Headline
RHSA-2022:6102: Red Hat Security Advisory: OpenShift Container Platform 4.11.1 packages and security update
Red Hat OpenShift Container Platform release 4.11.1 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add
Synopsis
Low: OpenShift Container Platform 4.11.1 packages and security update
Type/Severity
Security Advisory: Low
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
Red Hat OpenShift Container Platform release 4.11.1 is now available with
updates to packages and images that fix several bugs and add enhancements.
This release includes a security update for Red Hat OpenShift Container Platform 4.11.
Red Hat Product Security has rated this update as having a security impact
of Low. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Description
Red Hat OpenShift Container Platform is Red Hat’s cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.11.1. See the following advisory for the container images for this release:
https://access.redhat.com/errata/RHSA-2022:6103
Security Fix(es):
- golang: crypto/tls: session tickets lack random ticket_age_add
(CVE-2022-30629)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s)
listed in the References section.
All OpenShift Container Platform 4.11 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html
Affected Products
- Red Hat OpenShift Container Platform 4.11 for RHEL 8 x86_64
- Red Hat OpenShift Container Platform for Power 4.11 for RHEL 8 ppc64le
- Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.11 for RHEL 8 s390x
- Red Hat OpenShift Container Platform for ARM 64 4.11 aarch64
Fixes
- BZ - 2092793 - CVE-2022-30629 golang: crypto/tls: session tickets lack random ticket_age_add
Red Hat OpenShift Container Platform 4.11 for RHEL 8
SRPM
NetworkManager-1.36.0-8.el8_6.src.rpm
SHA-256: dfcc22d243d157657095c45ae51609cd1bded7072ba39faaa63b10fc53d36782
butane-0.15.0-2.rhaos4.11.el8.src.rpm
SHA-256: 97f0f7c653de494e484f62bf41e526dd2305be3f4986dfa13446496b030c3012
console-login-helper-messages-0.20.4-1.rhaos4.11.el8.src.rpm
SHA-256: 929d2a057b06524ff3a064ce2c899652e41bee04c95646d9bcde434a4de2e921
cri-o-1.24.2-4.rhaos4.11.gitd6283df.el8.src.rpm
SHA-256: cda75edce103e6412ee8e671959671c0ecf76b2c20ce2c725e75ff432d52119e
ignition-2.14.0-4.rhaos4.11.el8.src.rpm
SHA-256: 5d80fd98a55846a0cff8ca9ed8abfd64a3f5ef7731e9581fe5a1cdcd455279f6
openshift-4.11.0-202208101756.p0.g4f0dd4d.assembly.stream.el8.src.rpm
SHA-256: 36f053b6482d036e6f21a9adfcd583d842137c9439f8bc9fb2f3977f15aa854a
openshift-ansible-4.11.0-202208111716.p0.gdf73941.assembly.stream.el8.src.rpm
SHA-256: 9705cbbe3d4987ae4c1cc5bd4bda0f29e2546aaa9a541be51844a5922325fd0f
openshift-clients-4.11.0-202208110436.p0.gfcf512e.assembly.stream.el8.src.rpm
SHA-256: 848117764e8dffea4c94ae363e5e656b660fe880c3bf858badc739e2e8383284
openshift-kuryr-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.src.rpm
SHA-256: 04336ee1e5ed316311e459fa370d14eac8325758e978f07ef1d3d8e2d5275a27
python-kubernetes-24.2.0-1.el8.src.rpm
SHA-256: b5ab96db91c8590d991412d6176f2b60c47bfe23e1066a67a9fe320f779be3c9
x86_64
NetworkManager-1.36.0-8.el8_6.x86_64.rpm
SHA-256: b2769bd978be2c0a2a2a60aaebe3561585f09708a9b65a620cb526e57fd25f59
NetworkManager-adsl-1.36.0-8.el8_6.x86_64.rpm
SHA-256: 43725910403075ce8bc645cacec4a16d75548db59c4f61fd2a3c94884887ca81
NetworkManager-adsl-debuginfo-1.36.0-8.el8_6.x86_64.rpm
SHA-256: 026da5c6f0c816871ac93a4e46643c4ece801a81c7cf13f3b2ecc9b2469594f0
NetworkManager-bluetooth-1.36.0-8.el8_6.x86_64.rpm
SHA-256: f1d4c3cee8e87db9140b82ca6e26431e32d20438bc5f8c30eb0167fead74f6f7
NetworkManager-bluetooth-debuginfo-1.36.0-8.el8_6.x86_64.rpm
SHA-256: 951983cb6f1c5cf0ab3e61882672a983588f9ab5cc4b3fc39c29029f5f9859e7
NetworkManager-cloud-setup-1.36.0-8.el8_6.x86_64.rpm
SHA-256: de7e60f4d0984e14ad8c4b3fbabe9f6f96fe3bff4ab6e3fed7555b2ecd2977e2
NetworkManager-cloud-setup-debuginfo-1.36.0-8.el8_6.x86_64.rpm
SHA-256: 1676f2591dc8600abca14b87a1fda3e1729addc038dcb5a6e7c6f56237daeb5a
NetworkManager-config-connectivity-redhat-1.36.0-8.el8_6.noarch.rpm
SHA-256: afce910d783881294aa86ba61556c4a16e2531f1266a4f9f12f5492304bedd31
NetworkManager-config-server-1.36.0-8.el8_6.noarch.rpm
SHA-256: f8d5a45bf5a96561739875a091be0cbb94b5faaa7fe22a7a535198fd5d43dad4
NetworkManager-debuginfo-1.36.0-8.el8_6.x86_64.rpm
SHA-256: cf1495463b7375220db149b75a5ee004dbdb210a7ed8c0922978b8aed28e1094
NetworkManager-debugsource-1.36.0-8.el8_6.x86_64.rpm
SHA-256: efcd4cb40127c085df46e859c1018b4d2373ba769b35226dff45a37ce1d0392e
NetworkManager-dispatcher-routing-rules-1.36.0-8.el8_6.noarch.rpm
SHA-256: 77594dbc4d26d004364ade48b803021c13ba4e50f6e0c05bd1bc708b608229d9
NetworkManager-libnm-1.36.0-8.el8_6.x86_64.rpm
SHA-256: 2f388d3c4a74990db3ed3d0d04189a6a0f2d9e535f673e68bc8d2bb4d94c9183
NetworkManager-libnm-debuginfo-1.36.0-8.el8_6.x86_64.rpm
SHA-256: 5e4dac04f01741d31093fa7abf9a4963f6a41775675edb45cbc31cacd30a262c
NetworkManager-libnm-devel-1.36.0-8.el8_6.x86_64.rpm
SHA-256: 518493f8872cadc9a067a0e552cadafaf9b7a2c2ece86bc15bd6fe9aab426b30
NetworkManager-ovs-1.36.0-8.el8_6.x86_64.rpm
SHA-256: afb0f131e7ec0a782c85daccd4ff1be9882049c1d7d89558b445a0b69f985a90
NetworkManager-ovs-debuginfo-1.36.0-8.el8_6.x86_64.rpm
SHA-256: ed81a6de4c4801809ffef71244e26d399fb64e189027dd04f59191f60f54c333
NetworkManager-ppp-1.36.0-8.el8_6.x86_64.rpm
SHA-256: 97e924e39f77cd53dd2d1eefb3ca59128ce3eea9d3a42ee98354b6d25cde49a6
NetworkManager-ppp-debuginfo-1.36.0-8.el8_6.x86_64.rpm
SHA-256: 013e3c443cbeb8af9d9e368daa944a4a0048fa331d5f28afc50dc3b0ac560397
NetworkManager-team-1.36.0-8.el8_6.x86_64.rpm
SHA-256: 09b391325171c9ce944f3446246ba743c25ba1766fe7370a52c9dd9eb2f366e5
NetworkManager-team-debuginfo-1.36.0-8.el8_6.x86_64.rpm
SHA-256: 25c020d8d82fb1096a6948b29588a870b6f975ec49f087f3c530d7321ffe1a32
NetworkManager-tui-1.36.0-8.el8_6.x86_64.rpm
SHA-256: 004ec09f607eee24a29bac3165a4a1e2241e30889650ebb9ec505e27b5ed250e
NetworkManager-tui-debuginfo-1.36.0-8.el8_6.x86_64.rpm
SHA-256: dde9c3ac12d4ccdc51fcd65bd3cec88bf5ff771db28cabbd2b251cdefb734c52
NetworkManager-wifi-1.36.0-8.el8_6.x86_64.rpm
SHA-256: 333fc5685e3d0d090aa88034582f15ae1cafd475a1781aec9566d2272df08a80
NetworkManager-wifi-debuginfo-1.36.0-8.el8_6.x86_64.rpm
SHA-256: 47ef7bef21231dce599a2f597ea90f31f1dee6751e8a4cb7400f9a8f3f5f6af4
NetworkManager-wwan-1.36.0-8.el8_6.x86_64.rpm
SHA-256: 22bb8c5e9e24fe53efa603cf41e2638f86751e3fb8445dd17289269ef5279dc9
NetworkManager-wwan-debuginfo-1.36.0-8.el8_6.x86_64.rpm
SHA-256: bc1447c3980f3a444648724b3d6d405ce2be91530f8a6fec1dafcb91711b2048
butane-0.15.0-2.rhaos4.11.el8.x86_64.rpm
SHA-256: fad94802e295d82a31846941b339bd0401b554e8d0c1c14562638662feac9638
butane-debuginfo-0.15.0-2.rhaos4.11.el8.x86_64.rpm
SHA-256: 86974f6bb0be33ca5932344ba41e06d799106b502647139e40f9d63a337c0686
butane-debugsource-0.15.0-2.rhaos4.11.el8.x86_64.rpm
SHA-256: a8f18912643c1a205f94425f1498af4a7d25f975f6a118755b6e379d71f041da
butane-redistributable-0.15.0-2.rhaos4.11.el8.noarch.rpm
SHA-256: 2b132379251758e95331512bfa53e5617f1ad8f5429fd00eac6bbcdb61780688
console-login-helper-messages-0.20.4-1.rhaos4.11.el8.noarch.rpm
SHA-256: da1969640080afa1d69061ce700c24051a6489ae52b748890e0c2fdd654fa2a7
console-login-helper-messages-issuegen-0.20.4-1.rhaos4.11.el8.noarch.rpm
SHA-256: ed004ae56f9a93983dbadef06cb5efd780700adb491d13b80d9d25b3675714f2
console-login-helper-messages-profile-0.20.4-1.rhaos4.11.el8.noarch.rpm
SHA-256: f063e55d1d9b2fb7391d5ef20d7e9cee3972ba42d8ff976dd30458d19430c6c1
cri-o-1.24.2-4.rhaos4.11.gitd6283df.el8.x86_64.rpm
SHA-256: 1792a1d55a485be9128ed54e9742e6abeffa72abf0c102dae75874c58c6baa21
cri-o-debuginfo-1.24.2-4.rhaos4.11.gitd6283df.el8.x86_64.rpm
SHA-256: 57374c749830c017e16fba0c7d3ee7cb5f08bd7706d8a95bf7b18d7f99ebaed0
cri-o-debugsource-1.24.2-4.rhaos4.11.gitd6283df.el8.x86_64.rpm
SHA-256: bb1eeed82dff77d300f436ef9643eb9eab9aa0dd9f31dd213a95a99ef04260fa
ignition-2.14.0-4.rhaos4.11.el8.x86_64.rpm
SHA-256: a8fdf4b0de91e20ab8b6aba0bac65d91243180244d9c19880299ac1db9dcb4c7
ignition-debuginfo-2.14.0-4.rhaos4.11.el8.x86_64.rpm
SHA-256: db7bcc44c5870ec1134e89f53cfd0ec5dc09a25be94c25385fc0f0aee4979d3c
ignition-debugsource-2.14.0-4.rhaos4.11.el8.x86_64.rpm
SHA-256: 24c8c50e57073c7fa690f9df5091236bb6cfa062ec2520bad246b94c6f2b9ae1
ignition-validate-2.14.0-4.rhaos4.11.el8.x86_64.rpm
SHA-256: c31ceb6ff7882f027a4b71c3b025b45f124f9a24265cbe6ad8f72fa17c63e51d
ignition-validate-debuginfo-2.14.0-4.rhaos4.11.el8.x86_64.rpm
SHA-256: 91b1ee8ebb36a266d970cf00731e927073583292a0ea90da1c47cff918d02802
openshift-ansible-4.11.0-202208111716.p0.gdf73941.assembly.stream.el8.noarch.rpm
SHA-256: 9ea20faafa1dc5bd098a9e26c2c814a76957eff9424e142fffb88f0880dd6545
openshift-ansible-test-4.11.0-202208111716.p0.gdf73941.assembly.stream.el8.noarch.rpm
SHA-256: 8dae327ef78c802331a299e70bbc64def50489b2b8675abd8cc722e03f6c5f4a
openshift-clients-4.11.0-202208110436.p0.gfcf512e.assembly.stream.el8.x86_64.rpm
SHA-256: 362632b41c4a60aa2ea7f60ad2332f3acce09451fb5f29653b7abe0c41c73858
openshift-clients-redistributable-4.11.0-202208110436.p0.gfcf512e.assembly.stream.el8.x86_64.rpm
SHA-256: a3e8f82f03a89765522e59ca5a67cc3985568c2d5828b9e18707c763ad26dbe3
openshift-hyperkube-4.11.0-202208101756.p0.g4f0dd4d.assembly.stream.el8.x86_64.rpm
SHA-256: 5068455dd438af757c43274a8e8813012be867df83208bbb1442c1d503ce7a9c
openshift-kuryr-cni-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.noarch.rpm
SHA-256: 044bc60c4cddda8c715ce203c9ee407ff504a0efd327b5e26fee46317a3b6509
openshift-kuryr-common-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.noarch.rpm
SHA-256: 440836764b0a83ff0c246d242830b11e17b8711876e1b4e924da26fa297d7ae3
openshift-kuryr-controller-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.noarch.rpm
SHA-256: 82a9ab4510af498e76bd9b37f3b84f5d2ac0a81a3c55ead2897a1a772245d0d0
python3-kubernetes-24.2.0-1.el8.noarch.rpm
SHA-256: c635b0c82713adb5617c0020cbf1c6a517b1b3f78b18258acb2047ada2352f21
python3-kubernetes-tests-24.2.0-1.el8.noarch.rpm
SHA-256: 3b8965b1ae84c257b4b6b5b5984cb146a33b8293e73041feb249a49a2802b0c5
python3-kuryr-kubernetes-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.noarch.rpm
SHA-256: 7455f356395820067325c087c95d856ba769f896d1a0e03f1acbde17a4b124cd
Red Hat OpenShift Container Platform for Power 4.11 for RHEL 8
SRPM
NetworkManager-1.36.0-8.el8_6.src.rpm
SHA-256: dfcc22d243d157657095c45ae51609cd1bded7072ba39faaa63b10fc53d36782
butane-0.15.0-2.rhaos4.11.el8.src.rpm
SHA-256: 97f0f7c653de494e484f62bf41e526dd2305be3f4986dfa13446496b030c3012
console-login-helper-messages-0.20.4-1.rhaos4.11.el8.src.rpm
SHA-256: 929d2a057b06524ff3a064ce2c899652e41bee04c95646d9bcde434a4de2e921
cri-o-1.24.2-4.rhaos4.11.gitd6283df.el8.src.rpm
SHA-256: cda75edce103e6412ee8e671959671c0ecf76b2c20ce2c725e75ff432d52119e
ignition-2.14.0-4.rhaos4.11.el8.src.rpm
SHA-256: 5d80fd98a55846a0cff8ca9ed8abfd64a3f5ef7731e9581fe5a1cdcd455279f6
openshift-4.11.0-202208101756.p0.g4f0dd4d.assembly.stream.el8.src.rpm
SHA-256: 36f053b6482d036e6f21a9adfcd583d842137c9439f8bc9fb2f3977f15aa854a
openshift-ansible-4.11.0-202208111716.p0.gdf73941.assembly.stream.el8.src.rpm
SHA-256: 9705cbbe3d4987ae4c1cc5bd4bda0f29e2546aaa9a541be51844a5922325fd0f
openshift-clients-4.11.0-202208110436.p0.gfcf512e.assembly.stream.el8.src.rpm
SHA-256: 848117764e8dffea4c94ae363e5e656b660fe880c3bf858badc739e2e8383284
openshift-kuryr-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.src.rpm
SHA-256: 04336ee1e5ed316311e459fa370d14eac8325758e978f07ef1d3d8e2d5275a27
python-kubernetes-24.2.0-1.el8.src.rpm
SHA-256: b5ab96db91c8590d991412d6176f2b60c47bfe23e1066a67a9fe320f779be3c9
ppc64le
NetworkManager-1.36.0-8.el8_6.ppc64le.rpm
SHA-256: 7dd6fe085547da826e40798e9ff5134635617699bb3cccce934e3c7369dba945
NetworkManager-adsl-1.36.0-8.el8_6.ppc64le.rpm
SHA-256: 711dcde3cffe46c4ff6ba4684dc51f211957956a5bd1138fe1951bb3688e468d
NetworkManager-adsl-debuginfo-1.36.0-8.el8_6.ppc64le.rpm
SHA-256: 33767ddaa002e7a4047273fb8417a37cd846d283b2683f5933101f2cc0c3bdd5
NetworkManager-bluetooth-1.36.0-8.el8_6.ppc64le.rpm
SHA-256: 94e5e5d060ffa694576f82c679b920929dac7bea57fe92d890626fc1d48be646
NetworkManager-bluetooth-debuginfo-1.36.0-8.el8_6.ppc64le.rpm
SHA-256: 4d04aff28512623cc8076b5665afb2158a1654fb63af17c0dfd388dea50ac083
NetworkManager-cloud-setup-1.36.0-8.el8_6.ppc64le.rpm
SHA-256: 6121010cb234eefb9f303783111cc274246d29578d0f0f0d7ba20290e92a5a36
NetworkManager-cloud-setup-debuginfo-1.36.0-8.el8_6.ppc64le.rpm
SHA-256: cbcbabb84eee3eda3337659070cc261dc4c9ec619dc0937dbb3ab14c079d4e4a
NetworkManager-config-connectivity-redhat-1.36.0-8.el8_6.noarch.rpm
SHA-256: afce910d783881294aa86ba61556c4a16e2531f1266a4f9f12f5492304bedd31
NetworkManager-config-server-1.36.0-8.el8_6.noarch.rpm
SHA-256: f8d5a45bf5a96561739875a091be0cbb94b5faaa7fe22a7a535198fd5d43dad4
NetworkManager-debuginfo-1.36.0-8.el8_6.ppc64le.rpm
SHA-256: 0d7ddbd94f4328df950e4210aefbf30bdcc40e54c444d611b8bf8bbe248b2756
NetworkManager-debugsource-1.36.0-8.el8_6.ppc64le.rpm
SHA-256: dee81126f052b39d1f9255561a8bdcd6415f656385965f0bc209d4f6ab143dd0
NetworkManager-dispatcher-routing-rules-1.36.0-8.el8_6.noarch.rpm
SHA-256: 77594dbc4d26d004364ade48b803021c13ba4e50f6e0c05bd1bc708b608229d9
NetworkManager-libnm-1.36.0-8.el8_6.ppc64le.rpm
SHA-256: e88a63557b26bd311350edf7a4f5984eddb0a833b0006a0ec27d4d06e5adaad7
NetworkManager-libnm-debuginfo-1.36.0-8.el8_6.ppc64le.rpm
SHA-256: c6663da9b215ae5b1c87759b972ffed9b27240d42a1d13e50ba698c890e5bcda
NetworkManager-libnm-devel-1.36.0-8.el8_6.ppc64le.rpm
SHA-256: 5bf834f5364d1dbaa204c4d88e1aeba65fc9717624e3ae8301ed12298da07340
NetworkManager-ovs-1.36.0-8.el8_6.ppc64le.rpm
SHA-256: c03ce40e7497ebab91b01461f73f0bd8bb609d153e07780ff5c0fd1d04d3ebbd
NetworkManager-ovs-debuginfo-1.36.0-8.el8_6.ppc64le.rpm
SHA-256: bea73fb54266c972a80beea558170319f7d1bbed0358bdacea8b118072a7646f
NetworkManager-ppp-1.36.0-8.el8_6.ppc64le.rpm
SHA-256: d4dc8135916bd276b0d69eeae5aa4400fc5acb31b0d7d6b7b356fc981827b4fd
NetworkManager-ppp-debuginfo-1.36.0-8.el8_6.ppc64le.rpm
SHA-256: a865c06bc32ad7dd9dd560a8a5ed465d6bdaf45a355eccb90197ee52ddead855
NetworkManager-team-1.36.0-8.el8_6.ppc64le.rpm
SHA-256: ed69762ce2512acb10701fd4d11bc90842defc0949add3fb6ead65eaf37177bd
NetworkManager-team-debuginfo-1.36.0-8.el8_6.ppc64le.rpm
SHA-256: d91b5936255a3990f370cb572ae4a970e7206cd753a14dc8b9a1f2214a04fb25
NetworkManager-tui-1.36.0-8.el8_6.ppc64le.rpm
SHA-256: 30e76915584f7f545c00a149e9c712395469c19758a336d5766db65d41225c55
NetworkManager-tui-debuginfo-1.36.0-8.el8_6.ppc64le.rpm
SHA-256: 8d977e7b6a6a23e8f2f4e956f548032d1e47c96698071c9de3db5cb98e9fea6b
NetworkManager-wifi-1.36.0-8.el8_6.ppc64le.rpm
SHA-256: a348f70f4ecb4413a57d0d06b03017c5d604cb0401ecb197733ad8ef39b3a8d4
NetworkManager-wifi-debuginfo-1.36.0-8.el8_6.ppc64le.rpm
SHA-256: 16cb2465b943b78acf9348d0a349fd8f64615f73581cfa2edbb4d175b04a3ec7
NetworkManager-wwan-1.36.0-8.el8_6.ppc64le.rpm
SHA-256: 25b563236b74b576acd00a0fa059ef0447f5d6dc40fee14f6a40e5c996fc0c7a
NetworkManager-wwan-debuginfo-1.36.0-8.el8_6.ppc64le.rpm
SHA-256: 39c7ec51b5d3bb4aa48a4d0c65d12a17e550debbcbccdf2516cf455fb5e6298d
butane-0.15.0-2.rhaos4.11.el8.ppc64le.rpm
SHA-256: 9918f0a9fa9ebf5286dd0ea89a8827daf43af5bf5611a5ed1edd905195c2aec5
butane-debuginfo-0.15.0-2.rhaos4.11.el8.ppc64le.rpm
SHA-256: bbe968067b3abb05afd9373660fc8633d25e01109938f3d3bd52bc3e86427c85
butane-debugsource-0.15.0-2.rhaos4.11.el8.ppc64le.rpm
SHA-256: 341b7cd97d60d222735f774db7572ec168604814bb4b4c2d30ba84703e7a943d
butane-redistributable-0.15.0-2.rhaos4.11.el8.noarch.rpm
SHA-256: 2b132379251758e95331512bfa53e5617f1ad8f5429fd00eac6bbcdb61780688
console-login-helper-messages-0.20.4-1.rhaos4.11.el8.noarch.rpm
SHA-256: da1969640080afa1d69061ce700c24051a6489ae52b748890e0c2fdd654fa2a7
console-login-helper-messages-issuegen-0.20.4-1.rhaos4.11.el8.noarch.rpm
SHA-256: ed004ae56f9a93983dbadef06cb5efd780700adb491d13b80d9d25b3675714f2
console-login-helper-messages-profile-0.20.4-1.rhaos4.11.el8.noarch.rpm
SHA-256: f063e55d1d9b2fb7391d5ef20d7e9cee3972ba42d8ff976dd30458d19430c6c1
cri-o-1.24.2-4.rhaos4.11.gitd6283df.el8.ppc64le.rpm
SHA-256: 30d7f290fd06ba83aee88af9c0879232458d43e1494a0ff3ada1d85a588bde36
cri-o-debuginfo-1.24.2-4.rhaos4.11.gitd6283df.el8.ppc64le.rpm
SHA-256: 2f2c4a90c3be89c179682ad54c11da42dd5b87a7f435d8b55e1d49702d10607f
cri-o-debugsource-1.24.2-4.rhaos4.11.gitd6283df.el8.ppc64le.rpm
SHA-256: 0c1372936868e8004499151769273a88e2572bcf5260c747127e2057a96a22f2
ignition-2.14.0-4.rhaos4.11.el8.ppc64le.rpm
SHA-256: 194f9198dfc5981259d391af4360827760f5d81feeb974fd34f6983dfb2d42f4
ignition-debuginfo-2.14.0-4.rhaos4.11.el8.ppc64le.rpm
SHA-256: 95b92ab3d5b0ad30ecdae7834189aab028191b33fbec0c198d4060223f5b1c49
ignition-debugsource-2.14.0-4.rhaos4.11.el8.ppc64le.rpm
SHA-256: 2e6cda204734154cb04dfbac9156c45cca57c8e175c207aabbd2e6762943f688
ignition-validate-2.14.0-4.rhaos4.11.el8.ppc64le.rpm
SHA-256: 89c1b9f092fa775b94e81c6ee51782b470d270fc3a6bfdb19f6b146c35e32df7
ignition-validate-debuginfo-2.14.0-4.rhaos4.11.el8.ppc64le.rpm
SHA-256: f6fa6cdbd06a9a39dd21d49916af5915c35606e33aedb4cfb43446d5af57a303
openshift-ansible-4.11.0-202208111716.p0.gdf73941.assembly.stream.el8.noarch.rpm
SHA-256: 9ea20faafa1dc5bd098a9e26c2c814a76957eff9424e142fffb88f0880dd6545
openshift-ansible-test-4.11.0-202208111716.p0.gdf73941.assembly.stream.el8.noarch.rpm
SHA-256: 8dae327ef78c802331a299e70bbc64def50489b2b8675abd8cc722e03f6c5f4a
openshift-clients-4.11.0-202208110436.p0.gfcf512e.assembly.stream.el8.ppc64le.rpm
SHA-256: f65d2efa83dfabf588a99400693ada16accb1857a3606a302b573c7489ed8b1b
openshift-hyperkube-4.11.0-202208101756.p0.g4f0dd4d.assembly.stream.el8.ppc64le.rpm
SHA-256: b815bb84f950e96dc7617b562e883c61470890407af63538b22e5206b7c35491
openshift-kuryr-cni-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.noarch.rpm
SHA-256: 044bc60c4cddda8c715ce203c9ee407ff504a0efd327b5e26fee46317a3b6509
openshift-kuryr-common-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.noarch.rpm
SHA-256: 440836764b0a83ff0c246d242830b11e17b8711876e1b4e924da26fa297d7ae3
openshift-kuryr-controller-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.noarch.rpm
SHA-256: 82a9ab4510af498e76bd9b37f3b84f5d2ac0a81a3c55ead2897a1a772245d0d0
python3-kubernetes-24.2.0-1.el8.noarch.rpm
SHA-256: c635b0c82713adb5617c0020cbf1c6a517b1b3f78b18258acb2047ada2352f21
python3-kubernetes-tests-24.2.0-1.el8.noarch.rpm
SHA-256: 3b8965b1ae84c257b4b6b5b5984cb146a33b8293e73041feb249a49a2802b0c5
python3-kuryr-kubernetes-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.noarch.rpm
SHA-256: 7455f356395820067325c087c95d856ba769f896d1a0e03f1acbde17a4b124cd
Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.11 for RHEL 8
SRPM
NetworkManager-1.36.0-8.el8_6.src.rpm
SHA-256: dfcc22d243d157657095c45ae51609cd1bded7072ba39faaa63b10fc53d36782
butane-0.15.0-2.rhaos4.11.el8.src.rpm
SHA-256: 97f0f7c653de494e484f62bf41e526dd2305be3f4986dfa13446496b030c3012
console-login-helper-messages-0.20.4-1.rhaos4.11.el8.src.rpm
SHA-256: 929d2a057b06524ff3a064ce2c899652e41bee04c95646d9bcde434a4de2e921
cri-o-1.24.2-4.rhaos4.11.gitd6283df.el8.src.rpm
SHA-256: cda75edce103e6412ee8e671959671c0ecf76b2c20ce2c725e75ff432d52119e
ignition-2.14.0-4.rhaos4.11.el8.src.rpm
SHA-256: 5d80fd98a55846a0cff8ca9ed8abfd64a3f5ef7731e9581fe5a1cdcd455279f6
openshift-4.11.0-202208101756.p0.g4f0dd4d.assembly.stream.el8.src.rpm
SHA-256: 36f053b6482d036e6f21a9adfcd583d842137c9439f8bc9fb2f3977f15aa854a
openshift-ansible-4.11.0-202208111716.p0.gdf73941.assembly.stream.el8.src.rpm
SHA-256: 9705cbbe3d4987ae4c1cc5bd4bda0f29e2546aaa9a541be51844a5922325fd0f
openshift-clients-4.11.0-202208110436.p0.gfcf512e.assembly.stream.el8.src.rpm
SHA-256: 848117764e8dffea4c94ae363e5e656b660fe880c3bf858badc739e2e8383284
openshift-kuryr-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.src.rpm
SHA-256: 04336ee1e5ed316311e459fa370d14eac8325758e978f07ef1d3d8e2d5275a27
python-kubernetes-24.2.0-1.el8.src.rpm
SHA-256: b5ab96db91c8590d991412d6176f2b60c47bfe23e1066a67a9fe320f779be3c9
s390x
NetworkManager-1.36.0-8.el8_6.s390x.rpm
SHA-256: c3b89ce672d53d12795e4da491e99bd314e8c15c4052397f68ccf927bb6b35cd
NetworkManager-adsl-1.36.0-8.el8_6.s390x.rpm
SHA-256: 03293629815f124465663f8d86de883573de1d23ff3dea08372e0b2e772c3168
NetworkManager-adsl-debuginfo-1.36.0-8.el8_6.s390x.rpm
SHA-256: ef99dbc360d32311aadf65c0944cb0744344e9ee67b9c914280fa3eab09f075f
NetworkManager-bluetooth-1.36.0-8.el8_6.s390x.rpm
SHA-256: 07961c3b3c297f731260fd06e07959cb69511b94614e3b78c5549c99e2494a95
NetworkManager-bluetooth-debuginfo-1.36.0-8.el8_6.s390x.rpm
SHA-256: 9a5ebbd69b5e7e5dd5c2ed6ed207529985547a16803429be2328276c307cb5b6
NetworkManager-cloud-setup-1.36.0-8.el8_6.s390x.rpm
SHA-256: a40d05b280d74b7a0057b7db5c8bc5b23f02d53094999990fa337f1bfa8c61cc
NetworkManager-cloud-setup-debuginfo-1.36.0-8.el8_6.s390x.rpm
SHA-256: 3d5666ae737942216082f23f25a8d54bd1a7a23773eb1a4b1b4db7efbb85c716
NetworkManager-config-connectivity-redhat-1.36.0-8.el8_6.noarch.rpm
SHA-256: afce910d783881294aa86ba61556c4a16e2531f1266a4f9f12f5492304bedd31
NetworkManager-config-server-1.36.0-8.el8_6.noarch.rpm
SHA-256: f8d5a45bf5a96561739875a091be0cbb94b5faaa7fe22a7a535198fd5d43dad4
NetworkManager-debuginfo-1.36.0-8.el8_6.s390x.rpm
SHA-256: a063a0ed59cc11126be9b56b01de5e25f5454a7b06c491c4b114fa45a7f013ff
NetworkManager-debugsource-1.36.0-8.el8_6.s390x.rpm
SHA-256: fbe0124c8c67223614cdce714459c6e91a660ca2765bded131c4fa38d64c261c
NetworkManager-dispatcher-routing-rules-1.36.0-8.el8_6.noarch.rpm
SHA-256: 77594dbc4d26d004364ade48b803021c13ba4e50f6e0c05bd1bc708b608229d9
NetworkManager-libnm-1.36.0-8.el8_6.s390x.rpm
SHA-256: 2c37568ce77fd2df33546ca076a5b1e59df8903c3deb00d439a93b636d99b370
NetworkManager-libnm-debuginfo-1.36.0-8.el8_6.s390x.rpm
SHA-256: 5056d10648e23b6b17e69495ea5970d35ec8355638f1d75cce20803be2a53206
NetworkManager-libnm-devel-1.36.0-8.el8_6.s390x.rpm
SHA-256: ac1a8f8d8cdace7d1d9bc72ba685c550017fab02485360358eee3ecb951b4e7f
NetworkManager-ovs-1.36.0-8.el8_6.s390x.rpm
SHA-256: d817925258dc19345bce922b1849ea2c4253170b0ff453896c3f7a928170df26
NetworkManager-ovs-debuginfo-1.36.0-8.el8_6.s390x.rpm
SHA-256: 81dc37fad6ff7a0965b25e5347c94c42cd40639d91c8b8e33670548c3b7cec11
NetworkManager-ppp-1.36.0-8.el8_6.s390x.rpm
SHA-256: 68015debc77b117ffd7ff7a38270807172d4a1a7ec6d130f2d6b3596886e9f57
NetworkManager-ppp-debuginfo-1.36.0-8.el8_6.s390x.rpm
SHA-256: 8b018bdd78888e75863b9ec37fb4377e2f5ce8c28c73e0a0be46a93f243653b4
NetworkManager-team-1.36.0-8.el8_6.s390x.rpm
SHA-256: 59b3c30b98e4eb1757663afe78ea80d7ea75f12167b47d6318c6ecc0a06b1d18
NetworkManager-team-debuginfo-1.36.0-8.el8_6.s390x.rpm
SHA-256: 42a7b3a7965a3ddf2f12193d179ba6db2ad5c2dad434a7a79b14bf03cf04f340
NetworkManager-tui-1.36.0-8.el8_6.s390x.rpm
SHA-256: 2f45ba37624a9a451127af0c43629e88b30735b2d04b7c7d9ff61bcc2dbcfb75
NetworkManager-tui-debuginfo-1.36.0-8.el8_6.s390x.rpm
SHA-256: a2c602720d8a85d7b8d2fdf1005b01de2466114a9e923627ee097f71ec732246
NetworkManager-wifi-1.36.0-8.el8_6.s390x.rpm
SHA-256: f853ff7c0cc8faa81b54375b897efca68fb6afe9397e5887da6cacf6f9cff2e6
NetworkManager-wifi-debuginfo-1.36.0-8.el8_6.s390x.rpm
SHA-256: c09fb18320d9775090dd346286fbe542001bafe0ea94605f1201a1c033098ec2
NetworkManager-wwan-1.36.0-8.el8_6.s390x.rpm
SHA-256: 09f51935b91b3550ccd9ac1343e85f53b927879912e8443d58bbb524436d196a
NetworkManager-wwan-debuginfo-1.36.0-8.el8_6.s390x.rpm
SHA-256: 9cd71d06e3da7646812716449064d8f248673c8efb1cc75ae7de922ec89cf2ed
butane-0.15.0-2.rhaos4.11.el8.s390x.rpm
SHA-256: 908d1dbedaa82393a112626284eda508eb1a675c4e4f893d749d535a5bcb5580
butane-debuginfo-0.15.0-2.rhaos4.11.el8.s390x.rpm
SHA-256: cc2ea32d68a85dd6f2402738d93770247ed97ef8476915c8384da73401fcacd4
butane-debugsource-0.15.0-2.rhaos4.11.el8.s390x.rpm
SHA-256: 0ba02ee53bff0da5cc4a47ac000d9f7e86a502981521d6892b346c558c7989a5
butane-redistributable-0.15.0-2.rhaos4.11.el8.noarch.rpm
SHA-256: 2b132379251758e95331512bfa53e5617f1ad8f5429fd00eac6bbcdb61780688
console-login-helper-messages-0.20.4-1.rhaos4.11.el8.noarch.rpm
SHA-256: da1969640080afa1d69061ce700c24051a6489ae52b748890e0c2fdd654fa2a7
console-login-helper-messages-issuegen-0.20.4-1.rhaos4.11.el8.noarch.rpm
SHA-256: ed004ae56f9a93983dbadef06cb5efd780700adb491d13b80d9d25b3675714f2
console-login-helper-messages-profile-0.20.4-1.rhaos4.11.el8.noarch.rpm
SHA-256: f063e55d1d9b2fb7391d5ef20d7e9cee3972ba42d8ff976dd30458d19430c6c1
cri-o-1.24.2-4.rhaos4.11.gitd6283df.el8.s390x.rpm
SHA-256: 9edf49ab2e68a3f26a45282b08e7ede83a5a54ca7e2e54a303dab04961e5b1dd
cri-o-debuginfo-1.24.2-4.rhaos4.11.gitd6283df.el8.s390x.rpm
SHA-256: 10fd1dcec245ad69cf3434762e63427ab3432f35c4264a233ba9ea7be6612de3
cri-o-debugsource-1.24.2-4.rhaos4.11.gitd6283df.el8.s390x.rpm
SHA-256: 4fa68b041599339424dd9cc85991a8a641a261873f478d18af683a950d7e64e5
ignition-2.14.0-4.rhaos4.11.el8.s390x.rpm
SHA-256: 18ba0dd7e9b7e5399aadae9556c21f72d3365e425fa12cc24c38f72d50f10390
ignition-debuginfo-2.14.0-4.rhaos4.11.el8.s390x.rpm
SHA-256: a1af826c8cdf132a7ed48edebf88cec047903186b3b2ea5911c5babdd54b1dad
ignition-debugsource-2.14.0-4.rhaos4.11.el8.s390x.rpm
SHA-256: 284acda2e135999c1a9912fcce91282b8db48b4089ac7ad1cbdaef44e7a8a7d6
ignition-validate-2.14.0-4.rhaos4.11.el8.s390x.rpm
SHA-256: dd4ce16e959f24d650a35bececbf8091120e704b983f018ed601283086aa176d
ignition-validate-debuginfo-2.14.0-4.rhaos4.11.el8.s390x.rpm
SHA-256: 6ad117214c3824af0492b1c3cbc04ad7157db054ed87c59a7698b4ccfb356a2b
openshift-ansible-4.11.0-202208111716.p0.gdf73941.assembly.stream.el8.noarch.rpm
SHA-256: 9ea20faafa1dc5bd098a9e26c2c814a76957eff9424e142fffb88f0880dd6545
openshift-ansible-test-4.11.0-202208111716.p0.gdf73941.assembly.stream.el8.noarch.rpm
SHA-256: 8dae327ef78c802331a299e70bbc64def50489b2b8675abd8cc722e03f6c5f4a
openshift-clients-4.11.0-202208110436.p0.gfcf512e.assembly.stream.el8.s390x.rpm
SHA-256: f7926bef4aaedab8246ec98559779d460227b93728fe5f9163fb564ed2fd022a
openshift-hyperkube-4.11.0-202208101756.p0.g4f0dd4d.assembly.stream.el8.s390x.rpm
SHA-256: 4c0b438cc3ae6b0a1ee642d99738ad4d0bb4ec160b5bcd7c66a2c5c6a16feb17
openshift-kuryr-cni-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.noarch.rpm
SHA-256: 044bc60c4cddda8c715ce203c9ee407ff504a0efd327b5e26fee46317a3b6509
openshift-kuryr-common-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.noarch.rpm
SHA-256: 440836764b0a83ff0c246d242830b11e17b8711876e1b4e924da26fa297d7ae3
openshift-kuryr-controller-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.noarch.rpm
SHA-256: 82a9ab4510af498e76bd9b37f3b84f5d2ac0a81a3c55ead2897a1a772245d0d0
python3-kubernetes-24.2.0-1.el8.noarch.rpm
SHA-256: c635b0c82713adb5617c0020cbf1c6a517b1b3f78b18258acb2047ada2352f21
python3-kubernetes-tests-24.2.0-1.el8.noarch.rpm
SHA-256: 3b8965b1ae84c257b4b6b5b5984cb146a33b8293e73041feb249a49a2802b0c5
python3-kuryr-kubernetes-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.noarch.rpm
SHA-256: 7455f356395820067325c087c95d856ba769f896d1a0e03f1acbde17a4b124cd
Red Hat OpenShift Container Platform for ARM 64 4.11
SRPM
NetworkManager-1.36.0-8.el8_6.src.rpm
SHA-256: dfcc22d243d157657095c45ae51609cd1bded7072ba39faaa63b10fc53d36782
butane-0.15.0-2.rhaos4.11.el8.src.rpm
SHA-256: 97f0f7c653de494e484f62bf41e526dd2305be3f4986dfa13446496b030c3012
console-login-helper-messages-0.20.4-1.rhaos4.11.el8.src.rpm
SHA-256: 929d2a057b06524ff3a064ce2c899652e41bee04c95646d9bcde434a4de2e921
cri-o-1.24.2-4.rhaos4.11.gitd6283df.el8.src.rpm
SHA-256: cda75edce103e6412ee8e671959671c0ecf76b2c20ce2c725e75ff432d52119e
ignition-2.14.0-4.rhaos4.11.el8.src.rpm
SHA-256: 5d80fd98a55846a0cff8ca9ed8abfd64a3f5ef7731e9581fe5a1cdcd455279f6
openshift-4.11.0-202208101756.p0.g4f0dd4d.assembly.stream.el8.src.rpm
SHA-256: 36f053b6482d036e6f21a9adfcd583d842137c9439f8bc9fb2f3977f15aa854a
openshift-ansible-4.11.0-202208111716.p0.gdf73941.assembly.stream.el8.src.rpm
SHA-256: 9705cbbe3d4987ae4c1cc5bd4bda0f29e2546aaa9a541be51844a5922325fd0f
openshift-clients-4.11.0-202208110436.p0.gfcf512e.assembly.stream.el8.src.rpm
SHA-256: 848117764e8dffea4c94ae363e5e656b660fe880c3bf858badc739e2e8383284
openshift-kuryr-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.src.rpm
SHA-256: 04336ee1e5ed316311e459fa370d14eac8325758e978f07ef1d3d8e2d5275a27
python-kubernetes-24.2.0-1.el8.src.rpm
SHA-256: b5ab96db91c8590d991412d6176f2b60c47bfe23e1066a67a9fe320f779be3c9
aarch64
NetworkManager-1.36.0-8.el8_6.aarch64.rpm
SHA-256: ff33c6d6c1e0aee62da82ceeebb0a30389acf5bbb9f2aa9500208aa82aed1082
NetworkManager-adsl-1.36.0-8.el8_6.aarch64.rpm
SHA-256: 9301a59f572a9eb008ab6a6c97e806bcbf7be6caac7ddc01c646f402b7838239
NetworkManager-adsl-debuginfo-1.36.0-8.el8_6.aarch64.rpm
SHA-256: 10bc7aafb3021795a9723c3a28c9a5a4ac55ea778ea026f93deac7325b53658f
NetworkManager-bluetooth-1.36.0-8.el8_6.aarch64.rpm
SHA-256: 79126c2a65d6c30ba7c6a41ddf2516aa383a1f0eb58365911dfc5d8eb1274466
NetworkManager-bluetooth-debuginfo-1.36.0-8.el8_6.aarch64.rpm
SHA-256: fda2d40119fab0eaf91dc8219e8f9d47670a0e5a9955eff8a5e6490745289054
NetworkManager-cloud-setup-1.36.0-8.el8_6.aarch64.rpm
SHA-256: 682d75ab9cc86e980fac53e5f09cd0a8f0366a03ffcc53f339c6da4f995f1487
NetworkManager-cloud-setup-debuginfo-1.36.0-8.el8_6.aarch64.rpm
SHA-256: 723d57d24f60b39d45c1f54d4645dca0e44038d0e92324ac818c33d35a619be0
NetworkManager-config-connectivity-redhat-1.36.0-8.el8_6.noarch.rpm
SHA-256: afce910d783881294aa86ba61556c4a16e2531f1266a4f9f12f5492304bedd31
NetworkManager-config-server-1.36.0-8.el8_6.noarch.rpm
SHA-256: f8d5a45bf5a96561739875a091be0cbb94b5faaa7fe22a7a535198fd5d43dad4
NetworkManager-debuginfo-1.36.0-8.el8_6.aarch64.rpm
SHA-256: 05f852e99fe60049988882947f75785f0d669c1a3c68d7b13c3905d48013617e
NetworkManager-debugsource-1.36.0-8.el8_6.aarch64.rpm
SHA-256: ef5d3ee3a19bb315e0dd142a9bd1fa808d56d4b97ff942ae1df260624e4e5952
NetworkManager-dispatcher-routing-rules-1.36.0-8.el8_6.noarch.rpm
SHA-256: 77594dbc4d26d004364ade48b803021c13ba4e50f6e0c05bd1bc708b608229d9
NetworkManager-libnm-1.36.0-8.el8_6.aarch64.rpm
SHA-256: 3a3752ddb5297d41f5fb4845b9ed5560db42f5770fd96e032e6c687efb4f46a5
NetworkManager-libnm-debuginfo-1.36.0-8.el8_6.aarch64.rpm
SHA-256: 0e6af9b46647315ffb98010f59cc755d5d36447db67715bcfda99adb130929dc
NetworkManager-libnm-devel-1.36.0-8.el8_6.aarch64.rpm
SHA-256: d946affdd83990df49c58587aebf50685b8163b04792e80a244dcc289ff45c79
NetworkManager-ovs-1.36.0-8.el8_6.aarch64.rpm
SHA-256: b706970089a24319aa0e0ee40078f23cad86142bd4d82e4e00bbd14a4035b3fe
NetworkManager-ovs-debuginfo-1.36.0-8.el8_6.aarch64.rpm
SHA-256: 7ff5af4964b448184fd5c52da59cb34052b4aef371665e97b974cf187f59a84c
NetworkManager-ppp-1.36.0-8.el8_6.aarch64.rpm
SHA-256: e8a5b124341ab4ed534ab8f6a2fb2bea0ce3342a9a7185eddce70cc1fd68dfd8
NetworkManager-ppp-debuginfo-1.36.0-8.el8_6.aarch64.rpm
SHA-256: f4d2e6e005d4cc5ae606f0872367947728c3aea81d184f970d6d22c621668a80
NetworkManager-team-1.36.0-8.el8_6.aarch64.rpm
SHA-256: d8aa317d637115e70365dd626d0d12f7993ab15165b2317486164b33a4a864ac
NetworkManager-team-debuginfo-1.36.0-8.el8_6.aarch64.rpm
SHA-256: 26e604cf7a20545b43b6b9f59ab0aeb698bf20c23e452ce2d0da6ee71794a27d
NetworkManager-tui-1.36.0-8.el8_6.aarch64.rpm
SHA-256: 4a31c183c2da8ad065933243822e74aa27f4b9dbaae742c71ff3820db10875b6
NetworkManager-tui-debuginfo-1.36.0-8.el8_6.aarch64.rpm
SHA-256: 0c62874c69c132f9b3d2f4efc85f905e1fb30f62f50e5cc7087c8de7482bb61b
NetworkManager-wifi-1.36.0-8.el8_6.aarch64.rpm
SHA-256: 50a9c661e148702114a1314020eb89211f1693b6be5b36c9e3811c9e00306d98
NetworkManager-wifi-debuginfo-1.36.0-8.el8_6.aarch64.rpm
SHA-256: 8e1ab98a32a6cbbaed418189b63382fec0855093bf387dc34ef8e2b964620a45
NetworkManager-wwan-1.36.0-8.el8_6.aarch64.rpm
SHA-256: 72479726d12e5ab527890b48152889d18d5f968a3b55ef86f52cae91922bcadc
NetworkManager-wwan-debuginfo-1.36.0-8.el8_6.aarch64.rpm
SHA-256: 4ed9a0b1bbe4bd3c24d1bfe56a2a3820258d51d62871952116c40a3a36ecad33
butane-0.15.0-2.rhaos4.11.el8.aarch64.rpm
SHA-256: 7b5b2f2e946108d238dcfe462fe349e80368cabbc9af9ce10f7810ec927e3b9e
butane-debuginfo-0.15.0-2.rhaos4.11.el8.aarch64.rpm
SHA-256: f22ab59096796f26352bf67c20909c3c559f1a5cd0f448a4d32499a97562dd16
butane-debugsource-0.15.0-2.rhaos4.11.el8.aarch64.rpm
SHA-256: 9cca6a6aeeee45978dd2d36b020090461d3908294891c7a33d115f4465f8aaa8
butane-redistributable-0.15.0-2.rhaos4.11.el8.noarch.rpm
SHA-256: 2b132379251758e95331512bfa53e5617f1ad8f5429fd00eac6bbcdb61780688
console-login-helper-messages-0.20.4-1.rhaos4.11.el8.noarch.rpm
SHA-256: da1969640080afa1d69061ce700c24051a6489ae52b748890e0c2fdd654fa2a7
console-login-helper-messages-issuegen-0.20.4-1.rhaos4.11.el8.noarch.rpm
SHA-256: ed004ae56f9a93983dbadef06cb5efd780700adb491d13b80d9d25b3675714f2
console-login-helper-messages-profile-0.20.4-1.rhaos4.11.el8.noarch.rpm
SHA-256: f063e55d1d9b2fb7391d5ef20d7e9cee3972ba42d8ff976dd30458d19430c6c1
cri-o-1.24.2-4.rhaos4.11.gitd6283df.el8.aarch64.rpm
SHA-256: da08313eca1f5ead51d5d7a6a287b62eec2e37e4f0ce1b6894d48307a1fbfaf8
cri-o-debuginfo-1.24.2-4.rhaos4.11.gitd6283df.el8.aarch64.rpm
SHA-256: ca1a643a258b554e57af6a2868c49a541827b282ca1af81d1b065b7403c7ee99
cri-o-debugsource-1.24.2-4.rhaos4.11.gitd6283df.el8.aarch64.rpm
SHA-256: 8e91086e1c7bf69fdb5b18b5d1e42d82402e64cc09135c68db67ae5294f36d05
ignition-2.14.0-4.rhaos4.11.el8.aarch64.rpm
SHA-256: 7fd39473590e32bcf0e06ccba43b6aa7b4b2f2235abeeabdddba7ee7211c064b
ignition-debuginfo-2.14.0-4.rhaos4.11.el8.aarch64.rpm
SHA-256: 042710d6178c4400acef943130af639e1826f65805ae9c74dad4d0bde9d5cf3f
ignition-debugsource-2.14.0-4.rhaos4.11.el8.aarch64.rpm
SHA-256: a1a609ce98dfbf1ee208730d0509811fe66a4229a7c63f0c71da5fe3b084edb0
ignition-validate-2.14.0-4.rhaos4.11.el8.aarch64.rpm
SHA-256: 4cc33c10cc5743d6bd3c46f8969db5b96f5a1b09487582c00714e646f76d7da4
ignition-validate-debuginfo-2.14.0-4.rhaos4.11.el8.aarch64.rpm
SHA-256: 47bbca5767957e5f1c55a95327a1ead105f616938cb24d25bd9f6a507aa5ff7e
openshift-ansible-4.11.0-202208111716.p0.gdf73941.assembly.stream.el8.noarch.rpm
SHA-256: 9ea20faafa1dc5bd098a9e26c2c814a76957eff9424e142fffb88f0880dd6545
openshift-ansible-test-4.11.0-202208111716.p0.gdf73941.assembly.stream.el8.noarch.rpm
SHA-256: 8dae327ef78c802331a299e70bbc64def50489b2b8675abd8cc722e03f6c5f4a
openshift-clients-4.11.0-202208110436.p0.gfcf512e.assembly.stream.el8.aarch64.rpm
SHA-256: cb3ff1b802f394ea960585d2b31311e03ea4c95aff6ed3aa98906cff33a63590
openshift-hyperkube-4.11.0-202208101756.p0.g4f0dd4d.assembly.stream.el8.aarch64.rpm
SHA-256: e1b0af130e6452f4284379ad032d4f798395a03e77aeff236622d9483dbf46c5
openshift-kuryr-cni-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.noarch.rpm
SHA-256: 044bc60c4cddda8c715ce203c9ee407ff504a0efd327b5e26fee46317a3b6509
openshift-kuryr-common-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.noarch.rpm
SHA-256: 440836764b0a83ff0c246d242830b11e17b8711876e1b4e924da26fa297d7ae3
openshift-kuryr-controller-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.noarch.rpm
SHA-256: 82a9ab4510af498e76bd9b37f3b84f5d2ac0a81a3c55ead2897a1a772245d0d0
python3-kubernetes-24.2.0-1.el8.noarch.rpm
SHA-256: c635b0c82713adb5617c0020cbf1c6a517b1b3f78b18258acb2047ada2352f21
python3-kubernetes-tests-24.2.0-1.el8.noarch.rpm
SHA-256: 3b8965b1ae84c257b4b6b5b5984cb146a33b8293e73041feb249a49a2802b0c5
python3-kuryr-kubernetes-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.noarch.rpm
SHA-256: 7455f356395820067325c087c95d856ba769f896d1a0e03f1acbde17a4b124cd
Related news
Ubuntu Security Notice 6038-2 - USN-6038-1 fixed several vulnerabilities in Go 1.18. This update provides the corresponding updates for Go 1.13 and Go 1.16. CVE-2022-29526 and CVE-2022-30630 only affected Go 1.16. It was discovered that the Go net/http module incorrectly handled Transfer-Encoding headers in the HTTP/1 client. A remote attacker could possibly use this issue to perform an HTTP Request Smuggling attack.
The components for Red Hat OpenShift support for Windows Containers 6.0.1 are now available. This product release includes bug fixes and security update for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27191: A broken cryptographic algorithm flaw was found in golang.org/x/crypto/ssh. This issue causes a client to fail authentication with RSA keys to servers that reject...
Red Hat Security Advisory 2023-3642-01 - Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services. This new container image is based on Red Hat Ceph Storage 6.1 and Red Hat Enterprise Linux 9. Issues addressed include bypass, cross site scripting, denial of service, information leakage, spoofing, and traversal vulnerabilities.
Red Hat Security Advisory 2023-2283-01 - The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files.
Red Hat Security Advisory 2023-2367-01 - The Container Network Interface project consists of a specification and libraries for writing plug-ins for configuring network interfaces in Linux containers, along with a number of supported plug-ins. CNI concerns itself only with network connectivity of containers and removing allocated resources when the container is deleted.
An update for containernetworking-plugins is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30629: A flaw was found in the crypto/tls golang package. When session tickets are generated by crypto/tls, it is missing the ticket expiration. This issue may allow an attacker to observe the TLS handshakes to correlate successive connections during session resumption. * CVE-2022-41717: A flaw was found in the net/http library of th...
Ubuntu Security Notice 6038-1 - It was discovered that the Go net/http module incorrectly handled Transfer-Encoding headers in the HTTP/1 client. A remote attacker could possibly use this issue to perform an HTTP Request Smuggling attack. It was discovered that Go did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a panic resulting into a denial of service.
An update for etcd is now available for Red Hat OpenStack Platform. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: A flaw was found in golang. The HTTP/1 client accepted invalid Transfer-Encoding headers indicating "chunked" encoding. This issue could allow request smuggling, but only if combined with an intermediate server that also improperly accepts the header as invalid. * CVE-2022-2880: A flaw was found in the golang package, where requests forwarded by rev...
Red Hat Advanced Cluster Management for Kubernetes 2.7.0 General Availability release images, which provide security updates and fix bugs. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3517: A vulnerability was found in the nodejs-minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service. * CVE-2022-30629: A flaw was found in the crypto/tls golang pa...
Red Hat Security Advisory 2023-0407-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 4.12.0 RPMs. Issues addressed include denial of service and out of bounds read vulnerabilities.
The Migration Toolkit for Containers (MTC) 1.7.6 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30630: golang: io/fs: stack exhaustion in G...
Red Hat OpenShift Virtualization release 4.11.1 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-24921: golang: regexp: stack exhaustion via a deeply nested expression * CVE-2022-28327: golang: crypto/elliptic: panic caus...
Red Hat Advanced Cluster Management for Kubernetes 2.4.6 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-31129: moment: inefficient parsing algorithm resulting in DoS * CVE-2022-31150: nodejs16: CRLF injection in node-undici * CVE-2022-31151: nodejs/undici: Cookie headers uncleared on cross-origin redirect * CV...
Red Hat Security Advisory 2022-6536-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.5.
Red Hat Security Advisory 2022-6536-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.11.5.
Red Hat Security Advisory 2022-6429-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Issues addressed include bypass, code execution, and denial of service vulnerabilities.
Red Hat Security Advisory 2022-6430-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes. Issues addressed include a denial of service vulnerability.
OpenShift API for Data Protection (OADP) 1.0.4 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-21698: prometheus/client_golang: Denial of service using InstrumentHandlerCounter * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-30629: golang: crypto/tls: session ti...
Red Hat Security Advisory 2022-6370-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.0 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix security issues and several bugs. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2022-6345-01 - Multicluster engine for Kubernetes 2.1 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2022-6347-01 - VolSync is a Kubernetes operator that enables asynchronous replication of persistent volumes within a cluster, or across clusters. Version 0.5 has been released with security fixes and updates.
Red Hat Security Advisory 2022-6348-01 - Gatekeeper is an open source project that applies the OPA Constraint Framework to enforce policies on your Kubernetes clusters. This advisory contains the container images for Gatekeeper that include bug fixes and container upgrades.
Red Hat Advanced Cluster Management for Kubernetes 2.6.0 General Availability release images, which fix security issues and bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_a...
Multicluster Engine v2.1 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30630: golang: io/fs: stack exhaustion in Glob * CVE-2022-30631: golang: compress/gzi...
Gatekeeper Operator v0.2 security updates Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30630: golang: io/fs: stack exhaustion in Glob * CVE-2022-30631: gol...
Red Hat Security Advisory 2022-6152-01 - Secondary Scheduler Operator for Red Hat OpenShift 1.1.0.
Red Hat Security Advisory 2022-6290-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2022-6277-01 - Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an OpenShift Container Platform installation. This advisory covers the RPM packages for the release. Issues addressed include denial of service and traversal vulnerabilities.
Secondary Scheduler Operator for Red Hat OpenShift 1.1.0 Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-28327: golang: crypto/elliptic: panic caused by oversized scalar...
Red Hat Security Advisory 2022-6102-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.11.1.
Red Hat Security Advisory 2022-6103-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.1.
Red Hat OpenShift Container Platform release 4.11.1 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read
Red Hat Security Advisory 2022-6040-01 - Version 1.24.0 of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.6, 4.7, 4.8, 4.9, 4.10, and 4.11. This release includes security and bug fixes, and enhancements. Issues addressed include bypass and denial of service vulnerabilities.
Red Hat Security Advisory 2022-6042-01 - Red Hat OpenShift Serverless Client kn 1.24.0 provides a CLI to interact with Red Hat OpenShift Serverless 1.24.0. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms. Issues addressed include bypass and denial of service vulnerabilities.
Release of OpenShift Serverless 1.24.0 The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-1996: go-restful: Authorization Bypass Through User-Controlled Key * CVE-2022-21698: prometheus/client_golang: Denial of service using InstrumentHandlerCounter * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-24921: golang: regexp: stack exhaustion via a deeply nested expression * C...
Gentoo Linux Security Advisory 202208-2 - Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution. Versions less than 1.18.5 are affected.
Infinite loop in Read in crypto/rand before Go 1.17.11 and Go 1.18.3 on Windows allows attacker to cause an indefinite hang by passing a buffer larger than 1 << 32 - 1 bytes.
In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in which pulling an intentionally malformed Docker image manifest crashes the dockerd daemon. Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing.