SHA-256: 337bc08e7208b9807d0bd7870ecad78b5e271a6b78d5b94bd417693634f0a7da

perf-4.18.0-305.95.1.el8_4.ppc64le.rpm

SHA-256: cdbef9284336e743a5d95fbf93f7f5a6799a54d1245cfd67ac51a21c332d17a3

perf-debuginfo-4.18.0-305.95.1.el8_4.ppc64le.rpm

SHA-256: d2d11bb322e25a46c6a4d93307f35853b75f366a0faaa95c4fc1e8363ef6bd26

podman-3.2.3-1.1.rhaos4.10.el8.ppc64le.rpm

SHA-256: 46cbb037370fc3347228d586cd3c8109a723cac160dfe6f716906da01360e23f

podman-catatonit-3.2.3-1.1.rhaos4.10.el8.ppc64le.rpm

SHA-256: 9f201ada365a4292f3089f24a9bd62bdc1a3d652e4b9ae6dcbd159fbf4111e6c

podman-catatonit-debuginfo-3.2.3-1.1.rhaos4.10.el8.ppc64le.rpm

SHA-256: fd10e1143201d5385454ffadc6c413a12aa9f382e676e995a3c2c5ae0cb53093

podman-debuginfo-3.2.3-1.1.rhaos4.10.el8.ppc64le.rpm

SHA-256: ba9034297dbe4543c99f5d403470dc5fa38351d9acabd315e0f58ca2b0049ffc

podman-debugsource-3.2.3-1.1.rhaos4.10.el8.ppc64le.rpm

SHA-256: eaf2fa1d546f10f60b076c5043ec850352b33e980ee823069d82ea10e1969110

podman-docker-3.2.3-1.1.rhaos4.10.el8.noarch.rpm

SHA-256: 347acbd05acc37c822e7e34e197840c0a19848253c0d3b636b64623e06f25c7c

podman-plugins-3.2.3-1.1.rhaos4.10.el8.ppc64le.rpm

SHA-256: be067e53f5c4aaf7a8f9451a610869b3b9a5aba2f9988f14d628f4aa524c2e2a

podman-plugins-debuginfo-3.2.3-1.1.rhaos4.10.el8.ppc64le.rpm

SHA-256: 9835b0aa5e79ba5b81326ee0e3919f398f4eb1fc97f9117d2f4becc15eeeee27

podman-remote-3.2.3-1.1.rhaos4.10.el8.ppc64le.rpm

SHA-256: 9410606e4bf777ad40b3823589a8bf9962e0e17678c1132266adab7b09d0ad35

podman-remote-debuginfo-3.2.3-1.1.rhaos4.10.el8.ppc64le.rpm

SHA-256: 6fae662d04e452a13a984858dd4eba4e67b2b89dc355b3525d9956a966336708

podman-tests-3.2.3-1.1.rhaos4.10.el8.ppc64le.rpm

SHA-256: aca5506ad40200cc37db646a0f6299f0bbe983ae2b68e7226e7b84d2879672cf

python3-kuryr-kubernetes-4.10.0-202306170106.p0.g8e4df8b.assembly.stream.el8.noarch.rpm

SHA-256: a9c6a5517887782e278b7c1cb0bbd6d08047a573aef688121936533dd1323785

python3-perf-4.18.0-305.95.1.el8_4.ppc64le.rpm

SHA-256: 5bbdfe377909a5ab4d11e182a370638cce5b5332c5c04e8a4d5ec2226bdde7f8

python3-perf-debuginfo-4.18.0-305.95.1.el8_4.ppc64le.rpm

SHA-256: b56e465ec65b470b862b123125954e5807751c3696e5fc1e39c8405cd4d7ca6e

skopeo-1.2.4-1.1.el8.ppc64le.rpm

SHA-256: 385889761cca859103197241a2ab8b839b9b4ddf4d8e32e019e5cfef49bc6db0

skopeo-debuginfo-1.2.4-1.1.el8.ppc64le.rpm

SHA-256: 058abd43ee9e83effad8a2ec34709108cae092a0351f46a6adb3912ec845f52f

skopeo-debugsource-1.2.4-1.1.el8.ppc64le.rpm

SHA-256: 9a0f96fdabf8aea8f3fb726ab4bdd1ea84a135700e83f85bf4f8e07dc7326bb5

skopeo-tests-1.2.4-1.1.el8.ppc64le.rpm

SHA-256: 05e810d9e16bd8eba02003b9df39b88988040474f00a125b98fc05561541f052

Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.10 for RHEL 8

SRPM

buildah-1.19.9-1.1.el8.src.rpm

SHA-256: 555a156ba09cefad6b8f242cdeecc002d65fa8b4bf0d0ad9bccaf10b0cab3d1b

jenkins-2-plugins-4.10.1687341544-1.el8.src.rpm

SHA-256: 7836ee37c9fc93f46c1b8e412711faedecb20a5fe4dd93606dea66d61cf47389

jenkins-2.401.1.1687268694-1.el8.src.rpm

SHA-256: c6a841ccb711ebbaaf1dadce31b7ebc358bead2f611847deb942b8221ce4d886

kernel-4.18.0-305.95.1.el8_4.src.rpm

SHA-256: aacd435f65d78cca1ae4c9e2f8c6c91858936a880971587586236a9d6144cc48

openshift-4.10.0-202306170106.p0.g16bcd69.assembly.stream.el8.src.rpm

SHA-256: 4958bca30f0b6d33f3c6a6bc893ab917b61af00b59e9769111bf3bb81afaf990

openshift-ansible-4.10.0-202306170106.p0.g72c7be6.assembly.stream.el8.src.rpm

SHA-256: 31097ebe7e9fd0b32afaf7fc9a5fd0a2c695f56339cb8ea2059f126581bee214

openshift-clients-4.10.0-202306261054.p0.g22cf04a.assembly.stream.el8.src.rpm

SHA-256: c4d85a65d9bd3adbb4a8341eeb3f1725d52b27d2002820cb8441a165bd25155c

openshift-kuryr-4.10.0-202306170106.p0.g8e4df8b.assembly.stream.el8.src.rpm

SHA-256: 394b35f9d4c67366157f0988972014b5244385ac7723d0bef398653927530f23

podman-3.2.3-1.1.rhaos4.10.el8.src.rpm

SHA-256: c57f38830d81f1befef8f686b93c1530f9ea341b7f8f842a88a695ddbbdd6308

skopeo-1.2.4-1.1.el8.src.rpm

SHA-256: 5bf55cf968b0b1312cf99235ccd3d696dde325c7ec72513b32362fae9573a1bd

s390x

bpftool-4.18.0-305.95.1.el8_4.s390x.rpm

SHA-256: 088d29be83e2b59de95deeaabe684e3c4b48201eaae15c8bcb191d4a059871a8

bpftool-debuginfo-4.18.0-305.95.1.el8_4.s390x.rpm

SHA-256: aabfbf08fd8fdba9512ca8031bcafb6b2ea6f096c6cd42bc54ecf3c8f557bfe1

buildah-1.19.9-1.1.el8.s390x.rpm

SHA-256: 4c5b22f3f0235e2a3c2fc536e2ddaddbb5cb7c2463f70e3dafb7a4910cff29b5

buildah-debuginfo-1.19.9-1.1.el8.s390x.rpm

SHA-256: 249d6b7921bd607ef7f6adf78a077ec1df4b00b207033eb5824e4e8cea602062

buildah-debugsource-1.19.9-1.1.el8.s390x.rpm

SHA-256: 0109228e2557cb4ef406387aa0f73d1f79133b9e714295e27dc8cd5cf6d7fc2d

buildah-tests-1.19.9-1.1.el8.s390x.rpm

SHA-256: 9210e01360430b29074e8478d12d815a6c795195b5918e7038eb0d3206f919da

buildah-tests-debuginfo-1.19.9-1.1.el8.s390x.rpm

SHA-256: 8b11bed8420bea0247cb72ee7038cb547fb4fa944b44d1128df638cf5da23f9a

containers-common-1.2.4-1.1.el8.s390x.rpm

SHA-256: 93a700aa5b00be4b9b2d728806ebd132b45b5ad4a00b9d0c5d7af3711f1c3222

jenkins-2-plugins-4.10.1687341544-1.el8.noarch.rpm

SHA-256: 02e0411765bf43a5023118431a0740f410bc1e78a23e6cc5acf6e02b238f1bd1

jenkins-2.401.1.1687268694-1.el8.noarch.rpm

SHA-256: 3570e33bc0efc0fb7ae09c65e209cd2047004fbc9512879a35124c95c13beb3a

kernel-4.18.0-305.95.1.el8_4.s390x.rpm

SHA-256: 4ba039c5e06e65172a140bb20dbb7360046356123231cda937db46d25db12a7d

kernel-core-4.18.0-305.95.1.el8_4.s390x.rpm

SHA-256: 6ca21ffaf752a0ba02abc5e4c02531cbcf4d32d8852e4540e6b67ab482cac7f7

kernel-cross-headers-4.18.0-305.95.1.el8_4.s390x.rpm

SHA-256: e24b44e9a63f7fcbbe7cf57782d83ab61354dba0a987162851681a50e8e48a59

kernel-debug-4.18.0-305.95.1.el8_4.s390x.rpm

SHA-256: c9c85906a5aee922d07c0dafcec4059ed68779aa19f92a9c3a5ea680c2a9a8fc

kernel-debug-core-4.18.0-305.95.1.el8_4.s390x.rpm

SHA-256: 24f8063cbac46f49bab98e7b8644cb303fac0810f1d4ed54f05e2e8c164b082d

kernel-debug-debuginfo-4.18.0-305.95.1.el8_4.s390x.rpm

SHA-256: f3b69de8b0005934ff7a67731c09a2d2b860bed905c9a96cd00a261d3502a23c

kernel-debug-devel-4.18.0-305.95.1.el8_4.s390x.rpm

SHA-256: 4cb33dd1d5ad18431665949c90ee158dccb0ea9afda5444a064e184826ff1ccc

kernel-debug-modules-4.18.0-305.95.1.el8_4.s390x.rpm

SHA-256: e873f2cb365a43f5f344bad5bbcbb593ec4fc9ba1940b22f56009e5a2ecb8f5d

kernel-debug-modules-extra-4.18.0-305.95.1.el8_4.s390x.rpm

SHA-256: ff98bef181afd0aa976c6ea21cae2de94a3d418112dff8aa8b5f709e4d12adfd

kernel-debug-modules-internal-4.18.0-305.95.1.el8_4.s390x.rpm

SHA-256: 29ea333dd25cf6cefcf5b6b4d24962b5f00f29355e5faf52b3868b9514d9e37f

kernel-debuginfo-4.18.0-305.95.1.el8_4.s390x.rpm

SHA-256: 81cf246213fd658dbb0b3f42759c2ac3de372de85e16e0caacf3139d74b53122

kernel-debuginfo-common-s390x-4.18.0-305.95.1.el8_4.s390x.rpm

SHA-256: 4a7bbdaf142d6480f2d747280b222f86fe54423ba875378edd460c889ffae951

kernel-devel-4.18.0-305.95.1.el8_4.s390x.rpm

SHA-256: 43cff0b3ae1ddcad1108302a24fbd2ace5581d6145462ab73e633a6086a93d44

kernel-doc-4.18.0-305.95.1.el8_4.noarch.rpm

SHA-256: 86a6834fce4d782e09392ac73f19232df8ed846462d9f184c18f38dc33f6b89c

kernel-headers-4.18.0-305.95.1.el8_4.s390x.rpm

SHA-256: a98ea56f763a6dbfb71cf42e8d8eb2d85d4b0285c84ccb42f9a9c79b6b413beb

kernel-modules-4.18.0-305.95.1.el8_4.s390x.rpm

SHA-256: 92bb51f74c381353f5c7c1b2b3ced50e6210395f34202b039209d3741a238c84

kernel-modules-extra-4.18.0-305.95.1.el8_4.s390x.rpm

SHA-256: 1a107032fada241b5e0bbcd6739a9297668724c0a9dac8111e379555780e5d8d

kernel-modules-internal-4.18.0-305.95.1.el8_4.s390x.rpm

SHA-256: 967b591820f0d3b082a5bccd271970802be975e3864fe6ad9dad03b59f2ccf57

kernel-selftests-internal-4.18.0-305.95.1.el8_4.s390x.rpm

SHA-256: 51d5565d2fdbd7768190ad79c4b7f8d3cfadcd5a1f40d621715990aa1f0501c1

kernel-tools-4.18.0-305.95.1.el8_4.s390x.rpm

SHA-256: 93758a3827e6280ec458c541fdb3f95bd6f7191decc7285b5d23f7acd09e74a4

kernel-tools-debuginfo-4.18.0-305.95.1.el8_4.s390x.rpm

SHA-256: 660749c902d5fad4c2d95200896a9e46dd1738db17b9e08f7a6d6a4112449f33

kernel-zfcpdump-4.18.0-305.95.1.el8_4.s390x.rpm

SHA-256: be0cf12122d8888e5f58e61aaf2003cace8dcf7f18452af321bc5005fc2911b1

kernel-zfcpdump-core-4.18.0-305.95.1.el8_4.s390x.rpm

SHA-256: 2817e9aa58fef618848d01d5406fd9b5556bdeafacd9665bd22d9cb7739aa6f1

kernel-zfcpdump-debuginfo-4.18.0-305.95.1.el8_4.s390x.rpm

SHA-256: 0d195efac98e5787b27f56051212cef61b4e1e61d7fd566a8a26913de4dfe930

kernel-zfcpdump-devel-4.18.0-305.95.1.el8_4.s390x.rpm

SHA-256: f37c8ef76552e6147156b95dfd9c80922d83c3a3e65c4dd958b02c03989982ff

kernel-zfcpdump-modules-4.18.0-305.95.1.el8_4.s390x.rpm

SHA-256: 068b1d1451a6cce39f732032308709d2c066c11263337a60954e428222aa7d27

kernel-zfcpdump-modules-extra-4.18.0-305.95.1.el8_4.s390x.rpm

SHA-256: db1ff929a04a5580273d5ec1999baef0dc525c44b546ca388c4602f11679abbe

kernel-zfcpdump-modules-internal-4.18.0-305.95.1.el8_4.s390x.rpm

SHA-256: 232504f081d6f5526480fb91f367a762e9de884da0ba31487964350a78bdb04f

openshift-ansible-4.10.0-202306170106.p0.g72c7be6.assembly.stream.el8.noarch.rpm

SHA-256: d1ef00bd48542771dbf87522f3fd64e23a853703ba867917ce96955035a8a512

openshift-ansible-test-4.10.0-202306170106.p0.g72c7be6.assembly.stream.el8.noarch.rpm

SHA-256: 5c896ac0718322b2300431448bc70d6e1fd7378c8c245919a3cf59100e134481

openshift-clients-4.10.0-202306261054.p0.g22cf04a.assembly.stream.el8.s390x.rpm

SHA-256: b30df0110cb8755aa93511d0b2bb023db81bd7ffa870ae52c3bb90d72f684d81

openshift-hyperkube-4.10.0-202306170106.p0.g16bcd69.assembly.stream.el8.s390x.rpm

SHA-256: 87912c0facc8bc8222caf13b8039bade5670acd9a3c503be0bbba97b88a7f0cf

openshift-kuryr-cni-4.10.0-202306170106.p0.g8e4df8b.assembly.stream.el8.noarch.rpm

SHA-256: 5ac8aae5c74478e053896b7dc2af8298bc1c9dc9daf371abb2b6d53ca393f573

openshift-kuryr-common-4.10.0-202306170106.p0.g8e4df8b.assembly.stream.el8.noarch.rpm

SHA-256: 047ca6058439de4ebc71e63fdd6f88678a2d0c56b486795d4954682ca0e67830

openshift-kuryr-controller-4.10.0-202306170106.p0.g8e4df8b.assembly.stream.el8.noarch.rpm

SHA-256: 337bc08e7208b9807d0bd7870ecad78b5e271a6b78d5b94bd417693634f0a7da

perf-4.18.0-305.95.1.el8_4.s390x.rpm

SHA-256: 86c437793b54c50391c711bb0154e212b95641b1148d5d7f12bd794c5b32ec5a

perf-debuginfo-4.18.0-305.95.1.el8_4.s390x.rpm

SHA-256: b416421fefefb448ced1cf8a614da02105d4ddd75e783aafee55128dc65e3c11

podman-3.2.3-1.1.rhaos4.10.el8.s390x.rpm

SHA-256: 34618615d51c399e2ed949edb5ec34c97fbe52dc9dd67ef059ad718937511a6f

podman-catatonit-3.2.3-1.1.rhaos4.10.el8.s390x.rpm

SHA-256: 1f8f966777e0a32439c08e13749b2a716eeab374417b1acc40ac8c2832d1909a

podman-catatonit-debuginfo-3.2.3-1.1.rhaos4.10.el8.s390x.rpm

SHA-256: d25785ca151b90fd173ba84765ac8ccf94a06495d4a5956906a84df45a04fa2d

podman-debuginfo-3.2.3-1.1.rhaos4.10.el8.s390x.rpm

SHA-256: 19f6b5132447b5666e0c0b6d46eacd6cc213b9b95a76f7272656ce61b109e3fd

podman-debugsource-3.2.3-1.1.rhaos4.10.el8.s390x.rpm

SHA-256: 72cc4e39450c5a22d5d7d597d124efd4f8cf456e7b36fe981fdbc1a7de2e85a5

podman-docker-3.2.3-1.1.rhaos4.10.el8.noarch.rpm

SHA-256: 347acbd05acc37c822e7e34e197840c0a19848253c0d3b636b64623e06f25c7c

podman-plugins-3.2.3-1.1.rhaos4.10.el8.s390x.rpm

SHA-256: 512fcf34fcffa4cb48039ef26e7e54453811f56d5bb4f63f42ce8b4d1949d244

podman-plugins-debuginfo-3.2.3-1.1.rhaos4.10.el8.s390x.rpm

SHA-256: 6b5764a28b6fac376c0371b903098904d199e234c5d37d89c12f70c787ae6a47

podman-remote-3.2.3-1.1.rhaos4.10.el8.s390x.rpm

SHA-256: 559f4f7bb4e3d06989b42eebc08de44dab20882d19900567c230cb058d5e3707

podman-remote-debuginfo-3.2.3-1.1.rhaos4.10.el8.s390x.rpm

SHA-256: 8e9fc63c8e5d691d75b8f1b98ba850aceff449b4c55e2a73ba1e272b8ced8b82

podman-tests-3.2.3-1.1.rhaos4.10.el8.s390x.rpm

SHA-256: a8e22c3516dd5d0edff0039245e5e113df1d9a32b82dd0236a73adb25f2a0d86

python3-kuryr-kubernetes-4.10.0-202306170106.p0.g8e4df8b.assembly.stream.el8.noarch.rpm

SHA-256: a9c6a5517887782e278b7c1cb0bbd6d08047a573aef688121936533dd1323785

python3-perf-4.18.0-305.95.1.el8_4.s390x.rpm

SHA-256: 6bc5bc445078c2a8e3da6bd7b7f28b0e629cab234ee3f6afd8c6b16d0f489617

python3-perf-debuginfo-4.18.0-305.95.1.el8_4.s390x.rpm

SHA-256: 246055b42ae4a1d7fd1ee5500a2a6f7cf35b1c27a77d44916c444da5160de990

skopeo-1.2.4-1.1.el8.s390x.rpm

SHA-256: eb25798a7f27bcf3f1b3362b39cf150732363007025c7744984efe59b1cebbf8

skopeo-debuginfo-1.2.4-1.1.el8.s390x.rpm

SHA-256: 5d8c40e19e492b366ed273b5a38973ed1e321a0596dadf7ffeb1a823473f199a

skopeo-debugsource-1.2.4-1.1.el8.s390x.rpm

SHA-256: ca0658264f8247c6379af1383cc385b3e0923165c56df7ca9d216299efa0e079

skopeo-tests-1.2.4-1.1.el8.s390x.rpm

SHA-256: a22aeca1058ba7af62b6f0a53657648729862f04dad8ae1430ce18010c9f9db3

Red Hat OpenShift Container Platform for ARM 64 4.10

SRPM

buildah-1.19.9-1.1.el8.src.rpm

SHA-256: 555a156ba09cefad6b8f242cdeecc002d65fa8b4bf0d0ad9bccaf10b0cab3d1b

jenkins-2-plugins-4.10.1687341544-1.el8.src.rpm

SHA-256: 7836ee37c9fc93f46c1b8e412711faedecb20a5fe4dd93606dea66d61cf47389

jenkins-2.401.1.1687268694-1.el8.src.rpm

SHA-256: c6a841ccb711ebbaaf1dadce31b7ebc358bead2f611847deb942b8221ce4d886

kernel-4.18.0-305.95.1.el8_4.src.rpm

SHA-256: aacd435f65d78cca1ae4c9e2f8c6c91858936a880971587586236a9d6144cc48

kernel-rt-4.18.0-305.95.1.rt7.170.el8_4.src.rpm

SHA-256: 5d141d889bcb7e7b458bfcedb1bae5bd2969e6afaebb52ecf56343489309dbd2

openshift-4.10.0-202306170106.p0.g16bcd69.assembly.stream.el8.src.rpm

SHA-256: 4958bca30f0b6d33f3c6a6bc893ab917b61af00b59e9769111bf3bb81afaf990

openshift-ansible-4.10.0-202306170106.p0.g72c7be6.assembly.stream.el8.src.rpm

SHA-256: 31097ebe7e9fd0b32afaf7fc9a5fd0a2c695f56339cb8ea2059f126581bee214

openshift-clients-4.10.0-202306261054.p0.g22cf04a.assembly.stream.el8.src.rpm

SHA-256: c4d85a65d9bd3adbb4a8341eeb3f1725d52b27d2002820cb8441a165bd25155c

openshift-kuryr-4.10.0-202306170106.p0.g8e4df8b.assembly.stream.el8.src.rpm

SHA-256: 394b35f9d4c67366157f0988972014b5244385ac7723d0bef398653927530f23

podman-3.2.3-1.1.rhaos4.10.el8.src.rpm

SHA-256: c57f38830d81f1befef8f686b93c1530f9ea341b7f8f842a88a695ddbbdd6308

skopeo-1.2.4-1.1.el8.src.rpm

SHA-256: 5bf55cf968b0b1312cf99235ccd3d696dde325c7ec72513b32362fae9573a1bd

aarch64

bpftool-4.18.0-305.95.1.el8_4.aarch64.rpm

SHA-256: 54c74651dde0e12cf3a71dddb137b114b78905dc4dec7510382cfdf97925a840

bpftool-debuginfo-4.18.0-305.95.1.el8_4.aarch64.rpm

SHA-256: bc0b80e73dae322626f7eff7a14927537cce7c6c2c9816a1b28fecfac8562f39

buildah-1.19.9-1.1.el8.aarch64.rpm

SHA-256: 3096d9bfedb67f5d26e049b6221b6985fc927dcb843ba61db11527ed9a6306ab

buildah-debuginfo-1.19.9-1.1.el8.aarch64.rpm

SHA-256: 1db17407d2b6bf4f95a3da6f6b05a843d222a0e7d37fe9a75bfe30a43ae80137

buildah-debugsource-1.19.9-1.1.el8.aarch64.rpm

SHA-256: 5051d3f68e1b3609d81c0fddde00dd5394297652a50a124e1bd195a76b9158b0

buildah-tests-1.19.9-1.1.el8.aarch64.rpm

SHA-256: f50b715f276aa8c0a38068ea257daab9ed698606d32634c2e24469ff20dc3ea9

buildah-tests-debuginfo-1.19.9-1.1.el8.aarch64.rpm

SHA-256: 51dc843a7b54edb4ac25ee2fdff5587c8e63b9326f0143de71332e5424584ecf

containers-common-1.2.4-1.1.el8.aarch64.rpm

SHA-256: a1bc1b22d32dcdc738bed55008ad776ce068ec5f45c79738aaae95215f1cd0ff

jenkins-2-plugins-4.10.1687341544-1.el8.noarch.rpm

SHA-256: 02e0411765bf43a5023118431a0740f410bc1e78a23e6cc5acf6e02b238f1bd1

jenkins-2.401.1.1687268694-1.el8.noarch.rpm

SHA-256: 3570e33bc0efc0fb7ae09c65e209cd2047004fbc9512879a35124c95c13beb3a

kernel-4.18.0-305.95.1.el8_4.aarch64.rpm

SHA-256: 25855ae23af14fd1d31774b102aaf381a982243b22bd652628d4e5270df5ada8

kernel-core-4.18.0-305.95.1.el8_4.aarch64.rpm

SHA-256: 5f3a2505bae1b5582540b60a35ffdddddc5f0910053c85fd8658e6d12b2c06ac

kernel-cross-headers-4.18.0-305.95.1.el8_4.aarch64.rpm

SHA-256: acb1e0cb60928cd624f4e9d2bc010ebba09e46a333c9b5ff33b58cb2cdac1c1e

kernel-debug-4.18.0-305.95.1.el8_4.aarch64.rpm

SHA-256: 0366329d6a2959c8cc69580a03a07243e79a0186781f29f7bc4b2b80702cbce6

kernel-debug-core-4.18.0-305.95.1.el8_4.aarch64.rpm

SHA-256: 4b62afcbfaf97e0e22e1a2cf9f43b632ca3ea2954f1ca1ababd95e082570b72f

kernel-debug-debuginfo-4.18.0-305.95.1.el8_4.aarch64.rpm

SHA-256: e539a0cc3c9ec8401180f713f32d871c31a4796efe63ca7490c04eeb583ec786

kernel-debug-devel-4.18.0-305.95.1.el8_4.aarch64.rpm

SHA-256: e87f7fe46b318ad177fd0a11938944768b04b52bc8fe19a1fb48b81d1e84a37b

kernel-debug-modules-4.18.0-305.95.1.el8_4.aarch64.rpm

SHA-256: c388b8cce03a09285f457d8f71ebd791d3788c995150e123854fd6859ef8a2fa

kernel-debug-modules-extra-4.18.0-305.95.1.el8_4.aarch64.rpm

SHA-256: 2c8761b7a9edc94acd0ba7504de598ad1fe24e70c05f6d82e022f5c21b3db23d

kernel-debug-modules-internal-4.18.0-305.95.1.el8_4.aarch64.rpm

SHA-256: 988f410dc9b3a0eaf0d8fcdcc2493fb59daae046ed4c4acfa06eed686b2506ab

kernel-debuginfo-4.18.0-305.95.1.el8_4.aarch64.rpm

SHA-256: 28976c60e495b0830586f60fc57303398d16a39fbc981eee6434daca16f5ed44

kernel-debuginfo-common-aarch64-4.18.0-305.95.1.el8_4.aarch64.rpm

SHA-256: c3a8516b61801051063fcab15e86e47e998f4cb29891a343b55785ef049c4652

kernel-devel-4.18.0-305.95.1.el8_4.aarch64.rpm

SHA-256: f04e08a0522b8d23d064ec70167f68a0640aef97d65da643ecf5b9bdff664f13

kernel-doc-4.18.0-305.95.1.el8_4.noarch.rpm

SHA-256: 86a6834fce4d782e09392ac73f19232df8ed846462d9f184c18f38dc33f6b89c

kernel-headers-4.18.0-305.95.1.el8_4.aarch64.rpm

SHA-256: 1ca409897b203df59e041dcec319567ba1e17f569ebee492258488ee049ff10e

kernel-modules-4.18.0-305.95.1.el8_4.aarch64.rpm

SHA-256: 2656e2834b4f67fe2dc48043ad98421124278f58e5c20a984924a737cf8daba8

kernel-modules-extra-4.18.0-305.95.1.el8_4.aarch64.rpm

SHA-256: 910f148672f0208512df466695f3aba58f1dcc5536aab0e01fc0fbfd527db3e3

kernel-modules-internal-4.18.0-305.95.1.el8_4.aarch64.rpm

SHA-256: 6fc68d39e6f525d27eb7a4bf52de488c5fe9809a437d6e50b45cf59ccf159aa6

kernel-selftests-internal-4.18.0-305.95.1.el8_4.aarch64.rpm

SHA-256: 301a72c947d7a776a492a5bb3c12266565a1d2373898bb5d2fe6ea99b9639ac6

kernel-tools-4.18.0-305.95.1.el8_4.aarch64.rpm

SHA-256: 5ab48e3bd3ddd7431178c570c9c0f6796431492574c1ae84ff8bc8b139e7edd3

kernel-tools-debuginfo-4.18.0-305.95.1.el8_4.aarch64.rpm

SHA-256: 8cf1253fcb067f2ab71166bce311ec9848402999a23ece7b21dbc62379894c91

kernel-tools-libs-4.18.0-305.95.1.el8_4.aarch64.rpm

SHA-256: e34443f2ac735aae88f1d8b0bd4855245df3bbd41474fbd3754a6e16ede8ac0d

kernel-tools-libs-devel-4.18.0-305.95.1.el8_4.aarch64.rpm

SHA-256: a0664d2f403d650e8e0d6c2f3b83ec7ba4a5a2616d986e214980f810b4b199fd

openshift-ansible-4.10.0-202306170106.p0.g72c7be6.assembly.stream.el8.noarch.rpm

SHA-256: d1ef00bd48542771dbf87522f3fd64e23a853703ba867917ce96955035a8a512

openshift-ansible-test-4.10.0-202306170106.p0.g72c7be6.assembly.stream.el8.noarch.rpm

SHA-256: 5c896ac0718322b2300431448bc70d6e1fd7378c8c245919a3cf59100e134481

openshift-clients-4.10.0-202306261054.p0.g22cf04a.assembly.stream.el8.aarch64.rpm

SHA-256: b209ab8f7f95d29fbef7853bf5403e73f04c6e54270ef46efcc63ecb28c2d2e0

openshift-hyperkube-4.10.0-202306170106.p0.g16bcd69.assembly.stream.el8.aarch64.rpm

SHA-256: e67180788f59b4b64149a7aca0cd3e78d0aab5b59d8ee67a4ca334dd666ab7b3

openshift-kuryr-cni-4.10.0-202306170106.p0.g8e4df8b.assembly.stream.el8.noarch.rpm

SHA-256: 5ac8aae5c74478e053896b7dc2af8298bc1c9dc9daf371abb2b6d53ca393f573

openshift-kuryr-common-4.10.0-202306170106.p0.g8e4df8b.assembly.stream.el8.noarch.rpm

SHA-256: 047ca6058439de4ebc71e63fdd6f88678a2d0c56b486795d4954682ca0e67830

openshift-kuryr-controller-4.10.0-202306170106.p0.g8e4df8b.assembly.stream.el8.noarch.rpm

SHA-256: 337bc08e7208b9807d0bd7870ecad78b5e271a6b78d5b94bd417693634f0a7da

perf-4.18.0-305.95.1.el8_4.aarch64.rpm

SHA-256: 65a7bfb60ab857621ef62246ca02ef4af2cb244158e5e30a9d73acd21fe7cc8f

perf-debuginfo-4.18.0-305.95.1.el8_4.aarch64.rpm

SHA-256: 67bd92fcffeb0ee0250105a473c3ebd3c2f262fa186836d22232cfc3081888a0

podman-3.2.3-1.1.rhaos4.10.el8.aarch64.rpm

SHA-256: 749cd0630d4efe510e85458110e6b31ab610184ff0672dab508e50867e81acac

podman-catatonit-3.2.3-1.1.rhaos4.10.el8.aarch64.rpm

SHA-256: 0e64b6a483813de29244f281d1f0b7854fc55c5db17aa563d2ae563ae99e6aee

podman-catatonit-debuginfo-3.2.3-1.1.rhaos4.10.el8.aarch64.rpm

SHA-256: 3dc0a0e6f16baf145953934f5f13696364a7d502f28a69084cf4f9d2f4a7309b

podman-debuginfo-3.2.3-1.1.rhaos4.10.el8.aarch64.rpm

SHA-256: af62c55b9ec86e964b3e1ec7b5291c9f405521082c301d96f0281e16c49bae9e

podman-debugsource-3.2.3-1.1.rhaos4.10.el8.aarch64.rpm

SHA-256: 4fb88702f28b7d9e337df2081d11b965da0e2c6c381e2a0bed7151e74d679c49

podman-docker-3.2.3-1.1.rhaos4.10.el8.noarch.rpm

SHA-256: 347acbd05acc37c822e7e34e197840c0a19848253c0d3b636b64623e06f25c7c

podman-plugins-3.2.3-1.1.rhaos4.10.el8.aarch64.rpm

SHA-256: 46972aa4d32e1ae96a42758e8f17ed998791b10c5abd48227ae7e6e15b36ff57

podman-plugins-debuginfo-3.2.3-1.1.rhaos4.10.el8.aarch64.rpm

SHA-256: 8ee785b0ce1462cf72d29417062e91a141ceb16cd3af78dbaa6f87039f9d5581

podman-remote-3.2.3-1.1.rhaos4.10.el8.aarch64.rpm

SHA-256: 5a2e3ac591c467323205ffea206930accc10613eea3ef79a1b902a5c467988a9

podman-remote-debuginfo-3.2.3-1.1.rhaos4.10.el8.aarch64.rpm

SHA-256: 0f269c3ee0b03153a6dbfce5c8f215140e09e149170bdae02947a1de294fc02b

podman-tests-3.2.3-1.1.rhaos4.10.el8.aarch64.rpm

SHA-256: 3f41d7d7064b4e3da6da722e5a0fef89156a45692a1c41412ac906630f4c315d

python3-kuryr-kubernetes-4.10.0-202306170106.p0.g8e4df8b.assembly.stream.el8.noarch.rpm

SHA-256: a9c6a5517887782e278b7c1cb0bbd6d08047a573aef688121936533dd1323785

python3-perf-4.18.0-305.95.1.el8_4.aarch64.rpm

SHA-256: aa9918175691c3d8e0f3e77b49e6853a812e4c8844010281814cccff300cbae8

python3-perf-debuginfo-4.18.0-305.95.1.el8_4.aarch64.rpm

SHA-256: b8a5ee300afdba83a48d9a8f30decb1acedaf3d98a74009d88bb274e47fedf87

skopeo-1.2.4-1.1.el8.aarch64.rpm

SHA-256: debeccf6736ebb3f76cfc985e1554700448963f5dae46238b69de3d354b5329f

skopeo-debuginfo-1.2.4-1.1.el8.aarch64.rpm

SHA-256: 3694842d439f21b4e04ace32d8d76162913d528a2a6b4c3c50327c8c82bf2b58

skopeo-debugsource-1.2.4-1.1.el8.aarch64.rpm

SHA-256: 23a06fee45c233848f20080a12a7040f7a662cccca22b9b7512e299b17621dbf

skopeo-tests-1.2.4-1.1.el8.aarch64.rpm

SHA-256: 5a49069302905f6e641a4ef7f1f3ff66573cd1c79160707e6c1fcae8e00904b6

Related news

Red Hat Security Advisory 2024-0746-03

Red Hat Security Advisory 2024-0746-03 - Updated container image for Red Hat Ceph Storage 5.3 is now available in the Red Hat Ecosystem Catalog. Issues addressed include cross site scripting and denial of service vulnerabilities.

RHSA-2023:5421: Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.3.2 security updates and bug fixes

Multicluster Engine for Kubernetes 2.3.2 General Availability release images, which contain security updates and fix bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41721: A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead read the body of the HTTP request, which could be attacker-manipulate...

Red Hat Security Advisory 2023-4980-01

Red Hat Security Advisory 2023-4980-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.7 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a bypass vulnerability.

Red Hat Security Advisory 2023-4972-01

Red Hat Security Advisory 2023-4972-01 - Multicluster Engine for Kubernetes 2.1.8 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy. Issues addressed include a bypass vulnerability.

RHSA-2023:4862: Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.3.1 security updates and bug fixes

Multicluster Engine for Kubernetes 2.3.1 General Availability release images, which contain security updates and fix bugs. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated. * CVE-2023-37466: A flaw was found in the vm2 Promise handler sanitization, which allows attackers to esc...

RHSA-2023:4664: Red Hat Security Advisory: OpenShift Virtualization 4.13.3 Images security and bug fix update

Red Hat OpenShift Virtualization release 4.13.3 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of requests. * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Con...

RHSA-2023:4650: Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.2.7 security updates and bug fixes

Multicluster Engine for Kubernetes 2.2.7 General Availability release images, which provide security updates and fix bugs. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated. * CVE-2023-37903: A flaw was found in the vm2 custom inspect function, which allows attackers to escape t...

RHSA-2023:4456: Red Hat Security Advisory: OpenShift Container Platform 4.13.8 bug fix and security update

Red Hat OpenShift Container Platform release 4.13.8 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number...

RHSA-2023:4475: Red Hat Security Advisory: Gatekeeper Operator v0.2 security fixes and enhancements

Gatekeeper Operator v0.2 security fixes and enhancements Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.

Red Hat Security Advisory 2023-4421-01

Red Hat Security Advisory 2023-4421-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 4.12.5 images.

Red Hat Security Advisory 2023-4226-01

Red Hat Security Advisory 2023-4226-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.6.

Red Hat Security Advisory 2023-4225-01

Red Hat Security Advisory 2023-4225-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.6.

Red Hat Security Advisory 2023-4290-01

Red Hat Security Advisory 2023-4290-01 - OpenShift sandboxed containers 1.4.1 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.

RHSA-2023:4226: Red Hat Security Advisory: OpenShift Container Platform 4.13.6 bug fix and security update

Red Hat OpenShift Container Platform release 4.13.6 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number...

RHSA-2023:4225: Red Hat Security Advisory: OpenShift Container Platform 4.13.6 security and extras update

Red Hat OpenShift Container Platform release 4.13.6 is now available with updates to packages and images that fix several bugs. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.

Red Hat Security Advisory 2023-4276-01

Red Hat Security Advisory 2023-4276-01 - An update is now available for Red Hat DevWorkspace Operator. Red Hat Product Security has rated this update as having a security impact of Moderate.

Red Hat Security Advisory 2023-4241-01

Red Hat Security Advisory 2023-4241-01 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Data Foundation. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform.

Red Hat Security Advisory 2023-4090-01

Red Hat Security Advisory 2023-4090-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.5.

Red Hat Security Advisory 2023-4238-01

Red Hat Security Advisory 2023-4238-01 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Data Foundation. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform.

RHSA-2023:4093: Red Hat Security Advisory: OpenShift Container Platform 4.13.5 security update

Red Hat OpenShift Container Platform release 4.13.5 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1260: An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions "update, patch" the "po...

RHSA-2023:4091: Red Hat Security Advisory: OpenShift Container Platform 4.13.5 security update

Red Hat OpenShift Container Platform release 4.13.5 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server c...

RHSA-2023:4241: Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.10.14 security and bug fix update

Updated images that fix several bugs are now available for Red Hat OpenShift Data Foundation 4.10.14 on Red Hat Enterprise Linux 8 from Red Hat Container Registry. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.

RHSA-2023:4204: Red Hat Security Advisory: VolSync 0.7.3 security fixes and enhancements

VolSync v0.7.3 enhancements and security fixes Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.

RHSA-2023:4114: Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.1 security update

Red Hat OpenShift Service Mesh 2.4.1 Containers Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.

RHSA-2023:4113: Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.3.5 security update

Red Hat OpenShift Service Mesh 2.3.5 Containers Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptog...

RHSA-2023:4112: Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.2.8 security update

Red Hat OpenShift Service Mesh 2.2.8 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modu...

Red Hat Security Advisory 2023-3925-01

Red Hat Security Advisory 2023-3925-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.23.

Red Hat Security Advisory 2023-3924-01

Red Hat Security Advisory 2023-3924-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.12.23.

RHSA-2023:3924: Red Hat Security Advisory: OpenShift Container Platform 4.12.23 security update

Red Hat OpenShift Container Platform release 4.12.23 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-...

RHSA-2023:3925: Red Hat Security Advisory: Red Hat OpenShift Enterprise security update

Red Hat OpenShift Container Platform release 4.12.23 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-...

Red Hat Security Advisory 2023-3915-01

Red Hat Security Advisory 2023-3915-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.44.

Red Hat Security Advisory 2023-3914-01

Red Hat Security Advisory 2023-3914-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.11.44.

Red Hat Security Advisory 2023-3911-01

Red Hat Security Advisory 2023-3911-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.63.

Red Hat Security Advisory 2023-3910-01

Red Hat Security Advisory 2023-3910-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.10.63.

RHSA-2023:3914: Red Hat Security Advisory: Red Hat OpenShift Enterprise security update

Red Hat OpenShift Container Platform release 4.11.44 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-23772: A flaw was found in the big package of the math library in golang. The Rat.SetString could cause an overflow, and if left unhandled, it could lead to excessive memory use. This issu...

RHSA-2023:3915: Red Hat Security Advisory: OpenShift Container Platform 4.11.44 bug fix and security update

Red Hat OpenShift Container Platform release 4.11.44 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS...

CVE-2023-3089: cve-details

A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.

Red Hat Security Advisory 2023-3644-01

Red Hat Security Advisory 2023-3644-01 - Red Hat OpenShift Service Mesh is the Red Hat distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation. This advisory covers container images for the release.

RHSA-2023:3644: Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.0

Red Hat OpenShift Service Mesh Containers for 2.4.0 Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24540: A flaw was found in golang, where not all valid JavaScript white-space characters were considered white space. Due to this issue, templates containing white-space characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution.

RHSA-2023:3542: Red Hat Security Advisory: OpenShift Container Platform 4.11.43 bug fix and security update

Red Hat OpenShift Container Platform release 4.11.43 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: A flaw was found in golang. The language package for go language can panic due to an out-of-bounds read when an incorrectly formatted language tag is being parsed. This flaw allows a...

RHSA-2023:3545: Red Hat Security Advisory: OpenShift Container Platform 4.12.21 packages and security update

Red Hat OpenShift Container Platform release 4.12.21 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24540: A flaw was found in golang, where not all valid JavaScript white-space characters were considered white space. Due to this issue, templates containing white-space characters outside ...

Red Hat Security Advisory 2023-3409-01

Red Hat Security Advisory 2023-3409-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.12.20.

Red Hat Security Advisory 2023-3366-01

Red Hat Security Advisory 2023-3366-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.2. Issues addressed include a traversal vulnerability.

RHSA-2023:3435: Red Hat Security Advisory: Red Hat Advanced Cluster Security 3.74 for Kubernetes security update

An update is now available for Red Hat Advanced Cluster Security for Kubernetes (RHACS). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24539: A flaw was found in golang where angle brackets (<>) were not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character could result in unexpectedly closing the CSS context and allowing for the injection of unexpected HMTL if executed with untrusted inpu...

Red Hat Security Advisory 2023-3318-01

Red Hat Security Advisory 2023-3318-01 - Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. The golang packages provide the Go programming language compiler.

RHSA-2023:3319: Red Hat Security Advisory: go-toolset:rhel8 security update

An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24540: A flaw was found in golang, where not all valid JavaScript white-space characters were considered white space. Due to this issue, templates containing white-space characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution...

RHSA-2023:1329: Red Hat Security Advisory: OpenShift Container Platform 4.13.0 bug fix and security update

Red Hat build of MicroShift release 4.13.0 is now available with updates to packages and images that fix several bugs. This release includes a security update for Red Hat build of MicroShift 4.13. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP head...

CVE-2023-24540: [security] Go 1.20.4 and Go 1.19.9 are released

Not all valid JavaScript whitespace characters are considered to be whitespace. Templates containing whitespace characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution.

Red Hat Security Advisory 2023-2204-01

Red Hat Security Advisory 2023-2204-01 - Image Builder is a service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood.

RHSA-2023:2357: Red Hat Security Advisory: git-lfs security and bug fix update

An update for git-lfs is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: A flaw was found in golang. The HTTP/1 client accepted invalid Transfer-Encoding headers indicating "chunked" encoding. This issue could allow request smuggling, but only if combined with an intermediate server that also improperly accepts the header as invalid. * CVE-2022-2880: A flaw was found in the golang package, where requests forwarded by r...

RHSA-2023:2283: Red Hat Security Advisory: skopeo security and bug fix update

An update for skopeo is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30629: A flaw was found in the crypto/tls golang package. When session tickets are generated by crypto/tls, it is missing the ticket expiration. This issue may allow an attacker to observe the TLS handshakes to correlate successive connections during session resumption. * CVE-2022-41717: A flaw was found in the net/http library of the golang package. Thi...

Red Hat Security Advisory 2023-1030-01

Red Hat Security Advisory 2023-1030-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.30.

RHSA-2023:1030: Red Hat Security Advisory: OpenShift Container Platform 4.11.30 security update

Red Hat OpenShift Container Platform release 4.11.30 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total num...

RHSA-2023:0774: Red Hat Security Advisory: OpenShift Container Platform 4.11.28 security update

Red Hat OpenShift Container Platform release 4.11.28 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4238: A flaw was found in goutils where randomly generated alphanumeric strings contain significantly less entropy than expected. Both the `RandomAlphaNumeric` and `CryptoRandomAlphaNumeric` functions always return strings containing at least one digit from 0 to 9. This issu...

Red Hat Security Advisory 2023-0769-01

Red Hat Security Advisory 2023-0769-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.

Red Hat Security Advisory 2023-0692-01

Red Hat Security Advisory 2023-0692-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes.

RHSA-2023:0631: Red Hat Security Advisory: RHSA: Submariner 0.14 - bug fix and security updates

Submariner 0.14 packages that fix various bugs and add various enhancements that are now available for Red Hat Advanced Cluster Management for Kubernetes version 2.7 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2880: A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go ...