Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:6102: Red Hat Security Advisory: OpenShift Container Platform 4.11.1 packages and security update

Red Hat OpenShift Container Platform release 4.11.1 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add
Red Hat Security Data
#vulnerability#linux#red_hat#redis#git#kubernetes#ibm#rpm#wifi#ssl

Synopsis

Low: OpenShift Container Platform 4.11.1 packages and security update

Type/Severity

Security Advisory: Low

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Red Hat OpenShift Container Platform release 4.11.1 is now available with
updates to packages and images that fix several bugs and add enhancements.

This release includes a security update for Red Hat OpenShift Container Platform 4.11.

Red Hat Product Security has rated this update as having a security impact
of Low. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

Description

Red Hat OpenShift Container Platform is Red Hat’s cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.

This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.11.1. See the following advisory for the container images for this release:

https://access.redhat.com/errata/RHSA-2022:6103

Security Fix(es):

  • golang: crypto/tls: session tickets lack random ticket_age_add

(CVE-2022-30629)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s)
listed in the References section.

All OpenShift Container Platform 4.11 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html

Affected Products

  • Red Hat OpenShift Container Platform 4.11 for RHEL 8 x86_64
  • Red Hat OpenShift Container Platform for Power 4.11 for RHEL 8 ppc64le
  • Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.11 for RHEL 8 s390x
  • Red Hat OpenShift Container Platform for ARM 64 4.11 aarch64

Fixes

  • BZ - 2092793 - CVE-2022-30629 golang: crypto/tls: session tickets lack random ticket_age_add

Red Hat OpenShift Container Platform 4.11 for RHEL 8

SRPM

NetworkManager-1.36.0-8.el8_6.src.rpm

SHA-256: dfcc22d243d157657095c45ae51609cd1bded7072ba39faaa63b10fc53d36782

butane-0.15.0-2.rhaos4.11.el8.src.rpm

SHA-256: 97f0f7c653de494e484f62bf41e526dd2305be3f4986dfa13446496b030c3012

console-login-helper-messages-0.20.4-1.rhaos4.11.el8.src.rpm

SHA-256: 929d2a057b06524ff3a064ce2c899652e41bee04c95646d9bcde434a4de2e921

cri-o-1.24.2-4.rhaos4.11.gitd6283df.el8.src.rpm

SHA-256: cda75edce103e6412ee8e671959671c0ecf76b2c20ce2c725e75ff432d52119e

ignition-2.14.0-4.rhaos4.11.el8.src.rpm

SHA-256: 5d80fd98a55846a0cff8ca9ed8abfd64a3f5ef7731e9581fe5a1cdcd455279f6

openshift-4.11.0-202208101756.p0.g4f0dd4d.assembly.stream.el8.src.rpm

SHA-256: 36f053b6482d036e6f21a9adfcd583d842137c9439f8bc9fb2f3977f15aa854a

openshift-ansible-4.11.0-202208111716.p0.gdf73941.assembly.stream.el8.src.rpm

SHA-256: 9705cbbe3d4987ae4c1cc5bd4bda0f29e2546aaa9a541be51844a5922325fd0f

openshift-clients-4.11.0-202208110436.p0.gfcf512e.assembly.stream.el8.src.rpm

SHA-256: 848117764e8dffea4c94ae363e5e656b660fe880c3bf858badc739e2e8383284

openshift-kuryr-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.src.rpm

SHA-256: 04336ee1e5ed316311e459fa370d14eac8325758e978f07ef1d3d8e2d5275a27

python-kubernetes-24.2.0-1.el8.src.rpm

SHA-256: b5ab96db91c8590d991412d6176f2b60c47bfe23e1066a67a9fe320f779be3c9

x86_64

NetworkManager-1.36.0-8.el8_6.x86_64.rpm

SHA-256: b2769bd978be2c0a2a2a60aaebe3561585f09708a9b65a620cb526e57fd25f59

NetworkManager-adsl-1.36.0-8.el8_6.x86_64.rpm

SHA-256: 43725910403075ce8bc645cacec4a16d75548db59c4f61fd2a3c94884887ca81

NetworkManager-adsl-debuginfo-1.36.0-8.el8_6.x86_64.rpm

SHA-256: 026da5c6f0c816871ac93a4e46643c4ece801a81c7cf13f3b2ecc9b2469594f0

NetworkManager-bluetooth-1.36.0-8.el8_6.x86_64.rpm

SHA-256: f1d4c3cee8e87db9140b82ca6e26431e32d20438bc5f8c30eb0167fead74f6f7

NetworkManager-bluetooth-debuginfo-1.36.0-8.el8_6.x86_64.rpm

SHA-256: 951983cb6f1c5cf0ab3e61882672a983588f9ab5cc4b3fc39c29029f5f9859e7

NetworkManager-cloud-setup-1.36.0-8.el8_6.x86_64.rpm

SHA-256: de7e60f4d0984e14ad8c4b3fbabe9f6f96fe3bff4ab6e3fed7555b2ecd2977e2

NetworkManager-cloud-setup-debuginfo-1.36.0-8.el8_6.x86_64.rpm

SHA-256: 1676f2591dc8600abca14b87a1fda3e1729addc038dcb5a6e7c6f56237daeb5a

NetworkManager-config-connectivity-redhat-1.36.0-8.el8_6.noarch.rpm

SHA-256: afce910d783881294aa86ba61556c4a16e2531f1266a4f9f12f5492304bedd31

NetworkManager-config-server-1.36.0-8.el8_6.noarch.rpm

SHA-256: f8d5a45bf5a96561739875a091be0cbb94b5faaa7fe22a7a535198fd5d43dad4

NetworkManager-debuginfo-1.36.0-8.el8_6.x86_64.rpm

SHA-256: cf1495463b7375220db149b75a5ee004dbdb210a7ed8c0922978b8aed28e1094

NetworkManager-debugsource-1.36.0-8.el8_6.x86_64.rpm

SHA-256: efcd4cb40127c085df46e859c1018b4d2373ba769b35226dff45a37ce1d0392e

NetworkManager-dispatcher-routing-rules-1.36.0-8.el8_6.noarch.rpm

SHA-256: 77594dbc4d26d004364ade48b803021c13ba4e50f6e0c05bd1bc708b608229d9

NetworkManager-libnm-1.36.0-8.el8_6.x86_64.rpm

SHA-256: 2f388d3c4a74990db3ed3d0d04189a6a0f2d9e535f673e68bc8d2bb4d94c9183

NetworkManager-libnm-debuginfo-1.36.0-8.el8_6.x86_64.rpm

SHA-256: 5e4dac04f01741d31093fa7abf9a4963f6a41775675edb45cbc31cacd30a262c

NetworkManager-libnm-devel-1.36.0-8.el8_6.x86_64.rpm

SHA-256: 518493f8872cadc9a067a0e552cadafaf9b7a2c2ece86bc15bd6fe9aab426b30

NetworkManager-ovs-1.36.0-8.el8_6.x86_64.rpm

SHA-256: afb0f131e7ec0a782c85daccd4ff1be9882049c1d7d89558b445a0b69f985a90

NetworkManager-ovs-debuginfo-1.36.0-8.el8_6.x86_64.rpm

SHA-256: ed81a6de4c4801809ffef71244e26d399fb64e189027dd04f59191f60f54c333

NetworkManager-ppp-1.36.0-8.el8_6.x86_64.rpm

SHA-256: 97e924e39f77cd53dd2d1eefb3ca59128ce3eea9d3a42ee98354b6d25cde49a6

NetworkManager-ppp-debuginfo-1.36.0-8.el8_6.x86_64.rpm

SHA-256: 013e3c443cbeb8af9d9e368daa944a4a0048fa331d5f28afc50dc3b0ac560397

NetworkManager-team-1.36.0-8.el8_6.x86_64.rpm

SHA-256: 09b391325171c9ce944f3446246ba743c25ba1766fe7370a52c9dd9eb2f366e5

NetworkManager-team-debuginfo-1.36.0-8.el8_6.x86_64.rpm

SHA-256: 25c020d8d82fb1096a6948b29588a870b6f975ec49f087f3c530d7321ffe1a32

NetworkManager-tui-1.36.0-8.el8_6.x86_64.rpm

SHA-256: 004ec09f607eee24a29bac3165a4a1e2241e30889650ebb9ec505e27b5ed250e

NetworkManager-tui-debuginfo-1.36.0-8.el8_6.x86_64.rpm

SHA-256: dde9c3ac12d4ccdc51fcd65bd3cec88bf5ff771db28cabbd2b251cdefb734c52

NetworkManager-wifi-1.36.0-8.el8_6.x86_64.rpm

SHA-256: 333fc5685e3d0d090aa88034582f15ae1cafd475a1781aec9566d2272df08a80

NetworkManager-wifi-debuginfo-1.36.0-8.el8_6.x86_64.rpm

SHA-256: 47ef7bef21231dce599a2f597ea90f31f1dee6751e8a4cb7400f9a8f3f5f6af4

NetworkManager-wwan-1.36.0-8.el8_6.x86_64.rpm

SHA-256: 22bb8c5e9e24fe53efa603cf41e2638f86751e3fb8445dd17289269ef5279dc9

NetworkManager-wwan-debuginfo-1.36.0-8.el8_6.x86_64.rpm

SHA-256: bc1447c3980f3a444648724b3d6d405ce2be91530f8a6fec1dafcb91711b2048

butane-0.15.0-2.rhaos4.11.el8.x86_64.rpm

SHA-256: fad94802e295d82a31846941b339bd0401b554e8d0c1c14562638662feac9638

butane-debuginfo-0.15.0-2.rhaos4.11.el8.x86_64.rpm

SHA-256: 86974f6bb0be33ca5932344ba41e06d799106b502647139e40f9d63a337c0686

butane-debugsource-0.15.0-2.rhaos4.11.el8.x86_64.rpm

SHA-256: a8f18912643c1a205f94425f1498af4a7d25f975f6a118755b6e379d71f041da

butane-redistributable-0.15.0-2.rhaos4.11.el8.noarch.rpm

SHA-256: 2b132379251758e95331512bfa53e5617f1ad8f5429fd00eac6bbcdb61780688

console-login-helper-messages-0.20.4-1.rhaos4.11.el8.noarch.rpm

SHA-256: da1969640080afa1d69061ce700c24051a6489ae52b748890e0c2fdd654fa2a7

console-login-helper-messages-issuegen-0.20.4-1.rhaos4.11.el8.noarch.rpm

SHA-256: ed004ae56f9a93983dbadef06cb5efd780700adb491d13b80d9d25b3675714f2

console-login-helper-messages-profile-0.20.4-1.rhaos4.11.el8.noarch.rpm

SHA-256: f063e55d1d9b2fb7391d5ef20d7e9cee3972ba42d8ff976dd30458d19430c6c1

cri-o-1.24.2-4.rhaos4.11.gitd6283df.el8.x86_64.rpm

SHA-256: 1792a1d55a485be9128ed54e9742e6abeffa72abf0c102dae75874c58c6baa21

cri-o-debuginfo-1.24.2-4.rhaos4.11.gitd6283df.el8.x86_64.rpm

SHA-256: 57374c749830c017e16fba0c7d3ee7cb5f08bd7706d8a95bf7b18d7f99ebaed0

cri-o-debugsource-1.24.2-4.rhaos4.11.gitd6283df.el8.x86_64.rpm

SHA-256: bb1eeed82dff77d300f436ef9643eb9eab9aa0dd9f31dd213a95a99ef04260fa

ignition-2.14.0-4.rhaos4.11.el8.x86_64.rpm

SHA-256: a8fdf4b0de91e20ab8b6aba0bac65d91243180244d9c19880299ac1db9dcb4c7

ignition-debuginfo-2.14.0-4.rhaos4.11.el8.x86_64.rpm

SHA-256: db7bcc44c5870ec1134e89f53cfd0ec5dc09a25be94c25385fc0f0aee4979d3c

ignition-debugsource-2.14.0-4.rhaos4.11.el8.x86_64.rpm

SHA-256: 24c8c50e57073c7fa690f9df5091236bb6cfa062ec2520bad246b94c6f2b9ae1

ignition-validate-2.14.0-4.rhaos4.11.el8.x86_64.rpm

SHA-256: c31ceb6ff7882f027a4b71c3b025b45f124f9a24265cbe6ad8f72fa17c63e51d

ignition-validate-debuginfo-2.14.0-4.rhaos4.11.el8.x86_64.rpm

SHA-256: 91b1ee8ebb36a266d970cf00731e927073583292a0ea90da1c47cff918d02802

openshift-ansible-4.11.0-202208111716.p0.gdf73941.assembly.stream.el8.noarch.rpm

SHA-256: 9ea20faafa1dc5bd098a9e26c2c814a76957eff9424e142fffb88f0880dd6545

openshift-ansible-test-4.11.0-202208111716.p0.gdf73941.assembly.stream.el8.noarch.rpm

SHA-256: 8dae327ef78c802331a299e70bbc64def50489b2b8675abd8cc722e03f6c5f4a

openshift-clients-4.11.0-202208110436.p0.gfcf512e.assembly.stream.el8.x86_64.rpm

SHA-256: 362632b41c4a60aa2ea7f60ad2332f3acce09451fb5f29653b7abe0c41c73858

openshift-clients-redistributable-4.11.0-202208110436.p0.gfcf512e.assembly.stream.el8.x86_64.rpm

SHA-256: a3e8f82f03a89765522e59ca5a67cc3985568c2d5828b9e18707c763ad26dbe3

openshift-hyperkube-4.11.0-202208101756.p0.g4f0dd4d.assembly.stream.el8.x86_64.rpm

SHA-256: 5068455dd438af757c43274a8e8813012be867df83208bbb1442c1d503ce7a9c

openshift-kuryr-cni-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.noarch.rpm

SHA-256: 044bc60c4cddda8c715ce203c9ee407ff504a0efd327b5e26fee46317a3b6509

openshift-kuryr-common-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.noarch.rpm

SHA-256: 440836764b0a83ff0c246d242830b11e17b8711876e1b4e924da26fa297d7ae3

openshift-kuryr-controller-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.noarch.rpm

SHA-256: 82a9ab4510af498e76bd9b37f3b84f5d2ac0a81a3c55ead2897a1a772245d0d0

python3-kubernetes-24.2.0-1.el8.noarch.rpm

SHA-256: c635b0c82713adb5617c0020cbf1c6a517b1b3f78b18258acb2047ada2352f21

python3-kubernetes-tests-24.2.0-1.el8.noarch.rpm

SHA-256: 3b8965b1ae84c257b4b6b5b5984cb146a33b8293e73041feb249a49a2802b0c5

python3-kuryr-kubernetes-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.noarch.rpm

SHA-256: 7455f356395820067325c087c95d856ba769f896d1a0e03f1acbde17a4b124cd

Red Hat OpenShift Container Platform for Power 4.11 for RHEL 8

SRPM

NetworkManager-1.36.0-8.el8_6.src.rpm

SHA-256: dfcc22d243d157657095c45ae51609cd1bded7072ba39faaa63b10fc53d36782

butane-0.15.0-2.rhaos4.11.el8.src.rpm

SHA-256: 97f0f7c653de494e484f62bf41e526dd2305be3f4986dfa13446496b030c3012

console-login-helper-messages-0.20.4-1.rhaos4.11.el8.src.rpm

SHA-256: 929d2a057b06524ff3a064ce2c899652e41bee04c95646d9bcde434a4de2e921

cri-o-1.24.2-4.rhaos4.11.gitd6283df.el8.src.rpm

SHA-256: cda75edce103e6412ee8e671959671c0ecf76b2c20ce2c725e75ff432d52119e

ignition-2.14.0-4.rhaos4.11.el8.src.rpm

SHA-256: 5d80fd98a55846a0cff8ca9ed8abfd64a3f5ef7731e9581fe5a1cdcd455279f6

openshift-4.11.0-202208101756.p0.g4f0dd4d.assembly.stream.el8.src.rpm

SHA-256: 36f053b6482d036e6f21a9adfcd583d842137c9439f8bc9fb2f3977f15aa854a

openshift-ansible-4.11.0-202208111716.p0.gdf73941.assembly.stream.el8.src.rpm

SHA-256: 9705cbbe3d4987ae4c1cc5bd4bda0f29e2546aaa9a541be51844a5922325fd0f

openshift-clients-4.11.0-202208110436.p0.gfcf512e.assembly.stream.el8.src.rpm

SHA-256: 848117764e8dffea4c94ae363e5e656b660fe880c3bf858badc739e2e8383284

openshift-kuryr-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.src.rpm

SHA-256: 04336ee1e5ed316311e459fa370d14eac8325758e978f07ef1d3d8e2d5275a27

python-kubernetes-24.2.0-1.el8.src.rpm

SHA-256: b5ab96db91c8590d991412d6176f2b60c47bfe23e1066a67a9fe320f779be3c9

ppc64le

NetworkManager-1.36.0-8.el8_6.ppc64le.rpm

SHA-256: 7dd6fe085547da826e40798e9ff5134635617699bb3cccce934e3c7369dba945

NetworkManager-adsl-1.36.0-8.el8_6.ppc64le.rpm

SHA-256: 711dcde3cffe46c4ff6ba4684dc51f211957956a5bd1138fe1951bb3688e468d

NetworkManager-adsl-debuginfo-1.36.0-8.el8_6.ppc64le.rpm

SHA-256: 33767ddaa002e7a4047273fb8417a37cd846d283b2683f5933101f2cc0c3bdd5

NetworkManager-bluetooth-1.36.0-8.el8_6.ppc64le.rpm

SHA-256: 94e5e5d060ffa694576f82c679b920929dac7bea57fe92d890626fc1d48be646

NetworkManager-bluetooth-debuginfo-1.36.0-8.el8_6.ppc64le.rpm

SHA-256: 4d04aff28512623cc8076b5665afb2158a1654fb63af17c0dfd388dea50ac083

NetworkManager-cloud-setup-1.36.0-8.el8_6.ppc64le.rpm

SHA-256: 6121010cb234eefb9f303783111cc274246d29578d0f0f0d7ba20290e92a5a36

NetworkManager-cloud-setup-debuginfo-1.36.0-8.el8_6.ppc64le.rpm

SHA-256: cbcbabb84eee3eda3337659070cc261dc4c9ec619dc0937dbb3ab14c079d4e4a

NetworkManager-config-connectivity-redhat-1.36.0-8.el8_6.noarch.rpm

SHA-256: afce910d783881294aa86ba61556c4a16e2531f1266a4f9f12f5492304bedd31

NetworkManager-config-server-1.36.0-8.el8_6.noarch.rpm

SHA-256: f8d5a45bf5a96561739875a091be0cbb94b5faaa7fe22a7a535198fd5d43dad4

NetworkManager-debuginfo-1.36.0-8.el8_6.ppc64le.rpm

SHA-256: 0d7ddbd94f4328df950e4210aefbf30bdcc40e54c444d611b8bf8bbe248b2756

NetworkManager-debugsource-1.36.0-8.el8_6.ppc64le.rpm

SHA-256: dee81126f052b39d1f9255561a8bdcd6415f656385965f0bc209d4f6ab143dd0

NetworkManager-dispatcher-routing-rules-1.36.0-8.el8_6.noarch.rpm

SHA-256: 77594dbc4d26d004364ade48b803021c13ba4e50f6e0c05bd1bc708b608229d9

NetworkManager-libnm-1.36.0-8.el8_6.ppc64le.rpm

SHA-256: e88a63557b26bd311350edf7a4f5984eddb0a833b0006a0ec27d4d06e5adaad7

NetworkManager-libnm-debuginfo-1.36.0-8.el8_6.ppc64le.rpm

SHA-256: c6663da9b215ae5b1c87759b972ffed9b27240d42a1d13e50ba698c890e5bcda

NetworkManager-libnm-devel-1.36.0-8.el8_6.ppc64le.rpm

SHA-256: 5bf834f5364d1dbaa204c4d88e1aeba65fc9717624e3ae8301ed12298da07340

NetworkManager-ovs-1.36.0-8.el8_6.ppc64le.rpm

SHA-256: c03ce40e7497ebab91b01461f73f0bd8bb609d153e07780ff5c0fd1d04d3ebbd

NetworkManager-ovs-debuginfo-1.36.0-8.el8_6.ppc64le.rpm

SHA-256: bea73fb54266c972a80beea558170319f7d1bbed0358bdacea8b118072a7646f

NetworkManager-ppp-1.36.0-8.el8_6.ppc64le.rpm

SHA-256: d4dc8135916bd276b0d69eeae5aa4400fc5acb31b0d7d6b7b356fc981827b4fd

NetworkManager-ppp-debuginfo-1.36.0-8.el8_6.ppc64le.rpm

SHA-256: a865c06bc32ad7dd9dd560a8a5ed465d6bdaf45a355eccb90197ee52ddead855

NetworkManager-team-1.36.0-8.el8_6.ppc64le.rpm

SHA-256: ed69762ce2512acb10701fd4d11bc90842defc0949add3fb6ead65eaf37177bd

NetworkManager-team-debuginfo-1.36.0-8.el8_6.ppc64le.rpm

SHA-256: d91b5936255a3990f370cb572ae4a970e7206cd753a14dc8b9a1f2214a04fb25

NetworkManager-tui-1.36.0-8.el8_6.ppc64le.rpm

SHA-256: 30e76915584f7f545c00a149e9c712395469c19758a336d5766db65d41225c55

NetworkManager-tui-debuginfo-1.36.0-8.el8_6.ppc64le.rpm

SHA-256: 8d977e7b6a6a23e8f2f4e956f548032d1e47c96698071c9de3db5cb98e9fea6b

NetworkManager-wifi-1.36.0-8.el8_6.ppc64le.rpm

SHA-256: a348f70f4ecb4413a57d0d06b03017c5d604cb0401ecb197733ad8ef39b3a8d4

NetworkManager-wifi-debuginfo-1.36.0-8.el8_6.ppc64le.rpm

SHA-256: 16cb2465b943b78acf9348d0a349fd8f64615f73581cfa2edbb4d175b04a3ec7

NetworkManager-wwan-1.36.0-8.el8_6.ppc64le.rpm

SHA-256: 25b563236b74b576acd00a0fa059ef0447f5d6dc40fee14f6a40e5c996fc0c7a

NetworkManager-wwan-debuginfo-1.36.0-8.el8_6.ppc64le.rpm

SHA-256: 39c7ec51b5d3bb4aa48a4d0c65d12a17e550debbcbccdf2516cf455fb5e6298d

butane-0.15.0-2.rhaos4.11.el8.ppc64le.rpm

SHA-256: 9918f0a9fa9ebf5286dd0ea89a8827daf43af5bf5611a5ed1edd905195c2aec5

butane-debuginfo-0.15.0-2.rhaos4.11.el8.ppc64le.rpm

SHA-256: bbe968067b3abb05afd9373660fc8633d25e01109938f3d3bd52bc3e86427c85

butane-debugsource-0.15.0-2.rhaos4.11.el8.ppc64le.rpm

SHA-256: 341b7cd97d60d222735f774db7572ec168604814bb4b4c2d30ba84703e7a943d

butane-redistributable-0.15.0-2.rhaos4.11.el8.noarch.rpm

SHA-256: 2b132379251758e95331512bfa53e5617f1ad8f5429fd00eac6bbcdb61780688

console-login-helper-messages-0.20.4-1.rhaos4.11.el8.noarch.rpm

SHA-256: da1969640080afa1d69061ce700c24051a6489ae52b748890e0c2fdd654fa2a7

console-login-helper-messages-issuegen-0.20.4-1.rhaos4.11.el8.noarch.rpm

SHA-256: ed004ae56f9a93983dbadef06cb5efd780700adb491d13b80d9d25b3675714f2

console-login-helper-messages-profile-0.20.4-1.rhaos4.11.el8.noarch.rpm

SHA-256: f063e55d1d9b2fb7391d5ef20d7e9cee3972ba42d8ff976dd30458d19430c6c1

cri-o-1.24.2-4.rhaos4.11.gitd6283df.el8.ppc64le.rpm

SHA-256: 30d7f290fd06ba83aee88af9c0879232458d43e1494a0ff3ada1d85a588bde36

cri-o-debuginfo-1.24.2-4.rhaos4.11.gitd6283df.el8.ppc64le.rpm

SHA-256: 2f2c4a90c3be89c179682ad54c11da42dd5b87a7f435d8b55e1d49702d10607f

cri-o-debugsource-1.24.2-4.rhaos4.11.gitd6283df.el8.ppc64le.rpm

SHA-256: 0c1372936868e8004499151769273a88e2572bcf5260c747127e2057a96a22f2

ignition-2.14.0-4.rhaos4.11.el8.ppc64le.rpm

SHA-256: 194f9198dfc5981259d391af4360827760f5d81feeb974fd34f6983dfb2d42f4

ignition-debuginfo-2.14.0-4.rhaos4.11.el8.ppc64le.rpm

SHA-256: 95b92ab3d5b0ad30ecdae7834189aab028191b33fbec0c198d4060223f5b1c49

ignition-debugsource-2.14.0-4.rhaos4.11.el8.ppc64le.rpm

SHA-256: 2e6cda204734154cb04dfbac9156c45cca57c8e175c207aabbd2e6762943f688

ignition-validate-2.14.0-4.rhaos4.11.el8.ppc64le.rpm

SHA-256: 89c1b9f092fa775b94e81c6ee51782b470d270fc3a6bfdb19f6b146c35e32df7

ignition-validate-debuginfo-2.14.0-4.rhaos4.11.el8.ppc64le.rpm

SHA-256: f6fa6cdbd06a9a39dd21d49916af5915c35606e33aedb4cfb43446d5af57a303

openshift-ansible-4.11.0-202208111716.p0.gdf73941.assembly.stream.el8.noarch.rpm

SHA-256: 9ea20faafa1dc5bd098a9e26c2c814a76957eff9424e142fffb88f0880dd6545

openshift-ansible-test-4.11.0-202208111716.p0.gdf73941.assembly.stream.el8.noarch.rpm

SHA-256: 8dae327ef78c802331a299e70bbc64def50489b2b8675abd8cc722e03f6c5f4a

openshift-clients-4.11.0-202208110436.p0.gfcf512e.assembly.stream.el8.ppc64le.rpm

SHA-256: f65d2efa83dfabf588a99400693ada16accb1857a3606a302b573c7489ed8b1b

openshift-hyperkube-4.11.0-202208101756.p0.g4f0dd4d.assembly.stream.el8.ppc64le.rpm

SHA-256: b815bb84f950e96dc7617b562e883c61470890407af63538b22e5206b7c35491

openshift-kuryr-cni-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.noarch.rpm

SHA-256: 044bc60c4cddda8c715ce203c9ee407ff504a0efd327b5e26fee46317a3b6509

openshift-kuryr-common-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.noarch.rpm

SHA-256: 440836764b0a83ff0c246d242830b11e17b8711876e1b4e924da26fa297d7ae3

openshift-kuryr-controller-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.noarch.rpm

SHA-256: 82a9ab4510af498e76bd9b37f3b84f5d2ac0a81a3c55ead2897a1a772245d0d0

python3-kubernetes-24.2.0-1.el8.noarch.rpm

SHA-256: c635b0c82713adb5617c0020cbf1c6a517b1b3f78b18258acb2047ada2352f21

python3-kubernetes-tests-24.2.0-1.el8.noarch.rpm

SHA-256: 3b8965b1ae84c257b4b6b5b5984cb146a33b8293e73041feb249a49a2802b0c5

python3-kuryr-kubernetes-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.noarch.rpm

SHA-256: 7455f356395820067325c087c95d856ba769f896d1a0e03f1acbde17a4b124cd

Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.11 for RHEL 8

SRPM

NetworkManager-1.36.0-8.el8_6.src.rpm

SHA-256: dfcc22d243d157657095c45ae51609cd1bded7072ba39faaa63b10fc53d36782

butane-0.15.0-2.rhaos4.11.el8.src.rpm

SHA-256: 97f0f7c653de494e484f62bf41e526dd2305be3f4986dfa13446496b030c3012

console-login-helper-messages-0.20.4-1.rhaos4.11.el8.src.rpm

SHA-256: 929d2a057b06524ff3a064ce2c899652e41bee04c95646d9bcde434a4de2e921

cri-o-1.24.2-4.rhaos4.11.gitd6283df.el8.src.rpm

SHA-256: cda75edce103e6412ee8e671959671c0ecf76b2c20ce2c725e75ff432d52119e

ignition-2.14.0-4.rhaos4.11.el8.src.rpm

SHA-256: 5d80fd98a55846a0cff8ca9ed8abfd64a3f5ef7731e9581fe5a1cdcd455279f6

openshift-4.11.0-202208101756.p0.g4f0dd4d.assembly.stream.el8.src.rpm

SHA-256: 36f053b6482d036e6f21a9adfcd583d842137c9439f8bc9fb2f3977f15aa854a

openshift-ansible-4.11.0-202208111716.p0.gdf73941.assembly.stream.el8.src.rpm

SHA-256: 9705cbbe3d4987ae4c1cc5bd4bda0f29e2546aaa9a541be51844a5922325fd0f

openshift-clients-4.11.0-202208110436.p0.gfcf512e.assembly.stream.el8.src.rpm

SHA-256: 848117764e8dffea4c94ae363e5e656b660fe880c3bf858badc739e2e8383284

openshift-kuryr-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.src.rpm

SHA-256: 04336ee1e5ed316311e459fa370d14eac8325758e978f07ef1d3d8e2d5275a27

python-kubernetes-24.2.0-1.el8.src.rpm

SHA-256: b5ab96db91c8590d991412d6176f2b60c47bfe23e1066a67a9fe320f779be3c9

s390x

NetworkManager-1.36.0-8.el8_6.s390x.rpm

SHA-256: c3b89ce672d53d12795e4da491e99bd314e8c15c4052397f68ccf927bb6b35cd

NetworkManager-adsl-1.36.0-8.el8_6.s390x.rpm

SHA-256: 03293629815f124465663f8d86de883573de1d23ff3dea08372e0b2e772c3168

NetworkManager-adsl-debuginfo-1.36.0-8.el8_6.s390x.rpm

SHA-256: ef99dbc360d32311aadf65c0944cb0744344e9ee67b9c914280fa3eab09f075f

NetworkManager-bluetooth-1.36.0-8.el8_6.s390x.rpm

SHA-256: 07961c3b3c297f731260fd06e07959cb69511b94614e3b78c5549c99e2494a95

NetworkManager-bluetooth-debuginfo-1.36.0-8.el8_6.s390x.rpm

SHA-256: 9a5ebbd69b5e7e5dd5c2ed6ed207529985547a16803429be2328276c307cb5b6

NetworkManager-cloud-setup-1.36.0-8.el8_6.s390x.rpm

SHA-256: a40d05b280d74b7a0057b7db5c8bc5b23f02d53094999990fa337f1bfa8c61cc

NetworkManager-cloud-setup-debuginfo-1.36.0-8.el8_6.s390x.rpm

SHA-256: 3d5666ae737942216082f23f25a8d54bd1a7a23773eb1a4b1b4db7efbb85c716

NetworkManager-config-connectivity-redhat-1.36.0-8.el8_6.noarch.rpm

SHA-256: afce910d783881294aa86ba61556c4a16e2531f1266a4f9f12f5492304bedd31

NetworkManager-config-server-1.36.0-8.el8_6.noarch.rpm

SHA-256: f8d5a45bf5a96561739875a091be0cbb94b5faaa7fe22a7a535198fd5d43dad4

NetworkManager-debuginfo-1.36.0-8.el8_6.s390x.rpm

SHA-256: a063a0ed59cc11126be9b56b01de5e25f5454a7b06c491c4b114fa45a7f013ff

NetworkManager-debugsource-1.36.0-8.el8_6.s390x.rpm

SHA-256: fbe0124c8c67223614cdce714459c6e91a660ca2765bded131c4fa38d64c261c

NetworkManager-dispatcher-routing-rules-1.36.0-8.el8_6.noarch.rpm

SHA-256: 77594dbc4d26d004364ade48b803021c13ba4e50f6e0c05bd1bc708b608229d9

NetworkManager-libnm-1.36.0-8.el8_6.s390x.rpm

SHA-256: 2c37568ce77fd2df33546ca076a5b1e59df8903c3deb00d439a93b636d99b370

NetworkManager-libnm-debuginfo-1.36.0-8.el8_6.s390x.rpm

SHA-256: 5056d10648e23b6b17e69495ea5970d35ec8355638f1d75cce20803be2a53206

NetworkManager-libnm-devel-1.36.0-8.el8_6.s390x.rpm

SHA-256: ac1a8f8d8cdace7d1d9bc72ba685c550017fab02485360358eee3ecb951b4e7f

NetworkManager-ovs-1.36.0-8.el8_6.s390x.rpm

SHA-256: d817925258dc19345bce922b1849ea2c4253170b0ff453896c3f7a928170df26

NetworkManager-ovs-debuginfo-1.36.0-8.el8_6.s390x.rpm

SHA-256: 81dc37fad6ff7a0965b25e5347c94c42cd40639d91c8b8e33670548c3b7cec11

NetworkManager-ppp-1.36.0-8.el8_6.s390x.rpm

SHA-256: 68015debc77b117ffd7ff7a38270807172d4a1a7ec6d130f2d6b3596886e9f57

NetworkManager-ppp-debuginfo-1.36.0-8.el8_6.s390x.rpm

SHA-256: 8b018bdd78888e75863b9ec37fb4377e2f5ce8c28c73e0a0be46a93f243653b4

NetworkManager-team-1.36.0-8.el8_6.s390x.rpm

SHA-256: 59b3c30b98e4eb1757663afe78ea80d7ea75f12167b47d6318c6ecc0a06b1d18

NetworkManager-team-debuginfo-1.36.0-8.el8_6.s390x.rpm

SHA-256: 42a7b3a7965a3ddf2f12193d179ba6db2ad5c2dad434a7a79b14bf03cf04f340

NetworkManager-tui-1.36.0-8.el8_6.s390x.rpm

SHA-256: 2f45ba37624a9a451127af0c43629e88b30735b2d04b7c7d9ff61bcc2dbcfb75

NetworkManager-tui-debuginfo-1.36.0-8.el8_6.s390x.rpm

SHA-256: a2c602720d8a85d7b8d2fdf1005b01de2466114a9e923627ee097f71ec732246

NetworkManager-wifi-1.36.0-8.el8_6.s390x.rpm

SHA-256: f853ff7c0cc8faa81b54375b897efca68fb6afe9397e5887da6cacf6f9cff2e6

NetworkManager-wifi-debuginfo-1.36.0-8.el8_6.s390x.rpm

SHA-256: c09fb18320d9775090dd346286fbe542001bafe0ea94605f1201a1c033098ec2

NetworkManager-wwan-1.36.0-8.el8_6.s390x.rpm

SHA-256: 09f51935b91b3550ccd9ac1343e85f53b927879912e8443d58bbb524436d196a

NetworkManager-wwan-debuginfo-1.36.0-8.el8_6.s390x.rpm

SHA-256: 9cd71d06e3da7646812716449064d8f248673c8efb1cc75ae7de922ec89cf2ed

butane-0.15.0-2.rhaos4.11.el8.s390x.rpm

SHA-256: 908d1dbedaa82393a112626284eda508eb1a675c4e4f893d749d535a5bcb5580

butane-debuginfo-0.15.0-2.rhaos4.11.el8.s390x.rpm

SHA-256: cc2ea32d68a85dd6f2402738d93770247ed97ef8476915c8384da73401fcacd4

butane-debugsource-0.15.0-2.rhaos4.11.el8.s390x.rpm

SHA-256: 0ba02ee53bff0da5cc4a47ac000d9f7e86a502981521d6892b346c558c7989a5

butane-redistributable-0.15.0-2.rhaos4.11.el8.noarch.rpm

SHA-256: 2b132379251758e95331512bfa53e5617f1ad8f5429fd00eac6bbcdb61780688

console-login-helper-messages-0.20.4-1.rhaos4.11.el8.noarch.rpm

SHA-256: da1969640080afa1d69061ce700c24051a6489ae52b748890e0c2fdd654fa2a7

console-login-helper-messages-issuegen-0.20.4-1.rhaos4.11.el8.noarch.rpm

SHA-256: ed004ae56f9a93983dbadef06cb5efd780700adb491d13b80d9d25b3675714f2

console-login-helper-messages-profile-0.20.4-1.rhaos4.11.el8.noarch.rpm

SHA-256: f063e55d1d9b2fb7391d5ef20d7e9cee3972ba42d8ff976dd30458d19430c6c1

cri-o-1.24.2-4.rhaos4.11.gitd6283df.el8.s390x.rpm

SHA-256: 9edf49ab2e68a3f26a45282b08e7ede83a5a54ca7e2e54a303dab04961e5b1dd

cri-o-debuginfo-1.24.2-4.rhaos4.11.gitd6283df.el8.s390x.rpm

SHA-256: 10fd1dcec245ad69cf3434762e63427ab3432f35c4264a233ba9ea7be6612de3

cri-o-debugsource-1.24.2-4.rhaos4.11.gitd6283df.el8.s390x.rpm

SHA-256: 4fa68b041599339424dd9cc85991a8a641a261873f478d18af683a950d7e64e5

ignition-2.14.0-4.rhaos4.11.el8.s390x.rpm

SHA-256: 18ba0dd7e9b7e5399aadae9556c21f72d3365e425fa12cc24c38f72d50f10390

ignition-debuginfo-2.14.0-4.rhaos4.11.el8.s390x.rpm

SHA-256: a1af826c8cdf132a7ed48edebf88cec047903186b3b2ea5911c5babdd54b1dad

ignition-debugsource-2.14.0-4.rhaos4.11.el8.s390x.rpm

SHA-256: 284acda2e135999c1a9912fcce91282b8db48b4089ac7ad1cbdaef44e7a8a7d6

ignition-validate-2.14.0-4.rhaos4.11.el8.s390x.rpm

SHA-256: dd4ce16e959f24d650a35bececbf8091120e704b983f018ed601283086aa176d

ignition-validate-debuginfo-2.14.0-4.rhaos4.11.el8.s390x.rpm

SHA-256: 6ad117214c3824af0492b1c3cbc04ad7157db054ed87c59a7698b4ccfb356a2b

openshift-ansible-4.11.0-202208111716.p0.gdf73941.assembly.stream.el8.noarch.rpm

SHA-256: 9ea20faafa1dc5bd098a9e26c2c814a76957eff9424e142fffb88f0880dd6545

openshift-ansible-test-4.11.0-202208111716.p0.gdf73941.assembly.stream.el8.noarch.rpm

SHA-256: 8dae327ef78c802331a299e70bbc64def50489b2b8675abd8cc722e03f6c5f4a

openshift-clients-4.11.0-202208110436.p0.gfcf512e.assembly.stream.el8.s390x.rpm

SHA-256: f7926bef4aaedab8246ec98559779d460227b93728fe5f9163fb564ed2fd022a

openshift-hyperkube-4.11.0-202208101756.p0.g4f0dd4d.assembly.stream.el8.s390x.rpm

SHA-256: 4c0b438cc3ae6b0a1ee642d99738ad4d0bb4ec160b5bcd7c66a2c5c6a16feb17

openshift-kuryr-cni-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.noarch.rpm

SHA-256: 044bc60c4cddda8c715ce203c9ee407ff504a0efd327b5e26fee46317a3b6509

openshift-kuryr-common-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.noarch.rpm

SHA-256: 440836764b0a83ff0c246d242830b11e17b8711876e1b4e924da26fa297d7ae3

openshift-kuryr-controller-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.noarch.rpm

SHA-256: 82a9ab4510af498e76bd9b37f3b84f5d2ac0a81a3c55ead2897a1a772245d0d0

python3-kubernetes-24.2.0-1.el8.noarch.rpm

SHA-256: c635b0c82713adb5617c0020cbf1c6a517b1b3f78b18258acb2047ada2352f21

python3-kubernetes-tests-24.2.0-1.el8.noarch.rpm

SHA-256: 3b8965b1ae84c257b4b6b5b5984cb146a33b8293e73041feb249a49a2802b0c5

python3-kuryr-kubernetes-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.noarch.rpm

SHA-256: 7455f356395820067325c087c95d856ba769f896d1a0e03f1acbde17a4b124cd

Red Hat OpenShift Container Platform for ARM 64 4.11

SRPM

NetworkManager-1.36.0-8.el8_6.src.rpm

SHA-256: dfcc22d243d157657095c45ae51609cd1bded7072ba39faaa63b10fc53d36782

butane-0.15.0-2.rhaos4.11.el8.src.rpm

SHA-256: 97f0f7c653de494e484f62bf41e526dd2305be3f4986dfa13446496b030c3012

console-login-helper-messages-0.20.4-1.rhaos4.11.el8.src.rpm

SHA-256: 929d2a057b06524ff3a064ce2c899652e41bee04c95646d9bcde434a4de2e921

cri-o-1.24.2-4.rhaos4.11.gitd6283df.el8.src.rpm

SHA-256: cda75edce103e6412ee8e671959671c0ecf76b2c20ce2c725e75ff432d52119e

ignition-2.14.0-4.rhaos4.11.el8.src.rpm

SHA-256: 5d80fd98a55846a0cff8ca9ed8abfd64a3f5ef7731e9581fe5a1cdcd455279f6

openshift-4.11.0-202208101756.p0.g4f0dd4d.assembly.stream.el8.src.rpm

SHA-256: 36f053b6482d036e6f21a9adfcd583d842137c9439f8bc9fb2f3977f15aa854a

openshift-ansible-4.11.0-202208111716.p0.gdf73941.assembly.stream.el8.src.rpm

SHA-256: 9705cbbe3d4987ae4c1cc5bd4bda0f29e2546aaa9a541be51844a5922325fd0f

openshift-clients-4.11.0-202208110436.p0.gfcf512e.assembly.stream.el8.src.rpm

SHA-256: 848117764e8dffea4c94ae363e5e656b660fe880c3bf858badc739e2e8383284

openshift-kuryr-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.src.rpm

SHA-256: 04336ee1e5ed316311e459fa370d14eac8325758e978f07ef1d3d8e2d5275a27

python-kubernetes-24.2.0-1.el8.src.rpm

SHA-256: b5ab96db91c8590d991412d6176f2b60c47bfe23e1066a67a9fe320f779be3c9

aarch64

NetworkManager-1.36.0-8.el8_6.aarch64.rpm

SHA-256: ff33c6d6c1e0aee62da82ceeebb0a30389acf5bbb9f2aa9500208aa82aed1082

NetworkManager-adsl-1.36.0-8.el8_6.aarch64.rpm

SHA-256: 9301a59f572a9eb008ab6a6c97e806bcbf7be6caac7ddc01c646f402b7838239

NetworkManager-adsl-debuginfo-1.36.0-8.el8_6.aarch64.rpm

SHA-256: 10bc7aafb3021795a9723c3a28c9a5a4ac55ea778ea026f93deac7325b53658f

NetworkManager-bluetooth-1.36.0-8.el8_6.aarch64.rpm

SHA-256: 79126c2a65d6c30ba7c6a41ddf2516aa383a1f0eb58365911dfc5d8eb1274466

NetworkManager-bluetooth-debuginfo-1.36.0-8.el8_6.aarch64.rpm

SHA-256: fda2d40119fab0eaf91dc8219e8f9d47670a0e5a9955eff8a5e6490745289054

NetworkManager-cloud-setup-1.36.0-8.el8_6.aarch64.rpm

SHA-256: 682d75ab9cc86e980fac53e5f09cd0a8f0366a03ffcc53f339c6da4f995f1487

NetworkManager-cloud-setup-debuginfo-1.36.0-8.el8_6.aarch64.rpm

SHA-256: 723d57d24f60b39d45c1f54d4645dca0e44038d0e92324ac818c33d35a619be0

NetworkManager-config-connectivity-redhat-1.36.0-8.el8_6.noarch.rpm

SHA-256: afce910d783881294aa86ba61556c4a16e2531f1266a4f9f12f5492304bedd31

NetworkManager-config-server-1.36.0-8.el8_6.noarch.rpm

SHA-256: f8d5a45bf5a96561739875a091be0cbb94b5faaa7fe22a7a535198fd5d43dad4

NetworkManager-debuginfo-1.36.0-8.el8_6.aarch64.rpm

SHA-256: 05f852e99fe60049988882947f75785f0d669c1a3c68d7b13c3905d48013617e

NetworkManager-debugsource-1.36.0-8.el8_6.aarch64.rpm

SHA-256: ef5d3ee3a19bb315e0dd142a9bd1fa808d56d4b97ff942ae1df260624e4e5952

NetworkManager-dispatcher-routing-rules-1.36.0-8.el8_6.noarch.rpm

SHA-256: 77594dbc4d26d004364ade48b803021c13ba4e50f6e0c05bd1bc708b608229d9

NetworkManager-libnm-1.36.0-8.el8_6.aarch64.rpm

SHA-256: 3a3752ddb5297d41f5fb4845b9ed5560db42f5770fd96e032e6c687efb4f46a5

NetworkManager-libnm-debuginfo-1.36.0-8.el8_6.aarch64.rpm

SHA-256: 0e6af9b46647315ffb98010f59cc755d5d36447db67715bcfda99adb130929dc

NetworkManager-libnm-devel-1.36.0-8.el8_6.aarch64.rpm

SHA-256: d946affdd83990df49c58587aebf50685b8163b04792e80a244dcc289ff45c79

NetworkManager-ovs-1.36.0-8.el8_6.aarch64.rpm

SHA-256: b706970089a24319aa0e0ee40078f23cad86142bd4d82e4e00bbd14a4035b3fe

NetworkManager-ovs-debuginfo-1.36.0-8.el8_6.aarch64.rpm

SHA-256: 7ff5af4964b448184fd5c52da59cb34052b4aef371665e97b974cf187f59a84c

NetworkManager-ppp-1.36.0-8.el8_6.aarch64.rpm

SHA-256: e8a5b124341ab4ed534ab8f6a2fb2bea0ce3342a9a7185eddce70cc1fd68dfd8

NetworkManager-ppp-debuginfo-1.36.0-8.el8_6.aarch64.rpm

SHA-256: f4d2e6e005d4cc5ae606f0872367947728c3aea81d184f970d6d22c621668a80

NetworkManager-team-1.36.0-8.el8_6.aarch64.rpm

SHA-256: d8aa317d637115e70365dd626d0d12f7993ab15165b2317486164b33a4a864ac

NetworkManager-team-debuginfo-1.36.0-8.el8_6.aarch64.rpm

SHA-256: 26e604cf7a20545b43b6b9f59ab0aeb698bf20c23e452ce2d0da6ee71794a27d

NetworkManager-tui-1.36.0-8.el8_6.aarch64.rpm

SHA-256: 4a31c183c2da8ad065933243822e74aa27f4b9dbaae742c71ff3820db10875b6

NetworkManager-tui-debuginfo-1.36.0-8.el8_6.aarch64.rpm

SHA-256: 0c62874c69c132f9b3d2f4efc85f905e1fb30f62f50e5cc7087c8de7482bb61b

NetworkManager-wifi-1.36.0-8.el8_6.aarch64.rpm

SHA-256: 50a9c661e148702114a1314020eb89211f1693b6be5b36c9e3811c9e00306d98

NetworkManager-wifi-debuginfo-1.36.0-8.el8_6.aarch64.rpm

SHA-256: 8e1ab98a32a6cbbaed418189b63382fec0855093bf387dc34ef8e2b964620a45

NetworkManager-wwan-1.36.0-8.el8_6.aarch64.rpm

SHA-256: 72479726d12e5ab527890b48152889d18d5f968a3b55ef86f52cae91922bcadc

NetworkManager-wwan-debuginfo-1.36.0-8.el8_6.aarch64.rpm

SHA-256: 4ed9a0b1bbe4bd3c24d1bfe56a2a3820258d51d62871952116c40a3a36ecad33

butane-0.15.0-2.rhaos4.11.el8.aarch64.rpm

SHA-256: 7b5b2f2e946108d238dcfe462fe349e80368cabbc9af9ce10f7810ec927e3b9e

butane-debuginfo-0.15.0-2.rhaos4.11.el8.aarch64.rpm

SHA-256: f22ab59096796f26352bf67c20909c3c559f1a5cd0f448a4d32499a97562dd16

butane-debugsource-0.15.0-2.rhaos4.11.el8.aarch64.rpm

SHA-256: 9cca6a6aeeee45978dd2d36b020090461d3908294891c7a33d115f4465f8aaa8

butane-redistributable-0.15.0-2.rhaos4.11.el8.noarch.rpm

SHA-256: 2b132379251758e95331512bfa53e5617f1ad8f5429fd00eac6bbcdb61780688

console-login-helper-messages-0.20.4-1.rhaos4.11.el8.noarch.rpm

SHA-256: da1969640080afa1d69061ce700c24051a6489ae52b748890e0c2fdd654fa2a7

console-login-helper-messages-issuegen-0.20.4-1.rhaos4.11.el8.noarch.rpm

SHA-256: ed004ae56f9a93983dbadef06cb5efd780700adb491d13b80d9d25b3675714f2

console-login-helper-messages-profile-0.20.4-1.rhaos4.11.el8.noarch.rpm

SHA-256: f063e55d1d9b2fb7391d5ef20d7e9cee3972ba42d8ff976dd30458d19430c6c1

cri-o-1.24.2-4.rhaos4.11.gitd6283df.el8.aarch64.rpm

SHA-256: da08313eca1f5ead51d5d7a6a287b62eec2e37e4f0ce1b6894d48307a1fbfaf8

cri-o-debuginfo-1.24.2-4.rhaos4.11.gitd6283df.el8.aarch64.rpm

SHA-256: ca1a643a258b554e57af6a2868c49a541827b282ca1af81d1b065b7403c7ee99

cri-o-debugsource-1.24.2-4.rhaos4.11.gitd6283df.el8.aarch64.rpm

SHA-256: 8e91086e1c7bf69fdb5b18b5d1e42d82402e64cc09135c68db67ae5294f36d05

ignition-2.14.0-4.rhaos4.11.el8.aarch64.rpm

SHA-256: 7fd39473590e32bcf0e06ccba43b6aa7b4b2f2235abeeabdddba7ee7211c064b

ignition-debuginfo-2.14.0-4.rhaos4.11.el8.aarch64.rpm

SHA-256: 042710d6178c4400acef943130af639e1826f65805ae9c74dad4d0bde9d5cf3f

ignition-debugsource-2.14.0-4.rhaos4.11.el8.aarch64.rpm

SHA-256: a1a609ce98dfbf1ee208730d0509811fe66a4229a7c63f0c71da5fe3b084edb0

ignition-validate-2.14.0-4.rhaos4.11.el8.aarch64.rpm

SHA-256: 4cc33c10cc5743d6bd3c46f8969db5b96f5a1b09487582c00714e646f76d7da4

ignition-validate-debuginfo-2.14.0-4.rhaos4.11.el8.aarch64.rpm

SHA-256: 47bbca5767957e5f1c55a95327a1ead105f616938cb24d25bd9f6a507aa5ff7e

openshift-ansible-4.11.0-202208111716.p0.gdf73941.assembly.stream.el8.noarch.rpm

SHA-256: 9ea20faafa1dc5bd098a9e26c2c814a76957eff9424e142fffb88f0880dd6545

openshift-ansible-test-4.11.0-202208111716.p0.gdf73941.assembly.stream.el8.noarch.rpm

SHA-256: 8dae327ef78c802331a299e70bbc64def50489b2b8675abd8cc722e03f6c5f4a

openshift-clients-4.11.0-202208110436.p0.gfcf512e.assembly.stream.el8.aarch64.rpm

SHA-256: cb3ff1b802f394ea960585d2b31311e03ea4c95aff6ed3aa98906cff33a63590

openshift-hyperkube-4.11.0-202208101756.p0.g4f0dd4d.assembly.stream.el8.aarch64.rpm

SHA-256: e1b0af130e6452f4284379ad032d4f798395a03e77aeff236622d9483dbf46c5

openshift-kuryr-cni-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.noarch.rpm

SHA-256: 044bc60c4cddda8c715ce203c9ee407ff504a0efd327b5e26fee46317a3b6509

openshift-kuryr-common-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.noarch.rpm

SHA-256: 440836764b0a83ff0c246d242830b11e17b8711876e1b4e924da26fa297d7ae3

openshift-kuryr-controller-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.noarch.rpm

SHA-256: 82a9ab4510af498e76bd9b37f3b84f5d2ac0a81a3c55ead2897a1a772245d0d0

python3-kubernetes-24.2.0-1.el8.noarch.rpm

SHA-256: c635b0c82713adb5617c0020cbf1c6a517b1b3f78b18258acb2047ada2352f21

python3-kubernetes-tests-24.2.0-1.el8.noarch.rpm

SHA-256: 3b8965b1ae84c257b4b6b5b5984cb146a33b8293e73041feb249a49a2802b0c5

python3-kuryr-kubernetes-4.11.0-202208101627.p0.g6952743.assembly.stream.el8.noarch.rpm

SHA-256: 7455f356395820067325c087c95d856ba769f896d1a0e03f1acbde17a4b124cd

Related news

Ubuntu Security Notice USN-6038-2

Ubuntu Security Notice 6038-2 - USN-6038-1 fixed several vulnerabilities in Go 1.18. This update provides the corresponding updates for Go 1.13 and Go 1.16. CVE-2022-29526 and CVE-2022-30630 only affected Go 1.16. It was discovered that the Go net/http module incorrectly handled Transfer-Encoding headers in the HTTP/1 client. A remote attacker could possibly use this issue to perform an HTTP Request Smuggling attack.

RHSA-2023:4488: Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 6.0.1[security update]

The components for Red Hat OpenShift support for Windows Containers 6.0.1 are now available. This product release includes bug fixes and security update for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27191: A broken cryptographic algorithm flaw was found in golang.org/x/crypto/ssh. This issue causes a client to fail authentication with RSA keys to servers that reject...

Red Hat Security Advisory 2023-3642-01

Red Hat Security Advisory 2023-3642-01 - Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services. This new container image is based on Red Hat Ceph Storage 6.1 and Red Hat Enterprise Linux 9. Issues addressed include bypass, cross site scripting, denial of service, information leakage, spoofing, and traversal vulnerabilities.

Red Hat Security Advisory 2023-2283-01

Red Hat Security Advisory 2023-2283-01 - The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files.

Red Hat Security Advisory 2023-2367-01

Red Hat Security Advisory 2023-2367-01 - The Container Network Interface project consists of a specification and libraries for writing plug-ins for configuring network interfaces in Linux containers, along with a number of supported plug-ins. CNI concerns itself only with network connectivity of containers and removing allocated resources when the container is deleted.

RHSA-2023:2367: Red Hat Security Advisory: containernetworking-plugins security and bug fix update

An update for containernetworking-plugins is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30629: A flaw was found in the crypto/tls golang package. When session tickets are generated by crypto/tls, it is missing the ticket expiration. This issue may allow an attacker to observe the TLS handshakes to correlate successive connections during session resumption. * CVE-2022-41717: A flaw was found in the net/http library of th...

Ubuntu Security Notice USN-6038-1

Ubuntu Security Notice 6038-1 - It was discovered that the Go net/http module incorrectly handled Transfer-Encoding headers in the HTTP/1 client. A remote attacker could possibly use this issue to perform an HTTP Request Smuggling attack. It was discovered that Go did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a panic resulting into a denial of service.

RHSA-2023:1275: Red Hat Security Advisory: Red Hat OpenStack Platform (etcd) security update

An update for etcd is now available for Red Hat OpenStack Platform. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: A flaw was found in golang. The HTTP/1 client accepted invalid Transfer-Encoding headers indicating "chunked" encoding. This issue could allow request smuggling, but only if combined with an intermediate server that also improperly accepts the header as invalid. * CVE-2022-2880: A flaw was found in the golang package, where requests forwarded by rev...

RHSA-2023:0630: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.7.0 security and bug fix updates

Red Hat Advanced Cluster Management for Kubernetes 2.7.0 General Availability release images, which provide security updates and fix bugs. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3517: A vulnerability was found in the nodejs-minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service. * CVE-2022-30629: A flaw was found in the crypto/tls golang pa...

Red Hat Security Advisory 2023-0407-01

Red Hat Security Advisory 2023-0407-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 4.12.0 RPMs. Issues addressed include denial of service and out of bounds read vulnerabilities.

RHSA-2022:9047: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.6 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.6 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30630: golang: io/fs: stack exhaustion in G...

RHSA-2022:8750: Red Hat Security Advisory: OpenShift Virtualization 4.11.1 security and bug fix update

Red Hat OpenShift Virtualization release 4.11.1 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-24921: golang: regexp: stack exhaustion via a deeply nested expression * CVE-2022-28327: golang: crypto/elliptic: panic caus...

RHSA-2022:6696: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4.6 security update and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.4.6 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-31129: moment: inefficient parsing algorithm resulting in DoS * CVE-2022-31150: nodejs16: CRLF injection in node-undici * CVE-2022-31151: nodejs/undici: Cookie headers uncleared on cross-origin redirect * CV...

Red Hat Security Advisory 2022-6536-01

Red Hat Security Advisory 2022-6536-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.5.

Red Hat Security Advisory 2022-6536-01

Red Hat Security Advisory 2022-6536-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.11.5.

Red Hat Security Advisory 2022-6429-01

Red Hat Security Advisory 2022-6429-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Issues addressed include bypass, code execution, and denial of service vulnerabilities.

Red Hat Security Advisory 2022-6430-01

Red Hat Security Advisory 2022-6430-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes. Issues addressed include a denial of service vulnerability.

RHSA-2022:6430: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.0.4 security and bug fix update

OpenShift API for Data Protection (OADP) 1.0.4 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-21698: prometheus/client_golang: Denial of service using InstrumentHandlerCounter * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-30629: golang: crypto/tls: session ti...

Red Hat Security Advisory 2022-6370-01

Red Hat Security Advisory 2022-6370-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.0 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix security issues and several bugs. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-6345-01

Red Hat Security Advisory 2022-6345-01 - Multicluster engine for Kubernetes 2.1 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-6347-01

Red Hat Security Advisory 2022-6347-01 - VolSync is a Kubernetes operator that enables asynchronous replication of persistent volumes within a cluster, or across clusters. Version 0.5 has been released with security fixes and updates.

Red Hat Security Advisory 2022-6348-01

Red Hat Security Advisory 2022-6348-01 - Gatekeeper is an open source project that applies the OPA Constraint Framework to enforce policies on your Kubernetes clusters. This advisory contains the container images for Gatekeeper that include bug fixes and container upgrades.

RHSA-2022:6370: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.6.0 security updates and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.6.0 General Availability release images, which fix security issues and bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_a...

RHSA-2022:6345: Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.1 security updates and bug fixes

Multicluster Engine v2.1 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30630: golang: io/fs: stack exhaustion in Glob * CVE-2022-30631: golang: compress/gzi...

RHSA-2022:6348: Red Hat Security Advisory: Gatekeeper Operator v0.2 security and container updates

Gatekeeper Operator v0.2 security updates Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30630: golang: io/fs: stack exhaustion in Glob * CVE-2022-30631: gol...

Red Hat Security Advisory 2022-6152-01

Red Hat Security Advisory 2022-6152-01 - Secondary Scheduler Operator for Red Hat OpenShift 1.1.0.

Red Hat Security Advisory 2022-6290-01

Red Hat Security Advisory 2022-6290-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-6277-01

Red Hat Security Advisory 2022-6277-01 - Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an OpenShift Container Platform installation. This advisory covers the RPM packages for the release. Issues addressed include denial of service and traversal vulnerabilities.

RHSA-2022:6152: Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.1.0 security update

Secondary Scheduler Operator for Red Hat OpenShift 1.1.0 Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-28327: golang: crypto/elliptic: panic caused by oversized scalar...

Red Hat Security Advisory 2022-6102-01

Red Hat Security Advisory 2022-6102-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.11.1.

Red Hat Security Advisory 2022-6103-01

Red Hat Security Advisory 2022-6103-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.1.

RHSA-2022:6103: Red Hat Security Advisory: OpenShift Container Platform 4.11.1 bug fix and security update

Red Hat OpenShift Container Platform release 4.11.1 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read

Red Hat Security Advisory 2022-6040-01

Red Hat Security Advisory 2022-6040-01 - Version 1.24.0 of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.6, 4.7, 4.8, 4.9, 4.10, and 4.11. This release includes security and bug fixes, and enhancements. Issues addressed include bypass and denial of service vulnerabilities.

Red Hat Security Advisory 2022-6042-01

Red Hat Security Advisory 2022-6042-01 - Red Hat OpenShift Serverless Client kn 1.24.0 provides a CLI to interact with Red Hat OpenShift Serverless 1.24.0. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms. Issues addressed include bypass and denial of service vulnerabilities.

RHSA-2022:6040: Red Hat Security Advisory: Release of OpenShift Serverless 1.24.0

Release of OpenShift Serverless 1.24.0 The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-1996: go-restful: Authorization Bypass Through User-Controlled Key * CVE-2022-21698: prometheus/client_golang: Denial of service using InstrumentHandlerCounter * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-24921: golang: regexp: stack exhaustion via a deeply nested expression * C...

Gentoo Linux Security Advisory 202208-02

Gentoo Linux Security Advisory 202208-2 - Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution. Versions less than 1.18.5 are affected.

CVE-2022-30634: [security] Go 1.18.3 and Go 1.17.11 are released

Infinite loop in Read in crypto/rand before Go 1.17.11 and Go 1.18.3 on Windows allows attacker to cause an indefinite hang by passing a buffer larger than 1 << 32 - 1 bytes.

CVE-2021-21285: Docker Engine release notes

In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in which pulling an intentionally malformed Docker image manifest crashes the dockerd daemon. Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing.