Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:3915: Red Hat Security Advisory: OpenShift Container Platform 4.11.44 bug fix and security update

Red Hat OpenShift Container Platform release 4.11.44 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.
  • CVE-2023-24540: A flaw was found in golang, where not all valid JavaScript white-space characters were considered white space. Due to this issue, templates containing white-space characters outside of the character set “\t\n\f\r\u0020\u2028\u2029” in JavaScript contexts that also contain actions may not be properly sanitized during execution.
Red Hat Security Data
#vulnerability#web#mac#linux#red_hat#git#java#kubernetes#perl#vmware#alibaba#oauth#auth#ssh#ibm#rpm#docker#ssl

Synopsis

Important: OpenShift Container Platform 4.11.44 bug fix and security update

Type/Severity

Security Advisory: Important

Topic

Red Hat OpenShift Container Platform release 4.11.44 is now available with updates to packages and images that fix several bugs and add enhancements.

This release includes a security update for Red Hat OpenShift Container Platform 4.11.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Red Hat OpenShift Container Platform is Red Hat’s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.

This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.44. See the following advisory for the RPM packages for this release:

https://access.redhat.com/errata/RHSA-2023:3914

Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:

https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html

Security Fix(es):

  • golang: html/template: improper handling of JavaScript whitespace (CVE-2023-24540)
  • openshift: OCP does not use FIPS-certified cryptography (CVE-2023-3089)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

All OpenShift Container Platform 4.11 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html

Solution

For OpenShift Container Platform 4.11 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:

https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html

You may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.

The sha values for the release are

(For x86_64 architecture)
The image digest is sha256:52cbfbbeb9cc03b49c2788ac7333e63d3dae14673e01a9d8e59270f3a8390ed3

(For s390x architecture)
The image digest is sha256:8e25fe8123b744a1e7ae48b1d02cb989387168c6bc3eef8a47ee7ee13157c25f

(For ppc64le architecture)
The image digest is sha256:9d9ee02572038ccc4750e416c2acb4a222bfc4fcca63a3595ff63685304d0e53

(For aarch64 architecture)
The image digest is sha256:e26acde99c69074890e2eefc4ca89506e3dd7426c049a7ff02734cabfa3be42a

All OpenShift Container Platform 4.11 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html

Affected Products

  • Red Hat OpenShift Container Platform 4.11 for RHEL 8 x86_64
  • Red Hat OpenShift Container Platform for Power 4.11 for RHEL 8 ppc64le
  • Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.11 for RHEL 8 s390x
  • Red Hat OpenShift Container Platform for ARM 64 4.11 aarch64

Fixes

  • BZ - 2196027 - CVE-2023-24540 golang: html/template: improper handling of JavaScript whitespace
  • BZ - 2212085 - CVE-2023-3089 openshift: OCP & FIPS mode
  • OCPBUGS-14004 - “pipelines-as-code-pipelinerun-go” configMap is not been used for the Go repository
  • OCPBUGS-14413 - “Create” button inactive when creating application with “Import from Git” workflow
  • OCPBUGS-14456 - CRL configmap is limited by 1MB max, not allowing for multiple public CRLS. (4.11)
  • OCPBUGS-14457 - mtls CRL not working when using an intermediate CA (4.11)
  • OCPBUGS-14654 - [4.11] IPI redfish installation fails on inspect for EthernetInterfaces
  • OCPBUGS-14686 - Package openvswitch2.17 conflicts with openvswitch2.15 during the 4.12 to 4.13 upgrade of RHEL worker
  • OCPBUGS-14746 - container_network* metrics stop reporting after container restart
  • OCPBUGS-14931 - kuryr-controller crashes on KuryrPort cleanup when subport is already gone: Request requires an ID but none was found
  • OCPBUGS-15150 - TestNewApp unit tests in oc are failing
  • OCPBUGS-15151 - e2e-agnostic-ovn-cmd is permanently failing due to registry.centos.org
  • OCPBUGS-15361 - Bump to kubernetes 1.24.15
  • OCPBUGS-4812 - oc new-app command using s2i with private Github repo (over SSH) fails using oc v4.10
  • OCPBUGS-14355 - [4.11.z] [GCP] worker node with Sriov operator installed fails to come up online after reboot

CVEs

  • CVE-2022-2879
  • CVE-2022-2880
  • CVE-2022-2995
  • CVE-2022-27664
  • CVE-2022-32149
  • CVE-2022-32190
  • CVE-2022-41715
  • CVE-2023-1370
  • CVE-2023-3089
  • CVE-2023-24329
  • CVE-2023-24540
  • CVE-2023-32067

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://access.redhat.com/security/vulnerabilities/RHSB-2023-001

aarch64

openshift4/metallb-rhel8@sha256:acead0d920d53acf69ade1f416ad8eb3703bd23e582aa26f5cb7668b534136c4

openshift-tech-preview/metallb-rhel8@sha256:acead0d920d53acf69ade1f416ad8eb3703bd23e582aa26f5cb7668b534136c4

openshift4/cloud-event-proxy-rhel8@sha256:190fc9d2af960c365c1d8aa0c3bd07efa3c78e26c222d22acfdd76b1062b1d71

openshift4/ose-cloud-event-proxy-rhel8@sha256:190fc9d2af960c365c1d8aa0c3bd07efa3c78e26c222d22acfdd76b1062b1d71

openshift4/ose-cloud-event-proxy@sha256:190fc9d2af960c365c1d8aa0c3bd07efa3c78e26c222d22acfdd76b1062b1d71

openshift4/cloud-network-config-controller-rhel8@sha256:19ed58474bd35ac668ea389ae10b1a4685c838c4fa1e835f98284613c8d1989f

openshift4/dpu-network-rhel8-operator@sha256:306b1fe0c19090290585225ea3ea74a7b95285ef385f95181ef370ee878b6639

openshift4/driver-toolkit-rhel8@sha256:b0d4510b62b7cb1cd1d35b729fbed3e22bf15abb73602b29f0c8d1f8324c1852

openshift4/egress-router-cni-rhel8@sha256:9082685d2c633b8f66189988f87c432eac2ca8d4d24c611a5480d3c4168f7945

openshift4/frr-rhel8@sha256:5849f5ffdbc2cae77f681a241a81a6cf7507013b12685d7efc6a2b0690d32dd6

openshift4/kubernetes-nmstate-rhel8-operator@sha256:0b0d8798cade428fd28854f0cfcbaf5207e9149a41f941c159bbba0685d3f2c3

openshift4/metallb-rhel8-operator@sha256:4401b426b4a06cf7b6c0b92d8cbee86b6fbe84f09452bb76192040678ac20378

openshift4/network-tools-rhel8@sha256:98e661b221cb50cc834a10a2c8401b7a728d93c83c7f42a06128f0c7b43a1ff8

openshift4/ose-agent-installer-api-server-rhel8@sha256:c1ca6aed3938155595d741edcd0af168b06ec354b49f06860967ca772221ee8c

openshift4/ose-agent-installer-csr-approver-rhel8@sha256:766ea897a851689ef622b04bfd6306b18816f709d0d8a738ca1dd58a0558da7a

openshift4/ose-agent-installer-node-agent-rhel8@sha256:7e5ddfd358ef86af743f19a28916ce0451e7b9c263ea6d1cdefe0884001ef79d

openshift4/ose-agent-installer-orchestrator-rhel8@sha256:ab75da2dbe5b62c40da984043b5cb8c5a77f1fe4b1954501a525c8d0e0127b66

openshift4/ose-ansible-operator@sha256:450e3757f04e46feaf115e64d4d1c004bcb2fa5eed4d1185275501d2e51de4a7

openshift4/ose-apiserver-network-proxy-rhel8@sha256:b93b389f0c34e9e2e3640474b779dfed58969ae0e00ca6f58100f3d7c3a55b96

openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:4375b48121946f66f0c868a89ce25c6c5d15d5c2945c46d9708a2d415629a789

openshift4/ose-aws-cluster-api-controllers-rhel8@sha256:a325a014871074dee499a45c8f86f31e6fa48e04f1e4c2849d44e993bb209be6

openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:f3d3edbe6ca53bc4b02f4f139b5976751202a9d595e5aa67c3af13cf94d585d1

openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:e93718b82b5f42bdbc6bddd3224828ed5e819ed63bd76ec1bb02672a46978062

openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:d4f2afbca1c8a565736bde808a5d2380c0076b87853f1051cbe9e75400f906ab

openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:73b81cf46d826e40f5e6e6c74566bea0b8d5b9abf850c11bb27ccf0c2989a577

openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:052854e27868571127162a76ceaa7fefdf89dc539fb19bdcb0d5327abba21e3e

openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:0942739f5ef8181aa13db0e9a93d9559a649fd9cce9c77dc198fe889fd0e6712

openshift4/ose-azure-cloud-node-manager-rhel8@sha256:329375fc411a94905ddfd43837fd0a8e09eecb3dd7bdaee2285c801c053c0410

openshift4/ose-azure-cluster-api-controllers-rhel8@sha256:ccab6d8b6f9b69e36312b8f7870bc1c37355dae504551cdeb79e71c38fe7a60d

openshift4/ose-azure-disk-csi-driver-rhel8@sha256:55d6d4bc7b4ddce5cf473fde62706639517e964c418381f7b73188a0a072f4f6

openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:403bf293c18038aa161f607946be4b5e9644de3253c68a9183466774608ea1ee

openshift4/ose-azure-file-csi-driver-operator-rhel8@sha256:77e415b8e4bf860f4991cc788a7e73b5f432d889f07b5583cac6fcb29e80021a

openshift4/ose-azure-file-csi-driver-rhel8@sha256:59a3ac6a2f8b12d56cfb2e6795075d494d945d3d58face27e00f49d0728a7f03

openshift4/ose-baremetal-installer-rhel8@sha256:a410046499bbfb467ae00ec27d600abc775a8d5097549c7417029b7248155e1b

openshift4/ose-baremetal-machine-controllers@sha256:7fc794fc9c68ef711f26144fccff77b886fbd073db9fe7a72b0d32ffcf4e4a3c

openshift4/ose-baremetal-rhel8-operator@sha256:696bb48f33e5d5ddd3d001801e3cdef7386e38a21ca09db31f042df5d3b20cd7

openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e36c1e634cf34cbd3f275f522f91902904b09ba91707ffa6b9a346475cc598d2

openshift4/ose-cli@sha256:4a2cf774ca4f834337a91d1e2e859b3fc83c429a508db96163714e84ae127e17

openshift4/ose-cli-artifacts@sha256:17cd74ea08d18c6ce569b846cee0fcd8925fb82e516412afd517caa42d7e8676

openshift4/ose-cloud-credential-operator@sha256:a71dd737cc766417b1b7c4f0b3e2b7aced12a606635cc9156aa86cb69a740c4a

openshift4/ose-cluster-api-rhel8@sha256:df5fbef233c2bbb56bbb8ee7429aef791c0e74e95615393fe472c09c0bbdaa6a

openshift4/ose-cluster-authentication-operator@sha256:74c9c8b0afaffdcb2fa67165dae9db7d981186f409fa823947f7b2418a63439e

openshift4/ose-cluster-autoscaler@sha256:e11ce236300291be69ca0b6289c3837e6afe24fb090653086efc1b6236080b83

openshift4/ose-cluster-autoscaler-operator@sha256:74db0610b89f4cd3d0ee2a91c80df45ce8a55231f90b2507cb4ccd648a54bb1d

openshift4/ose-cluster-baremetal-operator-rhel8@sha256:78dbeb20d85ef24c2c1f19aeac46257a87b9d62feeed917d2d38bfd4e0472fb7

openshift4/ose-cluster-bootstrap@sha256:2fce29ec1c3ee0bccc29f1bdccee2f4a1c4c978c9ce9b76163c19a286507337f

openshift4/ose-cluster-capacity@sha256:1ec09b485c70a0af6292174c12597a7f2dc3d0bc192f0c2d16873131ecb04020

openshift4/ose-cluster-capi-rhel8-operator@sha256:8679501715db19b27b61fd98e66db10f77d8f5a3eab49d33afe34c8c5c28adec

openshift4/ose-cluster-capi-operator-container-rhel8@sha256:8679501715db19b27b61fd98e66db10f77d8f5a3eab49d33afe34c8c5c28adec

openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:02ffee76005626da129acaab78b8077d8b444d4b1ed81999534d819a2f17ca7b

openshift4/ose-cluster-config-operator@sha256:45ae71607db222b198136106a96bd436fab933425ec9d69c8d9c98862a4f5f9b

openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:d25371b226476f4b29ecdfec1b92dee58b77f69bbd9713e33af5378045a3d439

openshift4/ose-cluster-dns-operator@sha256:c18eaf79bdd55d0d2dadb12da0c9557bffdcd743c67233b3ea8db0ece85b0297

openshift4/ose-cluster-etcd-rhel8-operator@sha256:d61fd1fb1ceb7a12a883f685b63b975c1a88722f6bd32ee91a487d5e32870cb1

openshift4/ose-cluster-image-registry-operator@sha256:b3a9ec05e8941d1ff822379bdbc55489f0179d2d1cd31703c16ba0d0265c75a0

openshift4/ose-cluster-ingress-operator@sha256:b73c067ba24f7924956bcd626fb6e930c536366b8ce17ed8f9f054fe16b31ec8

openshift4/ose-cluster-kube-apiserver-operator@sha256:9e8c26463856915f8d21d8ef7a8f2da99b867befdc5a788dee423c9a5885fe15

openshift4/ose-cluster-kube-cluster-api-rhel8-operator@sha256:cc366a64d0e61f20372e6c6f0cdefce6f1ec1265e245ec5a45bbad8a9c10c08d

openshift4/ose-cluster-kube-controller-manager-operator@sha256:3407bf556cab6dadae645ede14e433f2559709592d7a82783e67726ec46ef5a5

openshift4/ose-cluster-kube-descheduler-operator@sha256:cfd0c8d9389781cd21bc7982773518ea509536b0c5fa120d18ea19c9797064f0

openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:cfd0c8d9389781cd21bc7982773518ea509536b0c5fa120d18ea19c9797064f0

openshift4/ose-cluster-kube-scheduler-operator@sha256:fc0a2565cb43d54eaf31c008715ed6a65966d3a06e8518c06aba0b18b8a39a3b

openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:b03d507e808ae442a315a0f6e7ffa31e576e99532b4db27e8b6cce2e869c8c5f

openshift4/ose-cluster-machine-approver@sha256:3d396466184d9dec001caeb51fafb6789f0e2f7048bc41aac881158f654f3421

openshift4/ose-cluster-monitoring-operator@sha256:b50241f29671bc71f92c14d5a286049b17627d488a44af7a59cac82298f01982

openshift4/ose-cluster-network-operator@sha256:db293752227ff8fead7c686112433dc6cfc7cb1c8fe7bd5504ecd27648de75dc

openshift4/ose-cluster-nfd-operator@sha256:2c951f7aa0668b03a3060060d6ca074c1899c3a8f041f79de0d330e3a29ee174

openshift4/ose-cluster-node-tuning-operator@sha256:07bce19335f99ce8a348165451e78db098dacd22e40f7c4f0af459aac10ef384

openshift4/ose-cluster-openshift-apiserver-operator@sha256:79623af82d5837d4fe13dc98d32a4721dc3bd5ccc2a9de7bb356f383a4355054

openshift4/ose-cluster-openshift-controller-manager-operator@sha256:f93f4e3ed8f7d8cbbc563572ba72876b6b438d3d662036b6abce6d636d6dda54

openshift4/ose-cluster-policy-controller-rhel8@sha256:c429a75f16341825803be1be15e506e8a1d628ac40a30b23551022f875fc1fe0

openshift4/ose-cluster-samples-operator@sha256:2bc2a4f3a5f6022f82c6223df6d007c4bff7f8907e2603451e8cd96c59f39595

openshift4/ose-cluster-storage-operator@sha256:846649d1555804fc6f4d5f946b554495c4c2aca13c330ca4e50c306d0c19724c

openshift4/ose-cluster-update-keys@sha256:67ff614fd4bf0d17985f6abda1b63783bb1173c2a9861006a0c4729000361a35

openshift4/ose-cluster-version-operator@sha256:71d6348f4edce7efd6502cb59aba8945880d50572599b455fb35e6ea9f184130

openshift4/ose-clusterresourceoverride-rhel8@sha256:b1a9d99f32adfe62ca0c37a0e9afb493534b3d1025f5b63a782554c9cfacd4f5

openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:e30d4c0c235e570fb1711f8a72eddcdb7001eb11f96a626b0b76660cf003f47b

openshift4/ose-configmap-reloader@sha256:209e935cf087b2d69cf4f813a64f5457b29aab81a6fb531dbe7ad5a7b9980f79

openshift4/ose-console@sha256:b1b63de1a22b4c20b2a8a145f1b646e1ee97d243201e27107a67af2751e3f81b

openshift4/ose-console-operator@sha256:8c80a324897e5a8e4341b69152d4d33007b056a38c9615a57f07c857356e5650

openshift4/ose-container-networking-plugins-rhel8@sha256:3ff63f34e5ca1c188c30717d2d1df493c631efada081912c61075c13248af5cb

openshift4/ose-contour-rhel8@sha256:6be085ad12f24fc3b55b36bde957d520c3bf5866811ed7fdfa1438c06dabdf2b

openshift4/ose-coredns@sha256:7722b13248737db2b2fbdfefbec57d8e24d25a54284fa810de4c9a1a0f9079b9

openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:c7ba586fda3932851306ede0e03c5d30f9109fe9d854e9ca357b18839e55b62a

openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:d93794f7d44896c6ab814ff9078b197cdb2a695f286a3be7e38aeefd4626a2b6

openshift4/ose-csi-driver-shared-resource-rhel8@sha256:a9b2dbe57aa36fcf5f68447c565f31599675d5de8b0cc2518810e2bf1337c6ed

openshift4/ose-csi-driver-shared-resource-webhook-rhel8@sha256:8dc510fde6ebd394783386da7c97f2940cfa9c85a3e97813403bf2e8178d57c7

openshift4/ose-csi-external-attacher-rhel8@sha256:b91d148b27a191272720f4a91390754986b2552b2f332696265487b27c05e72d

openshift4/ose-csi-external-attacher@sha256:b91d148b27a191272720f4a91390754986b2552b2f332696265487b27c05e72d

openshift4/ose-csi-external-provisioner-rhel8@sha256:477ad0d80a647ee70c6581d681ad92dbd274967c2a4136266f08916998d04700

openshift4/ose-csi-external-provisioner@sha256:477ad0d80a647ee70c6581d681ad92dbd274967c2a4136266f08916998d04700

openshift4/ose-csi-external-resizer@sha256:84ea8d40a9517c9b82235cec3b770cddd2d37a414cbdc0424dabec376644d0f9

openshift4/ose-csi-external-resizer-rhel8@sha256:84ea8d40a9517c9b82235cec3b770cddd2d37a414cbdc0424dabec376644d0f9

openshift4/ose-csi-external-snapshotter-rhel8@sha256:8a23d072d45caa1299e7d620516a7fff0c21c816b0ec36338bc2d7b52138744c

openshift4/ose-csi-external-snapshotter@sha256:8a23d072d45caa1299e7d620516a7fff0c21c816b0ec36338bc2d7b52138744c

openshift4/ose-csi-livenessprobe-rhel8@sha256:9dfc2cb7348e36021abb1c63512c3fa58865d720bc6cd693b5f128828b658c9f

openshift4/ose-csi-livenessprobe@sha256:9dfc2cb7348e36021abb1c63512c3fa58865d720bc6cd693b5f128828b658c9f

openshift4/ose-csi-node-driver-registrar@sha256:9af33742bbd14f4728ac4bc76ad72cee7f5d39fb24a218afdf8c60142a202328

openshift4/ose-csi-node-driver-registrar-rhel8@sha256:9af33742bbd14f4728ac4bc76ad72cee7f5d39fb24a218afdf8c60142a202328

openshift4/ose-csi-snapshot-controller-rhel8@sha256:1d4b84756b6791c71954e82668ec1dc010364096dd2be870cf6a30252d8e1982

openshift4/ose-csi-snapshot-controller@sha256:1d4b84756b6791c71954e82668ec1dc010364096dd2be870cf6a30252d8e1982

openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:51dd3ef11de4d22a33ded2ecb401e8a21f7225cb64aa093eac11fdef772a59bb

openshift4/ose-deployer@sha256:f02cb8d73e59148ca5ae1a8e74b450c58132446819503be3a6c9f42fe4071848

openshift4/ose-descheduler@sha256:adfee958b7f09ab6a257e8f291caaff9d89104ff29155c985ae2dd358ef9ad49

openshift4/ose-docker-builder@sha256:2944a9065d0b22d3d2f46c2d736611d9131d14c176b6aa21e776543aaf454d42

openshift4/ose-docker-registry@sha256:5443edb0330a298b37a2c75cad978a8b448f52bf7a939561afcc54ab3ba29884

openshift4/ose-egress-dns-proxy@sha256:a94c1082ab823c88163a72e7356b2bf213f86e3b53dbd83f88114539f8b2811e

openshift4/ose-egress-http-proxy@sha256:5dbcf6bf7e92e344061f24f618dd4e6eb6702a525d871fed39d646333360510f

openshift4/ose-egress-router@sha256:d24ffc74d83f76927ca04611f26e79446a806bde6fa6c327bca002412d7215af

openshift4/ose-etcd@sha256:a61a6f434351b9b2494a1ab384b9c2abaee58d7b6c9fde2209a77554af1d32f9

openshift4/ose-grafana@sha256:7058611dcd8e1e771f5b60b5130e5c79bb26543dc6ea0b7cd1bb851c1b2717b9

openshift4/ose-haproxy-router@sha256:a6a8da4f243dfa533b1e76f552fe5a5c41e9447b28c7b16893007862497c7f42

openshift4/ose-helm-operator@sha256:66c40d68536f8cd1df672b3c9724e68d177c005ab4f18d4d531c9b8965c1210a

openshift4/ose-hyperkube@sha256:3f360b2e16ad5563791ac244016210ce3f33bc955140189ecdb4f261b2c0077e

openshift4/ose-hypershift-rhel8@sha256:31126c8e3faeb1a70f563db57aacedc8e9273b5078cd6dec4e0d67b6adcf7873

openshift4/ose-image-customization-controller-rhel8@sha256:f0f74dd81a2321df77119ebe422e3c885f535b21f4c9d6dbc4ba7513b8ea874b

openshift4/ose-insights-rhel8-operator@sha256:b5edfd30494921f54a25fd0811dba329f6251a2c390968bee6c9d5becb53bbe7

openshift4/ose-installer@sha256:7bb30067f5016e091a25e408bb76c6390a311479b004cb7cc6a73cffa50420f9

openshift4/ose-installer-artifacts@sha256:3a565af92c1dece1122be541dc9bd50c904b61b95ebbf1ec0b103e7357d22c70

openshift4/ose-ironic-agent-rhel8@sha256:105662816630feed8e6d0b3bf5f027bc49ee09b74b93405dd1603c5f13f70c25

openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:514ddddb27beb3d7119f42a1b36999bbf6d02c019e24528d338666d41da29555

openshift4/ose-ironic-rhel8@sha256:8664ecc14bfea3b8db38a3d79c2beaae6e50781926bafeb354f2d888939c6b73

openshift4/ose-ironic-static-ip-manager-rhel8@sha256:7daf3a5913436bbd4cd7ab4f3513a631435dc905292e6c0eaf96608cd3445719

openshift4/ose-k8s-prometheus-adapter@sha256:ad6c08f2a9ddb4ef90f2885ec2714f48a7f473d8a2b23eb33e62218164e7ede6

openshift4/ose-keepalived-ipfailover@sha256:b3f75263c1e71b97f2da6a6fa9f42d9393cf1a5b90b835774fd536e6d5d50799

openshift4/ose-kube-proxy@sha256:eda862b5d57e58b83cfb27a1ddf4935bb292bf9300d515003d0f04f51cd1d63a

openshift4/ose-kube-rbac-proxy@sha256:6d49b13356f8bd51e27225c94d1dccda66dbda987420a455e4fdfc0d2aea49ea

openshift4/ose-kube-state-metrics@sha256:2a218ecadaf0b41fd196a5ad3941f6eaa4629cc6af54795d1da00e06f8cfaa5f

openshift4/ose-kube-storage-version-migrator-rhel8@sha256:ad0c63858292b9beb0c9d8fe1037c344fec29bf22091f3342138b4198ba5247b

openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:844b5dab48fe7bf3d0a84c2552bc60131f52b4eac94463eecaa71d0539835d98

openshift4/ose-libvirt-machine-controllers@sha256:48e388fdea06dbb6e5e06942bd705ddd9c997c07926af8bfb4c85d7758a89d49

openshift4/ose-local-storage-diskmaker@sha256:58cd5b94a8125338bac7368ef8a0f0e15b521baa1f23f1fa62a628ab672ad26c

openshift4/ose-local-storage-mustgather-rhel8@sha256:786ac686f3822358e8ab542ba5f0a7afa9add80a51fb219d629f1f4d7f6e2f29

openshift4/ose-local-storage-operator@sha256:bed406cea5e72d74ac1f67b0f07e916fc7a02f948e52de55c03485a7b6c46ab6

openshift4/ose-machine-api-operator@sha256:c5aecf339f0fc5eb82f7d5e420ee1cb35a6efa7d5401803815e082d03f9161d5

openshift4/ose-machine-api-provider-aws-rhel8@sha256:4cb842f1d95a10ad2c954c6473cf6995bb729c9b658d075a3d00f5ad645b6cce

openshift4/ose-machine-api-provider-azure-rhel8@sha256:47536fc7006c2c3e6233927db42b53e13d6c1a555c0c3ca4f845dfd8da21b3e6

openshift4/ose-machine-api-provider-openstack-rhel8@sha256:15fabd2415e40f74976b502f1ea63713dae088cd1e3059507863e5ec6961b582

openshift4/ose-machine-config-operator@sha256:24c776d35250950c054d16a2cf3d7e8419535cc273115cd48ee3111850fb9d3c

openshift4/ose-machine-os-images-rhel8@sha256:673a2c4d718ef8c4e5b4cc7b3fa06924267ec36105287cf1f40bb96fbde27fe5

openshift4/ose-multus-admission-controller@sha256:f87f2cbb3c6ddbb278d06fbcee6acbac8184d6fa6a780cc974943e91beef0c69

openshift4/ose-multus-cni@sha256:3e3928f1e92186364be85e0a644ff977497c773cbf04345affafa8a3c2bb95bc

openshift4/ose-multus-networkpolicy-rhel8@sha256:519f570abe05759b9348f4ead139d7b0f644e91283daf9fd05a98a4648e6e77f

openshift4/ose-multus-route-override-cni-rhel8@sha256:bdcf4e6ead8782f3b21f9506596d626a746d53a6e9f44da38a206f11704c843a

openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:a858cf251c9181b4d3f16a5a260b73c7515440c810de88f407e221547276980e

openshift4/ose-must-gather@sha256:56acca059604a2f1eefbc48a9ea23f40c9d35a2169630d04c31c1ebae5faace3

openshift4/ose-network-interface-bond-cni-rhel8@sha256:7d7cbc516140da09461ccfe72242ba38cc27508e24ac752d4b07b4ecafe677c3

openshift4/ose-network-metrics-daemon-rhel8@sha256:9bf7964cb4d6ebb4ba72779f4c0ad23a335a1797186951db97120efcae2ba876

openshift4/ose-node-feature-discovery@sha256:49f36e63be5d6bf84bfbcf4b5f86a63c0707c2b2d510aeabd664d82ecb1a9e19

openshift4/ose-node-problem-detector-rhel8@sha256:384a5035ba4280335d9869c23a91291e64dd5e363c53fe9672bce1339abad6ed

openshift4/ose-oauth-apiserver-rhel8@sha256:82fe29666ec377255f2d3fefd15380d92c147395d70796d1cd5219252bc39156

openshift4/ose-oauth-proxy@sha256:3e84a23d5ffecf1e4c8ddf4c3d3990fd5a0dfd669d227108a4635c1d5217826c

openshift4/ose-oauth-server-rhel8@sha256:92e3da4e2b86bfcddffa794acf91ef24d1e61ef28fd410eed83afe31d674d43b

openshift4/ose-openshift-apiserver-rhel8@sha256:1f31e3374ff42d2158fd9dc4a107a7fd2ec07272f40c5d56c0f2697150152e39

openshift4/ose-openshift-controller-manager-rhel8@sha256:951dee8c907c54329ebac840e509760f77f1a79f70b3441bd56fc3b152a1ef19

openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:d5fdeadf53988305b2382b48fa74a9e4bc1f9a902a92447c0d82de074fa97def

openshift4/ose-openshift-state-metrics-rhel8@sha256:40fe2e4aa6ecbf693db5cdaf012450c2bbfda80d9791685929a91311e1142488

openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:af29019a4254e3f01ec155c53cc93a968af8c882e859df1ab0ba8fc046af9c4a

openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:f43858d04f7c8b16cab3dee58bb06602f69224370ba211dd241b535d3d24549b

openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:46562cfc4f511858827fe1cbf568ce1054638bada29ee1dda391c04d689ef62a

openshift4/ose-openstack-machine-controllers@sha256:cbb9b0c9af69d1421c777f9fe9c36b0add3a91dde4fa34feb0ea1d8a5da0ae63

openshift4/ose-operator-lifecycle-manager@sha256:dea14338c63c82ad10d53a63db4557c20e1468a4a9d73c23a0402d04d58c3cde

openshift4/ose-operator-marketplace@sha256:fe82b3cdb0897ff8b8165674600208e2ed3fb2ce87c17ef313bd1a6427777103

openshift4/ose-operator-registry@sha256:8a2ff571e4f9256ebc9416a472f60ffa38d837011d907ea5112550317f52e71e

openshift4/ose-operator-sdk-rhel8@sha256:5c12cdd779c57aeff11a074d8661792bade6bd6a43cd2848a2e26f81680c18de

openshift4/ose-ovirt-machine-controllers-rhel8@sha256:4b4d9b21bd1f3fa9cd0aeae9e50f48aa67cd9a5b2623bc0ae9d20539a44a94f2

openshift4/ose-ovn-kubernetes@sha256:153a2e82b4807c5228f8719fffb5ec961dd4f8117c221e7370014286971b7b4b

openshift4/ose-pod@sha256:efea3330a8c1e14a41380f931e17b63cb3d2a67bb6ba819279122801f2ca3567

openshift4/ose-prom-label-proxy@sha256:5dc18ba8ed0bfd1fd137a727a60e045d4e5c90b20c15dbad2f089f8374385e50

openshift4/ose-prometheus@sha256:b7e7499503f66a830ea8f5136609d244edc75ca5497e05535958c04e7ece89ed

openshift4/ose-prometheus-alertmanager@sha256:e03f3778c46ccd1bfce322c73fa714be1e71c33c78a6ef386f706bcde19ae1b9

openshift4/ose-prometheus-config-reloader@sha256:b3eacbc81f84a26c6cc1e3d0f9c44d7d40e2cb4abffa1c352cfeb28339354187

openshift4/ose-prometheus-node-exporter@sha256:292909618219af5c6037cfe2914549a5005173d7629eb9db1eb8605975a7d048

openshift4/ose-prometheus-operator@sha256:f1c2f01985f164bad7ff8299ec0df2cfcdbd45fac0182bb0e42cf1f20fb73772

openshift4/ose-prometheus-operator-admission-webhook-rhel8@sha256:f8278ed2e7f1bb2c84f368fe68a5dfa4dd9c26163d6319b9c272af6361cb0ffe

openshift4/ose-ptp@sha256:43838b04506fd824973b51a39399073b07ee0949226a99c3c3a05390a202de4f

openshift4/ose-ptp-operator@sha256:21314994da06d079d6a7d7127ad2b0a9e579b000cbc04d906fae680e83cdc190

openshift4/ose-sdn-rhel8@sha256:100542761971ef4e7493a2c460912f4a9e73fe307a127d5bd90081f7c4739313

openshift4/ose-service-ca-operator@sha256:fed4b33869ea8fc7f440b9772b6cc6cb1c7239498e78cfeadc3464958c3ea32e

openshift4/ose-sriov-cni@sha256:97dae98225ffd1b6339191c13c38c5514739be3d1b03e426b0fa673db92a6427

openshift4/ose-sriov-dp-admission-controller@sha256:95543e86cf1725da9d5ee08466d89b912c23c8572b2c507f2fe9c3f738f1b80e

openshift4/ose-sriov-infiniband-cni@sha256:81f3ed0a57ef3851789b792e189a6e8350e59d05ed7f8da1cc22d958479c21aa

openshift4/ose-sriov-network-config-daemon@sha256:1a0c09e6ff530c765d3f00b6ed4559c6de2a539d41113e3cc203b36166776bbf

openshift4/ose-sriov-network-device-plugin@sha256:d166568f3d6a865dbb28a40a480bf2bc6eba62319025013e6c5ee6618664f246

openshift4/ose-sriov-network-operator@sha256:3dfe93b5811bf9fe2173b3d0f939387b7a7d22912193b03a7ef3d733015b484a

openshift4/ose-sriov-network-webhook@sha256:cf3352ecc9e86e9f09d84461842cbe77b18be3788436ac89e0d38164da07985f

openshift4/ose-telemeter@sha256:270a55405376c969ff3620dd9559af175f73cedb5d042cc1388a769f405cd96e

openshift4/ose-tests@sha256:83b47c8706b1dc7c1d8ad6d470e1fa13abed80964f016d32d96720c267bda78a

openshift4/ose-thanos-rhel8@sha256:9e0bf0b3614f01b79965a9f70e4ecb8bc1d4caacb1e7fcdc62620ff6bbb40009

openshift4/ose-tools-rhel8@sha256:a3991be36df59e1607c06a345d158dd993343cce32ff1c4f6815ef9627e23229

openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:a0996fc45e558f1a03b6cc2ad9bae82eaa79ff1d7f64013b1e6858a2fc3d6bba

openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:edc652443dc799ae47ddf516c61349772b27cb8e854aa22764d3a9b72741b25a

openshift4/ovirt-csi-driver-rhel8@sha256:3824f62b35f93386e988b5f07a7b280d6c09b08c4e9c35e89f4f0da375197f4b

openshift4/ovirt-csi-driver-rhel7@sha256:3824f62b35f93386e988b5f07a7b280d6c09b08c4e9c35e89f4f0da375197f4b

openshift4/ovirt-csi-driver-rhel8-operator@sha256:d1da7e076892aea4a2afe3d81db9d13e954f6cda9d9628054da350c63907a7e8

openshift4/ptp-must-gather-rhel8@sha256:ea8d2b47297bb8a5662bbb0186468a6a32cb872931b2a395230c34819183a74e

openshift4/special-resource-rhel8-operator@sha256:58e228f26ced3f1283928f25421fdb95cadbdfdbed8eaf5e8172f999df920a31

ppc64le

openshift4/metallb-rhel8@sha256:2dd0946a3f0022a5650d86264e84f519ef24a3aaca9e19052583657a984055bd

openshift-tech-preview/metallb-rhel8@sha256:2dd0946a3f0022a5650d86264e84f519ef24a3aaca9e19052583657a984055bd

openshift4/cloud-event-proxy-rhel8@sha256:964ef9dba67cfa6a8090da025e0d4d8528fd2aa45554fde761d4e94e4d3349b2

openshift4/ose-cloud-event-proxy-rhel8@sha256:964ef9dba67cfa6a8090da025e0d4d8528fd2aa45554fde761d4e94e4d3349b2

openshift4/ose-cloud-event-proxy@sha256:964ef9dba67cfa6a8090da025e0d4d8528fd2aa45554fde761d4e94e4d3349b2

openshift4/cloud-network-config-controller-rhel8@sha256:15d929e5bb7fd0a1b91197b6ea427fe9563d4e8a706ed70cb5b2531c7cba7d31

openshift4/driver-toolkit-rhel8@sha256:0c23bcd7172476fb4e0e26c9d72dd31d65269935070f8a010ba75657156f6c25

openshift4/egress-router-cni-rhel8@sha256:31b3ecf0a931189d2155b49e09960c14dcc173ec2b4544a6643b22189728b831

openshift4/frr-rhel8@sha256:ee6eac6f3989f52ef3dcd2d13159a53ead52d95954d970bb26f1b18961941c7c

openshift4/kubernetes-nmstate-rhel8-operator@sha256:10911015c9a2cf3a711df2f6d5f92319e4653e0f5cb7f54f6bbcc411d9bcc531

openshift4/metallb-rhel8-operator@sha256:4d2ea16293b3f51a51b538066a7794a8817a1c4c7e330a98a28428c0ad81fccf

openshift4/network-tools-rhel8@sha256:4226751ab88698708ecdcf284c44aef9f33d6cdf16e6ad32ca27da25c42ac874

openshift4/ose-agent-installer-api-server-rhel8@sha256:f56cce403e41a8f7af8667c43cf497d13698c71bbcae594761ba01f8cc0daa07

openshift4/ose-agent-installer-csr-approver-rhel8@sha256:13955aa4de7c6ae87eed7fe2bbc8774c21520fcf37723a155cc73f295751014b

openshift4/ose-agent-installer-node-agent-rhel8@sha256:4bdf2fbbe0c60b55682e62b881630fe52b801e3b4b552b031a835d3356efab0f

openshift4/ose-agent-installer-orchestrator-rhel8@sha256:d5f0a83a965789467fb2875f0b015e2f313935226109126884449665c472fd1a

openshift4/ose-ansible-operator@sha256:b58747e00aa27f362a859fa75e4c5c78a698023dbe370bade9af9080cd9ff2c7

openshift4/ose-apiserver-network-proxy-rhel8@sha256:97db5e5872e566dfaf85ac0c5ae280e397890c7cc7f06c81b79e754b762046b9

openshift4/ose-baremetal-installer-rhel8@sha256:94adfe41d67e2e1303b2477e7a5d7fd79634545050c7656c2023a9bb62077a8a

openshift4/ose-baremetal-machine-controllers@sha256:e9538889c31f6296cb86c1ffc92bb43d15cb07dc13dbad369fca36f61a90f0a9

openshift4/ose-baremetal-rhel8-operator@sha256:f47a5ef9909dc09f899dab30d6773fa00463ea9c05e5dcc0fe702e3025666c59

openshift4/ose-baremetal-runtimecfg-rhel8@sha256:ae6829db739c9103d4de683c8da157b8d74f0e3bf82008c562132da630363b88

openshift4/ose-cli@sha256:677a7148f9a0cf78c140cd81c780df74f22152d89a2ab979fe68be13084d31a8

openshift4/ose-cli-artifacts@sha256:6720b83e437e9358bd5f9e9378ad6ebff35e26d871c16778a765053defe7d459

openshift4/ose-cloud-credential-operator@sha256:fcb0033cb7ee74d6dfc115c209da296686f3207075ed49e1435cb0b3975b2e79

openshift4/ose-cluster-api-rhel8@sha256:e172d81c9782c0ee244558ee3d20b37307cc27e230eee96cd8610193615cf473

openshift4/ose-cluster-authentication-operator@sha256:c070d30dccba87366b1ca331afdbbfc399a8443155ce2ee47f1585a33acbc646

openshift4/ose-cluster-autoscaler@sha256:4f168b80355815216076fb86b9f0da64cc595dbfd2d39b96f07fc8c13fe54271

openshift4/ose-cluster-autoscaler-operator@sha256:a53c32e969cd093f2ad036c098182ff4caf0b08484a64b8fefc233d08be88fc6

openshift4/ose-cluster-baremetal-operator-rhel8@sha256:b9984d56e398b9d386efcb79a32723425942554152430d226859247bdcc417f6

openshift4/ose-cluster-bootstrap@sha256:5843a9287c91f70e8def4b4b97235ed30c8d8725d7779d01d9191e6d59c10a1c

openshift4/ose-cluster-capacity@sha256:03ae612645bdfbcaae26e02c1c8e54f737aab3c285b76c5b2b80b9aef75bd60e

openshift4/ose-cluster-capi-rhel8-operator@sha256:04bf627df58c3f476a9ce9cd91785bba5bd864c4f9e79d497751903c2eb12f2d

openshift4/ose-cluster-capi-operator-container-rhel8@sha256:04bf627df58c3f476a9ce9cd91785bba5bd864c4f9e79d497751903c2eb12f2d

openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:2489829274451fc24a43fcf0d1f8a7e086282ac0c20913c7f625a5196ff2f12a

openshift4/ose-cluster-config-operator@sha256:1f6c5b083f1738ef74716144f8ae4582615a7b0fca86bac5320562193e592b6d

openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:76d4e0bfd22046a61b48124ee6a32c0fd830922c7a43b4fa6941eabf31dfb152

openshift4/ose-cluster-dns-operator@sha256:f76f91227d1d4857062e8c75c59b5a57db9aa9b14e86a5b48ed01706c5366d00

openshift4/ose-cluster-etcd-rhel8-operator@sha256:8f0bdda6e884f01255af8ece5cfaba3124ddc386c6f903fb56e59874a3059ec0

openshift4/ose-cluster-image-registry-operator@sha256:5ad0ef232f69d7ba52c23dc014475db72d60918425466d620a8d6a632a473a7f

openshift4/ose-cluster-ingress-operator@sha256:dc346d82c72d1cc807d8f61d9b374feae772dbe2ba089f29ef517e2a656069ff

openshift4/ose-cluster-kube-apiserver-operator@sha256:04ae317b81df7b70a91bb2ca2f6c1607a65111b2d03a00b4a4d18c91ea2de21f

openshift4/ose-cluster-kube-cluster-api-rhel8-operator@sha256:9945061628427c4237286d4a017846c9fd2881c4f52e95f4d1d0ce39ff545ce6

openshift4/ose-cluster-kube-controller-manager-operator@sha256:1a8b5b600fcb72a75f9efe1793382fda4dd8fc7372beb62b6c09ccf1b92789dc

openshift4/ose-cluster-kube-descheduler-operator@sha256:ea0f8507c75c298aa7bf03b9c8f48ede64f5c684480bfcd25a6dec94a053fd7c

openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:ea0f8507c75c298aa7bf03b9c8f48ede64f5c684480bfcd25a6dec94a053fd7c

openshift4/ose-cluster-kube-scheduler-operator@sha256:1c2ccda85a5183b2760898a7e3eddd4e3230271882a1b0792821bf1ba310aae8

openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:c7ff9dd11cc79a52ddb31aa1d321df1c08ff2145835042e0f2d84f59e0d83f8c

openshift4/ose-cluster-machine-approver@sha256:d5cfbe380ceab7bd653ded197a7d89719906df5ecd658f14a98a6b2c438d7358

openshift4/ose-cluster-monitoring-operator@sha256:e4d608bd0a5a0a943269432bbaa3b44afd643af9a797e03c87930f1b173198b6

openshift4/ose-cluster-network-operator@sha256:60909136c43d125a75e6b9c2afcd164e95930cbde7468ce268d50ae97edda935

openshift4/ose-cluster-nfd-operator@sha256:290a92a93c311d5e840cf2488e5efb0ac46d73b6128623d59fbc45e6c6f3c5bd

openshift4/ose-cluster-node-tuning-operator@sha256:e9d49fa2d1fab727e2a03b1bba98be68d250a0daa329c10e18627247c12ecbda

openshift4/ose-cluster-openshift-apiserver-operator@sha256:048f4f9632804ce1ed2591c57bda99f3b50ef8d64078611842affc1270b1c2f0

openshift4/ose-cluster-openshift-controller-manager-operator@sha256:546f61eb30dc27e665fad49227f90b35d8224ee410d40acfe112dc437d03b262

openshift4/ose-cluster-policy-controller-rhel8@sha256:d78321c2407865affe4e4979b72981885eb752aa63c3f7648366b31db046cd24

openshift4/ose-cluster-samples-operator@sha256:0e42d4a7bcac4bb2fa4454075b0715d47437c9d877c619d85e43a109245fa427

openshift4/ose-cluster-storage-operator@sha256:e6edafd6898e71af1850f2f4bf7e3001977d21b14681c0d2354b048a51e398fd

openshift4/ose-cluster-update-keys@sha256:d74a85119f95b669feaf3fbdf0d52bc6cdb72e52d0761ef0b64e24e93aed6eb9

openshift4/ose-cluster-version-operator@sha256:e00fb51c18291626c235772d9dcf8dce854a5ad8a0c69c1755016bb5929bc8e5

openshift4/ose-clusterresourceoverride-rhel8@sha256:48a8bb70ab18322182c7dd56a36d0bfe11af45b45dde76123f6ab878aad37416

openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:6054ea976991884f5cbc2fc6ea256f7e7fc7c5f95995565c050152d842431812

openshift4/ose-configmap-reloader@sha256:a940f0f9cd8cc94846db1517912313a156ec86e1d02546404c1eed0037547613

openshift4/ose-console@sha256:01ef86bbc82b25b2d308da05ce050b84e34ed2e2b767e33e475b0568cf79a6b9

openshift4/ose-console-operator@sha256:6da8056d47928b9e4f2df28ab3ae5b0b7d8d73067d2e187bfb7db418cc142266

openshift4/ose-container-networking-plugins-rhel8@sha256:adfa4a95e0ad3f4e3b7d9ed873c5b54613b67b1a6fae4163c27680b1bdb6585c

openshift4/ose-contour-rhel8@sha256:ef0dcf2a87969077206b83b02112af64b73245e11e13d0b400e08832ba5c3487

openshift4/ose-coredns@sha256:fecf4a04e73e07433a075ce867509b91d55dd29098421ca8cb89c2683d76173d

openshift4/ose-csi-driver-manila-rhel8@sha256:701a1453b0b36124b77818f41aaf7b2f5151dee1facdcb8e3984e7c8d689c4f8

openshift4/ose-csi-driver-manila-rhel8-operator@sha256:7ba14401c227c5b3ae52b4afdb141750c3a7614b52ffbc5a818632225a406036

openshift4/ose-csi-driver-nfs-rhel8@sha256:5064758f36db1ba1b634d816d4a4a9cf07c34617d5a1caed77e981c39ac304dc

openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:58fdfd0dcf0502d6adfdf6bd1dc205061f9a1a6a2b7e4dd836ecd2be68bfcbaa

openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:dac7173df70e1e3c8608e0255a921d27866b6061652c5b6f188423395733b962

openshift4/ose-csi-driver-shared-resource-rhel8@sha256:8c48bedbb34bfac0fa8835cdaa742d699b32992835c9077ef95e92ba79d39aab

openshift4/ose-csi-driver-shared-resource-webhook-rhel8@sha256:dcd710013e6475b094f3e9f31b137ce442bfbee1d1249ebba6b62d31d07fbdbc

openshift4/ose-csi-external-attacher-rhel8@sha256:6eec6a4d47a1d8b8cf996f348c7e5afb4c8a318d3a87eab7a9ec76b6a0a48ad8

openshift4/ose-csi-external-attacher@sha256:6eec6a4d47a1d8b8cf996f348c7e5afb4c8a318d3a87eab7a9ec76b6a0a48ad8

openshift4/ose-csi-external-provisioner-rhel8@sha256:75b42c27f368834a188d377716ae92db0b359ae58764db7bdfe5d36a47dca73a

openshift4/ose-csi-external-provisioner@sha256:75b42c27f368834a188d377716ae92db0b359ae58764db7bdfe5d36a47dca73a

openshift4/ose-csi-external-resizer@sha256:75b9b31eafaf795738125fd6676fc8f74f408d60cfb6afe75c8dbdb659f3b2b1

openshift4/ose-csi-external-resizer-rhel8@sha256:75b9b31eafaf795738125fd6676fc8f74f408d60cfb6afe75c8dbdb659f3b2b1

openshift4/ose-csi-external-snapshotter-rhel8@sha256:36f9b1e2f407697c6653b93ce4f49f0ad50aefcb2e5ddc81e49a9887b43407d3

openshift4/ose-csi-external-snapshotter@sha256:36f9b1e2f407697c6653b93ce4f49f0ad50aefcb2e5ddc81e49a9887b43407d3

openshift4/ose-csi-livenessprobe-rhel8@sha256:d79192cc6078d1421a2e6a18b78d81c5188a345ba3f7dd5675086aa79bc42d88

openshift4/ose-csi-livenessprobe@sha256:d79192cc6078d1421a2e6a18b78d81c5188a345ba3f7dd5675086aa79bc42d88

openshift4/ose-csi-node-driver-registrar@sha256:8b0774f408dce55954f63e987a6b717357f27a482bc185fb559782e6a6183173

openshift4/ose-csi-node-driver-registrar-rhel8@sha256:8b0774f408dce55954f63e987a6b717357f27a482bc185fb559782e6a6183173

openshift4/ose-csi-snapshot-controller-rhel8@sha256:00621cfd94f397d48a128849d6a63c1273249111ee94e68f7ffb0687922ed716

openshift4/ose-csi-snapshot-controller@sha256:00621cfd94f397d48a128849d6a63c1273249111ee94e68f7ffb0687922ed716

openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:2265ff926964ca189cdbee8977bdfb518ca9c79e7fbeff348b82f4dc75bb180e

openshift4/ose-deployer@sha256:72163133551345e96cfbbfabc36cda0305932d80fdf34f3744aaff3c5a076f2c

openshift4/ose-descheduler@sha256:0068dc08682b6aa99016a6cf741c6ed643b372a62d62c851ce8aa655bdd79edb

openshift4/ose-docker-builder@sha256:8b2dd0bad9944556d31248a137090addc6e516374c768ac7d9f175fb20710831

openshift4/ose-docker-registry@sha256:0f54d16fbd56bea7ce74f7287b270615b28ff0f19ee97011e5345871251f43c4

openshift4/ose-egress-dns-proxy@sha256:cd13dabd8c99a10e68342d24a89b0cd27a9c90f8d74e88183aa4de3cf0c49f3b

openshift4/ose-egress-http-proxy@sha256:b60c919e950b93caab18d306d75835222f4f129fa556f1a659ed8585ead07756

openshift4/ose-egress-router@sha256:53a1abc558aa43223583c1e921c42203d26603b39be4fc3a766c8bc03e5f5c8a

openshift4/ose-etcd@sha256:3828841c42d916ffc90bbcf7fac556ea870978c793b236a64f825e71e7150452

openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:2f8eca05ce71b4803088fadba4d551296695fc3132f7fed027c64e9e04398518

openshift4/ose-gcp-cluster-api-controllers-rhel8@sha256:acc5bc21b6ddeb48f33e3a90f4550fe9d28d2cbebb2984e30d1f298ffd85f4ac

openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:6b2ca676253026932d05e65906f1b328ac08d60972c5abb4fa212a7c0056ddea

openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:bcf8d07311b1cfbc1bd5fe855b67f393ffca6095582d80b0ec9c1aea42017680

openshift4/ose-grafana@sha256:e3a3ba32749a357a5c52e670590d5efedede7a322379942f811cce8370cfc3af

openshift4/ose-haproxy-router@sha256:1db3d8d0932a4a0102944a7763628337f51fb711afb5e0cf1a11981008408890

openshift4/ose-helm-operator@sha256:8ea06be1ccc311950bf9781d8f6b309a57fa680d943cf29bf756525413b45269

openshift4/ose-hyperkube@sha256:1ca8df02184f57dac384dd94575a8444cacb98b16951e367cb5ef237acefc718

openshift4/ose-hypershift-rhel8@sha256:f14f8cefc299a414dceedbe7033f5c632f0840e4b49a5910f0728a0101162e8a

openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:276bfa9022cf3299d046673e16ceb174f1bb5aed58482f45193868bddc811b92

openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:87177dafb4314c70e3f62b056230a07d144b491dc8895b559fad532608f2ee13

openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:a34a95a7775bfde282981ae609fe31cc81c1357f2e7de046e91b52f0450219cf

openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:fc9434a41a30866764cbf9b694b3cdf3ec3bd2213000d291c3adbfd5a4077b39

openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:be3b108dec3e2c4cb82c42cac9a43a2f4a9a54a21cf6a46710bf54507a84e888

openshift4/ose-insights-rhel8-operator@sha256:8caf605846f1fd51a6b3fbc8d3346c5e1290413685ab58acfa9552ca0f9bffc2

openshift4/ose-installer@sha256:792544897ed9b48933e4a50d9dcb0fa625ae8b1cb6e14759dcfe2a6d834844be

openshift4/ose-installer-artifacts@sha256:8cb1934728486d23f9911688c4f671d205ff7f6a24539054ce800a513c3f7a96

openshift4/ose-k8s-prometheus-adapter@sha256:eb6fdfa03b9b6732e8689e5a8b80d0db39478c0465bbd6cd0dda4fa1f7c73b83

openshift4/ose-keepalived-ipfailover@sha256:b49f8c60aaba571f1bd3c7ae91a9445ad23e5957a92d01740f5f2dca608b70f7

openshift4/ose-kube-proxy@sha256:1f060b40122665ead8cfa17779e86d8dc9610ca4db6c15cc9993b7652d40f4be

openshift4/ose-kube-rbac-proxy@sha256:510d732deb6c6a3db37a123e49f8bf16abeebae819e93c69f6c98bb34ffe24a9

openshift4/ose-kube-state-metrics@sha256:969aa1bfce7da5ccee98228f1487da0a9df5e32264855103122efd0253a8ba3c

openshift4/ose-kube-storage-version-migrator-rhel8@sha256:d16e68ccafa5c5225fc1d52f047de44768152b5378188728c58b0500e88042e5

openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:263819fe969ae25f40a88b07e621435d97c7e3d3bff531787b1cb93cf43a3594

openshift4/ose-kuryr-cni-rhel8@sha256:f809231a300c83d183238bca5564ada5c138f74b93386ccfa93b591249f71f41

openshift4/ose-kuryr-controller-rhel8@sha256:a91b1f8b6744d74de56651258a2246b03d8cbffb955f7429201d33861762e23a

openshift4/ose-libvirt-machine-controllers@sha256:481bd830ab53c854c2f24cd8e9ca4c988bf425abd42046408b759a950f27690c

openshift4/ose-local-storage-diskmaker@sha256:0656024902d4863baaa5c96533e5e9d37be625ad45c59a555a91353b0c16d8e0

openshift4/ose-local-storage-mustgather-rhel8@sha256:b4d9e85f64a3fcd025f85ef78d49b65884b9cb9256075dd909de3cb0f6c3fdeb

openshift4/ose-local-storage-operator@sha256:a51b877193d85e840799b38011525565f4a23c5d700c4c8d69f89e2b380831ce

openshift4/ose-machine-api-operator@sha256:88dbf87021b20fc6a57eebd9b3bef1cc92d66247b4e674313bb0a078a505156f

openshift4/ose-machine-api-provider-gcp-rhel8@sha256:58f36e5b5e2cf765af84e45dc6fddeab26a3f56fd998f733c621bbcf95f1a8c4

openshift4/ose-machine-api-provider-openstack-rhel8@sha256:542df68965830267d6677c6c485a4c7d3591e7b1da96763c1ed79a0e3e8400e9

openshift4/ose-machine-config-operator@sha256:2ee270624814171d7c9add50bd293d308f5d25fd03bc4ddcbf72e09db8d9e9a6

openshift4/ose-multus-admission-controller@sha256:b3df1680706bc2df7ea4efbae0854bcf10407f97235f50a955cdbb0a0fcaf8bd

openshift4/ose-multus-cni@sha256:eed97e1b33685f3a5f315894258be64944176f461b77baa4290067a41b30f58c

openshift4/ose-multus-networkpolicy-rhel8@sha256:7c4a02727f7fc89c082269556e4b80e1eeae21308cbcdb2a771f548090761e53

openshift4/ose-multus-route-override-cni-rhel8@sha256:3061caf1e4e330c7da4b91abfaf528afcb34982b7612ff3180cd50ec3668f4d7

openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:361b3c976cff10a52b25bb888892c7e32d891e056dde9fdfe42f9e355a1c758a

openshift4/ose-must-gather@sha256:26bf0095de646b79b66847ff9817e5dc9f7b5b5dd451433c5cb65638a51fb83a

openshift4/ose-network-interface-bond-cni-rhel8@sha256:eaa4757b6b36ab246a798af17292172e964e661cf179739ae4a00a375167ba0a

openshift4/ose-network-metrics-daemon-rhel8@sha256:b0336d8af0e8245a7ab766197263a5e011514fe3b26184cd78175a57fca43369

openshift4/ose-node-feature-discovery@sha256:f446c9b40968a53177e402a8beed12b3f15710105697a73bb36fe2e3f57e08d0

openshift4/ose-node-problem-detector-rhel8@sha256:56aa479830fd99ed8c9ed83e84e574211c33015e1960e188195e126e809732bb

openshift4/ose-oauth-apiserver-rhel8@sha256:b36c96848fb2c18411da0ca9ecb0080fff6765860859cf51ed0cbe65e32032dd

openshift4/ose-oauth-proxy@sha256:d6b565317edad06994d87eadb5a4025e12090bbd578c6c6710cfb051bcc4cdd7

openshift4/ose-oauth-server-rhel8@sha256:2e9a2aa1fe5da93ae4953e2c4b5d041780eb7d1e853bba7102cba63bfea19ca5

openshift4/ose-openshift-apiserver-rhel8@sha256:45a081dd214cfb67c094e26c5eb823bec5a1c6cf636f9cd5f2a65d422b9ad3da

openshift4/ose-openshift-controller-manager-rhel8@sha256:b79861e2da32e1f3bd1593e230eda2a80c015cc9ddd933abd864177c47cefa2d

openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:69e5c261a5389e5acb09ae593d533d1f4e42eb26eeedaaf10b2290865248e73d

openshift4/ose-openshift-state-metrics-rhel8@sha256:15223c0a3c710c9b58bf557e4cbd6704a90e4ddf6bc529b293f1ca8266ab5c78

openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:c5c9f0b6b8cb453ae67fdb6e24a8fc2f7a9689c1c03458d4ca168178f9fa91b6

openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:190e1569e262a08b9e16141288486d1c30520eb16c8738c1884dc0741e1db766

openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:1203f64644c832cd72c7caa794a4b7ab2bf15fd8b606e01c93cf5790a79ea060

openshift4/ose-openstack-machine-controllers@sha256:ab67d3585e203d4cfad86362f7c4b6dbc24076525966b06fa9de6dc326f1fc76

openshift4/ose-operator-lifecycle-manager@sha256:c2ff8b7f4a30e2920e399ee3cede86771cca60d2db6a2852ec09513535751afc

openshift4/ose-operator-marketplace@sha256:f6c0815f97ec227d61ea8f72caac90bbe1e129d147ec22c46151ffa087da69f5

openshift4/ose-operator-registry@sha256:9786c93cf754bb725a495b29e30a46c9e05e504d98e703fa132b18aee20221dc

openshift4/ose-operator-sdk-rhel8@sha256:9097cda6fed2c3deae27d0d0eb1590abb9ce9a1c42513e9e12f767b24457be09

openshift4/ose-ovirt-machine-controllers-rhel8@sha256:bebdd9294531606ed1623345b430b915fafa69eedb6dfa789586d61a186a18ab

openshift4/ose-ovn-kubernetes@sha256:9c39401963dce377f52f6fc037b302b29fc7f1eb13fdddf9d7b85db72bbd1d28

openshift4/ose-pod@sha256:43bae81e53d64dc47ddc4802e8d7abffb825ee50d943c3a979d3f7fc00eb64ac

openshift4/ose-powervs-cloud-controller-manager-rhel8@sha256:5282373cc8866da6e8200504a1c8185fb2ba9e152ea6906459553f15a334daf0

openshift4/ose-powervs-machine-controllers-rhel8@sha256:a3b0756d2946cfe755c619785ce34a1609d9db3a8ee98d36fc9ef7684435aa3e

openshift4/ose-prom-label-proxy@sha256:99725b877b05fcb9c1aba5988f61b69b44146dc383b900a7c8de4885c64ce161

openshift4/ose-prometheus@sha256:59e137734a74dd91ec311937e4d5d603bf79d27ee3808f29eb9cfb32b728fca7

openshift4/ose-prometheus-alertmanager@sha256:a74eaea528b777b337d01c6649a6e955bcb86f5c1fc56e411caf95659b89507a

openshift4/ose-prometheus-config-reloader@sha256:4e2d07a0ec5c5fa71c81597a1474cedf70b68204a515838220f5f634d4385269

openshift4/ose-prometheus-node-exporter@sha256:eebb9808b431c51b83ed4621b2301297252c0a47e12e228d80383247a4c526ac

openshift4/ose-prometheus-operator@sha256:23c48836b436f0dd615e68026ea76a746719f2efd907bcb61d0a3a48903542f8

openshift4/ose-prometheus-operator-admission-webhook-rhel8@sha256:8f13e95b70b508e2ab35ae2c10d2a18232aeebde6915041b29954cc9dda3c4e8

openshift4/ose-ptp@sha256:647bd8130dd9a4eef5bcc425017e06bbc0f56fba1b4fdf9ec7398b76ae9955a6

openshift4/ose-ptp-operator@sha256:17f44b0c130c444b5264478cb779e64d34019e2764fc2eea57b02fb675507cf4

openshift4/ose-sdn-rhel8@sha256:df818251191d1665fa545aa6f8a3cf3648792ae30dbe93f37cbe4bfd22713115

openshift4/ose-service-ca-operator@sha256:a5f009ee14a47ce0fcc6ee920c4763ed6f3a743289ccb3e2e383a20696175b2f

openshift4/ose-sriov-cni@sha256:d8b969990a980e0595040bc0039d24d746f96dcfa2b92ab4865341d2d2c19fae

openshift4/ose-sriov-dp-admission-controller@sha256:bda38cf01ebb6758bc70375d26b1fb3dde2f0b8a1696b6c7c0fe566f9f5d3d23

openshift4/ose-sriov-infiniband-cni@sha256:c0628b4467c8c4375575471006db8c9b6041cc9aacbfa407f650c99db6a15e3f

openshift4/ose-sriov-network-config-daemon@sha256:333bccd5cb391b3c79b48d7e93510ac112f1d67c45413efc107d5b08fe5e385b

openshift4/ose-sriov-network-device-plugin@sha256:9988307d2e58da000120c66b5177c11f78305244fc49bbe7a1ec4cd0f342c0a2

openshift4/ose-sriov-network-operator@sha256:542351ab1b60cfbe4419a723db447efa7aebb49f9d7a45278ebd0e2503d36b83

openshift4/ose-sriov-network-webhook@sha256:2d63fe70cd9b3fc4479224be59b6f01ef1d5e5c9a17b93e2a9e03d8a61b4301a

openshift4/ose-telemeter@sha256:c28e87e69bcc85f73cb3eec27dba61189ab14ff4bce3f507a8beeb47b0efaf71

openshift4/ose-tests@sha256:0d2f12ce8816277aed1a1ca95922de260eda1e976cc9ffe9d1c86175f34699ba

openshift4/ose-thanos-rhel8@sha256:c25c610b11de02d08b71b687cd473927934779e6a28b2b4c8c59263eb639e895

openshift4/ose-tools-rhel8@sha256:b2ad4d7b7276b05fa30b6f18edf1cc35003baa42eb49330697cd7ae6f0272e7d

openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:a4c2bac493f70d40acde3f67eb48e8b80dc3c70562282f1d637041e5eb829305

openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:4388e9ec6df6a27285dd4de7d031ad79416c0a25a5aa3db072f4241eab55de94

openshift4/ovirt-csi-driver-rhel8@sha256:c1be44d5204337feffa06712ce60e1b5d5ac7226bd834b6672966051c4e11d7e

openshift4/ovirt-csi-driver-rhel7@sha256:c1be44d5204337feffa06712ce60e1b5d5ac7226bd834b6672966051c4e11d7e

openshift4/ovirt-csi-driver-rhel8-operator@sha256:4eaf3058117bd27e5541cbef55fbeb365441cfde1739118d810647d0dd3de936

openshift4/ptp-must-gather-rhel8@sha256:23237895d8a2e11a38b176f609dfedf2c62b11a0b9471e72ddb24031886cfe94

openshift4/special-resource-rhel8-operator@sha256:9761932fa797f9fee3b274901e8c0d1d705b04229a8eb339db1f03f8963baf61

s390x

openshift4/metallb-rhel8@sha256:60e1981718123ecb4ac96bf3cd1a9e1c1655e43708280838fbb3af4070b094e9

openshift-tech-preview/metallb-rhel8@sha256:60e1981718123ecb4ac96bf3cd1a9e1c1655e43708280838fbb3af4070b094e9

openshift4/cloud-network-config-controller-rhel8@sha256:b1371d74ccd62342f8b0543e905d6bcea86ee0bb581248cb5d3f203e1843a338

openshift4/driver-toolkit-rhel8@sha256:48480fb112d179f80afa134379fe73ee9c4612a1879472b15e489560fbfdc9d0

openshift4/egress-router-cni-rhel8@sha256:3479719fc504b39f453cbde0bd5694f329f946dbdac49f417b673604a51cfbef

openshift4/frr-rhel8@sha256:1ddf1d325aadbeb24666464eb0f56063528a7b13bf8d1a7c13c69a012495d02b

openshift4/kubernetes-nmstate-rhel8-operator@sha256:b8acd14953898262138d25c764c3f0443934e75c294302a090a7f9adead56c50

openshift4/metallb-rhel8-operator@sha256:cbd313515b0b1032bb21f0bf21650a1e6c64485073d919d0450d5898ae51e2df

openshift4/network-tools-rhel8@sha256:23a35c84a82fecf66f788f0fa7dfdda3da0c7e7ec921f113238877322a1f64c8

openshift4/ose-agent-installer-api-server-rhel8@sha256:0162a6494428ccd4eeb96bccd204bcc8cb3b1c20ba971d968d690ad0e2848d50

openshift4/ose-agent-installer-csr-approver-rhel8@sha256:96ca146d106370d137f78f96aa44a21ec67d2627dc86e1e47f4b153f96f49203

openshift4/ose-agent-installer-node-agent-rhel8@sha256:bf45f8386751f838ee6bd77a4363c9c135fa240d3afb9d5141be8b91314c210e

openshift4/ose-agent-installer-orchestrator-rhel8@sha256:829b672c29ec4507c6600d149a929479e056c559dc4ba87bb8aa192e45e88c35

openshift4/ose-ansible-operator@sha256:2825ee6a3980d80fbd426f86106f43bc0940ce3bde478700da4eb834352d44b8

openshift4/ose-apiserver-network-proxy-rhel8@sha256:8bf2f455c0781aba66d8bddca52285b34529a5cf821c3d746c0479fab0bf671e

openshift4/ose-baremetal-installer-rhel8@sha256:382dcaa57dd22dd22019966b4b5a5a433cae3ebac3cf7bde7b3a5e1771f10d53

openshift4/ose-baremetal-machine-controllers@sha256:0ca36cce12c4c43326ff6e9af9606ba404745c38cc95c8f44c9781a36c4fb36d

openshift4/ose-baremetal-rhel8-operator@sha256:b68a5b0febde726db8c365e01b4cef71c0977f6c86b2d3880d51c7469d3f74b6

openshift4/ose-baremetal-runtimecfg-rhel8@sha256:2c397431528c8860a8f0ebea823718816ee9ed99b36a5e257acfac5042943269

openshift4/ose-cli@sha256:47d338369adcc9217fc69765c0ffcd99d0ec969b34bbd009c0770df15014af0d

openshift4/ose-cli-artifacts@sha256:47ae6d1869fee25df16b15773d71530d9ff5bfa535e17d9240fefdd3deb4c5f5

openshift4/ose-cloud-credential-operator@sha256:f1136e663ec9f90f24670dae1a7fed7051a2e49c658fec652a4b09f35f2450b2

openshift4/ose-cluster-api-rhel8@sha256:56796b9a2bd0852a1aed6306a6e80ecdc06efaba06c35acedf7564a4e08bd2a2

openshift4/ose-cluster-authentication-operator@sha256:59c3474326193911f6279c240c04d0ff177e140381efacc44d413d110fec5951

openshift4/ose-cluster-autoscaler@sha256:9bd2aa1a14c32b3e584d9d6b490dce0eb5967dfbeb30e812cb6ed6cad225c393

openshift4/ose-cluster-autoscaler-operator@sha256:3ea977f51e6c9b5d69babbe46632bab576411aa64f419c9dad7d2f47b4acc495

openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e6849b80c99feb1c1352b5a6be34ff5954b43bd1ef28bb38e053a23e156d6bf8

openshift4/ose-cluster-bootstrap@sha256:68e3c573a40905974144ad3b0e14396e2cdfe150bc051ab6f409b0eafe2b3f3e

openshift4/ose-cluster-capacity@sha256:8909b5ff9cb8de59ffdf35d1ae6aff8e50e56d6ed3b4d68317692a23c43dc3b7

openshift4/ose-cluster-capi-rhel8-operator@sha256:dcc7f2fc9e638e4a45f516b1b744f91c0bd2594bfd28e3016d9379a3500b31f0

openshift4/ose-cluster-capi-operator-container-rhel8@sha256:dcc7f2fc9e638e4a45f516b1b744f91c0bd2594bfd28e3016d9379a3500b31f0

openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:699b270c65eb2ba3eb96becd80b26909635dfbb9f25fb146296cf0392bf5c80e

openshift4/ose-cluster-config-operator@sha256:b700fe834648adfb2fa125799761f7ba9f8ee7dced91466f0dd5b8c5702baa1f

openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:b8944d2637dd28bee27fc372e99a074623fb06a25822ed95450d328f5c5a4e6f

openshift4/ose-cluster-dns-operator@sha256:10b910f0395d93c75e3b0734bf4647dd710edb17e3170dde3e21afa013bac56d

openshift4/ose-cluster-etcd-rhel8-operator@sha256:f8251293f6751acb35474a8fe4e6a808b83c9bd9b38e610a88414ea8cdb769e4

openshift4/ose-cluster-image-registry-operator@sha256:538e27bfd61016d3bc06b54545ef6007ca6870ee8c42d2a8e048e25203f7abf2

openshift4/ose-cluster-ingress-operator@sha256:4c651e434505533fc93ee7796c82e607390cdf3235682903ddd171c65f9af425

openshift4/ose-cluster-kube-apiserver-operator@sha256:2213e951e8e926a018efd9fc16b631ffb30c04eee8b43c9d907a9e6ab767b914

openshift4/ose-cluster-kube-cluster-api-rhel8-operator@sha256:d652b307a62978a65b6d0884103888b92c0633f45c6af3ad2bdbf36cc03adbde

openshift4/ose-cluster-kube-controller-manager-operator@sha256:094f22ee8c82e2f09bbe1c18fc4265322c89845a9948f7e0e6b1510b4530acf2

openshift4/ose-cluster-kube-descheduler-operator@sha256:f51b4c6c08cb1dbd3be49bc8162c5f8a6e6119f87df059faa583b194f27690e9

openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:f51b4c6c08cb1dbd3be49bc8162c5f8a6e6119f87df059faa583b194f27690e9

openshift4/ose-cluster-kube-scheduler-operator@sha256:158a04b76c877c02c17cd5637087ae414e5f6df15eed29f4f9607a4a0033398d

openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:4c2b21ae77a161bdc8f218feecbd715208bdcdc16707e2ddb6e0e7b925b8dc8d

openshift4/ose-cluster-machine-approver@sha256:673de041ec2dfe818787fc8df7967e974f13debf205482c089d4c8c62d24a9da

openshift4/ose-cluster-monitoring-operator@sha256:e7121d3937aa060ae842e2a4e8aebe7e1828ab95838900be5bde0b3e29fe32b0

openshift4/ose-cluster-network-operator@sha256:16fa50f141f2cb523cd1d7d3eb7badd36af71fdbb26e9e0f27e76c9cb4aea050

openshift4/ose-cluster-nfd-operator@sha256:99ca79d3f0207e28e6cbb284d1a99d6c93c25316f5f17ef4fcbc5dbc8a67791c

openshift4/ose-cluster-node-tuning-operator@sha256:7fa0005cbf97731c9fa1b253c4a67b3173841b8e6a91ca6322a3199d6daaa7a7

openshift4/ose-cluster-openshift-apiserver-operator@sha256:2e70937653d9da5661fd956be986527bd5a5ada2bbd521653c2d4088dd26ad0f

openshift4/ose-cluster-openshift-controller-manager-operator@sha256:6aea8a9c4b51a92f4e456a10f6e121d8f5dbb9153fb268cb410c12e917e3327c

openshift4/ose-cluster-policy-controller-rhel8@sha256:1ee9161b0b857a0d2b7aa93470e2c3e920d4fb7759713dfb4628b3c727d14c85

openshift4/ose-cluster-samples-operator@sha256:36dc66667924e448b24433d184a5275c0f9cb3225456b8281e3e405afca364c4

openshift4/ose-cluster-storage-operator@sha256:7cfc4fa6c02e66c0b6116e708efbc6c2ce67f8df74615f1acb37c6d667159bd0

openshift4/ose-cluster-update-keys@sha256:71f1b08364a0ce8d1f0321232b3604e4f2cc2fc59c2a44ae59d86f742abcac3b

openshift4/ose-cluster-version-operator@sha256:25f710281fb53316c4a3d05de2011d52b6fbc83402a7e6252bb4ccebc6aff98b

openshift4/ose-clusterresourceoverride-rhel8@sha256:04894beeaf9a9a478cba7f3f996aecc9693fa8e842fb746ebf5d06913d2f5eb3

openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:bafc588c95cc68257ad391c384280bf1ce75f4dfdf9587fb67e3d6c6cbbb5964

openshift4/ose-configmap-reloader@sha256:cb53a0c36167a1e8c5bbf5e5d8de8b759b97111b489bea7c4dde850ac7235324

openshift4/ose-console@sha256:a232fd576800d742c2a126233e272dbf9f5d9e673316b5c32dbb92eadafddf2a

openshift4/ose-console-operator@sha256:6b0689afc4a3423a69bc50dfabff0bd7e1ee97639cf82e1e954625a7924eb5f4

openshift4/ose-container-networking-plugins-rhel8@sha256:fb629d0680deec2f1506c677bda57268a78ffbdf3823139417b5941af42cd216

openshift4/ose-contour-rhel8@sha256:c49dbb2308e6d6ad693682ad249857758f98ee66c8bfda6a940f9bc65c23c509

openshift4/ose-coredns@sha256:f649cb1a7386849fab758c284a7627f006fd6d95af66ac6972b4db5bc3dd6a2d

openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d96edecfbf9c47765e5b4fad32661ade7663c271628d177ea8152c13486f8aec

openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:1bad19362bb426e384cd1cfef16cf06fe5b6131d5ae5b48cab1e4df5fb61737a

openshift4/ose-csi-driver-shared-resource-rhel8@sha256:f5aa572addcedec0c2fc522790a7c4b56849993113d252dc3044c9fc5e5af8df

openshift4/ose-csi-driver-shared-resource-webhook-rhel8@sha256:34096c008b6f82fbfee28d3f3e66c89a269f7d028ea302afbf4d892dcc1a2d84

openshift4/ose-csi-external-attacher-rhel8@sha256:a7a82e10d262b2f666a9bd65d67be4aa4f07903021c64b3ab8972e1d295092ea

openshift4/ose-csi-external-attacher@sha256:a7a82e10d262b2f666a9bd65d67be4aa4f07903021c64b3ab8972e1d295092ea

openshift4/ose-csi-external-provisioner-rhel8@sha256:f6b8f59c1ea62088235d7ec9d2567737deab59ceeaab3acb56e71e81a270cc05

openshift4/ose-csi-external-provisioner@sha256:f6b8f59c1ea62088235d7ec9d2567737deab59ceeaab3acb56e71e81a270cc05

openshift4/ose-csi-external-resizer@sha256:9e7356d0e22a625ccdb8c0e05dc9b3e5bec5a0df133b8611f815426e5f5215ca

openshift4/ose-csi-external-resizer-rhel8@sha256:9e7356d0e22a625ccdb8c0e05dc9b3e5bec5a0df133b8611f815426e5f5215ca

openshift4/ose-csi-external-snapshotter-rhel8@sha256:498bf02c6a28d179f8a747baa44ca3cec2636b01ae332aecac60fa24fcc1987e

openshift4/ose-csi-external-snapshotter@sha256:498bf02c6a28d179f8a747baa44ca3cec2636b01ae332aecac60fa24fcc1987e

openshift4/ose-csi-livenessprobe-rhel8@sha256:22e9a79e9a8046f4132a5ea2feeb9317a6137735794cba65336f67ba6d146046

openshift4/ose-csi-livenessprobe@sha256:22e9a79e9a8046f4132a5ea2feeb9317a6137735794cba65336f67ba6d146046

openshift4/ose-csi-node-driver-registrar@sha256:45f9bcc0497ea150a91d72777a45a0a14622f77992f7128f9a0e8a454bbcaa56

openshift4/ose-csi-node-driver-registrar-rhel8@sha256:45f9bcc0497ea150a91d72777a45a0a14622f77992f7128f9a0e8a454bbcaa56

openshift4/ose-csi-snapshot-controller-rhel8@sha256:c84d5a8e8b68fcbcd93c781c5e379db0b4b394a204983b08f91e283350484853

openshift4/ose-csi-snapshot-controller@sha256:c84d5a8e8b68fcbcd93c781c5e379db0b4b394a204983b08f91e283350484853

openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:85b219aafd44fd422f30552e462f510f4a3b0c0d0e526f9eeab844a26cdd2566

openshift4/ose-deployer@sha256:62ecc8dbe36451288137cee91bb8bd6e4f05e3a8b0190e3bea4a99091915460e

openshift4/ose-descheduler@sha256:a51781d5862c21a5503233ee7071fd615c15aa054974f91c131403694486b4f4

openshift4/ose-docker-builder@sha256:6df76548454ae92b70aa0ab6bd2870dafeed66379ed6a6a1dc81a227dc211b45

openshift4/ose-docker-registry@sha256:c0c6aed54b1b85be9d0ffdb5119d35e1c3d84912409c2d3a03d1049e56a0ab8e

openshift4/ose-egress-dns-proxy@sha256:587eb348f0359e77ff781a13f06377417f830435ed7f0105ddc32c16d9971dd1

openshift4/ose-egress-http-proxy@sha256:9c3a05aea736af20b33d16343be84b3a6773df53c153620e80cc1af36b464c3a

openshift4/ose-egress-router@sha256:7b920d90b275e1fac9234cd5b32ce1dbdc630716602da4c556e9accb513c73cd

openshift4/ose-etcd@sha256:e036b837623ae08c38dca856c3c40ee1789753c51cdac173ad4351dea5ed4df4

openshift4/ose-grafana@sha256:0b7a9c42ad2bae8918cbc1d6a044f88464e3dd2a10cbe22b0da6f073afc1d59d

openshift4/ose-haproxy-router@sha256:d9ac8bb253c53ee6e1ad6f1cd78107d05ae6b2d5f0cda2e9fa5c0093901dd9d2

openshift4/ose-helm-operator@sha256:f7bcd07dd13e138e2788d316b9e931e20e57aae1a7db75f1f48c31eae9c7ac58

openshift4/ose-hyperkube@sha256:9d46ff2f326050f5561bbd7945ab7eeb718708c3e2422bf2885caf54dd7c42f1

openshift4/ose-hypershift-rhel8@sha256:b6a2bbfafc5da6e314cc034b22a1b633b79bb80ccf241adf5a37d43ed7b460f1

openshift4/ose-insights-rhel8-operator@sha256:b2943700df61fcaaf4524842a5483e25d9274b11928ca5780878bf03dd7bd9b4

openshift4/ose-installer@sha256:82aefe410c37ba624f1e0f055e7415a63363233e51b92156c63acff878256c82

openshift4/ose-installer-artifacts@sha256:27541565acc81f17d85f7964cdb1bd5c4cfc3cb90204bc5a8c1adabeaa3e0c6d

openshift4/ose-k8s-prometheus-adapter@sha256:6e37a3acb84b49411374f72a66d56229dbd8866bb1348617c7a04c0da7cb71f3

openshift4/ose-keepalived-ipfailover@sha256:9cf5de01f43f8ead6bd628f745cf23d0ed7c328b747c3ba7da0f26387f62e818

openshift4/ose-kube-proxy@sha256:0e04f62207c4fbde27488a5fb55c9613362b78388fa9e50a386153c8bd0de4cd

openshift4/ose-kube-rbac-proxy@sha256:77f0a7c1b8dcd3653d47355f6b5474cdadef4422f6b9fbdac50243acae83ce42

openshift4/ose-kube-state-metrics@sha256:97fc57a89d967735814ccf23463733f233b6c0c3936138289b82000e94b82d05

openshift4/ose-kube-storage-version-migrator-rhel8@sha256:c2967e0ea6f8517bbe080b9d3819ebe5978613f8a06e91531a89863c1b59c54c

openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:d43ef05de28c52fc269877855ed65e05913db5ef12e9f3d8a31abc14b176fc0d

openshift4/ose-libvirt-machine-controllers@sha256:c2ceacc474e64dd998245af9b8ca8c424b901feb694ced9035add1cfd2ca26f6

openshift4/ose-local-storage-diskmaker@sha256:441c1edd96ff03041ed478b286b32fa85f370844d945b14d93e73d11a17d2977

openshift4/ose-local-storage-mustgather-rhel8@sha256:e4011cd694af23b1a6761df83f44cd42064541abe215ac0525556197cef86f23

openshift4/ose-local-storage-operator@sha256:c1bf556d4e24b2851ea39034291e5af7b9f59e58e9d213c00640af7dbb211206

openshift4/ose-machine-api-operator@sha256:bb8fb97be9a1bc8809e42c7ec9710fecff996a79e856eaced87e2d776a51ee2b

openshift4/ose-machine-api-provider-openstack-rhel8@sha256:43ef4eb7ac1550f35cd53db6e7de366c2c638f515478df0caf3e665a10fe1b70

openshift4/ose-machine-config-operator@sha256:4c6e2163e1bb5bff68ffe64c21650e5c4e3292dccc0a61a889145ac66c41e2b7

openshift4/ose-multus-admission-controller@sha256:78cd79bbb77ddddd3883d201e42858cb4477ddf2ea1195ffa3fd65fa3e17076c

openshift4/ose-multus-cni@sha256:cc2991706d9ca6d24000f5d0f494ddbf4f65cd3e18f550c3ea1becef4d029243

openshift4/ose-multus-networkpolicy-rhel8@sha256:722769d4c6d4a15d5797b729225314c91b0b352fb21a57f856430e48f44a6d68

openshift4/ose-multus-route-override-cni-rhel8@sha256:598c3dcb19a86f7191bd28313f15275ab666b0fc89917a35554cfe5025fc111d

openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:86c051ae86e5e0009b053c186857dda0ef365dbc2c0d1fda82bf2e5e88130660

openshift4/ose-must-gather@sha256:fd0839f4fb4031d40af0c82b13e0e65c36d458c9c49f9d4f8e13ce8b1035ff58

openshift4/ose-network-interface-bond-cni-rhel8@sha256:91fbcd051898ed61ba3857703e5594b3b64049f2ca550e821b62ab445038481a

openshift4/ose-network-metrics-daemon-rhel8@sha256:146016172528053d0061841456bc8c8b78f6238d1cb59a02875373a3d81078a3

openshift4/ose-node-feature-discovery@sha256:bd9f1da040f782d039ce38836d073fe87cdc9130c6d529364c7f25e5f2ea92f4

openshift4/ose-node-problem-detector-rhel8@sha256:a6da82f4ed5575a636082f9c55562926bd8186c36c017bbce26d51fc176cf117

openshift4/ose-oauth-apiserver-rhel8@sha256:27ada7e1b433b88e39bcb60746c6551c94c2f6c71feb2f431dacb019beadfdef

openshift4/ose-oauth-proxy@sha256:d3fb426f8d1530009637c095e6778310292a28a1b389b77a179f86a3bc7e4910

openshift4/ose-oauth-server-rhel8@sha256:dc68d10a7918b7064f364f4502af63f40410f0a6d8c73c4c7cab6d79083081e9

openshift4/ose-openshift-apiserver-rhel8@sha256:ba1d0a185ed13a9bfd12a3c554ad40e27c9e084daad2afbc849733e67a50a761

openshift4/ose-openshift-controller-manager-rhel8@sha256:1a70626cdbf6d1e1e6ccac193a970364adb8db0649a2207474f1d1f46977ecd2

openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:b36b4442650830cd17501695a28a28aa29f7e85e01f7ea27781bf9c11a0dbc95

openshift4/ose-openshift-state-metrics-rhel8@sha256:540a8afcfba07a5e6384b631dddec4637e53175215a35b7034945296b2b283f6

openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9fa20d967ec0dbb5b1821b6197fd017331595efe61f39f866be0dc56f5801eae

openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:ddb34ae2572a19f037b60f86a4ac2fc37e1ce7baedb12c1eca34e4c1f41c82f0

openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:8ed9d276b9d9e1bb705a8c99a010f7b5cb40fddb56d3986f8606b8380d8c6147

openshift4/ose-openstack-machine-controllers@sha256:a72e4defa40c056452479815a8fa8b28928a408b6f2f8742409898e56c7f6021

openshift4/ose-operator-lifecycle-manager@sha256:7f11b3f8bf8e5554217a910589c64e6522f56ddad0ba9e3a0c5e575233a0359b

openshift4/ose-operator-marketplace@sha256:192cf81821a8fed33102639ca0f080cc4c774ef76ce73c14b6fc2123fbbbb267

openshift4/ose-operator-registry@sha256:ffffe7f02d872668e42868d5e10f813858f0ed2f4153aee88177f6b66cf7f205

openshift4/ose-operator-sdk-rhel8@sha256:31a9cd94cb2e130819ed0fe8b6c961ff8c517a12b426c1a85170b6e01c2262e7

openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7e25ee0aef9cc3ef6d0a1037e65e2a0ab1937b71d0e308cbed8b980cb7d4839b

openshift4/ose-ovn-kubernetes@sha256:b0a4f131193238ca1f4cdf663e8eaee122fa36bc05ccfe609d87953316817432

openshift4/ose-pod@sha256:1844abfd7ba2bfef3ad95b2bd64c969d5a8b3a60a0c1e5151af9653cbc06754c

openshift4/ose-prom-label-proxy@sha256:b38cc4a090700a9ae41b70b7e5c9625e1924ea13caa58245f2bf7ebd39c06377

openshift4/ose-prometheus@sha256:b66a6b074ab3e5c023fe82271934f0f6cf8658d17dc93f928467c52e492b2fda

openshift4/ose-prometheus-alertmanager@sha256:86b15f0f87e28fa5288e48fda471cafb166d8536d3f8f3fc50f451e35f3caa80

openshift4/ose-prometheus-config-reloader@sha256:c964a72e0951972091904dc23b89b6d419fdd1f2a8fc8d45c5345cba0b2a761e

openshift4/ose-prometheus-node-exporter@sha256:5c6849ac77c6747cff755b8d1e1799f419be5a656706e04f9ca1446f911d6735

openshift4/ose-prometheus-operator@sha256:60c4d9eac320042d797e460637f543607a5ec694a38d5d89c758605b600f6ad2

openshift4/ose-prometheus-operator-admission-webhook-rhel8@sha256:858d26c79c8559492e68d3f5d2ec1292b989e2e0be3c51dc82f874d631ebd7c3

openshift4/ose-sdn-rhel8@sha256:0a52d6c8b7f4a3ae8b214fe7225828842eabbd6bcceece17d16749026e10b12b

openshift4/ose-service-ca-operator@sha256:75b3c5cc493b5b6e535aee06ee4ca0bce5fe1dd5bb1e382c8d954977aeedea58

openshift4/ose-telemeter@sha256:928f21443116b08e5b3e96a8664db1c554ffbf923f820348427cb178388a3c0c

openshift4/ose-tests@sha256:9da87c6aa72c9fc2ad8fa1215e3a2111c708dc23e3607ef2e8dda19afdf5a661

openshift4/ose-thanos-rhel8@sha256:5b76318ebececff6a5da8d2252b0cde1841fdf0a4219acc1cf27372ab07034cc

openshift4/ose-tools-rhel8@sha256:aa79217dbcfc6777056898698552aca2358940ac77e2cf9a14579e6419de8e61

openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:07e0dc2b380a164ea4ce4daeeec64845061f6630a90e493ceb063e4f11ecdc39

openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:3ba57fef951795a359b79b5b7380557052af0b39ff3bb44be45c054e372d551d

openshift4/ovirt-csi-driver-rhel8@sha256:0b423de182a40e9f5ff46b6f50b23c00b35473fc045b78038c0b8fd0cb79cd28

openshift4/ovirt-csi-driver-rhel7@sha256:0b423de182a40e9f5ff46b6f50b23c00b35473fc045b78038c0b8fd0cb79cd28

openshift4/ovirt-csi-driver-rhel8-operator@sha256:1a90e8e7cef5374e65df029b4adf2aa03473c43adc1e28e53ac3a71a1db185de

openshift4/special-resource-rhel8-operator@sha256:c3b9f0911446d1145bedccf5572b55b132381d579bd90e30adb04bd090a7b935

x86_64

openshift4/metallb-rhel8@sha256:70d62f9b3e211c2624fe4d55f430cbf45c342904a381a64a931f77a125b6533c

openshift-tech-preview/metallb-rhel8@sha256:70d62f9b3e211c2624fe4d55f430cbf45c342904a381a64a931f77a125b6533c

openshift4/cloud-event-proxy-rhel8@sha256:4e277a68d9ce4fb8727da7e876a674c92cda7e1d75397b3758d592da712704a9

openshift4/ose-cloud-event-proxy-rhel8@sha256:4e277a68d9ce4fb8727da7e876a674c92cda7e1d75397b3758d592da712704a9

openshift4/ose-cloud-event-proxy@sha256:4e277a68d9ce4fb8727da7e876a674c92cda7e1d75397b3758d592da712704a9

openshift4/cloud-network-config-controller-rhel8@sha256:ae1838f10c80db10e71c270754d0d7a121b3746edfc864306309370520b661d8

openshift4/dpu-network-rhel8-operator@sha256:d243d85640874906e71dfac80b6e53568abb1944dfd9d16504b47150906b17da

openshift4/driver-toolkit-rhel8@sha256:1fb99c64b63ec160f444fb9f028235149a50733a2444feac4d5c69353043cfed

openshift4/egress-router-cni-rhel8@sha256:39a682e76cb1830ef288d4019fb4d1ade12f5826475cdc7d23265d2e0c74892c

openshift4/frr-rhel8@sha256:0bcecdbeac4cd0d88a0c7c10902d63994f1880b11fb075e21f821f645e6a0897

openshift4/kubernetes-nmstate-rhel8-operator@sha256:8dd92fa222f76ae7d470e2099611fa4f21f7cefbee4630fbb65422242039ed86

openshift4/metallb-rhel8-operator@sha256:1c1d699464c16e9d5c86cafddf2d9709b60decc9fe53dba34708a8939376e37d

openshift4/network-tools-rhel8@sha256:f4336c1f8ae417f78c598de0e160f5146a9280f2b0c211b01f287cf5f96104e1

openshift4/oc-mirror-plugin-rhel8@sha256:c2f7453e36e47ba140ea372110a73971f1f877a2959f20c43db06cfbb5db0dd3

openshift4/ose-agent-installer-api-server-rhel8@sha256:e2574ec03610199c0215dfd8a3e9adbdd1115f93eae3407056c48b83dc84a2ae

openshift4/ose-agent-installer-csr-approver-rhel8@sha256:e3b361b19be8de696ddae1841189f70d415b8a7990540e35341f5a9eb662558b

openshift4/ose-agent-installer-node-agent-rhel8@sha256:e8bb0f5af7508690067f83857a71add110fcc5598e087c2a5882053aa6f5f364

openshift4/ose-agent-installer-orchestrator-rhel8@sha256:2e0077df75d88e544929a720dcfc48dc55769effdc8aad0a381206ce04361a44

openshift4/ose-alibaba-cloud-controller-manager-rhel8@sha256:fc18b3cd900268ab720190c95a8ec6f0df99cfb994856a73ea85d685add195ce

openshift4/ose-alibaba-cloud-csi-driver-container-rhel8@sha256:ce2640548c6ca0c9b8fc234e8db328c2eaf0c46102800925d0142410a8f1e0b8

openshift4/ose-alibaba-disk-csi-driver-operator-container-rhel8@sha256:915cc786431737ac5ead405d641a7937cbe66dd76f3aa907561c80d4e567cc6d

openshift4/ose-alibaba-machine-controllers-rhel8@sha256:3e3c35b38410860c857be04da8eec26ab766cf68e8596f27f02cd9d4f57ed0b0

openshift4/ose-ansible-operator@sha256:94579670666f33b45f1ec98d32adc3cfd3d494d39c14b87150a7ab03702030bc

openshift4/ose-apiserver-network-proxy-rhel8@sha256:70b8290f72aa9b9681ec4eb8d24e2d13a858ab8ab0b8360fe3a795ef63b9f764

openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:eca0c7fbf61df0ff2e63a0a9a3372a85bff1e07a6e3e5e62cad793dea6a05cb3

openshift4/ose-aws-cluster-api-controllers-rhel8@sha256:247040b871397d0f3a5dd87db029783e9f78a3659e79603398e12fca6c359edb

openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:259af0bab7299f32a2935f8decec0c4adebd0d9463fe1ef508b29d58ee38c2db

openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:925b3605995870069049a26e48a64cd43241b5ccd0ddb1d03d4032f4133c9051

openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:93e6b4253f3638e3917cb671ed48f1d4f97f1fda04d5b6fc0d8c521e1b0210cd

openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:f7ab31b19d83d196013bc377aafd7ab569dda5956a332fd5e8cc3cec1a18fd09

openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:8a9326828969c00ce503334a852687c92733ceb74955175cf5c2adb8965577e9

openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:b7ff738ab6baceec2354ce62d4ebc40a8a138e6c8658a306ac8753f1bb2a0b71

openshift4/ose-azure-cloud-node-manager-rhel8@sha256:3824b616e85f7613dd4a34df657c8ca7841e3704177474c2b32a5d5790ad2c06

openshift4/ose-azure-cluster-api-controllers-rhel8@sha256:9828f4e93ec89f586e730614edf71a99e59070c36f086963562e0115a537b1b2

openshift4/ose-azure-disk-csi-driver-rhel8@sha256:412aebeeb47365a2395b5b6ec01e57d9505f328b58278451e178610807ca30ae

openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:23cfb03e542ee0f19919b3f05fa9143a43e1702ef660a5c569d27866cd644561

openshift4/ose-azure-file-csi-driver-operator-rhel8@sha256:e72607e9c31327d8593b81e6082ac87af1b8b84f5dfed9697d2c0784381d3249

openshift4/ose-azure-file-csi-driver-rhel8@sha256:d3c553d2637549d6543fa1c848d281373145bcde8f995c852a3ff7828adaf4f3

openshift4/ose-baremetal-installer-rhel8@sha256:6832dc616da92e38095944a4ce2fe7ce7e75f761f5ee6691de244b53647c6d7b

openshift4/ose-baremetal-machine-controllers@sha256:1116612e1d1d7fc5ce01c9d326a4b8975757e56e3fbb58f7033da7d4327a12fb

openshift4/ose-baremetal-rhel8-operator@sha256:b1762f5feb99b3511fdb28c99d2d4d8d05b78d3a6f9dddf11a6cb268f4e09ac4

openshift4/ose-baremetal-runtimecfg-rhel8@sha256:78b6cbf03c0019a73d0283b5ee2b09cdaa3ce55b2f7e9d1f8ad1d2d7c2abeb43

openshift4/ose-cli@sha256:e2fba1db6874ea8bc6cec76e574e52ae84bc40fb8e92772e161165ae674bacee

openshift4/ose-cli-artifacts@sha256:8397520a4b954a4a9761022cc773610836351d5f4b28dc8ca1173271e6f2a0ce

openshift4/ose-cloud-credential-operator@sha256:97751d1d908bd2483c57e8189ccd1b053602656d4944de7c10870cf240c7030e

openshift4/ose-cluster-api-rhel8@sha256:0b5d409acdcffd24b4537e514ac871c662e5f650f24c2e5ff6c2ba3660ef0281

openshift4/ose-cluster-authentication-operator@sha256:d092e5eeeea6fe96d62c854959063e42dbf6b19fc0731c4bc2cc758fa259fce7

openshift4/ose-cluster-autoscaler@sha256:9e147f0326dd681255ca3bfde6fd4c0eed882bf05a67870ea8b28e0d6debd8cd

openshift4/ose-cluster-autoscaler-operator@sha256:bae5a899f3732202f45aae3a429c2de816548a1f9d4e090cd62aab093c7e3baa

openshift4/ose-cluster-baremetal-operator-rhel8@sha256:404884ad39bf5caf6255ea045766669bd04d9714019801fd4974b9ce0b03da12

openshift4/ose-cluster-bootstrap@sha256:1a0c2b7798c3cbddaebe380f2cfe23832f219d3e84b4606b119209256885aa3b

openshift4/ose-cluster-capacity@sha256:f1d762cbdf1204f4153f80f5045e91d52bce76ebcf4ab61afa949c05c20d85ec

openshift4/ose-cluster-capi-rhel8-operator@sha256:99c655d952bdedb63e2fcb618db86aeb639c2072c00f9556556405fc05ad10f6

openshift4/ose-cluster-capi-operator-container-rhel8@sha256:99c655d952bdedb63e2fcb618db86aeb639c2072c00f9556556405fc05ad10f6

openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:1ae2279abbc48feda64928c295dcd6f2c5b06f1f908e4d640f5320278b50e644

openshift4/ose-cluster-config-operator@sha256:6d0fb57f81354d03f1a465cb91ac6907b67e11619ba0dc253f173a6d542c8149

openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:01653be5d4aae49a67b77929479af4d612cfc585b36200aeb9a24d3ce62766f2

openshift4/ose-cluster-dns-operator@sha256:18583876301ac063913155f7bb8202acbd485b406e00aeed78c779e318b8afc8

openshift4/ose-cluster-etcd-rhel8-operator@sha256:4a7d4ec7db41f3c8bdcbf6cbdf76fc1eb41517f1cb83847cad17afa5e38f04f5

openshift4/ose-cluster-image-registry-operator@sha256:846993ffb6ce4713b065761013dfa7f800889c911dd3c4f1304346c36a38a8cd

openshift4/ose-cluster-ingress-operator@sha256:05fb7b62bd82b829b512f3f00744d970e95ad77ba2db1f3ea613973ad6bee694

openshift4/ose-cluster-kube-apiserver-operator@sha256:ffb6e2a090e6c155942e9ece978e80724a354f4e44823806e6cff847a6149b5c

openshift4/ose-cluster-kube-cluster-api-rhel8-operator@sha256:3aad8b13f849a90cae4af8e4f9f5f70d62301886dd3654e9e4b89d21b001cfde

openshift4/ose-cluster-kube-controller-manager-operator@sha256:6b873b7e0c8719ba8e3ee4432175821d4db8169fb807f36c9182d57606dc674b

openshift4/ose-cluster-kube-descheduler-operator@sha256:e030612418054042d45ba342559b7bbc05591442b68d6f15313214e640c17f2c

openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:e030612418054042d45ba342559b7bbc05591442b68d6f15313214e640c17f2c

openshift4/ose-cluster-kube-scheduler-operator@sha256:a3b855f3938ab58215060dc147de3a944d289a8627ac3f981f397dbff1a7999a

openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:d4c6161272b03f3051a5e9ce4d63ecf31c8ed927251a5151682e551eee5216d4

openshift4/ose-cluster-machine-approver@sha256:1d0a2404a4656f399fdbe880590fbfbe0423464252a62c876c03bd8ff8cc44d4

openshift4/ose-cluster-monitoring-operator@sha256:219ef9f5f5d97996ba53a79d89599360a873f9a9e2ce5a9848aa6b9b40f0884e

openshift4/ose-cluster-network-operator@sha256:f23a8b3db7b937fe5321d0a08573447b84571b5d3be019efa728df7246dc5a1b

openshift4/ose-cluster-nfd-operator@sha256:544478d895a7742bdd1edeffc06e55feae84fce5452d6b0d97fc6fdcd93a85a8

openshift4/ose-cluster-node-tuning-operator@sha256:d62b9542e642875576b478cf0e9e9552b0bd67d01fcfc7cc3b3ec9210d7ab280

openshift4/ose-cluster-openshift-apiserver-operator@sha256:91132f6f0c1638861d681043c70a8dc70b30e2000a3c26092286385fb95134b5

openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3e7bdbe4011301cfb5267eb01e7e8f720bb78dbe0923376664a4eceb3ef11311

openshift4/ose-cluster-policy-controller-rhel8@sha256:8b5640bbba25e5e6242620b77b1f911205bc900b7d40bc240bf5fa10327ed1c5

openshift4/ose-cluster-samples-operator@sha256:62900fdd6ff1338235b902c282e8956e0f19d0379abebd03264ab0ac30a17666

openshift4/ose-cluster-storage-operator@sha256:eb9c54ebbd9ae3f3056b02b6643e917dc206c281bfdb46797f5d72cb808d9964

openshift4/ose-cluster-update-keys@sha256:c8b19483331b58ed663d244725ff9f4e37611cc98c014cba9402e33366f06bac

openshift4/ose-cluster-version-operator@sha256:38c1ea15a6304b2508fdf52570d59193884f913db3e357cee005315611eb9e66

openshift4/ose-clusterresourceoverride-rhel8@sha256:664b2d3d53e09918159a90cf2a670046cf698a84b56959c7ec7e9cb892e08986

openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:39dc85ef44e62b21f6fcced28256459e71f05922c3a6816ce0162ae688c1ad7d

openshift4/ose-configmap-reloader@sha256:f3ed75bc37e21b6261779ec383f8a2847b872a9bdb6fa2338f63cb6342155326

openshift4/ose-console@sha256:8419902a3410b30a490b65a53e9f396f6570c22ab1372f69e6808c33238d364d

openshift4/ose-console-operator@sha256:bb8f5e9a637aba7d7491f6d62fdc8869b86dff147afe496e666da4d0c54492aa

openshift4/ose-container-networking-plugins-rhel8@sha256:bbbf6dbe61a30fd2c7dc92d136a29de643b78179f0370a76a78a0d4c5659dd5b

openshift4/ose-contour-rhel8@sha256:a3f4cfa4977ceb4b11e0893419ad978e60e1119514d2f139b018fed1707dcb37

openshift4/ose-coredns@sha256:da2ca54a62fc8505e149bbcfef9dcf1eb5f356fe3d2a5dfab94a965c3eb5c941

openshift4/ose-csi-driver-manila-rhel8@sha256:3f9cd2c67753396ed99e8faf9f050c74f24aeca7863fce668da2b68858c40366

openshift4/ose-csi-driver-manila-rhel8-operator@sha256:d79a42e0b0cc8d4687fb29635dd3f28850ba47ae9d36c9c43049a373163d0a6f

openshift4/ose-csi-driver-nfs-rhel8@sha256:508522606e708cb8967bccc4f190ea8cbb2604eb77f6493e612f66140f791bbb

openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:ac2ae3ed2151bb6e6ccf25ae18ad71eb8d744beb23cfa909b0b79a789d6c83dd

openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:8222ba75d6cb32649431566b82d4f273c985338de449bd788997959001996c80

openshift4/ose-csi-driver-shared-resource-rhel8@sha256:dabb249a60062a0298ddc9dfc9053ef170932ab63f30cd3238a0e7545d661a2e

openshift4/ose-csi-driver-shared-resource-webhook-rhel8@sha256:b64f6a3cb933000664468886143c86eaa7b51307da0bf4d62b6cecf27bed09d0

openshift4/ose-csi-external-attacher-rhel8@sha256:c5c598f48b8bca3d64a0841b8dbb07c56bb0177daf6aaf7ac74d0371a7245ac0

openshift4/ose-csi-external-attacher@sha256:c5c598f48b8bca3d64a0841b8dbb07c56bb0177daf6aaf7ac74d0371a7245ac0

openshift4/ose-csi-external-provisioner-rhel8@sha256:9b921d94a7a6a8cdbd78c0372b268c94cde68270b554417fcbad43ed7deb865d

openshift4/ose-csi-external-provisioner@sha256:9b921d94a7a6a8cdbd78c0372b268c94cde68270b554417fcbad43ed7deb865d

openshift4/ose-csi-external-resizer@sha256:ebcb6064dc4bb4c666c97c4cfcf7fa825134c663d544feda7a5d600cbc54fc1b

openshift4/ose-csi-external-resizer-rhel8@sha256:ebcb6064dc4bb4c666c97c4cfcf7fa825134c663d544feda7a5d600cbc54fc1b

openshift4/ose-csi-external-snapshotter-rhel8@sha256:6c1637b2003dc7a0a6641751ce3e44423edb92a76d86ecc728a0c9299bccc95d

openshift4/ose-csi-external-snapshotter@sha256:6c1637b2003dc7a0a6641751ce3e44423edb92a76d86ecc728a0c9299bccc95d

openshift4/ose-csi-livenessprobe-rhel8@sha256:80f689a78901618d758404f22523c6ee093d6390ac5828e58b5e042b2df15067

openshift4/ose-csi-livenessprobe@sha256:80f689a78901618d758404f22523c6ee093d6390ac5828e58b5e042b2df15067

openshift4/ose-csi-node-driver-registrar@sha256:35c908f0df164f0459608ca91f4cc533aad3123f9640975c2702022566bebd6f

openshift4/ose-csi-node-driver-registrar-rhel8@sha256:35c908f0df164f0459608ca91f4cc533aad3123f9640975c2702022566bebd6f

openshift4/ose-csi-snapshot-controller-rhel8@sha256:88d7545d91604e34557120656b14f306b5d066f45c8c5bb4a1425438297129a8

openshift4/ose-csi-snapshot-controller@sha256:88d7545d91604e34557120656b14f306b5d066f45c8c5bb4a1425438297129a8

openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:8fabd62251e652546929b929c0819a3403b8087475ac67eecf76c4b54a88f1fc

openshift4/ose-deployer@sha256:d46abb0ab5d169cc6446618f058060ca1cd6829b0a9b5b5a3c08c83297b6e2e9

openshift4/ose-descheduler@sha256:2ecd61a47e0da7fcf28c18cf4d76949baed306fcaf97c0c33db093da23a2d214

openshift4/ose-docker-builder@sha256:a1173bbafe2b9625aef739b810c18564d281884e5fc4495ca3dc25daf24677b8

openshift4/ose-docker-registry@sha256:ef521cd54a57ba65e9adea91d39dde8fb5e2abc6d76fea61604b1493a0b15bd3

openshift4/ose-egress-dns-proxy@sha256:2408407709d0e25063a09f7a540cea817b8dcd1b200971fbc91e86eab33796ab

openshift4/ose-egress-http-proxy@sha256:b43827ecf3f0179807f99744cb815efad17912929bc7e7daf92affedd1982493

openshift4/ose-egress-router@sha256:d9ace414d48bda3ffb056e47975d3850392e362cff4711d3119a166def51ae68

openshift4/ose-etcd@sha256:7c4403bdc8ac55ccaded17175b6896e24ca22c816d5ffe5ab7636f5e4f6acab1

openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:e70e9877d28d3413ba41ea7d6ada9d87e123bc3ae2b06c17dc53dd33ca9b19bd

openshift4/ose-gcp-cluster-api-controllers-rhel8@sha256:711891fc3ed65d7c6ed57a224c8aa479cfcb26973336af64138dd1a0e59dd56c

openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:8fa58c03c57a1c26c326c8d5e3ebe4075222a5f033c4d04882318dc4302df9e2

openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:f674d68ecb71a6cb9b3f99507fd31a34c13448358182f706825d0f86639061ce

openshift4/ose-grafana@sha256:1d077774b5228f8cf067c807b8f869154837a0ecc3db6a6aaf47e702de8668a5

openshift4/ose-haproxy-router@sha256:9d91aec2c52f2e300e9aa4ee3d7e76eb179046e27b956958b5088721baf150f6

openshift4/ose-helm-operator@sha256:2edc478e59666572030ea2659b3afebeb7305b7243a53936b56d7e3e272ddf2e

openshift4/ose-hyperkube@sha256:5e55afce85f65858f034f4a9e315577b5e9a7b6c8662b04eab9599815d01f375

openshift4/ose-hypershift-rhel8@sha256:e47a5488b9ff5a407479eb4521e830f50f7f38d272a3effcac6b9d48cead0992

openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:2754628b259c7b7dc87bbf1f2d8d77aac3e1471f4124798e9bfa7b12668b28e0

openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:1a1f8b404da996af6f09e03e2874773d57b547b4574f64e3017b5e9ae2db76c9

openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:f90e296e13dcb0072c1a863a70ef10711342dfc4e6c41cf3a9b4586b2c44a409

openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:2a9995ae59ebb37aaaa7e78af9f1fa5e1b4f5d1b554a111d3a9695b021ad521e

openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:140644fe4152aac65f716541c66929d3158ac7555413b8e59657cb75680d4e07

openshift4/ose-image-customization-controller-rhel8@sha256:7a3b7a430dc765310cdcbde7b1d8a63b1258d52647a1ddf4cff60ff98d849298

openshift4/ose-insights-rhel8-operator@sha256:0f81fc6958d2fac828c8bf42ac46e3603ef3d3b0b7f2ccf2a5218817a2c9edc5

openshift4/ose-installer@sha256:5dfdf0a217b0c4883f9ff7ec567445e27a983f1cb370109398e1b8ec1aef64f2

openshift4/ose-installer-artifacts@sha256:0497a7a4c51991d0205defb05b1deb9bee5043ebd645610fa2c72044964e3ee0

openshift4/ose-ironic-agent-rhel8@sha256:5a3b9b58cd06a131bc3ff52b2ab39a1b2cedeffbe78c147056f9238b94ebe852

openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:45c3a4fb765b0095ac736f86d6ac808b43aafd69f69d528af2b890b2c67b937b

openshift4/ose-ironic-rhel8@sha256:2cceec4819e1b4d9e4c784e8a52725455024072d0a5663f56cb34454fd204af9

openshift4/ose-ironic-static-ip-manager-rhel8@sha256:e76fbeef9f5ea04a926c605df7cee45bc0d4093df316459653393f5f97ab5785

openshift4/ose-k8s-prometheus-adapter@sha256:8c0f41430a098ce5d3cf8920259e71d5b5154656d569e32a5867125a843ba218

openshift4/ose-keepalived-ipfailover@sha256:7f39f247a2ab1b4294d7ef5e72e914e6722474c66c1484c489c6f9f5f2e34f28

openshift4/ose-kube-proxy@sha256:00e6cbd5ffb6ebb304a9b19b3c375f2c18ae9c07342037ea88e46ae0ecbe2acc

openshift4/ose-kube-rbac-proxy@sha256:faf2b1113221beb3d7e365b1280a03e583690861e45d38c0638d9947faba8596

openshift4/ose-kube-state-metrics@sha256:2450d59cbfbb76de91f0e97641e2846748d34ef55abb1ae9657d539e582a387b

openshift4/ose-kube-storage-version-migrator-rhel8@sha256:857529404bc38450e96993976edc35d73c81de6f57a1738ee447be29a678abb2

openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:65f06a35405382dde1d1d120a52c5a4025e78e7381ca8c0ef2f84ed30554d51f

openshift4/ose-kuryr-cni-rhel8@sha256:49e64d1c8049d4ec031769d3780469fcdb13605eda8a7b2e2cb9d8cd61b7c051

openshift4/ose-kuryr-controller-rhel8@sha256:5a1bf57fa98a5d2376f44abc1850ce9e70f3c509042b818dcb258cd0512816d6

openshift4/ose-libvirt-machine-controllers@sha256:e292915bd570969f049643352be76ede448d978acb926f8d43a813660d31b12b

openshift4/ose-local-storage-diskmaker@sha256:c7c31a3c7ce0d49d7204bb9578db3c86d4b5e9168f0b84294cccd54d4a089e8a

openshift4/ose-local-storage-mustgather-rhel8@sha256:8a9a37e9a7331c601b46adf4f407fca17dec43bc758e67973b6fc6a6465761d0

openshift4/ose-local-storage-operator@sha256:f03211424d654b94a8ac6863c96bbf15d9b989223c74fe09ff8525e28514fe8e

openshift4/ose-machine-api-operator@sha256:e5e0ed6872b90fb75492b35c90e4eed14e0f04debd149a132726ae1c00e6912f

openshift4/ose-machine-api-provider-aws-rhel8@sha256:a299e030d6b414da3f7b63d843552a57fbfd5d5df3ba7aedae8be51503fdc57c

openshift4/ose-machine-api-provider-azure-rhel8@sha256:d720339fd16fb31a96fbb5d77fd5bfc1a15f1f200019e06ba5fbedb173b5c7b3

openshift4/ose-machine-api-provider-gcp-rhel8@sha256:1691274da6093be476b9a18a4c2b0464dd562d1da5ce78bbc3bc779835f6c081

openshift4/ose-machine-api-provider-openstack-rhel8@sha256:f09385fd500b607fa23e4c038061085aeb447ebbe86c465b71f535c4f2e4bb51

openshift4/ose-machine-config-operator@sha256:c36d0f98df0aa37d49dd59b6c3eea7647226b14013658fd26d518ebf18fd765e

openshift4/ose-machine-os-images-rhel8@sha256:c84dc805b5ce77e85cb9e245e83349ac9aceaeb9c9517d0b2984106b140a684f

openshift4/ose-multus-admission-controller@sha256:73a73ac8df17459e018907e7771216186f6d975de616f1a9c94ffda8047a79ab

openshift4/ose-multus-cni@sha256:ba6676a98d8ec51e7189d0d37fe7daae9a9c46278bd3b1eb55aa918a583a2f45

openshift4/ose-multus-networkpolicy-rhel8@sha256:53f34ac849c7b407b463eb4290b0704251a7240dc2b53034be04b2e3fbc4c823

openshift4/ose-multus-route-override-cni-rhel8@sha256:a30658e8c19567ebd97caf44c1def037201c3072b3166e70867149ffec56ff01

openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:0ce2c9f852113a5f12ba8e2c87997436391af1c393b1ce1e9f00c5af92babf23

openshift4/ose-must-gather@sha256:919fd299d8b51b11516702d0bd8cd4b70266699d2dae9835cff16ab8beebeab3

openshift4/ose-network-interface-bond-cni-rhel8@sha256:72c4289a39bc8e132b38bbdd1b53a34b8017f4d1c9d82f3a2ba1c431e5819bfe

openshift4/ose-network-metrics-daemon-rhel8@sha256:464cec3df58280ca8122c401b79612e4b624e3f27e346d4202e53c3b4ccca9d7

openshift4/ose-node-feature-discovery@sha256:b427679547960a2325f5d0786666f771b70ab32befb2880272ae58e0a0322f22

openshift4/ose-node-problem-detector-rhel8@sha256:5b8633d6623e76544a50b55942e24f33aa653f45431593445c57e689ad8755ce

openshift4/ose-nutanix-machine-controllers-rhel8@sha256:94b6e61d7414ea3ad8cff4430880b2b847cdafa4589c48a464e6d0b2a9841c25

openshift4/ose-oauth-apiserver-rhel8@sha256:3d738fd03a79170967d513a214cfe957dde549745687349b21691c12842446ba

openshift4/ose-oauth-proxy@sha256:7d4af9d36225056c9bf36aec5a714de5b785e8ea7f69c4b4d1b2e91a9b2dc1a7

openshift4/ose-oauth-server-rhel8@sha256:6f7718cc8b1037cd8ab34a2ac8231734796ab746df7827de16369f817dd8b50f

openshift4/ose-openshift-apiserver-rhel8@sha256:82c982f77e19b017f5455d27dd8316f6c81e4cf6c22ca2df37e8d6da7f5f0cf8

openshift4/ose-openshift-controller-manager-rhel8@sha256:cfe0bd5515b2855c4bfc82fe46b3c15979fa65736e121c06c351ac826c2d4c26

openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0f46463bdfc6966b02aa4e2a039381ada92f19d5fa18a4bfa27c8c0e59ea1076

openshift4/ose-openshift-state-metrics-rhel8@sha256:42d56a5b02471b161c8d40b8faa5596145023e40c6b29cfaaf1f5ddda261ff83

openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:075831a7dad3cc511b6e1bff458bb8f38110762a68005bb6f59ea5f876d035e4

openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:0b5a7b6ecabf9a69e0816bf0562c77ad1c13b96f5e3c4c52c57ee505dbb01d63

openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:99fce5ec5ca50caed47987f6baa1a8f6c77b9a9225638241880f6ea077980c53

openshift4/ose-openstack-machine-controllers@sha256:abace9253d13f843ee0616c3b9804932143022ee7dce119502c610db1028d840

openshift4/ose-operator-lifecycle-manager@sha256:d8f81cbe609c6fc748f31964eefb567e7577c39db2804be66846eb305bfa1c3c

openshift4/ose-operator-marketplace@sha256:0fe0cf32eb99484bdbbcf4ac58adb9aadb120763f570c2e35716a08cf4431308

openshift4/ose-operator-registry@sha256:87aab9769aed9192955cb74a5839c44668a33f61a4e7ed81994f93b41258f0fa

openshift4/ose-operator-sdk-rhel8@sha256:faeba966cdfaeae3780e47d18b8475feac08a087e6409b53f5fe255b061560b2

openshift4/ose-ovirt-machine-controllers-rhel8@sha256:e5f26f5b714b80998b79f6f482c4c4a15d31b5bfaf620061c0074d642a88b2be

openshift4/ose-ovn-kubernetes@sha256:720a7a052ecb538929ce731f48c8c725ddc532aa236f7848e49b0e6907f96008

openshift4/ose-pod@sha256:d92246086a7058c81da2c0f1bdfc9c91d62e680783ac75f4024d9287c2c246bd

openshift4/ose-powervs-cloud-controller-manager-rhel8@sha256:b13c6c3d59f0fd725d8ccaa5786bad36d1936abe84a9cf698f0558575a428d35

openshift4/ose-powervs-machine-controllers-rhel8@sha256:949f6137f67a292d1ebf2d6e5a1da6e4e9db8bfb4aad6589fdcc4056f5086c35

openshift4/ose-prom-label-proxy@sha256:11c6cbd8fe830e768589679e485ab87d891168474cfedab46d486b394b8e7083

openshift4/ose-prometheus@sha256:9075d049ae3a9cecbd208eecf77557e26566724b6e1ec7b3f624cc04c1088205

openshift4/ose-prometheus-alertmanager@sha256:c66ac6cf75152bd9d9287fc0a09637b6d7f03576db94c9788d498aec384d9877

openshift4/ose-prometheus-config-reloader@sha256:c42043430f0e1bd7b86d7a634a6d53508cb06b3ef56cb28b763fab500402e04d

openshift4/ose-prometheus-node-exporter@sha256:d035277ec9fdccc92ceaca5c086cafa4a80a228201f007f76e274ec0c74db8b1

openshift4/ose-prometheus-operator@sha256:47947b7d2f38d1118a7395b51fdd5f23184c31dbde4ac1264262b4c1e58d9d93

openshift4/ose-prometheus-operator-admission-webhook-rhel8@sha256:f3e0c4f53d9c03179c8760e3cb576874ae66f58b39e27088b9ee98e253efc86b

openshift4/ose-ptp@sha256:579f02739fdaf8b2e917d9614351df34b3fab52e0b0e5480185ab92ad98a87bb

openshift4/ose-ptp-operator@sha256:e79ad22de89e51aac241d05e132767f29d6c2601b111f2d97fdd66d4da63bec6

openshift4/ose-sdn-rhel8@sha256:bb68b568fafde17f028ac2b813d146a758dcffd3791628be490c6e2462a0816d

openshift4/ose-service-ca-operator@sha256:bfe7ff8ed0b8eb186ae72dec14ee4f00bc0052f9a65afe609ad371f87939e11a

openshift4/ose-sriov-cni@sha256:8b8c4ec52f7ed83b90092ac8a5ac60a037c2760580d9bcbff596c40211290c4a

openshift4/ose-sriov-dp-admission-controller@sha256:4773511aac9677dae815b165f53e1da97b02913b18b344ea538abefcce755e76

openshift4/ose-sriov-infiniband-cni@sha256:4cf78701800c1c14d59e65181f30be617e5c8e8bd34c397960d8adb41a785ed1

openshift4/ose-sriov-network-config-daemon@sha256:da220af8a7543d3e0175c88058fe6690ceb8da451389695f6d139009363fae56

openshift4/ose-sriov-network-device-plugin@sha256:5e56d7112b380a6fdab0d7c92b086f5637b34e919002c308d6f1cdb60613f656

openshift4/ose-sriov-network-operator@sha256:79f4ed91e9330240e16a9b7e8226051792aa8311e4565df41989118849b449bf

openshift4/ose-sriov-network-webhook@sha256:cbe927e8359881546f0c3c16af503b6841bf49bd3bf5e2812d8436383ae6f22f

openshift4/ose-telemeter@sha256:d921ffbcf105dd67f575341b9fa41cdd6fd3581368ff595c403d0856ba1efd39

openshift4/ose-tests@sha256:059b2c0e3b640077136b2d010e6311eba4ab59f3efd169cf2e6b570f6fecc9f0

openshift4/ose-thanos-rhel8@sha256:d83c4099d416a370091a3dbb257d20a6d01b9ac56295fbbeeb61017eb136669d

openshift4/ose-tools-rhel8@sha256:995b9c4045e846a8ef0689b98b287d0914d70daab02ce90d7fd2c4b9674f766f

openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:17e415b734bc7c02510b7100d7ef943e622a7aa7bab44a48d35aab19b4131fdf

openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:111a42a6ebc3f88bf1469009656fc7b058a6cb93a3bb42fb3f49d0a58206ab5c

openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:b921eae44a3cdb0acff0a62e9b570d14844d985bd694c517a9a14d9a1bfa9a9c

openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:b921eae44a3cdb0acff0a62e9b570d14844d985bd694c517a9a14d9a1bfa9a9c

openshift4/ose-vsphere-csi-driver-rhel8@sha256:ef6331af60baecdd083cc9b2e86fc2166c50ee8e55aba2f3b33539cbde5ec6e6

openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:ef6331af60baecdd083cc9b2e86fc2166c50ee8e55aba2f3b33539cbde5ec6e6

openshift4/ose-vsphere-cloud-controller-manager-rhel8@sha256:56eb4e5a235f41cb4a8d1ef96e75a0f68dea0673d77ce25a900aad6b6993dc2b

openshift4/ose-vsphere-cluster-api-controllers-rhel8@sha256:2c924fe7b67ad6ad678f58c9f5d11d201f0761539c066678bf4c40909a4eb9e2

openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:7f11fa5defe14d150ffb003a1d819b38605cdcc81e72714d686549b4e9e2dc6d

openshift4/ose-vsphere-problem-detector-rhel8@sha256:d85d886990ebcb85abfee22e8f2d021804b694c0080e04bf7a3c8c524769ce40

openshift4/ovirt-csi-driver-rhel8@sha256:0a93d623546861461df48b9c5ee19ff4b8da076036c090feec666f3a5497eff3

openshift4/ovirt-csi-driver-rhel7@sha256:0a93d623546861461df48b9c5ee19ff4b8da076036c090feec666f3a5497eff3

openshift4/ovirt-csi-driver-rhel8-operator@sha256:4296db98941e065979486d74885fc841ef8b8af41594a9ac90657092c3f6d68d

openshift4/ptp-must-gather-rhel8@sha256:e4f1b2617b30f4e670f6cd088e57097a01b55f6f9141c236769355262bc907e9

openshift4/special-resource-rhel8-operator@sha256:6f015ae7e72d28b60fbfd7a8e9037ae8f36d8b11001b6411995e4165ed23bddc

Related news

Red Hat Security Advisory 2024-1994-03

Red Hat Security Advisory 2024-1994-03 - An update for the container-tools:rhel8 module is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.

Ubuntu Security Notice USN-6038-2

Ubuntu Security Notice 6038-2 - USN-6038-1 fixed several vulnerabilities in Go 1.18. This update provides the corresponding updates for Go 1.13 and Go 1.16. CVE-2022-29526 and CVE-2022-30630 only affected Go 1.16. It was discovered that the Go net/http module incorrectly handled Transfer-Encoding headers in the HTTP/1 client. A remote attacker could possibly use this issue to perform an HTTP Request Smuggling attack.

RHSA-2023:5442: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.8.2 security and bug fix updates

Red Hat Advanced Cluster Management for Kubernetes 2.8.2 General Availability release images, which provide security updates and fix bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41721: A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead read the body of the HTTP request, which could be att...

Red Hat Security Advisory 2023-5103-01

Red Hat Security Advisory 2023-5103-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 4.11.6 images.

Red Hat Security Advisory 2023-4972-01

Red Hat Security Advisory 2023-4972-01 - Multicluster Engine for Kubernetes 2.1.8 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy. Issues addressed include a bypass vulnerability.

RHSA-2023:4862: Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.3.1 security updates and bug fixes

Multicluster Engine for Kubernetes 2.3.1 General Availability release images, which contain security updates and fix bugs. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated. * CVE-2023-37466: A flaw was found in the vm2 Promise handler sanitization, which allows attackers to esc...

RHSA-2023:4664: Red Hat Security Advisory: OpenShift Virtualization 4.13.3 Images security and bug fix update

Red Hat OpenShift Virtualization release 4.13.3 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of requests. * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Con...

RHSA-2023:4650: Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.2.7 security updates and bug fixes

Multicluster Engine for Kubernetes 2.2.7 General Availability release images, which provide security updates and fix bugs. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated. * CVE-2023-37903: A flaw was found in the vm2 custom inspect function, which allows attackers to escape t...

RHSA-2023:4456: Red Hat Security Advisory: OpenShift Container Platform 4.13.8 bug fix and security update

Red Hat OpenShift Container Platform release 4.13.8 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number...

RHSA-2023:4475: Red Hat Security Advisory: Gatekeeper Operator v0.2 security fixes and enhancements

Gatekeeper Operator v0.2 security fixes and enhancements Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.

Red Hat Security Advisory 2023-4310-01

Red Hat Security Advisory 2023-4310-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.46. Issues addressed include denial of service and out of bounds read vulnerabilities.

Red Hat Security Advisory 2023-4286-01

Red Hat Security Advisory 2023-4286-01 - Red Hat OpenShift Dev Spaces provides a cloud developer workspace server and a browser-based IDE built for teams and organizations. Dev Spaces runs in OpenShift and is well-suited for container-based development.

Red Hat Security Advisory 2023-4287-01

Red Hat Security Advisory 2023-4287-01 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform.

RHSA-2023:4290: Red Hat Security Advisory: OpenShift sandboxed containers 1.4.1 security update

OpenShift sandboxed containers 1.4.1 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.

RHSA-2023:4287: Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.12.5 security and bug fix update

Updated images that fix several bugs are now available for Red Hat OpenShift Data Foundation 4.12.5 on Red Hat Enterprise Linux 8 from Red Hat Container Registry. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.

RHSA-2023:4276: Red Hat Security Advisory: DevWorkspace Operator Security Update

An update is now available for Red Hat DevWorkspace Operator. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.

Red Hat Security Advisory 2023-4093-01

Red Hat Security Advisory 2023-4093-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.5. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-4091-01

Red Hat Security Advisory 2023-4091-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.5. Issues addressed include a denial of service vulnerability.

RHSA-2023:4093: Red Hat Security Advisory: OpenShift Container Platform 4.13.5 security update

Red Hat OpenShift Container Platform release 4.13.5 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1260: An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions "update, patch" the "po...

RHSA-2023:4090: Red Hat Security Advisory: OpenShift Container Platform 4.13.5 security update

Red Hat OpenShift Container Platform release 4.13.5 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server c...

RHSA-2023:4238: Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.11.9 security and bug fix update

Updated images that fix several bugs are now available for Red Hat OpenShift Data Foundation 4.11.9 on Red Hat Enterprise Linux 8 from Red Hat Container Registry. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.

Red Hat Security Advisory 2023-4204-01

Red Hat Security Advisory 2023-4204-01 - VolSync is a Kubernetes operator that enables asynchronous replication of persistent volumes within a cluster, or across clusters. After deploying the VolSync operator, it can create and maintain copies of your persistent data.

CVE-2023-22062: Oracle Critical Patch Update Advisory - July 2023

Vulnerability in the Oracle Hyperion Financial Reporting product of Oracle Hyperion (component: Repository). The supported version that is affected is 11.2.13.0.000. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hyperion Financial Reporting. While the vulnerability is in Oracle Hyperion Financial Reporting, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hyperion Financial Reporting accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Hyperion Financial Reporting. CVSS 3.1 Base Score 8.5 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L).

RHSA-2023:4113: Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.3.5 security update

Red Hat OpenShift Service Mesh 2.3.5 Containers Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptog...

RHSA-2023:4114: Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.1 security update

Red Hat OpenShift Service Mesh 2.4.1 Containers Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.

Red Hat Security Advisory 2023-4039-01

Red Hat Security Advisory 2023-4039-01 - Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-4034-01

Red Hat Security Advisory 2023-4034-01 - Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-4036-01

Red Hat Security Advisory 2023-4036-01 - Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Issues addressed include a denial of service vulnerability.

RHSA-2023:4035: Red Hat Security Advisory: nodejs:18 security update

An update for the nodejs:18 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4904: A flaw was found in the c-ares package. The ares_set_sortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confidentiality and integrity. * CVE-2023-31124: A flaw was found in c-ares. This issue occurs...

RHSA-2023:4036: Red Hat Security Advisory: nodejs security update

An update for nodejs is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-31124: A flaw was found in c-ares. This issue occurs when cross-compiling c-ares and using the autotools build system, CARES_RANDOM_FILE will not be set, as seen when cross-compiling aarch64 android. As a result, it will downgrade to rand(), which could allow an attacker to utilize the lack of entropy by not using a CSPRNG. * C...

Red Hat Security Advisory 2023-3925-01

Red Hat Security Advisory 2023-3925-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.23.

Red Hat Security Advisory 2023-3924-01

Red Hat Security Advisory 2023-3924-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.12.23.

RHSA-2023:3924: Red Hat Security Advisory: OpenShift Container Platform 4.12.23 security update

Red Hat OpenShift Container Platform release 4.12.23 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-...

RHSA-2023:3925: Red Hat Security Advisory: Red Hat OpenShift Enterprise security update

Red Hat OpenShift Container Platform release 4.12.23 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-...

Red Hat Security Advisory 2023-3915-01

Red Hat Security Advisory 2023-3915-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.44.

Red Hat Security Advisory 2023-3914-01

Red Hat Security Advisory 2023-3914-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.11.44.

Red Hat Security Advisory 2023-3911-01

Red Hat Security Advisory 2023-3911-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.63.

Red Hat Security Advisory 2023-3910-01

Red Hat Security Advisory 2023-3910-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.10.63.

RHSA-2023:3910: Red Hat Security Advisory: Red Hat OpenShift Enterprise security update

Red Hat OpenShift Container Platform release 4.10.63 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.10. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server...

RHSA-2023:3914: Red Hat Security Advisory: Red Hat OpenShift Enterprise security update

Red Hat OpenShift Container Platform release 4.11.44 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-23772: A flaw was found in the big package of the math library in golang. The Rat.SetString could cause an overflow, and if left unhandled, it could lead to excessive memory use. This issu...

CVE-2023-3089: cve-details

A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.

Red Hat Security Advisory 2023-3932-01

Red Hat Security Advisory 2023-3932-01 - Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL. Issues addressed include a bypass vulnerability.

RHSA-2023:3906: Red Hat Security Advisory: Red Hat Integration Camel K 1.10.1 release security update

Red Hat Integration Camel K 1.10.1 release and security update is now available. The purpose of this text-only errata is to inform you about the security issues fixed. Red Hat Product Security has rated this update as having an impact of Important.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4244: No description is available for this CVE. * CVE-2022-4245: No description is available for this CVE. * CVE-2022-39368: A flaw was found in the Eclipse Californium Scandium package. This issue occurs when failing handshakes don't clean up counters for throttling, causing the threshold to be reached without being released again, resulting in a denial of service. An attacker could submit a high quantity of server requests, leaving the serv...

Red Hat Security Advisory 2023-3796-01

Red Hat Security Advisory 2023-3796-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a bypass vulnerability.

Red Hat Security Advisory 2023-3781-01

Red Hat Security Advisory 2023-3781-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a bypass vulnerability.

Red Hat Security Advisory 2023-3614-01

Red Hat Security Advisory 2023-3614-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.4.

Red Hat Security Advisory 2023-3612-01

Red Hat Security Advisory 2023-3612-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.4. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3742-02

Red Hat Security Advisory 2023-3742-02 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. Issues addressed include bypass, denial of service, and remote SQL injection vulnerabilities.

RHSA-2023:3614: Red Hat Security Advisory: OpenShift Container Platform 4.13.4 bug fix and security update

Red Hat OpenShift Container Platform release 4.13.4 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number...

RHSA-2023:3614: Red Hat Security Advisory: OpenShift Container Platform 4.13.4 bug fix and security update

Red Hat OpenShift Container Platform release 4.13.4 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number...

Red Hat Security Advisory 2023-3741-01

Red Hat Security Advisory 2023-3741-01 - The c-ares C library defines asynchronous DNS requests and provides name resolving API. Issues addressed include a denial of service vulnerability.

RHSA-2023:3742: Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.13.0 security and bug fix update

Updated images that include numerous enhancements, security, and bug fixes are now available in Red Hat Container Registry for Red Hat OpenShift Data Foundation 4.13.0 on Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-16250: A flaw was found in Vault and Vault Enterprise (“Vault”). In the affected versions of Vault, with the AWS Auth Method configured and under certain circumstances, the values relied upon by Vault to validate AWS IAM ident...

RHSA-2023:3741: Red Hat Security Advisory: c-ares security update

An update for c-ares is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-32067: A vulnerability was found in c-ares. This issue occurs due to a 0-byte UDP payload that can cause a Denial of Service.

Red Hat Security Advisory 2023-3677-01

Red Hat Security Advisory 2023-3677-01 - The c-ares C library defines asynchronous DNS requests and provides name resolving API. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3665-01

Red Hat Security Advisory 2023-3665-01 - The c-ares C library defines asynchronous DNS requests and provides name resolving API. Issues addressed include a denial of service vulnerability.

RHSA-2023:3677: Red Hat Security Advisory: c-ares security update

An update for c-ares is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-32067: A vulnerability was found in c-ares. This issue occurs due to a 0-byte UDP payload that can cause a Denial of Service.

Red Hat Security Advisory 2023-3660-01

Red Hat Security Advisory 2023-3660-01 - The c-ares C library defines asynchronous DNS requests and provides name resolving API. Issues addressed include a denial of service vulnerability.

RHSA-2023:3663: Red Hat Security Advisory: jenkins and jenkins-2-plugins security update

An update for jenkins and jenkins-2-plugins is now available for OpenShift Developer Tools and Services for OCP 4.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2048: A flaw was found in the Eclipse Jetty http2-server package. This flaw allows an attacker to cause a denial of service in the server via HTTP/2 requests. * CVE-2022-22976: A flaw was found in Spring Framework. The encoder does not perform any salt rounds when using the BCrypt class with the maximum wo...

RHSA-2023:3660: Red Hat Security Advisory: c-ares security update

An update for c-ares is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-32067: c-ares is an asynchronous resolver library. c-ares is vulnerable to denial of service. If a target resolver sends a query, the attacker forges a malformed UDP packet with a length of 0 and r...

Red Hat Security Advisory 2023-3642-01

Red Hat Security Advisory 2023-3642-01 - Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services. This new container image is based on Red Hat Ceph Storage 6.1 and Red Hat Enterprise Linux 9. Issues addressed include bypass, cross site scripting, denial of service, information leakage, spoofing, and traversal vulnerabilities.

Red Hat Security Advisory 2023-3624-01

Red Hat Security Advisory 2023-3624-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3610-01

Red Hat Security Advisory 2023-3610-01 - Jenkins is a continuous integration server that monitors executions of repeated jobs, such as building a software project or jobs run by cron. Issues addressed include bypass, code execution, cross site request forgery, cross site scripting, denial of service, memory exhaustion, and resource exhaustion vulnerabilities.

Red Hat Security Advisory 2023-3559-01

Red Hat Security Advisory 2023-3559-01 - The c-ares C library defines asynchronous DNS requests and provides name resolving API. Issues addressed include a denial of service vulnerability.

RHSA-2023:3642: Red Hat Security Advisory: Red Hat Ceph Storage 6.1 Container security and bug fix update

A new container image for Red Hat Ceph Storage 6.1 is now available in the Red Hat Ecosystem Catalog. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-42581: A flaw was found in the Ramda NPM package that involves prototype poisoning. This flaw allows attackers to supply a crafted object, affecting the integrity or availability of the application. * CVE-2022-1650: A flaw was found in the EventSource NPM Package. The description from the source states the following messa...

RHSA-2023:3641: Red Hat Security Advisory: Red Hat Integration Camel for Spring Boot 3.18.3 Patch 2 release

Camel for Spring Boot 3.18.3 Patch 2 release and security update is now available. Red Hat Product Security has rated this update as having an impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-25857: A flaw was found in the org.yaml.snakeyaml package. This flaw allows an attacker to cause a denial of service (DoS) due to missing nested depth limitation for collections. * CVE-2022-38749: A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remot...

RHSA-2023:3624: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.10 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.10 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service. * CVE-2023-24536: A flaw was found in Golang Go, where it is vulnerable to a denial of service cause...

RHSA-2023:3622: Red Hat Security Advisory: jenkins and jenkins-2-plugins security update

An update for jenkins and jenkins-2-plugins is now available for OpenShift Developer Tools and Services for OCP 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-29599: A flaw was found in the maven-shared-utils package. This issue allows a Command Injection due to improper escaping, allowing a shell injection attack. * CVE-2022-30953: A cross-site request forgery (CSRF) vulnerability in Jenkins Blue Ocean Plugin 1.25.3 and earlier allows attackers to connect to an...

RHSA-2023:3610: Red Hat Security Advisory: jenkins and jenkins-2-plugins security update

An update for jenkins and jenkins-2-plugins is now available for OpenShift Developer Tools and Services for OCP 4.12. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46877: A flaw was found in Jackson Databind. This issue may allow a malicious user to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization. * CVE-2022-29599: A flaw was found in the maven-shared-utils package. This issue allows a Command...

RHSA-2023:3541: Red Hat Security Advisory: OpenShift Container Platform 4.11.43 packages and security update

Red Hat OpenShift Container Platform release 4.11.43 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2995: Incorrect handling of the supplementary groups in the CRI-O container engine might lead to sensitive information disclosure or possible data modification if an attacker has direct acc...

RHSA-2023:3583: Red Hat Security Advisory: c-ares security update

An update for c-ares is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-32067: c-ares is an asynchronous resolver library. c-ares is vulnerable to denial of service. If a target resolver sends a query, the attacker forges a malformed UDP packet with a length of 0 and returns them to the target resolver. The target resolver erroneously interprets the 0 length as a graceful shutdown of the connection...

Red Hat Security Advisory 2023-3555-01

Red Hat Security Advisory 2023-3555-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a bypass vulnerability.

RHSA-2023:3556: Red Hat Security Advisory: python3 security update

An update for python3 is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24329: A flaw was found in the Python package. An issue in the urllib.parse component could allow attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.This may lead to compromised Integrity.

Debian Security Advisory 5419-1

Debian Linux Security Advisory 5419-1 - Two vulnerabilities were discovered in c-ares, an asynchronous name resolver library.

Red Hat Security Advisory 2023-3362-01

Red Hat Security Advisory 2023-3362-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.10.61. Issues addressed include a resource exhaustion vulnerability.

Ubuntu Security Notice USN-6140-1

Ubuntu Security Notice 6140-1 - It was discovered that Go did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a panic resulting in a denial of service. This issue only affected golang-1.19 on Ubuntu 22.10. It was discovered that Go did not properly validate the amount of memory and disk files ReadForm can consume. An attacker could possibly use this issue to cause a panic resulting in a denial of service. This issue only affected golang-1.19 on Ubuntu 22.10.

Red Hat Security Advisory 2023-3445-01

Red Hat Security Advisory 2023-3445-01 - An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Issues addressed include a denial of service vulnerability.

RHSA-2023:3445: Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update

An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-28235: A flaw was found in etcd, where etc-io could allow a remote attacker to gain elevated privileges on the system caused by a vulnerability in the debug function. By sending a specially crafted request, an attacker can gain elevated privileges. * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause e...

Red Hat Security Advisory 2023-3415-01

Red Hat Security Advisory 2023-3415-01 - Updated images are now available for Red Hat Advanced Cluster Security (RHACS). The updated image includes security and bug fixes.

RHSA-2023:3379: Red Hat Security Advisory: Red Hat Advanced Cluster Security for Kubernetes 3.73 security update

Updated images are now available for Red Hat Advanced Cluster Security for Kubernetes (RHACS). The updated image includes security fixes. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24540: A flaw was found in golang, where not all valid JavaScript white-space characters were considered white space. Due to this issue, templates containing white-space characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions...

Red Hat Security Advisory 2023-3216-01

Red Hat Security Advisory 2023-3216-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.10.60.

RHSA-2023:3323: Red Hat Security Advisory: go-toolset-1.19 and go-toolset-1.19-golang security update

An update for go-toolset-1.19 and go-toolset-1.19-golang is now available for Red Hat Developer Tools. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24537: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by an infinite loop due to integer overflow when calling any of the Parse functions. By sending a specially crafted input, a remote attacker can cause a denial of service. * CVE-2023-24538: A flaw was found in Golang Go. This flaw ...

RHSA-2023:3216: Red Hat Security Advisory: OpenShift Container Platform 4.10.60 packages and security update

Red Hat OpenShift Container Platform release 4.10.60 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.10. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2995: Incorrect handling of the supplementary groups in the CRI-O container engine might lead to sensitive information disclosure or possible data modification if an attacker has direct acc...

Red Hat Security Advisory 2023-3204-01

Red Hat Security Advisory 2023-3204-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 4.13.0 RPMs. Issues addressed include a denial of service vulnerability.

RHSA-2023:3205: Red Hat Security Advisory: OpenShift Virtualization 4.13.0 Images security, bug fix, and enhancement update

Red Hat OpenShift Virtualization release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded...

RHSA-2023:3204: Red Hat Security Advisory: OpenShift Virtualization 4.13.0 RPMs security and bug fix update

Red Hat OpenShift Virtualization release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27664: A flaw was found in the golang package. In net/http in Go, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if a fatal error preempts the shutdown. * CVE-2022-32149: A vulnerability was found in the golang.org/x/text/language pack...

RHSA-2023:2784: Red Hat Security Advisory: grafana security update

An update for grafana is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2880: A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy saniti...

RHSA-2023:2784: Red Hat Security Advisory: grafana security update

An update for grafana is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2880: A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy saniti...

RHSA-2023:2784: Red Hat Security Advisory: grafana security update

An update for grafana is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2880: A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy saniti...

RHSA-2023:2785: Red Hat Security Advisory: grafana-pcp security update

An update for grafana-pcp is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27664: A flaw was found in the golang package. In net/http in Go, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if a fatal error preempts the shutdown.

RHSA-2023:2592: Red Hat Security Advisory: golang-github-cpuguy83-md2man security, bug fix, and enhancement update

An update for golang-github-cpuguy83-md2man is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41715: A flaw was found in the golang package, where programs that compile regular expressions from untrusted sources are vulnerable to memory exhaustion or a denial of service. The parsed regexp representation is linear in the input size. Still, in some cases, the constant factor can be as high as 40,000, making a relatively small...

RHSA-2023:2167: Red Hat Security Advisory: grafana security and enhancement update

An update for grafana is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2880: A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy saniti...

RHSA-2023:2167: Red Hat Security Advisory: grafana security and enhancement update

An update for grafana is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2880: A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy saniti...

RHSA-2023:2167: Red Hat Security Advisory: grafana security and enhancement update

An update for grafana is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2880: A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy saniti...

Red Hat Security Advisory 2023-2099-01

Red Hat Security Advisory 2023-2099-01 - A patch is now available for Camel for Spring Boot 3.18.3. The purpose of this text-only errata is to inform you about the security issues fixed in this release. Issues addressed include denial of service and resource exhaustion vulnerabilities.

RHSA-2023:2099: Red Hat Security Advisory: Red Hat Integration Camel for Spring Boot 3.18.3 Patch 1 security update

A patch is now available for Camel for Spring Boot 3.18.3. The purpose of this text-only errata is to inform you about the security issues fixed in this release. Red Hat Product Security has rated this update as having an impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1370: A flaw was found in the json-smart package. This security flaw occurs when reaching a ‘[‘ or ‘{‘ character in the JSON input, and the code parses an array or an object, respectively. The 3PP does not have any limit to the nesting of such arrays or objects. Since ne...

GHSA-493p-pfq6-5258: json-smart Uncontrolled Recursion vulnerabilty

### Impact Affected versions of [net.minidev:json-smart](https://github.com/netplex/json-smart-v1) are vulnerable to Denial of Service (DoS) due to a StackOverflowError when parsing a deeply nested JSON array or object. When reaching a ‘[‘ or ‘{‘ character in the JSON input, the code parses an array or an object respectively. It was discovered that the 3PP does not have any limit to the nesting of such arrays or objects. Since the parsing of nested arrays and objects is done recursively, nesting too many of them can cause stack exhaustion (stack overflow) and crash the software. ### Patches This vulnerability was fixed in json-smart version 2.4.9, but the maintainer recommends upgrading to 2.4.10, due to a remaining bug. ### Workarounds N/A ### References - https://www.cve.org/CVERecord?id=CVE-2023-1370 - https://nvd.nist.gov/vuln/detail/CVE-2023-1370 - https://security.snyk.io/vuln/SNYK-JAVA-NETMINIDEV-3369748

RHSA-2023:1428: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.8 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.8 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36567: A flaw was found in gin. This issue occurs when the default Formatter for the Logger middleware (LoggerConfig.Formatter), which is included in the Default engine, allows attackers to inject arbitrary log entries by manipulating the request path. * CVE-2022-24999: A flaw was found in the express.js npm package. Express.js Express is vulnerable to a d...

Ubuntu Security Notice USN-5960-1

Ubuntu Security Notice 5960-1 - Yebo Cao discovered that Python incorrectly handled certain URLs. An attacker could possibly use this issue to bypass blocklisting methods by supplying a URL that starts with blank characters.

RHSA-2023:1174: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.2 security and bug fix update

OpenShift API for Data Protection (OADP) 1.1.2 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panic. * CVE-2022...

RHSA-2023:1174: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.2 security and bug fix update

OpenShift API for Data Protection (OADP) 1.1.2 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panic. * CVE-2022...

RHSA-2023:1174: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.2 security and bug fix update

OpenShift API for Data Protection (OADP) 1.1.2 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panic. * CVE-2022...

Red Hat Security Advisory 2023-0727-01

Red Hat Security Advisory 2023-0727-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.12.3.

Red Hat Security Advisory 2023-0727-01

Red Hat Security Advisory 2023-0727-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.12.3.

Red Hat Security Advisory 2023-0727-01

Red Hat Security Advisory 2023-0727-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.12.3.

RHSA-2023:0727: Red Hat Security Advisory: OpenShift Container Platform 4.12.3 security update

Red Hat OpenShift Container Platform release 4.12.3 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks t...

Ubuntu Security Notice USN-5873-1

Ubuntu Security Notice 5873-1 - It was discovered that Go Text incorrectly handled certain encodings. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. It was discovered that Go Text incorrectly handled certain BCP 47 language tags. An attacker could possibly use this issue to cause a denial of service. CVE-2020-28851, CVE-2020-28852, and CVE-2021-38561 affected only Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.

Red Hat Security Advisory 2023-0709-01

Red Hat Security Advisory 2023-0709-01 - Version 1.27.0 of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.8, 4.9, 4.10, 4.11 and 4.12. This release includes security and bug fixes, and enhancements.

Red Hat Security Advisory 2023-0709-01

Red Hat Security Advisory 2023-0709-01 - Version 1.27.0 of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.8, 4.9, 4.10, 4.11 and 4.12. This release includes security and bug fixes, and enhancements.

Red Hat Security Advisory 2023-0709-01

Red Hat Security Advisory 2023-0709-01 - Version 1.27.0 of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.8, 4.9, 4.10, 4.11 and 4.12. This release includes security and bug fixes, and enhancements.

Red Hat Security Advisory 2023-0709-01

Red Hat Security Advisory 2023-0709-01 - Version 1.27.0 of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.8, 4.9, 4.10, 4.11 and 4.12. This release includes security and bug fixes, and enhancements.

Red Hat Security Advisory 2023-0693-01

Red Hat Security Advisory 2023-0693-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Issues addressed include a denial of service vulnerability.

RHSA-2023:0709: Red Hat Security Advisory: Release of OpenShift Serverless 1.27.0

Release of OpenShift Serverless 1.27.0 The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panic. * CVE-2022-2880: A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query para...

RHSA-2023:0709: Red Hat Security Advisory: Release of OpenShift Serverless 1.27.0

Release of OpenShift Serverless 1.27.0 The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panic. * CVE-2022-2880: A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query para...

RHSA-2023:0709: Red Hat Security Advisory: Release of OpenShift Serverless 1.27.0

Release of OpenShift Serverless 1.27.0 The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panic. * CVE-2022-2880: A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query para...

RHSA-2023:0709: Red Hat Security Advisory: Release of OpenShift Serverless 1.27.0

Release of OpenShift Serverless 1.27.0 The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panic. * CVE-2022-2880: A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query para...

RHSA-2023:0693: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.7 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.7 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-43138: A vulnerability was found in the async package. This flaw allows a malicious user to obtain privileges via the mapValues() method. * CVE-2022-2879: A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw a...

Red Hat Security Advisory 2023-0481-01

Red Hat Security Advisory 2023-0481-01 - Submariner enables direct networking between pods and services on different Kubernetes clusters that are either on-premises or in the cloud. This advisory contains bug fixes and enhancements to the Submariner container images.

RHSA-2023:0481: Red Hat Security Advisory: Submariner 0.12.3 - security update and bug fix

Submariner 0.12.3 packages that fix various bugs and add various enhancements that are now available for Red Hat Advanced Cluster Management for Kubernetes version 2.5. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32149: golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags

RHSA-2023:0446: Red Hat Security Advisory: go-toolset:rhel8 security and bug fix update

An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: golang: archive/tar: unbounded memory consumption when reading headers * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-41715: golang: regexp/syntax: limit memory used by parsing regexps

RHSA-2023:0446: Red Hat Security Advisory: go-toolset:rhel8 security and bug fix update

An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: golang: archive/tar: unbounded memory consumption when reading headers * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-41715: golang: regexp/syntax: limit memory used by parsing regexps

RHSA-2023:0328: Red Hat Security Advisory: go-toolset and golang security and bug fix update

An update for go-toolset and golang is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: golang: archive/tar: unbounded memory consumption when reading headers * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-41715: golang: regexp/syntax: limit memory used by parsing regexps

RHSA-2023:0328: Red Hat Security Advisory: go-toolset and golang security and bug fix update

An update for go-toolset and golang is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: golang: archive/tar: unbounded memory consumption when reading headers * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-41715: golang: regexp/syntax: limit memory used by parsing regexps

RHSA-2023:0328: Red Hat Security Advisory: go-toolset and golang security and bug fix update

An update for go-toolset and golang is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: golang: archive/tar: unbounded memory consumption when reading headers * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-41715: golang: regexp/syntax: limit memory used by parsing regexps

Red Hat Security Advisory 2022-7398-02

Red Hat Security Advisory 2022-7398-02 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.12.0. Issues addressed include a denial of service vulnerability.

RHSA-2022:7399: Red Hat Security Advisory: OpenShift Container Platform 4.12.0 bug fix and security update

Red Hat OpenShift Container Platform release 4.12.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-2879: golang: arc...

Red Hat Security Advisory 2022-8634-01

Red Hat Security Advisory 2022-8634-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes.

Red Hat Security Advisory 2022-8634-01

Red Hat Security Advisory 2022-8634-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes.

RHSA-2022:8634: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.1 security and bug fix update

OpenShift API for Data Protection (OADP) 1.1.1 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27191: golang: crash in a golang.org/x/crypto/ssh server * CVE-2022-27664: golang: net/http: handle server errors after sending GOAWAY * CVE-2022-30632: golang: path/filepath: stack exhaustion in Glob * CVE-2022-30635: golang: encoding/gob: stack exhaustion in Decoder.Decode * CVE-2022-32190: golang: net/url: JoinPath does not strip relative path components i...

Red Hat Security Advisory 2022-8535-01

Red Hat Security Advisory 2022-8535-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.16. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-7435-01

Red Hat Security Advisory 2022-7435-01 - An update is now available for Logging subsystem for Red Hat OpenShift 5.4. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-6882-01

Red Hat Security Advisory 2022-6882-01 - Openshift Logging 5.3.13 security and bug fix release.

RHSA-2022:6882: Red Hat Security Advisory: Openshift Logging 5.3.13 security and bug fix release

An update is now available for OpenShift Logging 5.3. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32149: golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags

Red Hat Security Advisory 2022-7407-01

Red Hat Security Advisory 2022-7407-01 - Service Binding Operator 1.3.1 is now available for OpenShift Developer Tools and Services for OCP 4.9 +.

RHSA-2022:7407: Red Hat Security Advisory: Service Binding Operator 1.3.1 security update

An update for service-binding-operator-bundle-container and service-binding-operator-container is now available for OpenShift Developer Tools and Services for OCP 4.9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32149: golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags

Red Hat Security Advisory 2022-7129-01

Red Hat Security Advisory 2022-7129-01 - Git Large File Storage replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server. Issues addressed include a denial of service vulnerability.

CVE-2022-41715: [security] Go 1.19.2 and Go 1.18.7 are released

Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.

CVE-2022-2880: net/http/httputil: ReverseProxy should not forward unparseable query parameters · Issue #54663 · golang/go

Requests forwarded by ReverseProxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After fix, ReverseProxy sanitizes the query parameters in the forwarded query when the outbound request's Form field is set after the ReverseProxy. Director function returns, indicating that the proxy has parsed the query parameters. Proxies which do not parse query parameters continue to forward the original query parameters unchanged.

CVE-2022-32149

An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.

CVE-2022-2879: archive/tar: unbounded memory consumption when reading headers · Issue #54853 · golang/go

Reader.Read does not set a limit on the maximum size of file headers. A maliciously crafted archive could cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panics. After fix, Reader.Read limits the maximum size of header blocks to 1 MiB.

CVE-2022-39278: Announcing Istio 1.13.9

Istio is an open platform-independent service mesh that provides traffic management, policy enforcement, and telemetry collection. Prior to versions 1.15.2, 1.14.5, and 1.13.9, the Istio control plane, istiod, is vulnerable to a request processing error, allowing a malicious attacker that sends a specially crafted or oversized message which results in the control plane crashing when the Kubernetes validating or mutating webhook service is exposed publicly. This endpoint is served over TLS port 15017, but does not require any authentication from the attacker. For simple installations, Istiod is typically only reachable from within the cluster, limiting the blast radius. However, for some deployments, especially external istiod topologies, this port is exposed over the public internet. Versions 1.15.2, 1.14.5, and 1.13.9 contain patches for this issue. There are no effective workarounds, beyond upgrading. This bug is due to an error in `regexp.Compile` in Go.

Gentoo Linux Security Advisory 202209-26

Gentoo Linux Security Advisory 202209-26 - Multiple vulnerabilities have been discovered in Go, the worst of which could result in denial of service. Versions less than 1.18.6 are affected.

Gentoo Linux Security Advisory 202209-26

Gentoo Linux Security Advisory 202209-26 - Multiple vulnerabilities have been discovered in Go, the worst of which could result in denial of service. Versions less than 1.18.6 are affected.

GHSA-phjr-8j92-w5v7: CRI-O incorrect handling of supplementary groups may lead to sensitive information disclosure

Incorrect handling of the supplementary groups in the CRI-O container engine might lead to sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.

CVE-2022-32190

JoinPath and URL.JoinPath do not remove ../ path elements appended to a relative path. For example, JoinPath("https://go.dev", "../go") returns the URL "https://go.dev/../go", despite the JoinPath documentation stating that ../ path elements are removed from the result.

CVE-2022-2990: Vulnerability in Linux containers – investigation and mitigation

An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.

CVE-2021-21285: Docker Engine release notes

In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in which pulling an intentionally malformed Docker image manifest crashes the dockerd daemon. Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing.

CVE-2021-21285: Docker Engine release notes

In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in which pulling an intentionally malformed Docker image manifest crashes the dockerd daemon. Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing.

CVE-2021-21285: Docker Engine release notes

In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in which pulling an intentionally malformed Docker image manifest crashes the dockerd daemon. Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing.

CVE-2021-21285: Docker Engine release notes

In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in which pulling an intentionally malformed Docker image manifest crashes the dockerd daemon. Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing.

CVE-2021-21285: Docker Engine release notes

In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in which pulling an intentionally malformed Docker image manifest crashes the dockerd daemon. Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing.

CVE-2020-11110: grafana/CHANGELOG.md at main · grafana/grafana

Grafana through 6.7.1 allows stored XSS due to insufficient input protection in the originalUrl field, which allows an attacker to inject JavaScript code that will be executed after clicking on Open Original Dashboard after visiting the snapshot.