Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:4093: Red Hat Security Advisory: OpenShift Container Platform 4.13.5 security update

Red Hat OpenShift Container Platform release 4.13.5 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2023-1260: An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions “update, patch” the “pods/ephemeralcontainers” subresource beyond what the default is. They would then need to create a new pod or patch one that they already have access to. This might allow evasion of SCC admission restrictions, thereby gaining control of a privileged pod.
  • CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.
  • CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service.
  • CVE-2023-24536: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by an issue during multipart form parsing. By sending a specially crafted input, a remote attacker can consume large amounts of CPU and memory, resulting in a denial of service.
  • CVE-2023-24537: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by an infinite loop due to integer overflow when calling any of the Parse functions. By sending a specially crafted input, a remote attacker can cause a denial of service.
  • CVE-2023-24538: A flaw was found in Golang Go. This flaw allows a remote attacker to execute arbitrary code on the system, caused by not properly considering backticks (`) as Javascript string delimiters. By sending a specially crafted request, an attacker execute arbitrary code on the system.
  • CVE-2023-24539: A flaw was found in golang where angle brackets (<>) were not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a ‘/’ character could result in the CSS context unexpectedly closing, allowing for the injection of unexpected HMTL if executed with untrusted input.
  • CVE-2023-27561: A flaw was found in runc. An attacker who controls the container image for two containers that share a volume can race volume mounts during container initialization by adding a symlink to the rootfs that points to a directory on the volume.
  • CVE-2023-29400: A flaw was found in golang. Templates containing actions in unquoted HTML attributes, for example, “attr={{.}}”) executed with empty input, could result in output that has unexpected results when parsed due to HTML normalization rules. This issue may allow the injection of arbitrary attributes into tags.
Red Hat Security Data
#vulnerability#web#linux#red_hat#dos#redis#git#java#kubernetes#perl#auth#ibm#rpm

Issued:

2023-07-20

Updated:

2023-07-20

RHSA-2023:4093 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: OpenShift Container Platform 4.13.5 security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Red Hat OpenShift Container Platform release 4.13.5 is now available with updates to packages and images that fix several bugs and add enhancements.

This release includes a security update for Red Hat OpenShift Container Platform 4.13.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Red Hat OpenShift Container Platform is Red Hat’s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.

This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.5. See the following advisory for the container images for this release:

https://access.redhat.com/errata/RHSA-2023:4091

Security Fix(es):

  • openshift: OCP & FIPS mode (CVE-2023-3089)
  • kube-apiserver: PrivEsc (CVE-2023-1260)
  • golang: net/http, net/textproto: denial of service from excessive memory allocation (CVE-2023-24534)
  • golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption (CVE-2023-24536)
  • golang: go/parser: Infinite loop in parsing (CVE-2023-24537)
  • golang: html/template: backticks not treated as string delimiters (CVE-2023-24538)
  • golang: html/template: improper sanitization of CSS values (CVE-2023-24539)
  • runc: volume mount race condition (regression of CVE-2019-19921) (CVE-2023-27561)
  • golang: html/template: improper handling of empty HTML attributes (CVE-2023-29400)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

All OpenShift Container Platform 4.13 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.13/updating/updating-cluster-cli.html

Affected Products

  • Red Hat OpenShift Container Platform 4.13 for RHEL 9 x86_64
  • Red Hat OpenShift Container Platform 4.13 for RHEL 8 x86_64
  • Red Hat OpenShift Container Platform for Power 4.13 for RHEL 9 ppc64le
  • Red Hat OpenShift Container Platform for Power 4.13 for RHEL 8 ppc64le
  • Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.13 for RHEL 9 s390x
  • Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.13 for RHEL 8 s390x
  • Red Hat OpenShift Container Platform for ARM 64 4.13 for RHEL 9 aarch64
  • Red Hat OpenShift Container Platform for ARM 64 4.13 for RHEL 8 aarch64

Fixes

  • BZ - 2175721 - CVE-2023-27561 runc: volume mount race condition (regression of CVE-2019-19921)
  • BZ - 2176267 - CVE-2023-1260 kube-apiserver: PrivEsc
  • BZ - 2184481 - CVE-2023-24538 golang: html/template: backticks not treated as string delimiters
  • BZ - 2184482 - CVE-2023-24536 golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption
  • BZ - 2184483 - CVE-2023-24534 golang: net/http, net/textproto: denial of service from excessive memory allocation
  • BZ - 2184484 - CVE-2023-24537 golang: go/parser: Infinite loop in parsing
  • BZ - 2196026 - CVE-2023-24539 golang: html/template: improper sanitization of CSS values
  • BZ - 2196029 - CVE-2023-29400 golang: html/template: improper handling of empty HTML attributes
  • BZ - 2212085 - CVE-2023-3089 openshift: OCP & FIPS mode

CVEs

  • CVE-2023-1260
  • CVE-2023-3089
  • CVE-2023-24534
  • CVE-2023-24536
  • CVE-2023-24537
  • CVE-2023-24538
  • CVE-2023-24539
  • CVE-2023-27561
  • CVE-2023-29400

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://access.redhat.com/security/vulnerabilities/RHSB-2023-001
  • https://docs.openshift.com/container-platform/4.13/release_notes/ocp-4-13-release-notes.html

Red Hat OpenShift Container Platform 4.13 for RHEL 9

SRPM

cri-o-1.26.3-11.rhaos4.13.git78941bf.el9.src.rpm

SHA-256: 6b9291ff99a224ae3b1d4f14eece6300423a934c7360e1dc221e95b000bab612

kernel-5.14.0-284.23.1.el9_2.src.rpm

SHA-256: 662b3173d17c1d51ada1b52fc633cea548bf6cf92061a3a36c86e1870b369ce2

kernel-rt-5.14.0-284.23.1.rt14.308.el9_2.src.rpm

SHA-256: d2a8842936c540f24364b8ceb669d763c8a3fd71d9d7aa1de7d7bf00a31c7d94

openshift-4.13.0-202307132344.p0.gf245ced.assembly.stream.el9.src.rpm

SHA-256: f0e5b4db42116d4065b9962d143b3fd0a69401ec05b8abaafe6bca400da8a655

openshift-ansible-4.13.0-202306230038.p0.g148be47.assembly.stream.el9.src.rpm

SHA-256: 722567d142c01d81544af61fd50501b98abf6a566d4d840f043a268c9dc0536d

openshift-clients-4.13.0-202306230038.p0.ge4c9a6a.assembly.stream.el9.src.rpm

SHA-256: 98d4fd7bcc068208270ab707be3bea3c5b0167bc110d441696d39180f45db444

openstack-ironic-21.3.1-0.20230706125653.c8f8157.el9.src.rpm

SHA-256: aafe441250f62e20c13224d4a42e855e4bc280eae3104957b9f63c071e9aefcb

openvswitch3.1-3.1.0-32.el9fdp.src.rpm

SHA-256: 3dde9dc9eb6715b302b189c4a4c4d073f56664cf41d991e7d0eb9f82ab24a907

ovn23.06-23.06.0-13.el9fdp.src.rpm

SHA-256: 69f0229fb4861e416db73c021506ecfbf6e9b4b4e24eb31681d3303b7a5f10a3

x86_64

bpftool-7.0.0-284.23.1.el9_2.x86_64.rpm

SHA-256: 52bf39472e46829d5375dd81f66bf5fce01422c145ddda668e6000ce9b582028

bpftool-debuginfo-7.0.0-284.23.1.el9_2.x86_64.rpm

SHA-256: 66664b14780518d3ae5a4fd9f88700cc202c93e0b3f4de6e357676d4ba72b796

cri-o-1.26.3-11.rhaos4.13.git78941bf.el9.x86_64.rpm

SHA-256: ec999df70f3cbd003bad4b60586740010e9ad4916789a56995bc85a12fa53504

cri-o-debuginfo-1.26.3-11.rhaos4.13.git78941bf.el9.x86_64.rpm

SHA-256: 3eb3b10a893dac44683e06c42db954e6fff98ed46e335879ba8a247c54e6c73a

cri-o-debugsource-1.26.3-11.rhaos4.13.git78941bf.el9.x86_64.rpm

SHA-256: ca1b5d8a7233661597562eb12b24a75d5f1673a02ef1994358c1bb798b4be159

kernel-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: 69f0d9df3627c62ddac5cde8a8f4b6acf27327dff6969721dbf8d5eb7597d604

kernel-abi-stablelists-5.14.0-284.23.1.el9_2.noarch.rpm

SHA-256: 4bae4c54c85b17ac3b50ae517a73bee1f546a6718d21e1623100834b81e26ffc

kernel-core-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: 23ad05db3241e4822239c9c84adca79db9fabad54a86292032e54a6c4f748740

kernel-cross-headers-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: 3108deef939cad2981bb66f2c7204a7b4b83747f5584d5ab931e7a50bf010a57

kernel-debug-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: 278e9fea0709a6b7366012439d5039e4d8403d935eae755ded07cd5d9eabfff2

kernel-debug-core-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: 494c40198400f287d0ab7934a7b3f3520ec7f0f532ab7f0e03b0baf372f5c562

kernel-debug-debuginfo-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: b91f41eaefaf8c11f9bacb6d742b72e086c436f1437ca861c095c85c97e3b47d

kernel-debug-devel-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: 07a4e1e831dd2a8154d3c31a73fa8d467a57934aa8bcda945961c3f4e5a204d7

kernel-debug-devel-matched-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: 9cb5ea56951c21ef664c428729fb89c1a15208995b8f0931050ce6af2a67db94

kernel-debug-modules-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: 79491f3ba0594b041d6cf5b4f4ddc33adf1ff9c81fa69576da1d6a8d7d81e9f0

kernel-debug-modules-core-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: b1b70d5ba8e5ed36bb75b06bd5fe75945dc27c2e991390ace28137e685110318

kernel-debug-modules-extra-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: a8be983f8caa3fa06beb70ff5ee498c3afcd9af5222eb59aa69710107b16eb46

kernel-debug-modules-internal-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: 08ebab52376c104c904b7fd45e7e617eca6436345bddcd506516d09d38c58964

kernel-debug-modules-partner-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: 1616e5146e0b6205947d849f84d3d8966eb407fd9a5b83c572e97da7856ff9ee

kernel-debug-uki-virt-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: 5761aa6efc67d86e44c855a44dfe113a7237188b79a3770a6862549d2d646aa9

kernel-debuginfo-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: 5a5c6c50f15383b41d7acf28959a47391bd8539b426627fcb68a1e117415df1e

kernel-debuginfo-common-x86_64-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: ef98aef3215ba87ae17937b2c1fd476cd1ecb27d9fca7eb5fd6a767d6b9bfea8

kernel-devel-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: 251f069162b0321a91c4d09275cb5cea6bd563e99491d1841ddbd7a293305a88

kernel-devel-matched-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: b8a4ccf28c5c9cb24f90a974338c81ce8a3989eaad133b4f0797fbdeda3f812c

kernel-doc-5.14.0-284.23.1.el9_2.noarch.rpm

SHA-256: b6c32230d547d7d2bb6086319b936453080a4f4eaef12983d783eefad9c4b526

kernel-headers-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: 3913942345f01ddf90e17f36e43d884e3a725da4687dfb39289e8077b5d90d93

kernel-ipaclones-internal-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: 9563118dcde02a0bcfcb566a9717ba9bcdd4b04da81f4df77b70e9a74bca7109

kernel-modules-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: 4bee2686614430d1b9530238fc5502d51615b275113bb40fa6c7977280dfa4dc

kernel-modules-core-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: 6e342661a73614a0a9a0c25519d16c1deb5d8e3b03f912e90cfa64e8a36717d4

kernel-modules-extra-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: c5bcb111f9d7a430b7a6c43f9c18a00a406d47bcbaf35009bb83a3e8d59ad17c

kernel-modules-internal-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: 0346be3784377c152ef312348e927609a550344f13849577da7ab1090cf29f20

kernel-modules-partner-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: d75cb47ffa4fc88823ddf916351aecddae7ecfa3e5d6353b51e8f92fae880d7c

kernel-rt-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm

SHA-256: f4d75d062d807726ed614ccbaa1d011073bc4d5637f6cefeb328dc914c2a1255

kernel-rt-core-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm

SHA-256: 7fcd837724e43c76c7dd3ef7e8a76c3e7f1f4132c2fcca77c74332da9c7cc9e2

kernel-rt-debug-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm

SHA-256: db081a70b30e79b1863081b0adc989d1a8f1e635a7a09fca4f32ffa87ae13004

kernel-rt-debug-core-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm

SHA-256: 2f70379054c0f64fed6bd1c27865e306785bcff8de2c0a2113ea36f7609ae8c2

kernel-rt-debug-debuginfo-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm

SHA-256: f530bf0cee33a4d145860668f63e516e33350606a0305eb978110abc4d389739

kernel-rt-debug-devel-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm

SHA-256: c4a50af8e0ca407314a5b1adf8a478e26e161abac8c75903fd974cdd63007048

kernel-rt-debug-devel-matched-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm

SHA-256: 61f70fc204385a2823fae59e84fe15578bcaee47c264628c695e3925ae537cf1

kernel-rt-debug-kvm-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm

SHA-256: fb5b32a6ab9b6b4fc039c8ebc7e929eeef3a6d86cce106877372425b8be148dc

kernel-rt-debug-modules-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm

SHA-256: 7663eea5810771debd62bef000d84086f2656df479ff57bf2fc16de1ce6a49b0

kernel-rt-debug-modules-core-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm

SHA-256: a9066152cede0d3b5c866f4f0c5937ac7e330c7ec99ca5332ff524f94f282495

kernel-rt-debug-modules-extra-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm

SHA-256: 1006cb0d0b339c01acca5d59f0594793b8516c6aba033e614d1ab301e1a6f070

kernel-rt-debug-modules-internal-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm

SHA-256: 6988c9a88b2eb7caf40c9c04bb0991597325e9d197a93cb755d06d5bdc6dbd35

kernel-rt-debug-modules-partner-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm

SHA-256: 9388cfd68cf77eb89fad4afa49595dc1dcfa8f2f7a95819be9a9bdc7666a6517

kernel-rt-debuginfo-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm

SHA-256: bca9e8795a3fe3ccd891f37510859e9fef0b4a3d65bb9bdf2f9fcee31cb7e941

kernel-rt-debuginfo-common-x86_64-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm

SHA-256: af46d8a098307a4beb4439607c26078d223242f32d347660f548d016613c4f86

kernel-rt-devel-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm

SHA-256: 1d08aef56072703a7038142a3c8288e5825432e869652f12d251e2671d121758

kernel-rt-devel-matched-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm

SHA-256: 1cb71e27235d84d0495271e79e7fb3afcebf7cc51cf37e766f9b2c8d86d06163

kernel-rt-kvm-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm

SHA-256: c7cf7de50a2a0c58892637d7e178590c33237bc8fe9228883be5320022c3e34b

kernel-rt-modules-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm

SHA-256: a0050d35c10aaba4d75d5bdd6071a7b7ee23cb80fdcbd7e171f8c358fd836994

kernel-rt-modules-core-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm

SHA-256: 7966bf886dcbfbf2fbd2f61a9b6af437f6b39101b242541710882521b1d9e375

kernel-rt-modules-extra-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm

SHA-256: f8e9fc85cefb851c4e838c2c7b45794129c8f52cd649d5a64ae6355e3c2a5cec

kernel-rt-modules-internal-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm

SHA-256: 63fbeb3f6e251049d505bf1228afd8312432aecb9783088ab30a17d615dce6b3

kernel-rt-modules-partner-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm

SHA-256: cd7327e15fd06307b710fed1d3e9655031dc61c003186402b46273b81502fa8f

kernel-rt-selftests-internal-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm

SHA-256: 4c196207864e538f873b88edcd3ff46e0b83611d35e4f0185fccbee2bd7923e3

kernel-selftests-internal-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: d8577c07f17e216c33d8f9c58219e36794eb7c547f378f718aeeaeb5c061f1a6

kernel-tools-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: a917adb6bf9b5dc8aa898728f3aaebdaa5dfc16a9a5d1578042ac07131de9038

kernel-tools-debuginfo-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: eaceac11dab4ee2a4a3b584ff0b08f99f36750fd2d7c590f3b0ba4b6ab808513

kernel-tools-libs-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: b7e0cfd068c24cd11fe8e4c5416c580927796293f683150eb5390e1032de2369

kernel-tools-libs-devel-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: 1b9cf3ef589ca1b53c5e34856a82439d07aa7896db53d241b7bac7666cb1dc47

kernel-uki-virt-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: e797f1ab3181f1631cd9e1492a874bef83b702da3ef6861b4054daeec9c6304e

openshift-ansible-4.13.0-202306230038.p0.g148be47.assembly.stream.el9.noarch.rpm

SHA-256: c2386a66a2f7f73007b38ff4076c5edbbb937bf7e7fafda615e2a503bed41c50

openshift-ansible-test-4.13.0-202306230038.p0.g148be47.assembly.stream.el9.noarch.rpm

SHA-256: c23193e850719e68e5e4e58c2c8ded48e61332a67c138e397fedbd274a1fdd84

openshift-clients-4.13.0-202306230038.p0.ge4c9a6a.assembly.stream.el9.x86_64.rpm

SHA-256: af67d50a7574bd02c5d72725de4ebfaeb2ff8bca0bb4ca2f41b365174ae4f362

openshift-clients-redistributable-4.13.0-202306230038.p0.ge4c9a6a.assembly.stream.el9.x86_64.rpm

SHA-256: de1e93cf6f0cae3509c333570af9fb20642462480107254f0e05ff164eb3539b

openshift-hyperkube-4.13.0-202307132344.p0.gf245ced.assembly.stream.el9.x86_64.rpm

SHA-256: ffb8d46cbfe4325d7f6e9e92322ae463f699f23f96a23ed7a129bd29b572d615

openstack-ironic-21.3.1-0.20230706125653.c8f8157.el9.noarch.rpm

SHA-256: 033d451c083d6c33eff601b499397f5a948307bc35f685a9a89eedf8ef7f3440

openstack-ironic-api-21.3.1-0.20230706125653.c8f8157.el9.noarch.rpm

SHA-256: 89ae8726da3753018d76ab2d91e7e881a0936b79e6733b3f708673dc3978d833

openstack-ironic-common-21.3.1-0.20230706125653.c8f8157.el9.noarch.rpm

SHA-256: 5ca83203fe0738c304c40d1db5b3ed23d36ae995d03960b68af151fd08c73869

openstack-ironic-conductor-21.3.1-0.20230706125653.c8f8157.el9.noarch.rpm

SHA-256: 2192042fe09f68f2b4036c5759047833555d0124840fb0da864e2751f79cfdad

openstack-ironic-dnsmasq-tftp-server-21.3.1-0.20230706125653.c8f8157.el9.noarch.rpm

SHA-256: 9df923124edae8a4e4f3e53ff64c7cba7cdc30b59e73e0c891b2f471dde838b5

openvswitch3.1-3.1.0-32.el9fdp.x86_64.rpm

SHA-256: 2b1f468e0300b5fe8e90d7eb27a05cae9b1a9406b669841be8265f6bf6e85f22

openvswitch3.1-debuginfo-3.1.0-32.el9fdp.x86_64.rpm

SHA-256: 7949990f6c41a38ccddb72dc3ec6526bf799ce2acb07f33b226a4a4d26cdca31

openvswitch3.1-debugsource-3.1.0-32.el9fdp.x86_64.rpm

SHA-256: d8c6225119152dc27815865b854ca960637c74f7e10708765e00b6c1bd0a14f0

openvswitch3.1-devel-3.1.0-32.el9fdp.x86_64.rpm

SHA-256: b41b502208f95e0909c7ddf61dea0a082b7f733c393cea277565f65c87d5855c

openvswitch3.1-ipsec-3.1.0-32.el9fdp.x86_64.rpm

SHA-256: 0d8c17ebf05fbcb641f7a02516b4b7e3058da0eb6be7b6ce08599e3e3a077532

openvswitch3.1-test-3.1.0-32.el9fdp.noarch.rpm

SHA-256: 51773c83943c0ff846a8bc79024231205069b5d3dacd58485e22f17cc2e9d9d7

ovn23.06-23.06.0-13.el9fdp.x86_64.rpm

SHA-256: f07cbe62dfb1cb49ba6524e170684a16450e9b50099734d2b42574b51f0b3cb8

ovn23.06-central-23.06.0-13.el9fdp.x86_64.rpm

SHA-256: fb13d4a79a2ebc280a058bebd202e6adf314d18f907b6e6b1b9af96d68a40afc

ovn23.06-central-debuginfo-23.06.0-13.el9fdp.x86_64.rpm

SHA-256: 891eced1439f0726d02fea7a60b3be9b9d6604301e4bb26828c54ee03896cd53

ovn23.06-debuginfo-23.06.0-13.el9fdp.x86_64.rpm

SHA-256: 8501a65a77e0f2fd9e4b2c5a818da4c538a24e93a2300337e9d8becec66754a5

ovn23.06-debugsource-23.06.0-13.el9fdp.x86_64.rpm

SHA-256: c766ec09f8f4b5c306fd33d19c44ea2b8a20bbaf5970d7cb540293500c33e98a

ovn23.06-host-23.06.0-13.el9fdp.x86_64.rpm

SHA-256: 2edb9f77443a735614959719be9cbc51600cb6e1f6cd21fb620ecf7367362f44

ovn23.06-host-debuginfo-23.06.0-13.el9fdp.x86_64.rpm

SHA-256: 9607fad4b41f1ba29d36e641f42666e900d8a25f5a90f61238bed202f8234773

ovn23.06-vtep-23.06.0-13.el9fdp.x86_64.rpm

SHA-256: 0420cecf4425aa5a534ed9fabc9428fb56966f3e9c6e721bd68b588877fcdb90

ovn23.06-vtep-debuginfo-23.06.0-13.el9fdp.x86_64.rpm

SHA-256: 1096c462792ecdb1531f05bf912debdbe4cd880bfe27d884cc6de616a96ec092

perf-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: 73d68eada78b0490ad661fc60ce4f546aa49ee41d1d0fcfc075db9157ce73c6e

perf-debuginfo-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: 21e5dd5abb3808deea3cf5a349b614e123e8252685ba67af7e6b664ab5e0bb83

python3-ironic-tests-21.3.1-0.20230706125653.c8f8157.el9.noarch.rpm

SHA-256: 878619a3f73c1037ac2a3fc4cd80b457b9b0460ef397e1d73729c5f3a6aac49f

python3-openvswitch3.1-3.1.0-32.el9fdp.x86_64.rpm

SHA-256: 545b5f78c4c7112313f7d749169279c628e6bbfe1a04b75f5d92d1ddb3d7b14a

python3-openvswitch3.1-debuginfo-3.1.0-32.el9fdp.x86_64.rpm

SHA-256: c99eef848fbf397bf15d2d59903fc15cc0941a0cc272fda629d5d91e9fec5991

python3-perf-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: 8a5298a9d198901a8e266ae02d999a705c9d04794ef64f0afe754616a9fb783b

python3-perf-debuginfo-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: 7ea5b63ef8bd9769bd218b0d4a9790f72aa9562cefbd66cb30604d04da140fd4

rtla-5.14.0-284.23.1.el9_2.x86_64.rpm

SHA-256: 728a3ca53be5985157f705d60bf13770cf3bbc49678d2cf4f79edf62bcd6a4bc

Red Hat OpenShift Container Platform 4.13 for RHEL 8

SRPM

container-selinux-2.215.0-1.rhaos4.13.el8.src.rpm

SHA-256: 594ba8e6906201b5f714929a3f040773f40f29ff169f2bad79bcce9b496b5917

containernetworking-plugins-1.0.1-8.rhaos4.13.el8.src.rpm

SHA-256: d34ce73f9b093c526bfead60212476c21185208c37344116ed6fa3131b5ba46a

cri-o-1.26.3-10.rhaos4.13.git78941bf.el8.src.rpm

SHA-256: 225d87e3bf7d6c0b4754be6c56340e01ebdc2e93a072f81c57f9f1eb7bcb93f6

nmstate-2.2.12-1.rhaos4.13.el8.src.rpm

SHA-256: a74d02f73a1b5379e2dcc76b95574582e876c53c075298058600d2ad7b6a566f

openshift-4.13.0-202307132344.p0.gf245ced.assembly.stream.el8.src.rpm

SHA-256: eba7dd8dd605ed9ba5a9f3170a30d907f1b0af5486de96aa982169ae0f399de6

openshift-ansible-4.13.0-202306230038.p0.g148be47.assembly.stream.el8.src.rpm

SHA-256: 62a575b3af4c8732efe0195955f39e47fdf61697d69471a89f0046edbfa34e22

openshift-clients-4.13.0-202306230038.p0.ge4c9a6a.assembly.stream.el8.src.rpm

SHA-256: 9fc053a2181b10fe9df59548b730a7b463ad202363e3599f2a7a315eb8242cc4

openshift-kuryr-4.13.0-202306281017.p0.g5baee73.assembly.stream.el8.src.rpm

SHA-256: 37f155efc7dc2fc9ebf370db62ce2f8b33d57159d7da2a9f120bd2e57b821ce0

openshift4-aws-iso-4.13.0-202306230038.p0.gd2acdd5.assembly.stream.el8.src.rpm

SHA-256: b4d222a596704be1cfe966a3fa25156d73a12dd30e607e23fb0d1433f4e4add5

x86_64

container-selinux-2.215.0-1.rhaos4.13.el8.noarch.rpm

SHA-256: b41ef03236e411cc5892f09c6027f583f8852151ef6c9813e059043dd91e1528

containernetworking-plugins-1.0.1-8.rhaos4.13.el8.x86_64.rpm

SHA-256: df69cb3030d0c77d5a6136f596087dc9a90dd9c7578ab95f791ec83a9295463b

containernetworking-plugins-debuginfo-1.0.1-8.rhaos4.13.el8.x86_64.rpm

SHA-256: 81c7f306640c7fa90b72601ff09e242d6b44fef14b0e0d4de01fbe3c563ed3a9

containernetworking-plugins-debugsource-1.0.1-8.rhaos4.13.el8.x86_64.rpm

SHA-256: 413894e8cab72aca4908f0dec0fcbebc0433affb0a4a05072c7287cbd0775247

cri-o-1.26.3-10.rhaos4.13.git78941bf.el8.x86_64.rpm

SHA-256: 7a3e9fcaadd5fc9202d4868e8236bdb71246841b5cbfa2231d35dad71914b222

cri-o-debuginfo-1.26.3-10.rhaos4.13.git78941bf.el8.x86_64.rpm

SHA-256: 99da7cfe9282b0f9b03daa5dec3b4c8d96780a31d7a6f93c1c60f3d2801e52c6

cri-o-debugsource-1.26.3-10.rhaos4.13.git78941bf.el8.x86_64.rpm

SHA-256: 5eec1bf47eeadc533f91276e812d6cad83c2255c0f405338fde04f80affc4409

nmstate-2.2.12-1.rhaos4.13.el8.x86_64.rpm

SHA-256: f1fa88673f19e57c219291089fc624cbaa65ad0dfacb96936402218646c4b5d9

nmstate-debuginfo-2.2.12-1.rhaos4.13.el8.x86_64.rpm

SHA-256: 565cbc057a3aafe4b47ec22890dc4e9c370be3c1e36d3834bdbf7d62d9293fe8

nmstate-debugsource-2.2.12-1.rhaos4.13.el8.x86_64.rpm

SHA-256: be7fd97730c9c5b188f5e1fc38ad5b69f16d54fbe981dda2bbdafcd1d016041f

nmstate-devel-2.2.12-1.rhaos4.13.el8.x86_64.rpm

SHA-256: c4c830743ea493990969208c060ac72348505000c84044fc9b45c46390b8f7ec

nmstate-libs-2.2.12-1.rhaos4.13.el8.x86_64.rpm

SHA-256: a9bfb199f9219356be0810f78619a416a5f1015c2dd8dc7d2ecf267cb02ed685

nmstate-libs-debuginfo-2.2.12-1.rhaos4.13.el8.x86_64.rpm

SHA-256: 359c9c05d44dd9b526d44b3c8bcd3d36317266131090f5fd8d32a504513b5f49

openshift-ansible-4.13.0-202306230038.p0.g148be47.assembly.stream.el8.noarch.rpm

SHA-256: 0f15f5a57bee6a3994ac5f10b1654ee84b041b5b04b7e153f928bd988bf2f99d

openshift-ansible-test-4.13.0-202306230038.p0.g148be47.assembly.stream.el8.noarch.rpm

SHA-256: 57bb0ce1c0eabad01a7fff2e7a213582a2ae923063277bbd9ca343d1773afba6

openshift-clients-4.13.0-202306230038.p0.ge4c9a6a.assembly.stream.el8.x86_64.rpm

SHA-256: de75b5e3b79bd1818f4b8cb4192b2a87ead256c817cf976c3ec4a2c3d207e79b

openshift-clients-redistributable-4.13.0-202306230038.p0.ge4c9a6a.assembly.stream.el8.x86_64.rpm

SHA-256: d8c22405dcad1bf8865730f22e399c69f2ac9700ab751ea2fbd8ffb6200a791d

openshift-hyperkube-4.13.0-202307132344.p0.gf245ced.assembly.stream.el8.x86_64.rpm

SHA-256: 48de49cbdce3fed9b6e036dfbcd4cc4f80d6059ac43a99cb240662cbf737ac1a

openshift-kuryr-cni-4.13.0-202306281017.p0.g5baee73.assembly.stream.el8.noarch.rpm

SHA-256: 1fb1d3fbd99bfd34dd377b3f3e2c601d99e803e85eb01759196ef8b393eb39a3

openshift-kuryr-common-4.13.0-202306281017.p0.g5baee73.assembly.stream.el8.noarch.rpm

SHA-256: bbe015f77db809c02d17301d40421b30e9188b1ae60d8fc3367a55f5a3812532

openshift-kuryr-controller-4.13.0-202306281017.p0.g5baee73.assembly.stream.el8.noarch.rpm

SHA-256: 28049ee509a6da23d01f469680d4e71cf0bac281ca242dc44f44f3e648f902a3

openshift4-aws-iso-4.13.0-202306230038.p0.gd2acdd5.assembly.stream.el8.noarch.rpm

SHA-256: 0e5e75d41e37090beea73a11a1779eff4327c26f69f6a1b4f36a0a6f0dc8fa95

python3-kuryr-kubernetes-4.13.0-202306281017.p0.g5baee73.assembly.stream.el8.noarch.rpm

SHA-256: afe76a9acdad7676ee98c8e25a58743e5b0553e9f4888f6083207ab8d6e99a5d

Red Hat OpenShift Container Platform for Power 4.13 for RHEL 9

SRPM

cri-o-1.26.3-11.rhaos4.13.git78941bf.el9.src.rpm

SHA-256: 6b9291ff99a224ae3b1d4f14eece6300423a934c7360e1dc221e95b000bab612

kernel-5.14.0-284.23.1.el9_2.src.rpm

SHA-256: 662b3173d17c1d51ada1b52fc633cea548bf6cf92061a3a36c86e1870b369ce2

openshift-4.13.0-202307132344.p0.gf245ced.assembly.stream.el9.src.rpm

SHA-256: f0e5b4db42116d4065b9962d143b3fd0a69401ec05b8abaafe6bca400da8a655

openshift-ansible-4.13.0-202306230038.p0.g148be47.assembly.stream.el9.src.rpm

SHA-256: 722567d142c01d81544af61fd50501b98abf6a566d4d840f043a268c9dc0536d

openshift-clients-4.13.0-202306230038.p0.ge4c9a6a.assembly.stream.el9.src.rpm

SHA-256: 98d4fd7bcc068208270ab707be3bea3c5b0167bc110d441696d39180f45db444

openstack-ironic-21.3.1-0.20230706125653.c8f8157.el9.src.rpm

SHA-256: aafe441250f62e20c13224d4a42e855e4bc280eae3104957b9f63c071e9aefcb

openvswitch3.1-3.1.0-32.el9fdp.src.rpm

SHA-256: 3dde9dc9eb6715b302b189c4a4c4d073f56664cf41d991e7d0eb9f82ab24a907

ovn23.06-23.06.0-13.el9fdp.src.rpm

SHA-256: 69f0229fb4861e416db73c021506ecfbf6e9b4b4e24eb31681d3303b7a5f10a3

ppc64le

bpftool-7.0.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: df7c62b1e12a1e3400b3205022e4f02b88b0511a071e41698148b07c2703c555

bpftool-debuginfo-7.0.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: da102f9ffb26be77cb3719beca7a073371338209f2155b855a7a50d5bf61f159

cri-o-1.26.3-11.rhaos4.13.git78941bf.el9.ppc64le.rpm

SHA-256: e99ea2eb2bd54418e444a3af7618794a5481c5e04576fca008165c73d38e69c7

cri-o-debuginfo-1.26.3-11.rhaos4.13.git78941bf.el9.ppc64le.rpm

SHA-256: 74f35fb0d8e866d47ce3bfc7af5a25110cd9f2d6897bff9c6720488e9fdeb296

cri-o-debugsource-1.26.3-11.rhaos4.13.git78941bf.el9.ppc64le.rpm

SHA-256: 82f3a0c2e73489cd125fce178e9cd783928b9310ef47f2c72f7f92c1788cf88f

kernel-5.14.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: aa8b3eadc19b8c7ba6c327389fb809e73d60dca6b6ba2521c6ec548490feb8c1

kernel-abi-stablelists-5.14.0-284.23.1.el9_2.noarch.rpm

SHA-256: 4bae4c54c85b17ac3b50ae517a73bee1f546a6718d21e1623100834b81e26ffc

kernel-core-5.14.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: 2f6239bcd2daa8334909f3e7fb7fc3f0efc9c79ccc21d13805f6ee8cb61347ee

kernel-cross-headers-5.14.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: 97898ab26ea38549a712d14b6a7b05d5267a836e37acb36dcaceada792ee1114

kernel-debug-5.14.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: ed5a4e9e2dde2607620bb0b0e14443f1caff4d52f53090e0f2d54cff28e534c7

kernel-debug-core-5.14.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: c28ff3ca85cfa2d2a12a88e7c273f75482d9dc15151c57821bcc84bb89d2dfb7

kernel-debug-debuginfo-5.14.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: 2114acef8162b4a6f9f250642a963427e701789b31ca2509f6a3e7acd9239801

kernel-debug-devel-5.14.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: 726dbd4acbfb47642954573a66eb73b621ce1f843a325fc0ef07328ba454c842

kernel-debug-devel-matched-5.14.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: 37a5b42a2c0ddbc4957f88a532fb8bff7999e3d819571cf5fddb7529a569a18a

kernel-debug-modules-5.14.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: 1ae0f7b0ee260a5cb4bd5c5728e18f0e400cbf6f12bb9971719e3404b50709ba

kernel-debug-modules-core-5.14.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: 5e9ac37a4eb907c0d6121faad85e0902cc41b011e0be7630124021c13cd6b340

kernel-debug-modules-extra-5.14.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: ea68c5b356f831255cc14dd0461acd3c87d31124783e2febea2aa265b4f03f0a

kernel-debug-modules-internal-5.14.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: 979befed9cff4797bde48ef687e8485928309b431019aa8c1c33d30242f8d19b

kernel-debug-modules-partner-5.14.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: e1e1f7961768a473b9796e2cc5fc6b673c3736700087686cac741d7e21ea01a4

kernel-debuginfo-5.14.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: 24e98d52e555429d0ec9ada25a5b6b01f08234ff27669c1a9bf414f3cb1d7501

kernel-debuginfo-common-ppc64le-5.14.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: 69991a04107218e161a78ee472b54aecb93ee5020b17168c62cada12cee1fa44

kernel-devel-5.14.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: e57bad8f850aabe1d8a2ffd0023ade2ddc4665e5d49bd77be052b66072fb4bab

kernel-devel-matched-5.14.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: 21f7588944ad9ffe48cf11a69d275b89983fcf71320a4d9feea07762144481c3

kernel-doc-5.14.0-284.23.1.el9_2.noarch.rpm

SHA-256: b6c32230d547d7d2bb6086319b936453080a4f4eaef12983d783eefad9c4b526

kernel-headers-5.14.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: ddbe2ef34b3def3ee23d1102e5dd7c839867572c92ecd86e6b9e74630b7accf2

kernel-ipaclones-internal-5.14.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: dfc747ecb7924fdb173944633942a6748bddf016b1755a6176d61d946c8a5419

kernel-modules-5.14.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: 9208416516df6ff6169fb738cd9475be14518edc098e6205ca57380029cf35d4

kernel-modules-core-5.14.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: b6182d87bea3a5b61bb821b3ec1bbd34e40c94ab4a2b0ad328843c64f0a6c013

kernel-modules-extra-5.14.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: f643fd91f8c8740b9957b47fdc67812e4dd904914df16015935430c362881bb2

kernel-modules-internal-5.14.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: 5396eacdb516c8bb9fc7169b64c4701a7aa222b32d65fac973a02f7e9f57d80b

kernel-modules-partner-5.14.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: 773ed69715bb1164e7b68283b86981921d795a5285df344c676c6276a46e787d

kernel-selftests-internal-5.14.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: e171abf06ed823f72c2fedd952b3673998ae78411639a574359425e97931e5f0

kernel-tools-5.14.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: 10e107a3be7a15c8f5fc908d873f857e74d19427b3859b04a2c3b06576758df6

kernel-tools-debuginfo-5.14.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: 16517cf874dd0830cbb7e45d61fb8dc12b6ff0934bae4ec8983dbba92eb4aae2

kernel-tools-libs-5.14.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: 4a587c7bb374bb78eec25802df4e612c42385161fbf7256dbb216ae79fa784ad

kernel-tools-libs-devel-5.14.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: d09540190fbac8e684ec3f5fb7602336517ac493f2b4e88a1a7e46332a43b357

openshift-ansible-4.13.0-202306230038.p0.g148be47.assembly.stream.el9.noarch.rpm

SHA-256: c2386a66a2f7f73007b38ff4076c5edbbb937bf7e7fafda615e2a503bed41c50

openshift-ansible-test-4.13.0-202306230038.p0.g148be47.assembly.stream.el9.noarch.rpm

SHA-256: c23193e850719e68e5e4e58c2c8ded48e61332a67c138e397fedbd274a1fdd84

openshift-clients-4.13.0-202306230038.p0.ge4c9a6a.assembly.stream.el9.ppc64le.rpm

SHA-256: e5e16a6fccaf05e680779493a8da7149ae1d1c9f677c627dbf9795ca02659b35

openshift-hyperkube-4.13.0-202307132344.p0.gf245ced.assembly.stream.el9.ppc64le.rpm

SHA-256: 05295c92b64eabb2f6338689e16241c6d2d7b82b217d6ac0019c931ec1ed805c

openstack-ironic-21.3.1-0.20230706125653.c8f8157.el9.noarch.rpm

SHA-256: 033d451c083d6c33eff601b499397f5a948307bc35f685a9a89eedf8ef7f3440

openstack-ironic-api-21.3.1-0.20230706125653.c8f8157.el9.noarch.rpm

SHA-256: 89ae8726da3753018d76ab2d91e7e881a0936b79e6733b3f708673dc3978d833

openstack-ironic-common-21.3.1-0.20230706125653.c8f8157.el9.noarch.rpm

SHA-256: 5ca83203fe0738c304c40d1db5b3ed23d36ae995d03960b68af151fd08c73869

openstack-ironic-conductor-21.3.1-0.20230706125653.c8f8157.el9.noarch.rpm

SHA-256: 2192042fe09f68f2b4036c5759047833555d0124840fb0da864e2751f79cfdad

openstack-ironic-dnsmasq-tftp-server-21.3.1-0.20230706125653.c8f8157.el9.noarch.rpm

SHA-256: 9df923124edae8a4e4f3e53ff64c7cba7cdc30b59e73e0c891b2f471dde838b5

openvswitch3.1-3.1.0-32.el9fdp.ppc64le.rpm

SHA-256: fc0f75a230927323ae589b2c8d42887010a9a8a89855a7bc5c980621f2f0cd63

openvswitch3.1-debuginfo-3.1.0-32.el9fdp.ppc64le.rpm

SHA-256: 0f3f2f9528817c640b048f2cb01d5af6d80ecc0d48cf501cac56b1bcb46c2f64

openvswitch3.1-debugsource-3.1.0-32.el9fdp.ppc64le.rpm

SHA-256: 90d649877880cc8478a3e02303e3576783cd56e970b7eee0797fc2a4ddab7450

openvswitch3.1-devel-3.1.0-32.el9fdp.ppc64le.rpm

SHA-256: 4e5d9a4bd3d5715d46c8556c6e2be8236a2ea61ab551fef92d601d240c5e737f

openvswitch3.1-ipsec-3.1.0-32.el9fdp.ppc64le.rpm

SHA-256: 0646ae756103870d87f9d64093aa659d11c8cf7b481343f01e44120ba41ba0b4

openvswitch3.1-test-3.1.0-32.el9fdp.noarch.rpm

SHA-256: 51773c83943c0ff846a8bc79024231205069b5d3dacd58485e22f17cc2e9d9d7

ovn23.06-23.06.0-13.el9fdp.ppc64le.rpm

SHA-256: 26969fde9204c3276bbee74287dc5408b5fabd2ab66043488535a381e0d4fd5b

ovn23.06-central-23.06.0-13.el9fdp.ppc64le.rpm

SHA-256: aff22b0d05fcdc3cac8a287a8e5b4165e58b44185f66e628735de40cb7a9be33

ovn23.06-central-debuginfo-23.06.0-13.el9fdp.ppc64le.rpm

SHA-256: 158402ef346ac4cf8e9723d0737453ccc47895262fabd75bff59b40dd18009e7

ovn23.06-debuginfo-23.06.0-13.el9fdp.ppc64le.rpm

SHA-256: 8582bd3f80348107652722d6aa7fc37a441c0334851e8c65ecff5cc27344a2a7

ovn23.06-debugsource-23.06.0-13.el9fdp.ppc64le.rpm

SHA-256: 93eb86c62cf519431aab4c02420ca50e785f73212ad7f29c4116427daf7dc31e

ovn23.06-host-23.06.0-13.el9fdp.ppc64le.rpm

SHA-256: e84986b53832687caabeb349574950d2339d23d62a03f6d00094cfd7cd434244

ovn23.06-host-debuginfo-23.06.0-13.el9fdp.ppc64le.rpm

SHA-256: edf0172fe413ddddda65ea70189b43b4a57fb93159a749a497d0f508588a8f02

ovn23.06-vtep-23.06.0-13.el9fdp.ppc64le.rpm

SHA-256: 273f93e96ef9c098b6019dc9a79f32eb4f94a4d5e57f2e22c5498ee5bfb226df

ovn23.06-vtep-debuginfo-23.06.0-13.el9fdp.ppc64le.rpm

SHA-256: df1f933cbc0d2b44c7b8f220ce272aeb986924ff7cac126e4ee48a5a8f6cce6a

perf-5.14.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: 0657f190258c876bb798ccdbdde9358df72921e4a1383d757018e20e495bc5f8

perf-debuginfo-5.14.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: 5bf7a4bd4f64234a729a0175bb33325aa2052e5bbf2434baff2302425489b8f6

python3-ironic-tests-21.3.1-0.20230706125653.c8f8157.el9.noarch.rpm

SHA-256: 878619a3f73c1037ac2a3fc4cd80b457b9b0460ef397e1d73729c5f3a6aac49f

python3-openvswitch3.1-3.1.0-32.el9fdp.ppc64le.rpm

SHA-256: 793e32ba0bbaa66958840cd114f2b97db9ac00853e66527c58187cfe61d61136

python3-openvswitch3.1-debuginfo-3.1.0-32.el9fdp.ppc64le.rpm

SHA-256: c83089e60d58ab988484939e3eff88b8e8417ea705a1cba97d46531e40c00d39

python3-perf-5.14.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: d9bb08413fb6cd0b517d850326fe80265df988d982d2d176d38688404dcbe804

python3-perf-debuginfo-5.14.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: ffa9002816e7b115ffc093ad169cdd7cba215dbd250635dfab561696ae3d721e

rtla-5.14.0-284.23.1.el9_2.ppc64le.rpm

SHA-256: 21f5c232e3260df5e2ab9160e0438f5e79dbe254b52282ce063a9ce8d10409f5

Red Hat OpenShift Container Platform for Power 4.13 for RHEL 8

SRPM

container-selinux-2.215.0-1.rhaos4.13.el8.src.rpm

SHA-256: 594ba8e6906201b5f714929a3f040773f40f29ff169f2bad79bcce9b496b5917

containernetworking-plugins-1.0.1-8.rhaos4.13.el8.src.rpm

SHA-256: d34ce73f9b093c526bfead60212476c21185208c37344116ed6fa3131b5ba46a

cri-o-1.26.3-10.rhaos4.13.git78941bf.el8.src.rpm

SHA-256: 225d87e3bf7d6c0b4754be6c56340e01ebdc2e93a072f81c57f9f1eb7bcb93f6

nmstate-2.2.12-1.rhaos4.13.el8.src.rpm

SHA-256: a74d02f73a1b5379e2dcc76b95574582e876c53c075298058600d2ad7b6a566f

openshift-4.13.0-202307132344.p0.gf245ced.assembly.stream.el8.src.rpm

SHA-256: eba7dd8dd605ed9ba5a9f3170a30d907f1b0af5486de96aa982169ae0f399de6

openshift-ansible-4.13.0-202306230038.p0.g148be47.assembly.stream.el8.src.rpm

SHA-256: 62a575b3af4c8732efe0195955f39e47fdf61697d69471a89f0046edbfa34e22

openshift-clients-4.13.0-202306230038.p0.ge4c9a6a.assembly.stream.el8.src.rpm

SHA-256: 9fc053a2181b10fe9df59548b730a7b463ad202363e3599f2a7a315eb8242cc4

openshift-kuryr-4.13.0-202306281017.p0.g5baee73.assembly.stream.el8.src.rpm

SHA-256: 37f155efc7dc2fc9ebf370db62ce2f8b33d57159d7da2a9f120bd2e57b821ce0

openshift4-aws-iso-4.13.0-202306230038.p0.gd2acdd5.assembly.stream.el8.src.rpm

SHA-256: b4d222a596704be1cfe966a3fa25156d73a12dd30e607e23fb0d1433f4e4add5

ppc64le

container-selinux-2.215.0-1.rhaos4.13.el8.noarch.rpm

SHA-256: b41ef03236e411cc5892f09c6027f583f8852151ef6c9813e059043dd91e1528

containernetworking-plugins-1.0.1-8.rhaos4.13.el8.ppc64le.rpm

SHA-256: 3342d0ca29190e521fabcf928d03277f202009043da5dfa53d99a5bcf7319782

containernetworking-plugins-debuginfo-1.0.1-8.rhaos4.13.el8.ppc64le.rpm

SHA-256: 66db67de49715ee240dee21aece4360b76e24823d6d2f49296f740b6338aa8f2

containernetworking-plugins-debugsource-1.0.1-8.rhaos4.13.el8.ppc64le.rpm

SHA-256: eacb0c74a8a40f3c8358cbcdc953e3ac467a6d1e2105feb87e92c2eded2762c8

cri-o-1.26.3-10.rhaos4.13.git78941bf.el8.ppc64le.rpm

SHA-256: 9687f68de3807d91cba698a3497251ae662817b0136268978b56c4b3763c27c5

cri-o-debuginfo-1.26.3-10.rhaos4.13.git78941bf.el8.ppc64le.rpm

SHA-256: bcad0e966d5bb991cbc4727ab051778bf3d0fbbe07bcc9961a30c558592d41a0

cri-o-debugsource-1.26.3-10.rhaos4.13.git78941bf.el8.ppc64le.rpm

SHA-256: 97a1563998eb5dc585446a2a4f5903a8b03b836a88482572967e969ef1d43726

nmstate-2.2.12-1.rhaos4.13.el8.ppc64le.rpm

SHA-256: 6ccd147dd6f26a9ad0d875a2a4cbbb470f7eb7c32fac0d81ba3dac9420e20034

nmstate-debuginfo-2.2.12-1.rhaos4.13.el8.ppc64le.rpm

SHA-256: 318a045347d9350073a52d94633e8fb09834e20e5c35f36a207812baf02a1e12

nmstate-debugsource-2.2.12-1.rhaos4.13.el8.ppc64le.rpm

SHA-256: 349f74986830301df12f29c5d5a0f827cc71f5ed731de549e876a5dbf90b65f7

nmstate-devel-2.2.12-1.rhaos4.13.el8.ppc64le.rpm

SHA-256: 867dd099e153735f447874c25d8f7dfa6154384eefbf931af37c79e55a95629a

nmstate-libs-2.2.12-1.rhaos4.13.el8.ppc64le.rpm

SHA-256: 665f4aef235bd3d6039a50026866f0de25664fe52287bdc014259297aacfa5ba

nmstate-libs-debuginfo-2.2.12-1.rhaos4.13.el8.ppc64le.rpm

SHA-256: 13191706cb9a2df8da60a94f3aec01677e0de0b9eae089f75f8baa95dc0b90ba

openshift-ansible-4.13.0-202306230038.p0.g148be47.assembly.stream.el8.noarch.rpm

SHA-256: 0f15f5a57bee6a3994ac5f10b1654ee84b041b5b04b7e153f928bd988bf2f99d

openshift-ansible-test-4.13.0-202306230038.p0.g148be47.assembly.stream.el8.noarch.rpm

SHA-256: 57bb0ce1c0eabad01a7fff2e7a213582a2ae923063277bbd9ca343d1773afba6

openshift-clients-4.13.0-202306230038.p0.ge4c9a6a.assembly.stream.el8.ppc64le.rpm

SHA-256: 90bc087c43aa762fff83e0ae924bc47ad59389040f5656040a4d98972d658de8

openshift-hyperkube-4.13.0-202307132344.p0.gf245ced.assembly.stream.el8.ppc64le.rpm

SHA-256: 1696693d855ad1845808943f47a45cae3ec3e0b03d9c844775982aacb0806a2e

openshift-kuryr-cni-4.13.0-202306281017.p0.g5baee73.assembly.stream.el8.noarch.rpm

SHA-256: 1fb1d3fbd99bfd34dd377b3f3e2c601d99e803e85eb01759196ef8b393eb39a3

openshift-kuryr-common-4.13.0-202306281017.p0.g5baee73.assembly.stream.el8.noarch.rpm

SHA-256: bbe015f77db809c02d17301d40421b30e9188b1ae60d8fc3367a55f5a3812532

openshift-kuryr-controller-4.13.0-202306281017.p0.g5baee73.assembly.stream.el8.noarch.rpm

SHA-256: 28049ee509a6da23d01f469680d4e71cf0bac281ca242dc44f44f3e648f902a3

openshift4-aws-iso-4.13.0-202306230038.p0.gd2acdd5.assembly.stream.el8.noarch.rpm

SHA-256: 0e5e75d41e37090beea73a11a1779eff4327c26f69f6a1b4f36a0a6f0dc8fa95

python3-kuryr-kubernetes-4.13.0-202306281017.p0.g5baee73.assembly.stream.el8.noarch.rpm

SHA-256: afe76a9acdad7676ee98c8e25a58743e5b0553e9f4888f6083207ab8d6e99a5d

Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.13 for RHEL 9

SRPM

cri-o-1.26.3-11.rhaos4.13.git78941bf.el9.src.rpm

SHA-256: 6b9291ff99a224ae3b1d4f14eece6300423a934c7360e1dc221e95b000bab612

kernel-5.14.0-284.23.1.el9_2.src.rpm

SHA-256: 662b3173d17c1d51ada1b52fc633cea548bf6cf92061a3a36c86e1870b369ce2

openshift-4.13.0-202307132344.p0.gf245ced.assembly.stream.el9.src.rpm

SHA-256: f0e5b4db42116d4065b9962d143b3fd0a69401ec05b8abaafe6bca400da8a655

openshift-ansible-4.13.0-202306230038.p0.g148be47.assembly.stream.el9.src.rpm

SHA-256: 722567d142c01d81544af61fd50501b98abf6a566d4d840f043a268c9dc0536d

openshift-clients-4.13.0-202306230038.p0.ge4c9a6a.assembly.stream.el9.src.rpm

SHA-256: 98d4fd7bcc068208270ab707be3bea3c5b0167bc110d441696d39180f45db444

openstack-ironic-21.3.1-0.20230706125653.c8f8157.el9.src.rpm

SHA-256: aafe441250f62e20c13224d4a42e855e4bc280eae3104957b9f63c071e9aefcb

openvswitch3.1-3.1.0-32.el9fdp.src.rpm

SHA-256: 3dde9dc9eb6715b302b189c4a4c4d073f56664cf41d991e7d0eb9f82ab24a907

ovn23.06-23.06.0-13.el9fdp.src.rpm

SHA-256: 69f0229fb4861e416db73c021506ecfbf6e9b4b4e24eb31681d3303b7a5f10a3

s390x

bpftool-7.0.0-284.23.1.el9_2.s390x.rpm

SHA-256: 441f593060bb8865c573ef529d4fb582cd5020e6cb7c81d678622440c2e0968d

bpftool-debuginfo-7.0.0-284.23.1.el9_2.s390x.rpm

SHA-256: a18fe8432451e734551790bab16cbbcd2d856056cecdbf31ae2c2507cd1fc851

cri-o-1.26.3-11.rhaos4.13.git78941bf.el9.s390x.rpm

SHA-256: 21f30297d606d1a45ccd2bad8c7cf9015522c8c96e218083fbfab722761ad7bf

cri-o-debuginfo-1.26.3-11.rhaos4.13.git78941bf.el9.s390x.rpm

SHA-256: d2ec1360925db617c74008c58c7f1a019a573dd1b49a7d505d1bd07708db2ed0

cri-o-debugsource-1.26.3-11.rhaos4.13.git78941bf.el9.s390x.rpm

SHA-256: 8b6b7cd8488bdd82def5d1ab33b753dde1a3334499fc269c5a173ac026b604bb

kernel-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: 86ef1da73cf4be515f94f84fefa663b4dccfaec2e9ebfa0ff5cf7bdeca30a223

kernel-abi-stablelists-5.14.0-284.23.1.el9_2.noarch.rpm

SHA-256: 4bae4c54c85b17ac3b50ae517a73bee1f546a6718d21e1623100834b81e26ffc

kernel-core-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: 5425db2ba32c80e558000268fc86448c2a25526a0d845eff52d34d75db1e0124

kernel-cross-headers-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: 5a68f8f7ba1d3ca7177054b79918b33fe55991568c2878f9e7ed5aa8f43573eb

kernel-debug-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: a124d1625803666cdeb46f88538da05544169bff75e124b1b0ae134cb95e71e1

kernel-debug-core-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: 4bd4fc96222b91e8ae9ce932d8a6f7a24879baf04b0a73708d184f822679c882

kernel-debug-debuginfo-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: 60a8667df5572c511f090ba1aca5fafa37ad3c488b87e31eb7002027a12aa76d

kernel-debug-devel-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: f2103573c12eb2bb4e677a31d104b231ed5501fb50309b099851244b3bec2d33

kernel-debug-devel-matched-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: 2e2c612767003922a5df9b0f19f90b3f91888489c323066cd5e9612be6893b75

kernel-debug-modules-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: a7bf976c95c3c213c5dc68cd8f68b917a59d2ab736f8c1f34e2b508d568c08d0

kernel-debug-modules-core-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: d334bf1bed50ff4009efebb9fddf8978363ab3ba9cb2e94a7b80e67dd9bebfee

kernel-debug-modules-extra-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: 6d14d6cf3f366ae965a86ef80acbbb7261f6347ccc4621f054802e2928c4b8b1

kernel-debug-modules-internal-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: 3216ff87839c68c31aa13dbfb414ce8448810ac9df7024c88ad6958ec5a1d52f

kernel-debug-modules-partner-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: 081bc68da842b0f9d742f84015a3c0a592641d671edde3f3723ca879289b8145

kernel-debuginfo-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: dc034944b51910ed2971e0739ac259c7b92aae7ca3ec4ba8a85c8de1dd8ef1cc

kernel-debuginfo-common-s390x-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: d6d6f0d72ea282f4b29f3a6369206b631f51193da76e63efe81fda74af9a4c7e

kernel-devel-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: bed26e996d03445b7c810c92850415e5ad890936082585d4ddb1e065e7916568

kernel-devel-matched-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: 74f8070d405aeb2cadd232555d5e2a6962165d0ec310e7a979769d1eb1351805

kernel-doc-5.14.0-284.23.1.el9_2.noarch.rpm

SHA-256: b6c32230d547d7d2bb6086319b936453080a4f4eaef12983d783eefad9c4b526

kernel-headers-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: e0240c3ac118ea8a8146a091d50fba56057398d3275c8eebe3a5db060e1e61ff

kernel-modules-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: 76d53a5328b79c94a7a0545168726341f46409ebd7adcead0c12f69757fb4134

kernel-modules-core-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: 4d4a799532f2dfbeb867b9e433f82c6313c33011c686be7e64c6b5c4b43f2b14

kernel-modules-extra-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: bb745a7900e2cfe88f2e0407ff323932d99904b10117e7d1b4770d506a194d9c

kernel-modules-internal-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: 89944b1fa2f49c57c8bb16c47d54347157bd6782dadd54aea2c8ba75024cdbef

kernel-modules-partner-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: 54535095552785d91d8412b193715c13cbb7af6b21d6236405f01a6e68dcd928

kernel-selftests-internal-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: 6675dd137e366b2913980146b64c7382a65b50c6b14095d46caf224effb04754

kernel-tools-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: a451f4d8c84f6689c0b73c02e169c3cea53965b3610e17d26abb0ef409f52bda

kernel-tools-debuginfo-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: c15155c00ac0a00435405082e785a2dd55deddb4e5c622e4269e35c30b0af3b5

kernel-zfcpdump-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: 7f7b5ad629591ef1e5ce41bac54dc4aa2b4ca6200fbdebec04883330112b44ff

kernel-zfcpdump-core-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: a3c705fd57da4b54fdcd5c68245bb8ab7687a856872743d201b5636670376047

kernel-zfcpdump-debuginfo-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: a9b70be17558555e39ddf4201abab588b0c031a0dd3c18316b7f6a9640adeaec

kernel-zfcpdump-devel-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: 3d569ae06f5a06db4e36880fb27be0c82453517c5f1dd937be103734fab723ba

kernel-zfcpdump-devel-matched-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: f42e153a88a4604f53dcc1ee09656d504705b1d27746af8c7f99d368d52f18d2

kernel-zfcpdump-modules-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: 103180954511847bbb3548eaac4afad137ee199f166cd831e6c00eb607e54d69

kernel-zfcpdump-modules-core-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: 0956bd030cf7f71762f70a0a9bcdc7777ba202c870510d884e47fcfb5777c960

kernel-zfcpdump-modules-extra-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: f6a8d8bfb6022395287ac487f16c21ebbb19b00da9bca69d5c509552723ff6fb

kernel-zfcpdump-modules-internal-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: 06e185636a92fb44ccd66d42fed1eda915eda33d5554f51f61b13079ef4c347c

kernel-zfcpdump-modules-partner-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: 47f35e0f23051464489e1af2401d66a7544c4ddcef8a489098ac399e1f766ba0

openshift-ansible-4.13.0-202306230038.p0.g148be47.assembly.stream.el9.noarch.rpm

SHA-256: c2386a66a2f7f73007b38ff4076c5edbbb937bf7e7fafda615e2a503bed41c50

openshift-ansible-test-4.13.0-202306230038.p0.g148be47.assembly.stream.el9.noarch.rpm

SHA-256: c23193e850719e68e5e4e58c2c8ded48e61332a67c138e397fedbd274a1fdd84

openshift-clients-4.13.0-202306230038.p0.ge4c9a6a.assembly.stream.el9.s390x.rpm

SHA-256: 2ad7f29c39de1ec6d03eeaf28611c617ffd419ff40329690c5396945898d65d4

openshift-hyperkube-4.13.0-202307132344.p0.gf245ced.assembly.stream.el9.s390x.rpm

SHA-256: 14e708a6714d88021d5e2335839010f7006bd36f0b01b9f90f0890cd38943926

openstack-ironic-21.3.1-0.20230706125653.c8f8157.el9.noarch.rpm

SHA-256: 033d451c083d6c33eff601b499397f5a948307bc35f685a9a89eedf8ef7f3440

openstack-ironic-api-21.3.1-0.20230706125653.c8f8157.el9.noarch.rpm

SHA-256: 89ae8726da3753018d76ab2d91e7e881a0936b79e6733b3f708673dc3978d833

openstack-ironic-common-21.3.1-0.20230706125653.c8f8157.el9.noarch.rpm

SHA-256: 5ca83203fe0738c304c40d1db5b3ed23d36ae995d03960b68af151fd08c73869

openstack-ironic-conductor-21.3.1-0.20230706125653.c8f8157.el9.noarch.rpm

SHA-256: 2192042fe09f68f2b4036c5759047833555d0124840fb0da864e2751f79cfdad

openstack-ironic-dnsmasq-tftp-server-21.3.1-0.20230706125653.c8f8157.el9.noarch.rpm

SHA-256: 9df923124edae8a4e4f3e53ff64c7cba7cdc30b59e73e0c891b2f471dde838b5

openvswitch3.1-3.1.0-32.el9fdp.s390x.rpm

SHA-256: a8079ddf05eb0eb029fb89e43637aa7673a5110c0a6b9d0cfc9c23a6c984ddcd

openvswitch3.1-debuginfo-3.1.0-32.el9fdp.s390x.rpm

SHA-256: 2538cb2764b1198ed2429f5eac1a2a7f1ddadbc2865171bebb2443bf34f9e0b1

openvswitch3.1-debugsource-3.1.0-32.el9fdp.s390x.rpm

SHA-256: bbc3562d345e218e2d9734703f5ee8325ac6a3eedb95acd364a1bf76d8741c97

openvswitch3.1-devel-3.1.0-32.el9fdp.s390x.rpm

SHA-256: d52a169ccead9395dd7d9438318ee1c350452b3c124190c556a94e162f81d095

openvswitch3.1-ipsec-3.1.0-32.el9fdp.s390x.rpm

SHA-256: af6e2aef47cb81baaf820ab257e03bdfc1779e3ad8b374dd6f795312349432fb

openvswitch3.1-test-3.1.0-32.el9fdp.noarch.rpm

SHA-256: 51773c83943c0ff846a8bc79024231205069b5d3dacd58485e22f17cc2e9d9d7

ovn23.06-23.06.0-13.el9fdp.s390x.rpm

SHA-256: 2756bf3b4b4f99bdc3cce5cf0a6401730bedddeec2b79345fe346bbb38d23424

ovn23.06-central-23.06.0-13.el9fdp.s390x.rpm

SHA-256: 52de0d277721e4aae371320b9c0d6dd062275443e49134cc5f88b647152882e0

ovn23.06-central-debuginfo-23.06.0-13.el9fdp.s390x.rpm

SHA-256: 648c892659db014b5852f0cb61f6bd6ebb32af0afb90c78ba2a9e56abb6de643

ovn23.06-debuginfo-23.06.0-13.el9fdp.s390x.rpm

SHA-256: bcafb90741730b422e6c3147144628b4608af49a9989c27e2711442e8d3e59af

ovn23.06-debugsource-23.06.0-13.el9fdp.s390x.rpm

SHA-256: 9a542d35c32789030d8572ebae8b6934a2e7563d5a77fd09e57ac1f64fc87163

ovn23.06-host-23.06.0-13.el9fdp.s390x.rpm

SHA-256: 5eedcc87293535f5bff456bcc4fa28d20ea9c00b1c0a3d4e2fc7db0c83d464ec

ovn23.06-host-debuginfo-23.06.0-13.el9fdp.s390x.rpm

SHA-256: 4c38dda0e69e1b2769547ed59e7f22692df9e81d7586c568e4c912321583f39e

ovn23.06-vtep-23.06.0-13.el9fdp.s390x.rpm

SHA-256: 77320fa8b501007328e1654dfeb6e40250277b096abb570af141d5355333037c

ovn23.06-vtep-debuginfo-23.06.0-13.el9fdp.s390x.rpm

SHA-256: b0d6d7fa00e2c441c1e533c3dc4fe55e28030b3820e52bf7b992a7a2dd1b72c7

perf-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: 9c6eed5df01cd9d0e7bbfb9db59e83b9fab085844e9d5c80082391c884ef4e6b

perf-debuginfo-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: 11849fd485b18ed0daf71031ca53b6daceef7810c12eb7cb309ad0901e961fa8

python3-ironic-tests-21.3.1-0.20230706125653.c8f8157.el9.noarch.rpm

SHA-256: 878619a3f73c1037ac2a3fc4cd80b457b9b0460ef397e1d73729c5f3a6aac49f

python3-openvswitch3.1-3.1.0-32.el9fdp.s390x.rpm

SHA-256: db237ed08c5cf75a70df8566229f4771631831ee939cdabfc54e89dd573e9a6a

python3-openvswitch3.1-debuginfo-3.1.0-32.el9fdp.s390x.rpm

SHA-256: 1eb016e8cad43607b275f2a09573b28c6a260159fedab02af9f5a66d4c9bb5f3

python3-perf-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: f16535ee742fbd150fbbe8b9476e6c7c9c5b139335f61273294751fa98092ffb

python3-perf-debuginfo-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: ca9cf8a112e45c89c9011ad6b3a9d286f17016b4bc13176e741902f47966f7f8

rtla-5.14.0-284.23.1.el9_2.s390x.rpm

SHA-256: 313e1ed144d8ec3193a1f1d5883dee464c97f43cd9491b511ec56164b96f4e60

Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.13 for RHEL 8

SRPM

container-selinux-2.215.0-1.rhaos4.13.el8.src.rpm

SHA-256: 594ba8e6906201b5f714929a3f040773f40f29ff169f2bad79bcce9b496b5917

containernetworking-plugins-1.0.1-8.rhaos4.13.el8.src.rpm

SHA-256: d34ce73f9b093c526bfead60212476c21185208c37344116ed6fa3131b5ba46a

cri-o-1.26.3-10.rhaos4.13.git78941bf.el8.src.rpm

SHA-256: 225d87e3bf7d6c0b4754be6c56340e01ebdc2e93a072f81c57f9f1eb7bcb93f6

nmstate-2.2.12-1.rhaos4.13.el8.src.rpm

SHA-256: a74d02f73a1b5379e2dcc76b95574582e876c53c075298058600d2ad7b6a566f

openshift-4.13.0-202307132344.p0.gf245ced.assembly.stream.el8.src.rpm

SHA-256: eba7dd8dd605ed9ba5a9f3170a30d907f1b0af5486de96aa982169ae0f399de6

openshift-ansible-4.13.0-202306230038.p0.g148be47.assembly.stream.el8.src.rpm

SHA-256: 62a575b3af4c8732efe0195955f39e47fdf61697d69471a89f0046edbfa34e22

openshift-clients-4.13.0-202306230038.p0.ge4c9a6a.assembly.stream.el8.src.rpm

SHA-256: 9fc053a2181b10fe9df59548b730a7b463ad202363e3599f2a7a315eb8242cc4

openshift-kuryr-4.13.0-202306281017.p0.g5baee73.assembly.stream.el8.src.rpm

SHA-256: 37f155efc7dc2fc9ebf370db62ce2f8b33d57159d7da2a9f120bd2e57b821ce0

openshift4-aws-iso-4.13.0-202306230038.p0.gd2acdd5.assembly.stream.el8.src.rpm

SHA-256: b4d222a596704be1cfe966a3fa25156d73a12dd30e607e23fb0d1433f4e4add5

s390x

container-selinux-2.215.0-1.rhaos4.13.el8.noarch.rpm

SHA-256: b41ef03236e411cc5892f09c6027f583f8852151ef6c9813e059043dd91e1528

containernetworking-plugins-1.0.1-8.rhaos4.13.el8.s390x.rpm

SHA-256: 1a49eb704a3b0dd9b6ca8b45ea763bd3dc0b0d05ca95d7e261886b0ebd391411

containernetworking-plugins-debuginfo-1.0.1-8.rhaos4.13.el8.s390x.rpm

SHA-256: cd83a55de628830be6daaf36704820261a5a33b574ffe40abe7e44f419422f91

containernetworking-plugins-debugsource-1.0.1-8.rhaos4.13.el8.s390x.rpm

SHA-256: fac114c964a74ddd21e187f8ce103dbfe8523599a11de203bcf12c8389e4a8f3

cri-o-1.26.3-10.rhaos4.13.git78941bf.el8.s390x.rpm

SHA-256: 51101513fe4747ebd6ef90800fdfc66b61831f595af98ac3278a52f72454b3d2

cri-o-debuginfo-1.26.3-10.rhaos4.13.git78941bf.el8.s390x.rpm

SHA-256: 62d939aac3892082c9c3cb8e8ed5f402def225e34535b73a01860d0eacce7e69

cri-o-debugsource-1.26.3-10.rhaos4.13.git78941bf.el8.s390x.rpm

SHA-256: 8d1867f834c93ab6f101f299536c0dede63a8f1524119b23ecd40e8bc0c5c0da

nmstate-2.2.12-1.rhaos4.13.el8.s390x.rpm

SHA-256: b1062fb3fadf0cd2ebb1b6bbacb7e2aabbd23188622a18f80d2f5eb934b9ccdd

nmstate-debuginfo-2.2.12-1.rhaos4.13.el8.s390x.rpm

SHA-256: 62cee4add943a5436ced29fd544326d3af0e1ec055082730ea66077207d5f9c6

nmstate-debugsource-2.2.12-1.rhaos4.13.el8.s390x.rpm

SHA-256: 67cbf60bb1c10cb9f7fbf1bfea8bcc83a1a5b7617c3e26e1628c6abd51c901e5

nmstate-devel-2.2.12-1.rhaos4.13.el8.s390x.rpm

SHA-256: e6b1dcbb706498c84c8c948f0eb044e47b0ebcf651f5959faf2691b2042e60db

nmstate-libs-2.2.12-1.rhaos4.13.el8.s390x.rpm

SHA-256: 0812410653ff1e3ffba0dacdc81c0dd5535326a7ffd72b028ab1e975ba9247ad

nmstate-libs-debuginfo-2.2.12-1.rhaos4.13.el8.s390x.rpm

SHA-256: 2e163bd3ab0d2523b340ee19a9f8b10d44f16ec8db3ac4adbafcf75fbaef92c1

openshift-ansible-4.13.0-202306230038.p0.g148be47.assembly.stream.el8.noarch.rpm

SHA-256: 0f15f5a57bee6a3994ac5f10b1654ee84b041b5b04b7e153f928bd988bf2f99d

openshift-ansible-test-4.13.0-202306230038.p0.g148be47.assembly.stream.el8.noarch.rpm

SHA-256: 57bb0ce1c0eabad01a7fff2e7a213582a2ae923063277bbd9ca343d1773afba6

openshift-clients-4.13.0-202306230038.p0.ge4c9a6a.assembly.stream.el8.s390x.rpm

SHA-256: 6fa4b409fb2980ecdddc8ff8874abc8db5f681c92764cc6e698d949233ac1cae

openshift-hyperkube-4.13.0-202307132344.p0.gf245ced.assembly.stream.el8.s390x.rpm

SHA-256: 416afcb879099ac8b3fcd4e7602dc50e414fb90798e4607129c97f5507b2096d

openshift-kuryr-cni-4.13.0-202306281017.p0.g5baee73.assembly.stream.el8.noarch.rpm

SHA-256: 1fb1d3fbd99bfd34dd377b3f3e2c601d99e803e85eb01759196ef8b393eb39a3

openshift-kuryr-common-4.13.0-202306281017.p0.g5baee73.assembly.stream.el8.noarch.rpm

SHA-256: bbe015f77db809c02d17301d40421b30e9188b1ae60d8fc3367a55f5a3812532

openshift-kuryr-controller-4.13.0-202306281017.p0.g5baee73.assembly.stream.el8.noarch.rpm

SHA-256: 28049ee509a6da23d01f469680d4e71cf0bac281ca242dc44f44f3e648f902a3

openshift4-aws-iso-4.13.0-202306230038.p0.gd2acdd5.assembly.stream.el8.noarch.rpm

SHA-256: 0e5e75d41e37090beea73a11a1779eff4327c26f69f6a1b4f36a0a6f0dc8fa95

python3-kuryr-kubernetes-4.13.0-202306281017.p0.g5baee73.assembly.stream.el8.noarch.rpm

SHA-256: afe76a9acdad7676ee98c8e25a58743e5b0553e9f4888f6083207ab8d6e99a5d

Red Hat OpenShift Container Platform for ARM 64 4.13 for RHEL 9

SRPM

cri-o-1.26.3-11.rhaos4.13.git78941bf.el9.src.rpm

SHA-256: 6b9291ff99a224ae3b1d4f14eece6300423a934c7360e1dc221e95b000bab612

kernel-5.14.0-284.23.1.el9_2.src.rpm

SHA-256: 662b3173d17c1d51ada1b52fc633cea548bf6cf92061a3a36c86e1870b369ce2

openshift-4.13.0-202307132344.p0.gf245ced.assembly.stream.el9.src.rpm

SHA-256: f0e5b4db42116d4065b9962d143b3fd0a69401ec05b8abaafe6bca400da8a655

openshift-ansible-4.13.0-202306230038.p0.g148be47.assembly.stream.el9.src.rpm

SHA-256: 722567d142c01d81544af61fd50501b98abf6a566d4d840f043a268c9dc0536d

openshift-clients-4.13.0-202306230038.p0.ge4c9a6a.assembly.stream.el9.src.rpm

SHA-256: 98d4fd7bcc068208270ab707be3bea3c5b0167bc110d441696d39180f45db444

openstack-ironic-21.3.1-0.20230706125653.c8f8157.el9.src.rpm

SHA-256: aafe441250f62e20c13224d4a42e855e4bc280eae3104957b9f63c071e9aefcb

openvswitch3.1-3.1.0-32.el9fdp.src.rpm

SHA-256: 3dde9dc9eb6715b302b189c4a4c4d073f56664cf41d991e7d0eb9f82ab24a907

ovn23.06-23.06.0-13.el9fdp.src.rpm

SHA-256: 69f0229fb4861e416db73c021506ecfbf6e9b4b4e24eb31681d3303b7a5f10a3

aarch64

bpftool-7.0.0-284.23.1.el9_2.aarch64.rpm

SHA-256: e14dd3d33e26974a5c5a3861cfe2c6bfccf6ae39d256ee79c412ba59551074a4

bpftool-debuginfo-7.0.0-284.23.1.el9_2.aarch64.rpm

SHA-256: f16fa89ad626e7de460259ae750db1b2865c5dfbeb225812ebfaeb99968d42b0

cri-o-1.26.3-11.rhaos4.13.git78941bf.el9.aarch64.rpm

SHA-256: 2c2d3d7d4b95d1da23fbcc2a4e222043da5d9952426c775e3acf9d7a29311aaa

cri-o-debuginfo-1.26.3-11.rhaos4.13.git78941bf.el9.aarch64.rpm

SHA-256: c0fb4fbbc72f21dbcd206c02bc665533a413c1f0b4833e93093c1a99d738b9e4

cri-o-debugsource-1.26.3-11.rhaos4.13.git78941bf.el9.aarch64.rpm

SHA-256: c3e86edf0a75acc10956a93bf9bfc022d85e427fe78c672da1aae9012b361751

kernel-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: a023584ca5db26e01312001507ea820e3e53093f1f952a2b1e2beb3b8beaf356

kernel-64k-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: 56fb02665aeb54bc8ffd141cba1288dfbe139a801ac104053ad77a886da575bf

kernel-64k-core-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: dc9679b85039f9a213a180c1827ace434be7c29622850fed5edb6200fd80c122

kernel-64k-debug-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: 77767121749b629ff296252e1a8c3bc3446874c98d82782a234468bffd03598c

kernel-64k-debug-core-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: 965259f3d5e239fbc6bcfb051aaa37370b43a12e2fe6a925b9fb6f628d38b129

kernel-64k-debug-debuginfo-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: 4d02e91afcf741c4789cc4bac4c5e76c0c9c2dd665d21f1c5d3b922897c71779

kernel-64k-debug-devel-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: 4d2118617cc44a364cabc7debf0bddf0b696c46d2aeb72aee77932fbc920e720

kernel-64k-debug-devel-matched-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: f8979299e9f9a7522cb9eed04c50f0d1fb0a449c7e5dfcf8e7b9ec58a783243d

kernel-64k-debug-modules-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: e857fee6a27a345bc74bc0f26ae3ce529e4389a4f06086abd8258ed59d419b99

kernel-64k-debug-modules-core-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: feba468dc2a8fdac254f54639e29dda645a21215ce43ad6eefbd9e9dae12af0f

kernel-64k-debug-modules-extra-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: c46796c324eb583be90a5018d06339b8dc5db37affe60861022c55ba3d138298

kernel-64k-debug-modules-internal-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: f992084458a3592164765d153f185ed1657b7ff59c3a9dd3b6b8169ff365d7cf

kernel-64k-debug-modules-partner-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: e0eba409908c7e28cce0a64fee3a33da0a36d41eaa72a8e241842f90632f1928

kernel-64k-debuginfo-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: c270daa257423c8e326a0b39fbc051596508e0cec952a2b1bcb3a3885fe64dd1

kernel-64k-devel-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: 9c883e48c6eaec30ececf5e3199c25278a1913e1d635f6b2e67b44f6e4382f4a

kernel-64k-devel-matched-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: 97079ff6e004f9c4a4beebcb3c26b4d0870e5ea8e61c464b99eaf21e95aaf696

kernel-64k-modules-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: 55de81d13390197e9805291d779abea364bd91158ecdcdeedf8579fd30acbe8c

kernel-64k-modules-core-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: 1ea474fa5785c0f9973eb875eb5ab59de1d178e3dcd51104e8ea4267034b0b05

kernel-64k-modules-extra-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: d749cf1782b2a3d53241e4b84ef6737b08c7cb63c8102e8a6137b474725adc93

kernel-64k-modules-internal-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: c8ff70a2f8644b8ebac6c744475d3cb02b0cb1dde6b8e154e6d3fd853cbe2cf5

kernel-64k-modules-partner-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: df2ca160b142b4494ced3d380f998af1cc35e74921f33521a4027fe1b3b14a4c

kernel-abi-stablelists-5.14.0-284.23.1.el9_2.noarch.rpm

SHA-256: 4bae4c54c85b17ac3b50ae517a73bee1f546a6718d21e1623100834b81e26ffc

kernel-core-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: 2cd07677f39d124fb83884f047da350f1c7c0d0af194da4ead26ea8d5a1642a2

kernel-cross-headers-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: 11f0726e0d35b14f1dfc8ecaa2153fb3cbbd6d6441fa4926ecec9998837788c1

kernel-debug-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: 0a073e6ab24ae3f395da34d3cceedd29fda62c9f081905450978d675b8d3da07

kernel-debug-core-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: b7a7fb218666474b865c6db66bd9178361aabbc66325e1f78ee26c6bed39003d

kernel-debug-debuginfo-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: 16ebdfd24ff2da6d7a6d80fc806fd1978e86f0aba9658a9d391fc0eec9fc105b

kernel-debug-devel-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: 5fde7e6c88d85750402b3b4d3dd18090114f2d7a960e6dea8b623489cc414f25

kernel-debug-devel-matched-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: d90b99ad225e5229bcecf4eccc0c2b9a42a6acace79e4a1628f764840e7143d7

kernel-debug-modules-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: 8affbb1837b24995bbb24bbd3b8f9b00cb59b56654ab97af647d012731bf2ce1

kernel-debug-modules-core-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: 8512036d5c98f37269823c96aeb1c8881d999de1c7705421030b1fa84838388f

kernel-debug-modules-extra-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: e5b2663e67cef5e6c7463a35aa63156c2ace99625182bab6af93fec6d58ce75b

kernel-debug-modules-internal-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: 0767ae26c6bf048bf0e4cdd1749d1e13d00ebcfaf324872191434f4d9d1b7e8a

kernel-debug-modules-partner-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: 5484f35a592601be2ef0037d7e69abdad9d3bdd3095a0f366a6ff09187cd287a

kernel-debuginfo-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: eafcbe09245938ddc2a4cacc099fe41acc6698609285dc2a8d6b54c61a1d2509

kernel-debuginfo-common-aarch64-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: 3248ccd1225bc0c1caf1350c1ae4678586f8f621ee9db5b9aa233db6822d60b6

kernel-devel-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: 97392ad9ad89d201ee12be0fbf1c5756f4f5b499d43e52966a181630e3e2a2fd

kernel-devel-matched-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: 1212791a7eb4a6a6f6b50128bc8e4d1e17119c74b8156c636013e8312b19fb30

kernel-doc-5.14.0-284.23.1.el9_2.noarch.rpm

SHA-256: b6c32230d547d7d2bb6086319b936453080a4f4eaef12983d783eefad9c4b526

kernel-headers-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: 3fa681d980a66a7f46495a80c36b446a9493d31c3fc1756cf571a21c18210b95

kernel-modules-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: 91b2ccaa5f2f6a904fab15f0e9c60a576b5667776307e2f5e6d08300ec79914c

kernel-modules-core-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: d6d2e46e9f04a2fe7ebb4eecf05a7dec85ce30611963c3b66c578280f631c0be

kernel-modules-extra-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: 12565a04cac47ea82260a83932abc5af2d657a3a29c91ca3905735a8c95ae398

kernel-modules-internal-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: a0d03d72a3f43ea404d8890b20c36057a5f65d1f328d9a08eb580c1adc53f65a

kernel-modules-partner-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: 8dd90508198792d7646e32a926ca9e79ae7d4881c87a10882f2167ee734c940c

kernel-selftests-internal-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: 359f4ea277cef7339fc2ddc557c446cf1412874cd1267835bad0803da772207c

kernel-tools-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: 045fdd8d4f5ce50c74cfda12f840e19290b69054eaf214a423990152bd30d505

kernel-tools-debuginfo-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: f72b0d68d47c9bdad548f4c93d7671c43c608c57a3984b7a5d623ac935c9a08e

kernel-tools-libs-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: dd90aa113a5e28f60b338b100f6467d42f5c87f59b052c591d506f04ec888466

kernel-tools-libs-devel-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: c6151b37efae047e0d5624ed811920ac6c81a0783ba20c1f0a5e3fb67685cade

openshift-ansible-4.13.0-202306230038.p0.g148be47.assembly.stream.el9.noarch.rpm

SHA-256: c2386a66a2f7f73007b38ff4076c5edbbb937bf7e7fafda615e2a503bed41c50

openshift-ansible-test-4.13.0-202306230038.p0.g148be47.assembly.stream.el9.noarch.rpm

SHA-256: c23193e850719e68e5e4e58c2c8ded48e61332a67c138e397fedbd274a1fdd84

openshift-clients-4.13.0-202306230038.p0.ge4c9a6a.assembly.stream.el9.aarch64.rpm

SHA-256: 95fd6322674afe8ee1cd2d1b906d67fa4fc1568c8af01dc03f4f355974aceb7b

openshift-hyperkube-4.13.0-202307132344.p0.gf245ced.assembly.stream.el9.aarch64.rpm

SHA-256: 9db729026b7c398177685e501391b17c7c6f2fe6fdc5ea51325db2e4826bd27d

openstack-ironic-21.3.1-0.20230706125653.c8f8157.el9.noarch.rpm

SHA-256: 033d451c083d6c33eff601b499397f5a948307bc35f685a9a89eedf8ef7f3440

openstack-ironic-api-21.3.1-0.20230706125653.c8f8157.el9.noarch.rpm

SHA-256: 89ae8726da3753018d76ab2d91e7e881a0936b79e6733b3f708673dc3978d833

openstack-ironic-common-21.3.1-0.20230706125653.c8f8157.el9.noarch.rpm

SHA-256: 5ca83203fe0738c304c40d1db5b3ed23d36ae995d03960b68af151fd08c73869

openstack-ironic-conductor-21.3.1-0.20230706125653.c8f8157.el9.noarch.rpm

SHA-256: 2192042fe09f68f2b4036c5759047833555d0124840fb0da864e2751f79cfdad

openstack-ironic-dnsmasq-tftp-server-21.3.1-0.20230706125653.c8f8157.el9.noarch.rpm

SHA-256: 9df923124edae8a4e4f3e53ff64c7cba7cdc30b59e73e0c891b2f471dde838b5

openvswitch3.1-3.1.0-32.el9fdp.aarch64.rpm

SHA-256: 38568da394d71ebbf381c7dfbcbcd8baa4f020be11accc0f88bf26eb8cc104ff

openvswitch3.1-debuginfo-3.1.0-32.el9fdp.aarch64.rpm

SHA-256: 5eeabd23e40332b9eb8ab576494558a39f9752815c2383f9a6e04a6607df2a2b

openvswitch3.1-debugsource-3.1.0-32.el9fdp.aarch64.rpm

SHA-256: aeaa30b3f4c42129e48432c1f734fdccf0af81322d9d387ba5bfa6570c7c919b

openvswitch3.1-devel-3.1.0-32.el9fdp.aarch64.rpm

SHA-256: 90924dc5e1e26c0d9f72ddfa071f3160a4e82568788240f284cae56426cc96a7

openvswitch3.1-ipsec-3.1.0-32.el9fdp.aarch64.rpm

SHA-256: 32c886b4cf369e632d9f307554e78bbd1ddcd7a3d669820bcad3e73186c26d58

openvswitch3.1-test-3.1.0-32.el9fdp.noarch.rpm

SHA-256: 51773c83943c0ff846a8bc79024231205069b5d3dacd58485e22f17cc2e9d9d7

ovn23.06-23.06.0-13.el9fdp.aarch64.rpm

SHA-256: e49424399e0c667088e64c10634e541b6a4c95bf6ea316b0584319673245989b

ovn23.06-central-23.06.0-13.el9fdp.aarch64.rpm

SHA-256: 207da3418dcf875b11ea10c7690991198a933e5652c34fd014d4c3800d618281

ovn23.06-central-debuginfo-23.06.0-13.el9fdp.aarch64.rpm

SHA-256: 87582a54967e70cf997b511ece9dd7f9e23bd61a7d7ddc18bac02ee2822111d4

ovn23.06-debuginfo-23.06.0-13.el9fdp.aarch64.rpm

SHA-256: 2a7a4ca8911bfe572dbac69e58d83295c0d6299e153cf2e5ebcad3df0a483a1e

ovn23.06-debugsource-23.06.0-13.el9fdp.aarch64.rpm

SHA-256: f7d59e168acd3c611d27cc03b928ed991ada2649c65ea948aa963e6044947c10

ovn23.06-host-23.06.0-13.el9fdp.aarch64.rpm

SHA-256: 50d07e73f007f65fcdd94129296072f266152b334808f6077f16589a26c6e2fa

ovn23.06-host-debuginfo-23.06.0-13.el9fdp.aarch64.rpm

SHA-256: 2a947dd41470998be81587fdfde527f531f202a6222fe5e9eb37bc02d787bb97

ovn23.06-vtep-23.06.0-13.el9fdp.aarch64.rpm

SHA-256: 578f5401487fd10df2e1d7a79fa6f374278a95c5b20fa021c13ec88b26c8bd32

ovn23.06-vtep-debuginfo-23.06.0-13.el9fdp.aarch64.rpm

SHA-256: 252bc8e6874b45b06f5372bfa43c4fd66772acacfed0ba08d922e5695d64c23b

perf-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: 96ab812d22ea8c56571173f0c6c9d33073c242db2255e23af5a02bfcbab417fc

perf-debuginfo-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: 74425065c765c71cc3d4df7a25158f7f92c50fa2957ef8caef9f1c0c2749374a

python3-ironic-tests-21.3.1-0.20230706125653.c8f8157.el9.noarch.rpm

SHA-256: 878619a3f73c1037ac2a3fc4cd80b457b9b0460ef397e1d73729c5f3a6aac49f

python3-openvswitch3.1-3.1.0-32.el9fdp.aarch64.rpm

SHA-256: a1ca210d184f2dbc11a0cd76503584d2f36e57bf12793b45bf801efc12360a46

python3-openvswitch3.1-debuginfo-3.1.0-32.el9fdp.aarch64.rpm

SHA-256: 49201b06dc41cb1c645197fcf25b8e440149da6b21a7f707df85e7cfc3f681fc

python3-perf-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: 85cbf30443d08cda9e2f58aa746b9b24d001fde13c71b9cfd7632da463d47b8f

python3-perf-debuginfo-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: 20550bb0e61c746064e8c925b1fb0c55f9561487ae2989b6cb4346c4e8357a1f

rtla-5.14.0-284.23.1.el9_2.aarch64.rpm

SHA-256: 1fc18c478b3fc152f2a85284b4a49cba29008bc9c55468eccb70fd6f420666ff

Red Hat OpenShift Container Platform for ARM 64 4.13 for RHEL 8

SRPM

container-selinux-2.215.0-1.rhaos4.13.el8.src.rpm

SHA-256: 594ba8e6906201b5f714929a3f040773f40f29ff169f2bad79bcce9b496b5917

containernetworking-plugins-1.0.1-8.rhaos4.13.el8.src.rpm

SHA-256: d34ce73f9b093c526bfead60212476c21185208c37344116ed6fa3131b5ba46a

cri-o-1.26.3-10.rhaos4.13.git78941bf.el8.src.rpm

SHA-256: 225d87e3bf7d6c0b4754be6c56340e01ebdc2e93a072f81c57f9f1eb7bcb93f6

nmstate-2.2.12-1.rhaos4.13.el8.src.rpm

SHA-256: a74d02f73a1b5379e2dcc76b95574582e876c53c075298058600d2ad7b6a566f

openshift-4.13.0-202307132344.p0.gf245ced.assembly.stream.el8.src.rpm

SHA-256: eba7dd8dd605ed9ba5a9f3170a30d907f1b0af5486de96aa982169ae0f399de6

openshift-ansible-4.13.0-202306230038.p0.g148be47.assembly.stream.el8.src.rpm

SHA-256: 62a575b3af4c8732efe0195955f39e47fdf61697d69471a89f0046edbfa34e22

openshift-clients-4.13.0-202306230038.p0.ge4c9a6a.assembly.stream.el8.src.rpm

SHA-256: 9fc053a2181b10fe9df59548b730a7b463ad202363e3599f2a7a315eb8242cc4

openshift-kuryr-4.13.0-202306281017.p0.g5baee73.assembly.stream.el8.src.rpm

SHA-256: 37f155efc7dc2fc9ebf370db62ce2f8b33d57159d7da2a9f120bd2e57b821ce0

openshift4-aws-iso-4.13.0-202306230038.p0.gd2acdd5.assembly.stream.el8.src.rpm

SHA-256: b4d222a596704be1cfe966a3fa25156d73a12dd30e607e23fb0d1433f4e4add5

aarch64

container-selinux-2.215.0-1.rhaos4.13.el8.noarch.rpm

SHA-256: b41ef03236e411cc5892f09c6027f583f8852151ef6c9813e059043dd91e1528

containernetworking-plugins-1.0.1-8.rhaos4.13.el8.aarch64.rpm

SHA-256: 2b2163f66531fcb99576d65fa644d4a392a3978d62fe5befbc3d50cd7baf0333

containernetworking-plugins-debuginfo-1.0.1-8.rhaos4.13.el8.aarch64.rpm

SHA-256: 8337779cc11cecb08fa3e541188f365758c435de0645285452430e019cdf379e

containernetworking-plugins-debugsource-1.0.1-8.rhaos4.13.el8.aarch64.rpm

SHA-256: 5c80d8a853f8ff16ccc16c8b3e201660f08ef73cfcb69a9b6e58710377de9070

cri-o-1.26.3-10.rhaos4.13.git78941bf.el8.aarch64.rpm

SHA-256: a1b2c608bbb50c215bcf1ac4232c897c6e7eb26a5a0983c418ed4e8da36241d6

cri-o-debuginfo-1.26.3-10.rhaos4.13.git78941bf.el8.aarch64.rpm

SHA-256: 1435d8ce95f733769e7b816168a09fa5d48137bd6aa6c84455c3fb654b669981

cri-o-debugsource-1.26.3-10.rhaos4.13.git78941bf.el8.aarch64.rpm

SHA-256: 1060a91885d44006b452d10bbffdf9cef14c0a792ddfd623c8d2cd47d48037d2

nmstate-2.2.12-1.rhaos4.13.el8.aarch64.rpm

SHA-256: dedd45d3b94fe8c95521a691118b6bc45595eba3b8aa484c59bb8d9475af668c

nmstate-debuginfo-2.2.12-1.rhaos4.13.el8.aarch64.rpm

SHA-256: 3cc99213608d761d25482ccd602803c41e614dc6f52f131167810935046dcfa5

nmstate-debugsource-2.2.12-1.rhaos4.13.el8.aarch64.rpm

SHA-256: 410829ed961130f09667e18f24ba3a814bc9ba41fa82dd3ad58c8b477d9a2877

nmstate-devel-2.2.12-1.rhaos4.13.el8.aarch64.rpm

SHA-256: 72be8fdbb570658f1274356a0dc67718353a0bf3114890e06fbd1b136d3a9416

nmstate-libs-2.2.12-1.rhaos4.13.el8.aarch64.rpm

SHA-256: 0e782c53cd9d6ff2cbbcad6eb8cf06cbed2fe7028858ecb25838a5bfa1bdf52c

nmstate-libs-debuginfo-2.2.12-1.rhaos4.13.el8.aarch64.rpm

SHA-256: 90765e61f4ffc1a01e649fa40ef95f03bb2ef31c1150bfd3ca22fca2427deca8

openshift-ansible-4.13.0-202306230038.p0.g148be47.assembly.stream.el8.noarch.rpm

SHA-256: 0f15f5a57bee6a3994ac5f10b1654ee84b041b5b04b7e153f928bd988bf2f99d

openshift-ansible-test-4.13.0-202306230038.p0.g148be47.assembly.stream.el8.noarch.rpm

SHA-256: 57bb0ce1c0eabad01a7fff2e7a213582a2ae923063277bbd9ca343d1773afba6

openshift-clients-4.13.0-202306230038.p0.ge4c9a6a.assembly.stream.el8.aarch64.rpm

SHA-256: d5ac0a1ae2dc01b0d6313fa79b8b81ce8768622d0a65fcf51ee3aa17b8f6f7b1

openshift-hyperkube-4.13.0-202307132344.p0.gf245ced.assembly.stream.el8.aarch64.rpm

SHA-256: c402371c80ff859209c61383cba2af5de4eb83be3a261d64fb9a275018fe5b64

openshift-kuryr-cni-4.13.0-202306281017.p0.g5baee73.assembly.stream.el8.noarch.rpm

SHA-256: 1fb1d3fbd99bfd34dd377b3f3e2c601d99e803e85eb01759196ef8b393eb39a3

openshift-kuryr-common-4.13.0-202306281017.p0.g5baee73.assembly.stream.el8.noarch.rpm

SHA-256: bbe015f77db809c02d17301d40421b30e9188b1ae60d8fc3367a55f5a3812532

openshift-kuryr-controller-4.13.0-202306281017.p0.g5baee73.assembly.stream.el8.noarch.rpm

SHA-256: 28049ee509a6da23d01f469680d4e71cf0bac281ca242dc44f44f3e648f902a3

openshift4-aws-iso-4.13.0-202306230038.p0.gd2acdd5.assembly.stream.el8.noarch.rpm

SHA-256: 0e5e75d41e37090beea73a11a1779eff4327c26f69f6a1b4f36a0a6f0dc8fa95

python3-kuryr-kubernetes-4.13.0-202306281017.p0.g5baee73.assembly.stream.el8.noarch.rpm

SHA-256: afe76a9acdad7676ee98c8e25a58743e5b0553e9f4888f6083207ab8d6e99a5d

The Red Hat security contact is [email protected]. More contact details at https://access.redhat.com/security/team/contact/.

Related news

Gentoo Linux Security Advisory 202408-25

Gentoo Linux Security Advisory 202408-25 - Multiple vulnerabilities have been discovered in runc, the worst of which could lead to privilege escalation. Versions greater than or equal to 1.1.12 are affected.

Red Hat Security Advisory 2024-0746-03

Red Hat Security Advisory 2024-0746-03 - Updated container image for Red Hat Ceph Storage 5.3 is now available in the Red Hat Ecosystem Catalog. Issues addressed include cross site scripting and denial of service vulnerabilities.

Gentoo Linux Security Advisory 202311-09

Gentoo Linux Security Advisory 202311-9 - Multiple vulnerabilities have been discovered in Go, the worst of which could lead to remote code execution. Versions greater than or equal to 1.20.10 are affected.

Red Hat Security Advisory 2023-5964-01

Red Hat Security Advisory 2023-5964-01 - An update for collectd-libpod-stats is now available for Red Hat OpenStack Platform 16.2.5. Issues addressed include a denial of service vulnerability.

RHSA-2023:5442: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.8.2 security and bug fix updates

Red Hat Advanced Cluster Management for Kubernetes 2.8.2 General Availability release images, which provide security updates and fix bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41721: A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead read the body of the HTTP request, which could be att...

CVE-2023-1260: cve-details

An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions "update, patch" the "pods/ephemeralcontainers" subresource beyond what the default is. They would then need to create a new pod or patch one that they already have access to. This might allow evasion of SCC admission restrictions, thereby gaining control of a privileged pod.

Red Hat Security Advisory 2023-4898-01

Red Hat Security Advisory 2023-4898-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.10.67.

RHSA-2023:4972: Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.1.8 security updates and bug fixes

Multicluster Engine for Kubernetes 2.1.8 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated. * CVE-2023-37466: A flaw was found in the vm2 Promise handler sanitization, which allows attackers to esc...

Red Hat Security Advisory 2023-4875-01

Red Hat Security Advisory 2023-4875-01 - Red Hat Advanced Cluster Management for Kubernetes 2.8.1 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which provide security updates and fix several bugs. Issues addressed include bypass and privilege escalation vulnerabilities.

Red Hat Security Advisory 2023-4657-01

Red Hat Security Advisory 2023-4657-01 - Secondary Scheduler Operator for Red Hat OpenShift 1.1.2. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-4664-01

Red Hat Security Advisory 2023-4664-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 4.13.3 images. Issues addressed include a denial of service vulnerability.

RHSA-2023:4664: Red Hat Security Advisory: OpenShift Virtualization 4.13.3 Images security and bug fix update

Red Hat OpenShift Virtualization release 4.13.3 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of requests. * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Con...

Red Hat Security Advisory 2023-4627-01

Red Hat Security Advisory 2023-4627-01 - Migration Toolkit for Applications 6.2.0 Images. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-4456-01

Red Hat Security Advisory 2023-4456-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.8. Issues addressed include an add administrator vulnerability.

RHSA-2023:4335: Red Hat Security Advisory: Security Update for cert-manager Operator for Red Hat OpenShift 1.10.3

cert-manager Operator for Red Hat OpenShift 1.10.3 Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specia...

RHSA-2023:4475: Red Hat Security Advisory: Gatekeeper Operator v0.2 security fixes and enhancements

Gatekeeper Operator v0.2 security fixes and enhancements Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.

Red Hat Security Advisory 2023-4312-01

Red Hat Security Advisory 2023-4312-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.11.46.

RHSA-2023:4312: Red Hat Security Advisory: OpenShift Container Platform 4.11.46 security update

Red Hat OpenShift Container Platform release 4.11.46 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1260: An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions "update, patch" the "p...

Red Hat Security Advisory 2023-4226-01

Red Hat Security Advisory 2023-4226-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.6.

Red Hat Security Advisory 2023-4225-01

Red Hat Security Advisory 2023-4225-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.6.

Red Hat Security Advisory 2023-4290-01

Red Hat Security Advisory 2023-4290-01 - OpenShift sandboxed containers 1.4.1 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.

Red Hat Security Advisory 2023-4293-01

Red Hat Security Advisory 2023-4293-01 - The Migration Toolkit for Containers (MTC) 1.7.11 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate.

RHSA-2023:4226: Red Hat Security Advisory: OpenShift Container Platform 4.13.6 bug fix and security update

Red Hat OpenShift Container Platform release 4.13.6 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number...

RHSA-2023:4225: Red Hat Security Advisory: OpenShift Container Platform 4.13.6 security and extras update

Red Hat OpenShift Container Platform release 4.13.6 is now available with updates to packages and images that fix several bugs. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.

Red Hat Security Advisory 2023-4276-01

Red Hat Security Advisory 2023-4276-01 - An update is now available for Red Hat DevWorkspace Operator. Red Hat Product Security has rated this update as having a security impact of Moderate.

Red Hat Security Advisory 2023-4241-01

Red Hat Security Advisory 2023-4241-01 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Data Foundation. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform.

Red Hat Security Advisory 2023-4093-01

Red Hat Security Advisory 2023-4093-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.5. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-4091-01

Red Hat Security Advisory 2023-4091-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.5. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-4090-01

Red Hat Security Advisory 2023-4090-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.5.

RHSA-2023:4091: Red Hat Security Advisory: OpenShift Container Platform 4.13.5 security update

Red Hat OpenShift Container Platform release 4.13.5 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server c...

RHSA-2023:4090: Red Hat Security Advisory: OpenShift Container Platform 4.13.5 security update

Red Hat OpenShift Container Platform release 4.13.5 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server c...

RHSA-2023:4238: Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.11.9 security and bug fix update

Updated images that fix several bugs are now available for Red Hat OpenShift Data Foundation 4.11.9 on Red Hat Enterprise Linux 8 from Red Hat Container Registry. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.

RHSA-2023:4204: Red Hat Security Advisory: VolSync 0.7.3 security fixes and enhancements

VolSync v0.7.3 enhancements and security fixes Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.

RHSA-2023:4113: Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.3.5 security update

Red Hat OpenShift Service Mesh 2.3.5 Containers Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptog...

RHSA-2023:4114: Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.1 security update

Red Hat OpenShift Service Mesh 2.4.1 Containers Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.

Red Hat Security Advisory 2023-3976-01

Red Hat Security Advisory 2023-3976-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.12.24.

RHSA-2023:3976: Red Hat Security Advisory: OpenShift Container Platform 4.12.24 packages and security update

Red Hat OpenShift Container Platform release 4.12.24 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1260: An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions "update, patch" the "po...

Red Hat Security Advisory 2023-4003-01

Red Hat Security Advisory 2023-4003-01 - As a Kubernetes user, I cannot connect easily connect services from one cluster with services on another cluster. Red Hat Application Interconnect enables me to create a service network and it allows geographically distributed services to connect as if they were all running in the same site. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-4003-01

Red Hat Security Advisory 2023-4003-01 - As a Kubernetes user, I cannot connect easily connect services from one cluster with services on another cluster. Red Hat Application Interconnect enables me to create a service network and it allows geographically distributed services to connect as if they were all running in the same site. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-4003-01

Red Hat Security Advisory 2023-4003-01 - As a Kubernetes user, I cannot connect easily connect services from one cluster with services on another cluster. Red Hat Application Interconnect enables me to create a service network and it allows geographically distributed services to connect as if they were all running in the same site. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-4003-01

Red Hat Security Advisory 2023-4003-01 - As a Kubernetes user, I cannot connect easily connect services from one cluster with services on another cluster. Red Hat Application Interconnect enables me to create a service network and it allows geographically distributed services to connect as if they were all running in the same site. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-4003-01

Red Hat Security Advisory 2023-4003-01 - As a Kubernetes user, I cannot connect easily connect services from one cluster with services on another cluster. Red Hat Application Interconnect enables me to create a service network and it allows geographically distributed services to connect as if they were all running in the same site. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-4003-01

Red Hat Security Advisory 2023-4003-01 - As a Kubernetes user, I cannot connect easily connect services from one cluster with services on another cluster. Red Hat Application Interconnect enables me to create a service network and it allows geographically distributed services to connect as if they were all running in the same site. Issues addressed include a denial of service vulnerability.

RHSA-2023:4003: Red Hat Security Advisory: Red Hat Service Interconnect 1.4 Release security update

This is release 1.4 of the rpms for Red Hat Service Interconnect. Red Hat Service Interconnect 1.4 introduces a service network, linking TCP and HTTP services across the hybrid cloud. A service network enables communication between services running in different network locations or sites. It allows geographically distributed services to connect as if they were all running in the same site. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: A flaw was found in the gol...

RHSA-2023:4003: Red Hat Security Advisory: Red Hat Service Interconnect 1.4 Release security update

This is release 1.4 of the rpms for Red Hat Service Interconnect. Red Hat Service Interconnect 1.4 introduces a service network, linking TCP and HTTP services across the hybrid cloud. A service network enables communication between services running in different network locations or sites. It allows geographically distributed services to connect as if they were all running in the same site. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: A flaw was found in the gol...

RHSA-2023:4003: Red Hat Security Advisory: Red Hat Service Interconnect 1.4 Release security update

This is release 1.4 of the rpms for Red Hat Service Interconnect. Red Hat Service Interconnect 1.4 introduces a service network, linking TCP and HTTP services across the hybrid cloud. A service network enables communication between services running in different network locations or sites. It allows geographically distributed services to connect as if they were all running in the same site. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: A flaw was found in the gol...

RHSA-2023:4003: Red Hat Security Advisory: Red Hat Service Interconnect 1.4 Release security update

This is release 1.4 of the rpms for Red Hat Service Interconnect. Red Hat Service Interconnect 1.4 introduces a service network, linking TCP and HTTP services across the hybrid cloud. A service network enables communication between services running in different network locations or sites. It allows geographically distributed services to connect as if they were all running in the same site. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: A flaw was found in the gol...

RHSA-2023:4003: Red Hat Security Advisory: Red Hat Service Interconnect 1.4 Release security update

This is release 1.4 of the rpms for Red Hat Service Interconnect. Red Hat Service Interconnect 1.4 introduces a service network, linking TCP and HTTP services across the hybrid cloud. A service network enables communication between services running in different network locations or sites. It allows geographically distributed services to connect as if they were all running in the same site. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: A flaw was found in the gol...

RHSA-2023:4003: Red Hat Security Advisory: Red Hat Service Interconnect 1.4 Release security update

This is release 1.4 of the rpms for Red Hat Service Interconnect. Red Hat Service Interconnect 1.4 introduces a service network, linking TCP and HTTP services across the hybrid cloud. A service network enables communication between services running in different network locations or sites. It allows geographically distributed services to connect as if they were all running in the same site. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: A flaw was found in the gol...

Red Hat Security Advisory 2023-3925-01

Red Hat Security Advisory 2023-3925-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.23.

Red Hat Security Advisory 2023-3925-01

Red Hat Security Advisory 2023-3925-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.23.

RHSA-2023:3925: Red Hat Security Advisory: Red Hat OpenShift Enterprise security update

Red Hat OpenShift Container Platform release 4.12.23 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-...

RHSA-2023:3925: Red Hat Security Advisory: Red Hat OpenShift Enterprise security update

Red Hat OpenShift Container Platform release 4.12.23 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-...

Red Hat Security Advisory 2023-3914-01

Red Hat Security Advisory 2023-3914-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.11.44.

Red Hat Security Advisory 2023-3911-01

Red Hat Security Advisory 2023-3911-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.63.

Red Hat Security Advisory 2023-3910-01

Red Hat Security Advisory 2023-3910-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.10.63.

RHSA-2023:3910: Red Hat Security Advisory: Red Hat OpenShift Enterprise security update

Red Hat OpenShift Container Platform release 4.10.63 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.10. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server...

RHSA-2023:3915: Red Hat Security Advisory: OpenShift Container Platform 4.11.44 bug fix and security update

Red Hat OpenShift Container Platform release 4.11.44 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS...

Red Hat Security Advisory 2023-3612-01

Red Hat Security Advisory 2023-3612-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.4. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3612-01

Red Hat Security Advisory 2023-3612-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.4. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3612-01

Red Hat Security Advisory 2023-3612-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.4. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3612-01

Red Hat Security Advisory 2023-3612-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.4. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3612-01

Red Hat Security Advisory 2023-3612-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.4. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3612-01

Red Hat Security Advisory 2023-3612-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.4. Issues addressed include a denial of service vulnerability.

CVE-2023-32463: DSA-2023-200: Security Update for Dell VxRail for Multiple Third-Party Component Vulnerabilities

Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction.

CVE-2023-32463: DSA-2023-200: Security Update for Dell VxRail for Multiple Third-Party Component Vulnerabilities

Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction.

Red Hat Security Advisory 2023-3540-01

Red Hat Security Advisory 2023-3540-01 - Red Hat build of MicroShift is Red Hat's light-weight Kubernetes orchestration solution designed for edge device deployments and is built from the edge capabilities of Red Hat OpenShift. MicroShift is an application that is deployed on top of Red Hat Enterprise Linux devices at the edge, providing an efficient way to operate single-node clusters in these low-resource environments. This advisory contains the RPM packages for Red Hat build of MicroShift 4.13.3. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3540-01

Red Hat Security Advisory 2023-3540-01 - Red Hat build of MicroShift is Red Hat's light-weight Kubernetes orchestration solution designed for edge device deployments and is built from the edge capabilities of Red Hat OpenShift. MicroShift is an application that is deployed on top of Red Hat Enterprise Linux devices at the edge, providing an efficient way to operate single-node clusters in these low-resource environments. This advisory contains the RPM packages for Red Hat build of MicroShift 4.13.3. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3540-01

Red Hat Security Advisory 2023-3540-01 - Red Hat build of MicroShift is Red Hat's light-weight Kubernetes orchestration solution designed for edge device deployments and is built from the edge capabilities of Red Hat OpenShift. MicroShift is an application that is deployed on top of Red Hat Enterprise Linux devices at the edge, providing an efficient way to operate single-node clusters in these low-resource environments. This advisory contains the RPM packages for Red Hat build of MicroShift 4.13.3. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3540-01

Red Hat Security Advisory 2023-3540-01 - Red Hat build of MicroShift is Red Hat's light-weight Kubernetes orchestration solution designed for edge device deployments and is built from the edge capabilities of Red Hat OpenShift. MicroShift is an application that is deployed on top of Red Hat Enterprise Linux devices at the edge, providing an efficient way to operate single-node clusters in these low-resource environments. This advisory contains the RPM packages for Red Hat build of MicroShift 4.13.3. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3540-01

Red Hat Security Advisory 2023-3540-01 - Red Hat build of MicroShift is Red Hat's light-weight Kubernetes orchestration solution designed for edge device deployments and is built from the edge capabilities of Red Hat OpenShift. MicroShift is an application that is deployed on top of Red Hat Enterprise Linux devices at the edge, providing an efficient way to operate single-node clusters in these low-resource environments. This advisory contains the RPM packages for Red Hat build of MicroShift 4.13.3. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3445-01

Red Hat Security Advisory 2023-3445-01 - An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3445-01

Red Hat Security Advisory 2023-3445-01 - An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3445-01

Red Hat Security Advisory 2023-3445-01 - An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3445-01

Red Hat Security Advisory 2023-3445-01 - An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3445-01

Red Hat Security Advisory 2023-3445-01 - An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3445-01

Red Hat Security Advisory 2023-3445-01 - An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Issues addressed include a denial of service vulnerability.

RHSA-2023:3445: Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update

An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-28235: A flaw was found in etcd, where etc-io could allow a remote attacker to gain elevated privileges on the system caused by a vulnerability in the debug function. By sending a specially crafted request, an attacker can gain elevated privileges. * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause e...

RHSA-2023:3445: Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update

An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-28235: A flaw was found in etcd, where etc-io could allow a remote attacker to gain elevated privileges on the system caused by a vulnerability in the debug function. By sending a specially crafted request, an attacker can gain elevated privileges. * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause e...

RHSA-2023:3445: Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update

An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-28235: A flaw was found in etcd, where etc-io could allow a remote attacker to gain elevated privileges on the system caused by a vulnerability in the debug function. By sending a specially crafted request, an attacker can gain elevated privileges. * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause e...

RHSA-2023:3445: Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update

An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-28235: A flaw was found in etcd, where etc-io could allow a remote attacker to gain elevated privileges on the system caused by a vulnerability in the debug function. By sending a specially crafted request, an attacker can gain elevated privileges. * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause e...

RHSA-2023:3445: Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update

An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-28235: A flaw was found in etcd, where etc-io could allow a remote attacker to gain elevated privileges on the system caused by a vulnerability in the debug function. By sending a specially crafted request, an attacker can gain elevated privileges. * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause e...

RHSA-2023:3445: Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update

An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-28235: A flaw was found in etcd, where etc-io could allow a remote attacker to gain elevated privileges on the system caused by a vulnerability in the debug function. By sending a specially crafted request, an attacker can gain elevated privileges. * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause e...

RHSA-2023:3450: Red Hat Security Advisory: OpenShift Serverless Client kn 1.29.0 release

OpenShift Serverless 1.29.0 has been released. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of serv...

RHSA-2023:3450: Red Hat Security Advisory: OpenShift Serverless Client kn 1.29.0 release

OpenShift Serverless 1.29.0 has been released. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of serv...

RHSA-2023:3450: Red Hat Security Advisory: OpenShift Serverless Client kn 1.29.0 release

OpenShift Serverless 1.29.0 has been released. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of serv...

RHSA-2023:3450: Red Hat Security Advisory: OpenShift Serverless Client kn 1.29.0 release

OpenShift Serverless 1.29.0 has been released. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of serv...

RHSA-2023:3435: Red Hat Security Advisory: Red Hat Advanced Cluster Security 3.74 for Kubernetes security update

An update is now available for Red Hat Advanced Cluster Security for Kubernetes (RHACS). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24539: A flaw was found in golang where angle brackets (<>) were not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character could result in unexpectedly closing the CSS context and allowing for the injection of unexpected HMTL if executed with untrusted inpu...

RHSA-2023:3435: Red Hat Security Advisory: Red Hat Advanced Cluster Security 3.74 for Kubernetes security update

An update is now available for Red Hat Advanced Cluster Security for Kubernetes (RHACS). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24539: A flaw was found in golang where angle brackets (<>) were not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character could result in unexpectedly closing the CSS context and allowing for the injection of unexpected HMTL if executed with untrusted inpu...

Red Hat Security Advisory 2023-3415-01

Red Hat Security Advisory 2023-3415-01 - Updated images are now available for Red Hat Advanced Cluster Security (RHACS). The updated image includes security and bug fixes.

Red Hat Security Advisory 2023-3415-01

Red Hat Security Advisory 2023-3415-01 - Updated images are now available for Red Hat Advanced Cluster Security (RHACS). The updated image includes security and bug fixes.

RHSA-2023:3415: Red Hat Security Advisory: ACS 4.0 enhancement and security update

Updated images are now available for Red Hat Advanced Cluster Security (RHACS). The updated image includes security and bug fixes. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24539: A flaw was found in golang where angle brackets (<>) were not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character could result in unexpectedly closing the CSS context and allowing for the injection of unexpe...

RHSA-2023:3415: Red Hat Security Advisory: ACS 4.0 enhancement and security update

Updated images are now available for Red Hat Advanced Cluster Security (RHACS). The updated image includes security and bug fixes. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24539: A flaw was found in golang where angle brackets (<>) were not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character could result in unexpectedly closing the CSS context and allowing for the injection of unexpe...

Red Hat Security Advisory 2023-3323-01

Red Hat Security Advisory 2023-3323-01 - Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.

Red Hat Security Advisory 2023-3323-01

Red Hat Security Advisory 2023-3323-01 - Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.

Red Hat Security Advisory 2023-3323-01

Red Hat Security Advisory 2023-3323-01 - Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.

Red Hat Security Advisory 2023-3323-01

Red Hat Security Advisory 2023-3323-01 - Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.

RHSA-2023:3323: Red Hat Security Advisory: go-toolset-1.19 and go-toolset-1.19-golang security update

An update for go-toolset-1.19 and go-toolset-1.19-golang is now available for Red Hat Developer Tools. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24537: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by an infinite loop due to integer overflow when calling any of the Parse functions. By sending a specially crafted input, a remote attacker can cause a denial of service. * CVE-2023-24538: A flaw was found in Golang Go. This flaw ...

RHSA-2023:3323: Red Hat Security Advisory: go-toolset-1.19 and go-toolset-1.19-golang security update

An update for go-toolset-1.19 and go-toolset-1.19-golang is now available for Red Hat Developer Tools. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24537: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by an infinite loop due to integer overflow when calling any of the Parse functions. By sending a specially crafted input, a remote attacker can cause a denial of service. * CVE-2023-24538: A flaw was found in Golang Go. This flaw ...

RHSA-2023:3323: Red Hat Security Advisory: go-toolset-1.19 and go-toolset-1.19-golang security update

An update for go-toolset-1.19 and go-toolset-1.19-golang is now available for Red Hat Developer Tools. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24537: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by an infinite loop due to integer overflow when calling any of the Parse functions. By sending a specially crafted input, a remote attacker can cause a denial of service. * CVE-2023-24538: A flaw was found in Golang Go. This flaw ...

Red Hat Security Advisory 2023-3167-01

Red Hat Security Advisory 2023-3167-01 - New Red Hat build of Cryostat 2.3.0 on RHEL 8 container images have been released, adding a variety of features and bug fixes. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3167-01

Red Hat Security Advisory 2023-3167-01 - New Red Hat build of Cryostat 2.3.0 on RHEL 8 container images have been released, adding a variety of features and bug fixes. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3167-01

Red Hat Security Advisory 2023-3167-01 - New Red Hat build of Cryostat 2.3.0 on RHEL 8 container images have been released, adding a variety of features and bug fixes. Issues addressed include a denial of service vulnerability.

Ubuntu Security Notice USN-6088-1

Ubuntu Security Notice 6088-1 - It was discovered that runC incorrectly made /sys/fs/cgroup writable when in rootless mode. An attacker could possibly use this issue to escalate privileges. It was discovered that runC incorrectly performed access control when mounting /proc to non-directories. An attacker could possibly use this issue to escalate privileges. It was discovered that runC incorrectly handled /proc and /sys mounts inside a container. An attacker could possibly use this issue to bypass AppArmor, and potentially SELinux.

Red Hat Security Advisory 2023-1326-01

Red Hat Security Advisory 2023-1326-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.0. Issues addressed include bypass, denial of service, information leakage, out of bounds read, and remote SQL injection vulnerabilities.

Red Hat Security Advisory 2023-1326-01

Red Hat Security Advisory 2023-1326-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.0. Issues addressed include bypass, denial of service, information leakage, out of bounds read, and remote SQL injection vulnerabilities.

RHSA-2023:3167: Red Hat Security Advisory: Red Hat build of Cryostat 2.3.0: new RHEL 8 container images

New Red Hat build of Cryostat 2.3.0 on RHEL 8 container images are now availableThis content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition. * CVE-2022-41725: A flaw was found in Go, where it is vulnerable to a denial of service caused by an excessive resource consumption...

RHSA-2023:3167: Red Hat Security Advisory: Red Hat build of Cryostat 2.3.0: new RHEL 8 container images

New Red Hat build of Cryostat 2.3.0 on RHEL 8 container images are now availableThis content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition. * CVE-2022-41725: A flaw was found in Go, where it is vulnerable to a denial of service caused by an excessive resource consumption...

RHSA-2023:3167: Red Hat Security Advisory: Red Hat build of Cryostat 2.3.0: new RHEL 8 container images

New Red Hat build of Cryostat 2.3.0 on RHEL 8 container images are now availableThis content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition. * CVE-2022-41725: A flaw was found in Go, where it is vulnerable to a denial of service caused by an excessive resource consumption...

RHSA-2023:1326: Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update

Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: A flaw was found in go-yaml. This issue occurs due to unbounded alias chasing, where a maliciously crafted YAML file can cause the system to consume significant system resources. If p...

RHSA-2023:1326: Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update

Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: A flaw was found in go-yaml. This issue occurs due to unbounded alias chasing, where a maliciously crafted YAML file can cause the system to consume significant system resources. If p...

CVE-2023-24538

Templates do not properly consider backticks (`) as Javascript string delimiters, and do not escape them as expected. Backticks are used, since ES6, for JS template literals. If a template contains a Go template action within a Javascript template literal, the contents of the action can be used to terminate the literal, injecting arbitrary Javascript code into the Go template. As ES6 template literals are rather complex, and themselves can do string interpolation, the decision was made to simply disallow Go template actions from being used inside of them (e.g. "var a = {{.}}"), since there is no obviously safe way to allow this behavior. This takes the same approach as github.com/google/safehtml. With fix, Template.Parse returns an Error when it encounters templates like this, with an ErrorCode of value 12. This ErrorCode is currently unexported, but will be exported in the release of Go 1.21. Users who rely on the previous behavior can re-enable it using the GODEBUG flag jstmpllitinte...

CVE-2023-24537

Calling any of the Parse functions on Go source code which contains //line directives with very large line numbers can cause an infinite loop due to integer overflow.

CVE-2023-24534: net/http, net/textproto: denial of service from excessive memory allocation ​(CVE-2023-24534) · Issue #58975 · golang/go

HTTP and MIME header parsing can allocate large amounts of memory, even when parsing small inputs, potentially leading to a denial of service. Certain unusual patterns of input data can cause the common function used to parse HTTP and MIME headers to allocate substantially more memory than required to hold the parsed headers. An attacker can exploit this behavior to cause an HTTP server to allocate large amounts of memory from a small request, potentially leading to memory exhaustion and a denial of service. With fix, header parsing now correctly allocates only the memory required to hold parsed headers.

CVE-2023-24536

Multipart form parsing can consume large amounts of CPU and memory when processing form inputs containing very large numbers of parts. This stems from several causes: 1. mime/multipart.Reader.ReadForm limits the total memory a parsed multipart form can consume. ReadForm can undercount the amount of memory consumed, leading it to accept larger inputs than intended. 2. Limiting total memory does not account for increased pressure on the garbage collector from large numbers of small allocations in forms with many parts. 3. ReadForm can allocate a large number of short-lived buffers, further increasing pressure on the garbage collector. The combination of these factors can permit an attacker to cause an program that parses multipart forms to consume large amounts of CPU and memory, potentially resulting in a denial of service. This affects programs that use mime/multipart.Reader.ReadForm, as well as form parsing in the net/http package with the Request methods FormFile, FormValue, ParseMul...

CVE-2023-28642: AppArmor/SELinux bypass with symlinked /proc

runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked `/proc`. See PR #3785 for details. users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image.

CVE-2023-27561: CVE-2019-19921 re-introduction/regression · Issue #3751 · opencontainers/runc

runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression.

CVE-2019-19921: [CVE-2019-19921]: Volume mount race condition with shared mounts · Issue #2197 · opencontainers/runc

runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. (This vulnerability does not affect Docker due to an implementation detail that happens to block the attack.)