Headline
RHSA-2023:1525: Red Hat Security Advisory: OpenShift Container Platform 4.9.59 security update
Red Hat OpenShift Container Platform release 4.9.59 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2021-20329: A flaw was found in Mongo. Specific cstrings input may not be properly validated in the MongoDB Go Driver when marshaling Go objects into BSON. This flaw allows a malicious user to use a Go object with a specific string to inject additional fields into marshaled documents.
Synopsis
Moderate: OpenShift Container Platform 4.9.59 security update
Type/Severity
Security Advisory: Moderate
Topic
Red Hat OpenShift Container Platform release 4.9.59 is now available with updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Red Hat OpenShift Container Platform is Red Hat’s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.
This advisory contains the container images for Red Hat OpenShift Container Platform 4.9.59. See the following advisory for the RPM packages for this release:
https://access.redhat.com/errata/RHSA-2023:1524
Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:
https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html
Security Fix(es):
- mongo-go-driver: specific cstrings input may not be properly validated (CVE-2021-20329)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
All OpenShift Container Platform 4.9 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html
Solution
See the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and
fully apply this asynchronous errata update:
https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html
You can download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch architectures.
The image digests can be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.
The sha values for the release are:
(For x86_64 architecture)
The image digest is sha256:b22d8c20d3f7fc0afb8654f5df4cfafa8230ad6fe58c0c48760c3f42a3aae5fd
(For s390x architecture)
The image digest is sha256:8f0821c7da21b63df30f99572621700c4a2bfb1cf7570761f03c4fecfacbe548
(For ppc64le architecture)
The image digest is sha256:2629197b0a278178d0350a6fac60ce5f2ff9047a6bef6f6933d375a029f6ccb1
(For aarch64 architecture)
The image digest is sha256:5d043b2f061c4b0909b87b0c3ba8995fa2e20cda290a807b0a30722a0e8b4ce7
All OpenShift Container Platform 4.9 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at
https://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html
Affected Products
- Red Hat OpenShift Container Platform 4.9 for RHEL 8 x86_64
- Red Hat OpenShift Container Platform for Power 4.9 for RHEL 8 ppc64le
- Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.9 for RHEL 8 s390x
- Red Hat OpenShift Container Platform for ARM 64 4.9 aarch64
Fixes
- BZ - 1971033 - CVE-2021-20329 mongo-go-driver: specific cstrings input may not be properly validated
- OCPBUGS-7081 - Bump to kubernetes 1.22.17
CVEs
- CVE-2021-20329
- CVE-2022-42889
- CVE-2023-0286
- CVE-2023-0767
References
- https://access.redhat.com/security/updates/classification/#moderate
- https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html
aarch64
openshift4/driver-toolkit-rhel8@sha256:eec5158d327bf4ce12e68fb22062ff540e9c16810b7a2b1b2e266b03a7c26f68
openshift4/egress-router-cni-rhel8@sha256:d768a0b21782474ea09dbe050b6d02a0dc770761cfd0f880ec30c161d5a3f116
openshift4/network-tools-rhel8@sha256:6b75132fb0df546ef9ce407f7fae3ed6264155b8659c551ce75715cce7aab57f
openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:973268aa23c97ead8beef6353d095a76c9d9edd9ee17a127ef3891d0bd5f2606
openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:6faed119e16c8f28f3d570a4ca9d1ebc4919470974feb5ab6c80c3eb7e31326d
openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:d3fa47465d68f56c67132936a8b7edfb3170ac01505e2f8b3ca44dd4525b71ae
openshift4/ose-aws-machine-controllers@sha256:79e35d06c9e4d88c21e5f2199c6c07c49d110aee89449a14446be430a0174e96
openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:9f4d64f25cb84a21616c0d98a19da6a1de6ba4af9d3620a9b080a1ceae451e6d
openshift4/ose-baremetal-installer-rhel8@sha256:cd2225d1ed63db3592a432e4766666fbb7ff88ecbe1fb9398387a65bd0e37a7c
openshift4/ose-baremetal-machine-controllers@sha256:d573214f98b398cfccc68dcab7d68c096d00c86d48be191dcc30434626f5f246
openshift4/ose-baremetal-rhel8-operator@sha256:df3d351e4530f83cb3b0900be5a34519f923119d8cca41b3a4c1537012923c81
openshift4/ose-baremetal-runtimecfg-rhel8@sha256:91b642a9aa8cff7f0c1525ec125542d877bdd2dfc1a9484d2ba7cc4f4a915bc2
openshift4/ose-cli@sha256:6f747814286c7718a6bb0b31e00e90e1972e70099c360384799e74cf5f773e04
openshift4/ose-cli-artifacts@sha256:febd958607f1098a15b36f5daa0a259a8f688357ccef68770f2c0ce99ac1c87a
openshift4/ose-cloud-credential-operator@sha256:0bcd3cdd8b2fd0a47ac3f34b66351b50cd4f29766b6c7498ca22e049e69377d2
openshift4/ose-cluster-authentication-operator@sha256:9d562da427c8427ee34574baa3d24b21a526390c2c3c3d5dc1c442cf1b87b6ec
openshift4/ose-cluster-autoscaler@sha256:43a46290c10a6fb9eb3ec17190805d7a67bc30ec30668e7df8094ab90e8a397b
openshift4/ose-cluster-autoscaler-operator@sha256:d2715c605457a018e84577deb23b2a7cedf1677c44cee21c58a50da50c08e475
openshift4/ose-cluster-baremetal-operator-rhel8@sha256:918e80ecd821591d7c5a3aa984241d9237848e35b1e019feca57567a01e6d9c4
openshift4/ose-cluster-bootstrap@sha256:2c1c256bbcbeb46f9296e4a21df269014ad53015c011c95b04554fa845b6c0f7
openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:b36c9fc21731e0f2e37568d814d8c73d05d0e866cc4e23466cd0846cb29ee9bf
openshift4/ose-cluster-config-operator@sha256:43c03366922d5c304cdb836463d9484b5100cd95615147afc2833b6b4a5f6a98
openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:cff16a15a3fa37499cb6160e8d82536be0d14ff2ddb2620bc8c5665242cc71c0
openshift4/ose-cluster-dns-operator@sha256:e27c33afd954fa3ebbf4435140383ba2fd303c756db8966c8510e7b5abe46e55
openshift4/ose-cluster-etcd-rhel8-operator@sha256:b7f143a6384f147f96e25db35379e4ed0212e954e35522785cef53e8f40370cf
openshift4/ose-cluster-image-registry-operator@sha256:e6f912e80d7e0bec6cf9b4fffae3028654eef2bac135ddf0e5597a20251288a9
openshift4/ose-cluster-ingress-operator@sha256:510c4e706847bcb25dbbbb0aec9ab7113d7d485285599c2aa3f376740067cbaf
openshift4/ose-cluster-kube-apiserver-operator@sha256:83bdc0261d07df2c696834c616a3cb5055e2314f28d7ecff5c84ed98c8bdd42d
openshift4/ose-cluster-kube-controller-manager-operator@sha256:56a11ff576bd51ebe4f325f2782e384bdd8fe522e624400d1acde8c909267d14
openshift4/ose-cluster-kube-scheduler-operator@sha256:af4a3d85f0019ea23a6c5c3b1b9f2e2acba5dbb33abb2c8c59cc8e0d80981e3a
openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:ad41568df1f4dc18a3a8eacbec56c7ab2dfff564a525c0904ea62e764fb7b67f
openshift4/ose-cluster-machine-approver@sha256:a7900858a91ed397e3b0c9acd220b6164104cb321be40a332f1186b6373b19b7
openshift4/ose-cluster-monitoring-operator@sha256:f01d2b7cc41109c3b42935d04238ff94b77cb7ac059104c78e60651c73a47e88
openshift4/ose-cluster-network-operator@sha256:e6278b7a4ac505e8c8bb885c8076d7f8bd36a78f967cb4999a6871384e6823b6
openshift4/ose-cluster-node-tuning-operator@sha256:9140cf4eae6bc78e6f6d0674c3eecc7f54c7dc9731b9b5c0c2c5c5357e95e028
openshift4/ose-cluster-openshift-apiserver-operator@sha256:f4dcde308f3af05c5d66d055693fe5a4d5f47ad0ee81e1680c1a796936315059
openshift4/ose-cluster-openshift-controller-manager-operator@sha256:dd32aec659e2c4194e9ee2cbc26ca843ad8de361f4269a062cc9224d79207af9
openshift4/ose-cluster-policy-controller-rhel8@sha256:f890185a0432b67fa294e24e4b4d5e65321d0a8345e6f359d4174739079bb839
openshift4/ose-cluster-samples-operator@sha256:4441f98082fcfd114e2b4dc373755c9681279856f6875bdce1ed96527984b919
openshift4/ose-cluster-storage-operator@sha256:57e6f1e5058b77fb93d0fbc3b3b5d32e7449bf117bbc98085fecce2e972b76fe
openshift4/ose-cluster-update-keys@sha256:56e56d1c4b1a26495bc810811877826b717837999d146f5134a47f86ac2b4474
openshift4/ose-cluster-version-operator@sha256:2a50e00e46cf42f3c3f8eaee72031f9b4e6962b8edb18f7dd1986c280c33e04b
openshift4/ose-configmap-reloader@sha256:f3e9349cd07dec2aa6ece6c155787ade5e2519849fb8f1a81a9d0016144dd0c6
openshift4/ose-console@sha256:e7ab39c7dfe9624ccdd60b2e8ceb0e4e184119db313fbf1affe412911f7f9bb1
openshift4/ose-console-operator@sha256:77cbaf5afdc0b821242d6ceb2cec8faa5282f61f2225bfbfac5d6a6e8c6814dc
openshift4/ose-container-networking-plugins-rhel8@sha256:5a940643a4689c09eb2232248cb1b56cad73614d390010bd1a0e3aac87c74176
openshift4/ose-coredns@sha256:6e28100bef5de964a71cfed1a3dff7bb2b57c76b500ac6bde3f355e9c1e40a34
openshift4/ose-csi-external-attacher-rhel8@sha256:0dbec82136a67871098653ee0116c33935fa01716b4c8caaa775927eb9fb0a23
openshift4/ose-csi-external-attacher@sha256:0dbec82136a67871098653ee0116c33935fa01716b4c8caaa775927eb9fb0a23
openshift4/ose-csi-external-provisioner-rhel8@sha256:3e5400dc8a71c0c0560bdedeeb51cbda90fcf52a492c1d4086a1f18cd3693495
openshift4/ose-csi-external-provisioner@sha256:3e5400dc8a71c0c0560bdedeeb51cbda90fcf52a492c1d4086a1f18cd3693495
openshift4/ose-csi-external-resizer@sha256:487bc506b3310e62994fc276d140a71aa5702a8d1703fddf5357f198a9f378cd
openshift4/ose-csi-external-resizer-rhel8@sha256:487bc506b3310e62994fc276d140a71aa5702a8d1703fddf5357f198a9f378cd
openshift4/ose-csi-external-snapshotter-rhel8@sha256:da0d2cf8db5b908b7c10d549d863b3d1685243b0ae3967f107984178a517da32
openshift4/ose-csi-external-snapshotter@sha256:da0d2cf8db5b908b7c10d549d863b3d1685243b0ae3967f107984178a517da32
openshift4/ose-csi-livenessprobe-rhel8@sha256:9dc3d1db0d8cf9b48bb13815174508f03a3b4ee8de4da45062f9e0a0f5c479d6
openshift4/ose-csi-livenessprobe@sha256:9dc3d1db0d8cf9b48bb13815174508f03a3b4ee8de4da45062f9e0a0f5c479d6
openshift4/ose-csi-node-driver-registrar@sha256:6948f5eb352145cf5d63fd157e3e3a4876fe13cac44e2c05f221fc9336b7f8da
openshift4/ose-csi-node-driver-registrar-rhel8@sha256:6948f5eb352145cf5d63fd157e3e3a4876fe13cac44e2c05f221fc9336b7f8da
openshift4/ose-csi-snapshot-controller-rhel8@sha256:ac3cc6535aebd2294626444485f7a180a1ba098136aa64efd3d5a80fdfb282d7
openshift4/ose-csi-snapshot-controller@sha256:ac3cc6535aebd2294626444485f7a180a1ba098136aa64efd3d5a80fdfb282d7
openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:0ef6b6acdb10a72c3cdf3e9c26f27b6cb7bdb1bb36cbc8ca76ee82fb319314ad
openshift4/ose-deployer@sha256:e837abacb5c63281f6bcbf6f2fc7923c740c71dfc7b6d90f4c970e08f5dc780e
openshift4/ose-docker-builder@sha256:abb9450aca13dc1622c01f8ba912fb610415dd9aeddf56a7aa92fd87aaf124ae
openshift4/ose-docker-registry@sha256:a3e0e1cb0bbaa05de016f097b35ec4899b1b0489df4e01daf5542c9b0d4df5a2
openshift4/ose-etcd@sha256:9aeb5acb96deb903b88cc59549f73b7b14fe1538f0861fe5260310b429e94e05
openshift4/ose-grafana@sha256:a1cf92ad61d729ee80760ce9efa5ff286a7ff1cb3b6d462479773dcf13446946
openshift4/ose-haproxy-router@sha256:d801098277ae6669326ce4c9e9d3f5855b81371ee355ec1003bf5cc9cb1036eb
openshift4/ose-hyperkube@sha256:c0be410377d6530ae242deceab2bf50069abbfa1fe9785d8d1e27210de359d40
openshift4/ose-insights-rhel8-operator@sha256:806a0ef8b6fc7847f949d6384b62c18bca9344f83eea0f6d04f10c48d6a95918
openshift4/ose-installer@sha256:a052c710b1bf18bd04e1c868b7636141adf54a192a76ea9cc78abb9218272ce1
openshift4/ose-installer-artifacts@sha256:1fadbcaffd5bd7476cd0943d2b9324cceb245b33c931c0ee9791ef23817002f7
openshift4/ose-jenkins@sha256:dc8b32ac673d0460e8e85fa81320938f87adaaf8d8d4f3c434caff413914a0fd
openshift4/ose-jenkins-agent-base@sha256:20b3c111123a93378b13718ac16ed5080420d006cef0292957a1f8b008ce47b8
openshift4/ose-jenkins-agent-maven@sha256:141b763073476ef393f6a1a9ca86022d319a5227e595fbf11eaeb59a279bb3ca
openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:7b7eb49091137e6b4ddd399c98dcdc352b089064e3dd3f83bb89e681de17e1db
openshift4/ose-k8s-prometheus-adapter@sha256:4ae508cb7c18a2de738f8fe25f64a121251cdd6e81ea65f5bfabef3c7ca9b79f
openshift4/ose-keepalived-ipfailover@sha256:21bd496fedbe2f8b72216242d9977d35c3ef017313c5c05f705ff1398609ac97
openshift4/ose-kube-proxy@sha256:5de12f7e7e7399e4b453c6b9154e2ae865fa221be0449963b24bc3a20f5fe59d
openshift4/ose-kube-rbac-proxy@sha256:0af3aa9560dede21df22fb26dc421e3b3d933fe13c514e30d00afecc323bc8ae
openshift4/ose-kube-state-metrics@sha256:d3a5601169fbda6f254a160d58c7a4685167228d3a2491f435ed66f4c2d4ee2b
openshift4/ose-kube-storage-version-migrator-rhel8@sha256:e957a6711f8d04021bf392cc3c0e88cc152abf32b6780e907e223e210ed2e47e
openshift4/ose-libvirt-machine-controllers@sha256:6a1dee2299bebbde6ef5985ffbffedb5dfbd76130391d80c3f84834829da10fc
openshift4/ose-machine-api-operator@sha256:c162d7dc2f0350f43314d7a2c60423d06a389cb8de74f9fc0370532d76bcd727
openshift4/ose-machine-config-operator@sha256:ea2d5953c3620a642c61b5f4935b97e9eada29dde6c7fbb38812b590e6795c7b
openshift4/ose-mdns-publisher-rhel8@sha256:7878d45671bcdd926785908dbf2f216076d57d7afd3c4446e8b79554dc147943
openshift4/ose-multus-admission-controller@sha256:4c9d648296dc4e5edc0d9ef03b83099b87e9726812ebdd18b12f33fa40b38415
openshift4/ose-multus-cni@sha256:2a6eebf20ae93a9031e74d649454e5f72491299e6773a219c9869f07a2e7c22e
openshift4/ose-multus-networkpolicy-rhel8@sha256:54b1b626381cf57df5cb8f6ca55687018a859c04111ce734ac4244e48e57e870
openshift4/ose-multus-route-override-cni-rhel8@sha256:8e30bc04dafff548503a9c50599e0166f18a497479efe0a8571fdce9cbf2e7a9
openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:232d106319d5c855d27da8e677c0d874aa3e9f566713cb3e4abcff462203ee51
openshift4/ose-must-gather@sha256:07be9ceaeb4a25082cef56ccff66b560db88160464884de0f4833a93847711fa
openshift4/ose-network-metrics-daemon-rhel8@sha256:74b78e8250e241fbf59a79fb8719f8835718d2c54ef341dddabfaa06ee3a8bb0
openshift4/ose-oauth-apiserver-rhel8@sha256:574f0a37657ef98f449f15b3adcfa6fac64fd01f54e9a132d9afb2b8deadf38a
openshift4/ose-oauth-proxy@sha256:62b15d624c6dc91cd6ef9b2e4924434df63bf8d593ed2d15d79ae8b5e3266d81
openshift4/ose-oauth-server-rhel8@sha256:9a79abedac9de7d7689b821d712ad2aeba5c3e20d0941b616c1a15c4921ec5b4
openshift4/ose-openshift-apiserver-rhel8@sha256:2acd41596fc2cfdc15b2922c179b726afb5dd8ac457fe7ffc5ca14d084bad058
openshift4/ose-openshift-controller-manager-rhel8@sha256:280dd7031925db528caa1c620f63466a0872dfc6ebec263789a4a007b0336d29
openshift4/ose-openshift-state-metrics-rhel8@sha256:0108174f862b88fd5b892dc5d66014fa5678ae4995ac3fe9e31b7c9cb9d95569
openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:fe1c1a4860dc452ac4bef61ef9abb7f12c621a0686e9fb51563bad5cef635eeb
openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:416ff16652902a2bd97e4e89466b1303032283ca01b80ee62d5c449429e86f61
openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:03a0997d62fef9b31d672b0a638e5b1c23ea8bda81d4b02f9c2a71209b1e4640
openshift4/ose-openstack-machine-controllers@sha256:af12ce5366d78772d740d7902d46725fafd368f0e4677742a70c19cf91595433
openshift4/ose-operator-lifecycle-manager@sha256:d91dc3629e86076c1a296ab56f8e9107e65fcbb33c2e90ede693195d1de725c6
openshift4/ose-operator-marketplace@sha256:5e4b32be1020ff6923ef4d365da0b73fb7ed15165b2fdab14dfd0748fbee8e76
openshift4/ose-operator-registry@sha256:e4f61b3cbe862b7fa06f0bcdb54d8e002bd423c7a957675b9d975c2a8849819a
openshift4/ose-ovirt-machine-controllers-rhel8@sha256:c2714c199561554ded4f69a3470789a4ad44522fd3e0038ada7fe4f03d4d0e72
openshift4/ose-ovn-kubernetes@sha256:8280b297f2d3415410e40a4928c986edad43fbe9a391e59f816831b7f2a6b70f
openshift4/ose-pod@sha256:3df4a34b48670b674ce4110f5661959946d7cd9d64e8076a53a66abcbc3db9ab
openshift4/ose-prom-label-proxy@sha256:ab6bb8ef9a396a087cd706b49cce9d0a8f061ad416d9b05e373c941b939218b7
openshift4/ose-prometheus@sha256:ffa2923a289b15dd485976d703d4f546f705656fcf03a50ca92e4b3aa58dd090
openshift4/ose-prometheus-alertmanager@sha256:d928622cb05410e2825e479522097b4bebe6bae04bfe36f7117b1ccf505f41be
openshift4/ose-prometheus-config-reloader@sha256:8dfb2028fd2bfa2ee01316c3fef6ec285739ef366e1e9894e2cc31ffc267663b
openshift4/ose-prometheus-node-exporter@sha256:67f88ebc8f2e8f32bb82665c25157b98fa2178dada5e0532cecd133e44ee608a
openshift4/ose-prometheus-operator@sha256:f448cda1fbd25c69ea6f348ca751ac725d3e95119b80ddc67ea1340527765f1a
openshift4/ose-sdn-rhel8@sha256:196a82e6533c64082b2797afa87c3b8cfbf6a733e6b879d520cb436d11ca08a4
openshift4/ose-service-ca-operator@sha256:0cde3ed1a9f2ee1ac0226758722c2fa6679f69dea777a6f1c64612d96059630e
openshift4/ose-telemeter@sha256:31f9057eb11742b0cade07c64f146060a401d924bef74fa6d1764d4823399ca1
openshift4/ose-tests@sha256:5d6af8e7f0a7a356b3e6850d526a8312488544e89a9f737f7d3e86bdc753ac69
openshift4/ose-thanos-rhel8@sha256:1fd41c703fbeb900ccf9a9e71854574c6dbf4a12c7dcbcba8c1728bae091732b
openshift4/ose-tools-rhel8@sha256:3e26fb4486aaf6fdddfebab36c133641750021af0d96211a618d44fde7fc3566
openshift4/ovirt-csi-driver-rhel8@sha256:03a5821d48b0acee4dad5574af4e7bd37f11c6494ba6f48826e549c50fb97244
openshift4/ovirt-csi-driver-rhel8-operator@sha256:645984cb5cc6957f714a88c92b663e1912596fbc7c73ffb3236a4c5fdc31d143
ppc64le
openshift4/driver-toolkit-rhel8@sha256:ec545cb6d0b830361071c406ea4c2ffb20ac252b4752968423443e2fdf363454
openshift4/egress-router-cni-rhel8@sha256:7531ea3b430bf6da3a4cde3d04984ea8aeb42afa022ec5117f1b73059a0fb0f7
openshift4/network-tools-rhel8@sha256:3c95c6b59e5369c48cf8e0598829754f847a72014e016130810e9dde3202cb66
openshift4/ose-baremetal-installer-rhel8@sha256:3f26f54d8274287706a92d7092677c1400ffee62c45ebc8d62118fbc5fc235a9
openshift4/ose-baremetal-machine-controllers@sha256:d544361c37c8aea3aede750251c32c3d4717e0472319abb9ae5a9858bf1d6e5a
openshift4/ose-baremetal-rhel8-operator@sha256:f3a3eecdce814e6fa92e17856c1c62f2adb3bc717a15efb112616649f535c52d
openshift4/ose-baremetal-runtimecfg-rhel8@sha256:577a3ad4a2576959a3dcddc6f986893882a04ae2382b312dc9ac4097df54acd2
openshift4/ose-cli@sha256:fd848e078c8e4a7fff4be28a19aa35586832dddd69ff4433cf869e0dbe982be2
openshift4/ose-cli-alt-rhel8@sha256:86ca837d278ac3f6457c575056671690f4b959d14796140721b0787ede1ed221
openshift4/ose-cli-artifacts@sha256:bad2136a863ea4111396489f64dccbd2f6e13930b84e4939987ab1c0b9690bc7
openshift4/ose-cli-artifacts-alt-rhel8@sha256:79f73f29aeb9fc9c0cf5789f48c0f0a71a8a54861f2e07dd24a53752f837089a
openshift4/ose-cloud-credential-operator@sha256:82f3ec38018ee9f503fe64e4fccb305b641dc7b894a10d857380f0ca5c6a6e89
openshift4/ose-cluster-authentication-operator@sha256:5d3da65d6e49da071133de3ab04b5a9fbd16d75bf3893d1f2326ffe68b6618ca
openshift4/ose-cluster-autoscaler@sha256:d45c6d6d6a9b7a7fb42fddde86fb9340f36897ca67c581dab5369f8616a893b9
openshift4/ose-cluster-autoscaler-operator@sha256:007614e95e1b66f3ae5b29d14b04e330f055855358aab1fc590ed80e878f7e4b
openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e52b0c16552146f9a31f7dbc79c5cbd408499fdf7367ecc98005f27a0566836d
openshift4/ose-cluster-bootstrap@sha256:7679537f1456ad1ba54439ed83cdbaefd0ce2601f2316a6409643ee0093c9a09
openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:e69331d3559c5128c2e05d31cf82e4ce5e101b5be715b7e6961ba6d964a919cd
openshift4/ose-cluster-config-operator@sha256:8babc6fbf139684be4d303216bcee8d907d9169cdc683790c7a95b040b0b587b
openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:3730904c924a5056246dcd8a7b8747f79794e4a51fc38a24eb537eb1643bc399
openshift4/ose-cluster-dns-operator@sha256:cc7ef2ef2a0c1a5a6c2406b10da80e89f37b3d5a6b0adafae752897e1891589e
openshift4/ose-cluster-etcd-rhel8-operator@sha256:fb59c10cc06264120f758696b9f45904e70c2858e6e8a7277fcbcd7f99f1c70f
openshift4/ose-cluster-image-registry-operator@sha256:81982543b5665eabeb264f851b3c01c7d8abe6e3a1d525d138d7c851e6c0c454
openshift4/ose-cluster-ingress-operator@sha256:38d93bb692ceafe207f368497d50be04d06eea377f3fea62911eaa3528a2efb0
openshift4/ose-cluster-kube-apiserver-operator@sha256:bb94995cc958b4a97d198b8dadb4ac5294c179d7329ff0c2b416859d2fa393ee
openshift4/ose-cluster-kube-controller-manager-operator@sha256:ae169f288de34094421b399c2a739fc28ff2dc677c50afa5ccbdc60ba1df08e9
openshift4/ose-cluster-kube-scheduler-operator@sha256:b867e70217548ebd53f1b9bc183491e1a3f0f819d8822fd9a2bae9b12dde6c23
openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:3e20320cff87ca3777e6e74918a640331f07aa982f8e48e9a7f9d40aad866293
openshift4/ose-cluster-machine-approver@sha256:7c7b45559064750d5ff01d0f665ae3b31c91fbb0bd5dc4c63063f84aff0d9a6e
openshift4/ose-cluster-monitoring-operator@sha256:c87c2e945ea554a3dca3c5e54c3115c1f0de8d11cfcc9484c614bd62f8770dd0
openshift4/ose-cluster-network-operator@sha256:01b8187539c8ce1b74433a7fdf9b8bfec6fcf7df19c3030fc450c0f0b77a2b87
openshift4/ose-cluster-node-tuning-operator@sha256:a8df6263c61323a6e57c74762a52ed1bb36fa8364c339303f96f6efb883a3e34
openshift4/ose-cluster-openshift-apiserver-operator@sha256:a3cbd5c0649147b962dcbdd57322541390393c01384bae4413292da0df7e851c
openshift4/ose-cluster-openshift-controller-manager-operator@sha256:7bb26b5a4d21c650aae4cdf34590e748bed83573893eac1ef4cd442417fcdc28
openshift4/ose-cluster-policy-controller-rhel8@sha256:5d4f754782830f1bfc43e54424cfd84f8f7e952ded0963328571249d42dec1de
openshift4/ose-cluster-samples-operator@sha256:fe482132ddc3da06b67a056270a1a84805ee0fdc73245d49d34f40614f685b3e
openshift4/ose-cluster-storage-operator@sha256:7b9e182dbc1b959d2d5f4d588bdfebe44484c6f97c6f8e31e11e13439f72f681
openshift4/ose-cluster-update-keys@sha256:0be1bff3b50d870da75751bec05b8e8854edf72c359cfb5c87779ec608444b2f
openshift4/ose-cluster-version-operator@sha256:5ccb268f0bd664b635952a4bc07c79f0d8b615bb3bc6c5cb52c0c5bfd56ac242
openshift4/ose-configmap-reloader@sha256:c06f05cccaba25f71479c2506c4997c933892efe968b901b8fa768da39f20e82
openshift4/ose-console@sha256:700326fd6cf64e8bea48809a11199ad19e88a2d579dbedbd702f1ad8cdf4d3c4
openshift4/ose-console-operator@sha256:22f1946239424df2cb08cde21afe865700a468771b90106f586dab030195c5d5
openshift4/ose-container-networking-plugins-rhel8@sha256:0e39f70e55578697f5b433ada75bc11f712892478fff6721c912ed30d02a14ab
openshift4/ose-coredns@sha256:e96b4c897ef16cd6bc383f70618574a966ef173fafafd3293bb599787d6d9ee0
openshift4/ose-csi-driver-manila-rhel8@sha256:80cafce4411dee6ea85586ec3094abc41d98eff489a80a1032cefe9498fd30aa
openshift4/ose-csi-driver-manila-rhel8-operator@sha256:1ffb1e9790d508bcc9f47bec9cec2f610adc6bf067a7a14f7bf19f0a95fa858a
openshift4/ose-csi-driver-nfs-rhel8@sha256:87ba1b2260fd1bdb157cce5b6dc76606ad7e000e09312de122b579f8caf8b56e
openshift4/ose-csi-external-attacher-rhel8@sha256:68411ed2afa40bdb6303ef599bbded79cfdb5bd491c51f6fa9410aeded3ce197
openshift4/ose-csi-external-attacher@sha256:68411ed2afa40bdb6303ef599bbded79cfdb5bd491c51f6fa9410aeded3ce197
openshift4/ose-csi-external-provisioner-rhel8@sha256:ec40868bb62c456c64ddb217764b733958618e2bd2bf32c18ed969919f622b93
openshift4/ose-csi-external-provisioner@sha256:ec40868bb62c456c64ddb217764b733958618e2bd2bf32c18ed969919f622b93
openshift4/ose-csi-external-resizer@sha256:605c007488e35fa781c1d7e991866460536ad4330eaa1db1f653311267830a17
openshift4/ose-csi-external-resizer-rhel8@sha256:605c007488e35fa781c1d7e991866460536ad4330eaa1db1f653311267830a17
openshift4/ose-csi-external-snapshotter-rhel8@sha256:c5ce1e717aab79f2d82268115061e2127fccf77cd5b298a476756977a5f75d0d
openshift4/ose-csi-external-snapshotter@sha256:c5ce1e717aab79f2d82268115061e2127fccf77cd5b298a476756977a5f75d0d
openshift4/ose-csi-livenessprobe-rhel8@sha256:b626a7bd748936e8a6732d687b6de2ff98d1f36e4e07ac9bc402dec81e61eb83
openshift4/ose-csi-livenessprobe@sha256:b626a7bd748936e8a6732d687b6de2ff98d1f36e4e07ac9bc402dec81e61eb83
openshift4/ose-csi-node-driver-registrar@sha256:02d689aacc4100e5686dd47c63b5f923ff3046e481d6ab1f59b503a0a799cfb1
openshift4/ose-csi-node-driver-registrar-rhel8@sha256:02d689aacc4100e5686dd47c63b5f923ff3046e481d6ab1f59b503a0a799cfb1
openshift4/ose-csi-snapshot-controller-rhel8@sha256:34bd736694f376813ac20a23d1d28dbd8acc6e2e4c0de6bfa33c036ddf12d64a
openshift4/ose-csi-snapshot-controller@sha256:34bd736694f376813ac20a23d1d28dbd8acc6e2e4c0de6bfa33c036ddf12d64a
openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:7cb55154d5f3df7f6bf161a4460b614e1e413c1dff0f14a331e26293e0d4a5fc
openshift4/ose-deployer@sha256:ea2c2d453b8605e53b02ab337aa88dad5aae2cd2954055569f13df4d01399695
openshift4/ose-docker-builder@sha256:667956820d6941c18f90c915477c7bb62c2f6c773ce5b66b33225bff52b23dbd
openshift4/ose-docker-registry@sha256:9a35081d1802f7e1fd0642694876f5afc0573039c47ac4674747496c817b14a5
openshift4/ose-etcd@sha256:bf8e50e92be5c7267907151e8a87cd8062dc4d0600414d2ae409bc214259c92c
openshift4/ose-gcp-machine-controllers-rhel8@sha256:43c8be2a1f762266cbd1a5c19d72237d5a12829bf05ff4dfa8435cb7966f454f
openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:7ed2da245f4102bc483d4d2b0198bc5636cf5b982ab055b096ecb2eb9850ba29
openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:a4aee41a3f2a2956f0614cf3db22457b1be4984f7c6c05d30995cc83a38df8f2
openshift4/ose-grafana@sha256:3e59fa299341d56a18a006dc20cc226c920d18a26b10a66df991dc5c52c40672
openshift4/ose-haproxy-router@sha256:125e1ec1c181dfb31f32137409cac5f012051475e4c0d7b889d102e6d672da1f
openshift4/ose-hyperkube@sha256:54504cce6c3919034493d2639555769cbd5146baebe5314e561b5aa195dda171
openshift4/ose-insights-rhel8-operator@sha256:e29c271a0578898702bbde11f6043bc68962f3b17851c5c61d04c13cad973979
openshift4/ose-installer@sha256:325c34ae142f9d2834afd20f1562c3b22f5fed94bd1a557b0b5555d2ce18d467
openshift4/ose-installer-artifacts@sha256:cbebebd5ab216f68ae6f235ab67100dabb51542a6d8b12ae9bc04c6b42a105ee
openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:d23e3c5db9847c53bc0d36111a323f3c243b9df08de5e5d6fbfc86bd207f49fb
openshift4/ose-ironic-inspector-rhel8@sha256:c2291059fada5ca437304c3b55c27f8111ed8f848d5d4efe2bdcbd5a2f084b13
openshift4/ose-ironic-ipa-downloader-rhel8@sha256:fc803fa686916b6a3654bf5a385ce93ad2b6db0fbc7a88550f8c9be4c841b3a2
openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:50fa54589494d74db9387a5f8e9b228f0302ab8bc14252813b5e2419174d9261
openshift4/ose-ironic-rhel8@sha256:6ba5dbd4febacebaa7f1e0ad71a40b46bc36fc88c9822ca479cf01f1237ed5e1
openshift4/ose-ironic-static-ip-manager-rhel8@sha256:7cb06f14312418c8516e5992a83d2044b631ecb08bd19df3ad9fc42e3251be77
openshift4/ose-jenkins@sha256:db690ca4d6c3e8f7461a69c01be1ab923d6b88a3f68353c04663c931ef6b9b80
openshift4/ose-jenkins-agent-base@sha256:3664498ff0a1991d059cba3c70cd4f045181b05b7465bd9b45b5608a7c108505
openshift4/ose-jenkins-agent-maven@sha256:dd977a5dde83703581669c775d65e72c4e13697a78621a923c17200c343a6a50
openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:aa2b9f27aa8e5d0ab530b5cf489185c4d35f4b2dbd83b681559a39f79666b1f6
openshift4/ose-k8s-prometheus-adapter@sha256:b7c6ec176a2449b2c4b3acc69ad5be69c790d7b6cd9bf00f928f184a358c2bbd
openshift4/ose-keepalived-ipfailover@sha256:a1e3d481d41714e1cd13288b37691a66bfce15980b8eb809d3b7c4aa9bd1e5aa
openshift4/ose-kube-proxy@sha256:7a56cc089d8a01b3e519058ab29e18a48eddd34d5f31ccb85544360bcbbacf1b
openshift4/ose-kube-rbac-proxy@sha256:051f11a2d355811fcb86bc17a19186340f6af280295a64304396db5815f189e0
openshift4/ose-kube-state-metrics@sha256:0ccccda7e4ad49116739da3c8312879cdb955eb8a884581ad10000e4ec2d065e
openshift4/ose-kube-storage-version-migrator-rhel8@sha256:8422fee991a695be780205efd5af5d6f6471191648bfc4ce09dde4bf928c62e9
openshift4/ose-kuryr-cni-rhel8@sha256:23fb5338af4fe79064ab2004519a7aa2b120ff14afeef8c91fc2c1ddba89bf96
openshift4/ose-kuryr-controller-rhel8@sha256:0e35ee5988c5e54f4530fb6fe818bee108dcde53aae256ac3d0e88340d13680a
openshift4/ose-libvirt-machine-controllers@sha256:cbded7daf79b0ef6011b633bb0eed4eb6ac1a4c910f0fdcf22a5a9dc782ece6f
openshift4/ose-machine-api-operator@sha256:b17279c1b87e9723f680935b35adc40f1435e9596c50926e34cebc6401e6076f
openshift4/ose-machine-config-operator@sha256:7a5748a0581c0542ff1d257e4de20db2d574f51e439a3c30641ff0c95bc1b22c
openshift4/ose-mdns-publisher-rhel8@sha256:652bbd34ab8e066b669f52559255985b5c8ad03b5e5a54e8529f89e73fe38db8
openshift4/ose-multus-admission-controller@sha256:07563270f693dbd2caababfb3096e113293d6d4b6c7ef536c4542153d6f98a75
openshift4/ose-multus-cni@sha256:7d35834cd707ab9229b4b3f29bf4e567377157cdbf60cf16467bcbe9d094a6a9
openshift4/ose-multus-networkpolicy-rhel8@sha256:8684d4a4995223047aa6b46eb995997a61f93f55a804cf377b9c16581e4b64c1
openshift4/ose-multus-route-override-cni-rhel8@sha256:488983d6209500927f8bb271099b27720510a9310ccfa61ff9a50c30024bb0fa
openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:6277d178efe5e9c4a2818d105c908d2407edf3887634402751e0ced0c3da4744
openshift4/ose-must-gather@sha256:a4d1d56a992418156214c173a260cc5e5b8f84d3be974ca6b06ef29568ddfcc2
openshift4/ose-network-metrics-daemon-rhel8@sha256:db409d704b31dfe1bb9e1dde09694ac30e180ee975a7ec4fc5ac210d345b9818
openshift4/ose-oauth-apiserver-rhel8@sha256:289dce10808f58b5ade0ce89e1dbc37c7c2ac81f395e043b8ddf475496f251c8
openshift4/ose-oauth-proxy@sha256:2bb42c9745f407207d56864229b035d252ef6b8aee5fb9e3d2bdc819454c4790
openshift4/ose-oauth-server-rhel8@sha256:91d22662f33dd9aab043fcdd19ca7eab81e45df784b569cb3c4ff76e6632829b
openshift4/ose-openshift-apiserver-rhel8@sha256:c8e1b3a37c5c494955c56f39f81b97208a30172e9c3e0705460225366c68f4dd
openshift4/ose-openshift-controller-manager-rhel8@sha256:f2f88f61a2214fe74b91788fb7772983aa41258c66b13acd4e837208cb9dcd23
openshift4/ose-openshift-state-metrics-rhel8@sha256:48053135cd51c9a05681023df0c81f88680935389e682ab445c6011dd794bd82
openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:3cfceedfa38f283ebfca5c3a1a54d9a9ad7a6dfa924b81fb89c7cd3321bef4c9
openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:17075bdc7608e0fdb21361331717359a2719b3b37877a86940041fc861d783c0
openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:c371c17cf15daac9ccf3203e02a6dfd3956cb9c72cabc1a7a2bbb796a9975009
openshift4/ose-openstack-machine-controllers@sha256:9c43a78429651226112ecbf5829991e180c7e6961b401daed5c0e133ea4792ca
openshift4/ose-operator-lifecycle-manager@sha256:19fe043d9b8d4d25826b1e578d3bb84b2e6b91f68ccc433867277cab3cf84373
openshift4/ose-operator-marketplace@sha256:8ecfcd98f39c54215fa8a206b5b7fa7c6093da19efeecd617576bba245760543
openshift4/ose-operator-registry@sha256:3ccdd6466c0ca0f4263772eef43f895d1db89008fa4b39dc9aa049937e7a83b6
openshift4/ose-ovirt-machine-controllers-rhel8@sha256:340806d8d933d366f53c80116aae95ebd4fa1b5c272cf80e6f439aafee7e974a
openshift4/ose-ovn-kubernetes@sha256:d54d6eb3c8b40ca416b32f17e6356be280c06a6717bfce2f86dc160e67e00c38
openshift4/ose-pod@sha256:bce338379189fa3da618276c72bc60c79413c64bd24e00eb188f1946f0ae0d16
openshift4/ose-prom-label-proxy@sha256:25651a3e8796c8ef94dc6c5ee6fd2a0c0783b2f8596f261ee8c5530772f8db44
openshift4/ose-prometheus@sha256:eb96d3148b990287b809a2136fbd117f65e0f35d6edd321373be496254c57987
openshift4/ose-prometheus-alertmanager@sha256:e0890a29f54f7bd4172b032d584a75d4a9e670b0c6023446ac448d0e52ae4cf6
openshift4/ose-prometheus-config-reloader@sha256:0e09c388e693705e9b32edffcddc862dc0d9574e651bdba6306af4f95b27e78a
openshift4/ose-prometheus-node-exporter@sha256:5fd1319cd825aba9ad2d70500341769d5c4123eea25a6f5ee7ba7e161ecb5e9f
openshift4/ose-prometheus-operator@sha256:64de6bb50c7e1be35c220ba71a2d182f0387eafd621c33acaacc8b85b3cc251f
openshift4/ose-sdn-rhel8@sha256:3066053a9635ac99f00242c9a75bae05d79bf672ee01e00adad342cfca0a9b3a
openshift4/ose-service-ca-operator@sha256:2cd85dde7cf2791ce553a3488acf1f42aed645e2bab90859497dbd160d1bffc2
openshift4/ose-telemeter@sha256:7a41024043d1d811ac8e95ce9a901532991548bf12c4aa74e04d9c5c343f302d
openshift4/ose-tests@sha256:a1bef3e8fea93a4cf73ee1e492d58a11fbe279bfe17b0930064a408c043ee55b
openshift4/ose-thanos-rhel8@sha256:4a331ca6426e37482896c527c9c56a61491c87d3e0775362af93c4f0e02565c6
openshift4/ose-tools-rhel8@sha256:24b5490bd1dc6e802e9096e0eec98548cda19c5934c514dadf7a204bf97df05f
openshift4/ovirt-csi-driver-rhel8@sha256:23c1d6e88d8d89f0923299be36e8286c78a716b5873aecc80a0dfca083a91f21
openshift4/ovirt-csi-driver-rhel8-operator@sha256:34fa4c831a46fd6f16f94251cf76525bfa5ddb04499f83321a2eec645cb77830
s390x
openshift4/driver-toolkit-rhel8@sha256:38659ce4baf64e291427f4c8e85495891095a9911a22b6711295640e1336fc8e
openshift4/egress-router-cni-rhel8@sha256:9f78797842235e742acf37c44339aa35c6caa3edd508a7bd741c44afc27c8e1e
openshift4/network-tools-rhel8@sha256:b459aa38d31443fd07c5486b3779d53a0e3370c6a0feb5fdd45fb4ce1032af92
openshift4/ose-baremetal-installer-rhel8@sha256:0b0e00a77a9df79538f2959a1268bc1467b3721334dc1e1942f2597472243372
openshift4/ose-baremetal-machine-controllers@sha256:02379cdbbdc78465b5c75ad1ab5a85ed44d6de4e099ef4c02aaa4aec5495da44
openshift4/ose-baremetal-rhel8-operator@sha256:860ea92fe9864ee60981534f31ba9a1d1a715baa2125445b191843beac7e0e67
openshift4/ose-baremetal-runtimecfg-rhel8@sha256:968e8e81bcc43540c2e4e7904d9c2cf64c0256976214d615acd9d497e133edf2
openshift4/ose-cli@sha256:0d95168ec74f38d108a4883a788f85e1160b379f94c5e2ec657da3945d90fdd9
openshift4/ose-cli-alt-rhel8@sha256:de22190a38ba5de90fe5b15acaa96dfb5dddcc7aae0ff653f033464e0522e553
openshift4/ose-cli-artifacts@sha256:1d8c7c75da309e9476ae63fe106179cfcb4fd4885a10259ff76d81b80b552e05
openshift4/ose-cli-artifacts-alt-rhel8@sha256:4eb8fd5d66aa9027b227e279f83e84a384e264ecce16f007f0d28f66d31b505b
openshift4/ose-cloud-credential-operator@sha256:7594afb64db70e0784c4e177929b464fad28f7560e3888aff47fe982c3d60e04
openshift4/ose-cluster-authentication-operator@sha256:883069edf5cfbff5a07818357c6dfa0427d8dd4cd7a2c07a5341ca3c136aba1a
openshift4/ose-cluster-autoscaler@sha256:79197c54301d39eccff5752336e3c540b5dd54eec67ef09c3ac269b8e03168a1
openshift4/ose-cluster-autoscaler-operator@sha256:94f1d5189e362764185ff3747da25ab2ea80762283afea31af4de4613cdb6f12
openshift4/ose-cluster-baremetal-operator-rhel8@sha256:fd90c8b7627e4f77e60e579b2381eb7bbbc423988f56de45b0953f67a32c98dc
openshift4/ose-cluster-bootstrap@sha256:ae4a3303950042f1eee6bdbb092e397f8a0a6345adc67c21cfe7d9b98d95e77a
openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:0816cc09cad9f0060b94c196dafb899a24c69d76c13641d10b67ac9a4837e967
openshift4/ose-cluster-config-operator@sha256:3e2b5e455266772536c9dbcb40aa9865e9f224edef15a51b3258ac845c825119
openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:44bc66ac90e9fdfbf8bf2f11081508c479c5bfd1d86e7ba0ff3962ea1987fea9
openshift4/ose-cluster-dns-operator@sha256:ed8266f0d2da525283e58a2c621f226045f8827b245ff216dfa8505ff3cb9cb3
openshift4/ose-cluster-etcd-rhel8-operator@sha256:1c8c078b1ecf96f095970f71bfbd5865cf53a4ed60a130fbbcb8524df4fd2f8b
openshift4/ose-cluster-image-registry-operator@sha256:020c5017b012a2ecc318e0b31423671c52fbc12981b043fecb4c157a453b7078
openshift4/ose-cluster-ingress-operator@sha256:da4e16262651c95204b30556b1d4c242456ae94a6d0989a3c95de8972a094b71
openshift4/ose-cluster-kube-apiserver-operator@sha256:ed80f312591fa4274592a6cf569ced093b9c55f7eafeb2719ece6cc5b03e05c5
openshift4/ose-cluster-kube-controller-manager-operator@sha256:9212139661cf95786d5f284d2e1b490cdd288b09be6dd2d12808d7a4e69c020c
openshift4/ose-cluster-kube-scheduler-operator@sha256:4c274c06a4d45596abc0e1d18b22711b51d5a0f7486d14082c0ca365f05d4068
openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:83eb3a6bc90b7666929f51508d922fcf9243fa533cf1500da10b387a4fa6c895
openshift4/ose-cluster-machine-approver@sha256:74f74ab1b810921c095a465dab0681ff2a1a770dcd9d2183340596eb413de637
openshift4/ose-cluster-monitoring-operator@sha256:ad64fd55c3795f204d0fb44d563a229578f3eb2b148389a85c6d5212e5297d0e
openshift4/ose-cluster-network-operator@sha256:28eb4c9b54019fd4ffc4a16851cd469f1a9c32fdfa19b17c9d11d61e14435c86
openshift4/ose-cluster-node-tuning-operator@sha256:2091427e1b5f36fc557ed78d5ad5480dfb5950f90ce6c0ac2184b2c02d16d636
openshift4/ose-cluster-openshift-apiserver-operator@sha256:dccfbaee75d5c9cc53e89c879eda29a89198d44769ca622db84c9285fe9c8f37
openshift4/ose-cluster-openshift-controller-manager-operator@sha256:374c9e64f13de68e20844e710b74ca934982cd6fad0eef1c37418ee7505fc605
openshift4/ose-cluster-policy-controller-rhel8@sha256:be9656e4a4d7726b87c38ab0763bd8994905dfc67af131d8971baff35b3ede79
openshift4/ose-cluster-samples-operator@sha256:7a3b919bccf329b6b34db65ed36a9c07cca37ec0257dc89433e0abce8c10eaca
openshift4/ose-cluster-storage-operator@sha256:aa4d663fece68333b3495ddec7ce3d7b6c60735599115b7480155a8d3078742c
openshift4/ose-cluster-update-keys@sha256:49851bb8454507d4003b2e491a008c62dbd8b542aeb265fe28f8c4dc67a2524f
openshift4/ose-cluster-version-operator@sha256:3267e563114346c964decc7fe001622f9e23ff59cf2ac92a20904dfd70ec98fb
openshift4/ose-configmap-reloader@sha256:dbc550b8a9571ee99c78cbf26e9fe085c94ac7d8b4e104ac6fa15e38243cd7c5
openshift4/ose-console@sha256:ac8ca6b01d25130d1bec2c488dfb81f8f963f2acdd5535b61f11824930275b70
openshift4/ose-console-operator@sha256:dbd45ac985b7bd9d61acd884de3c6dc065d25a12e6044d291990f6c48e07f8a9
openshift4/ose-container-networking-plugins-rhel8@sha256:e0c5e6810d5df9d57036196ff5a1015f1d514057c8daedbad880e614049c6ab1
openshift4/ose-coredns@sha256:4e135f892df146ebabbeaeac7b18005bf426ab5d13b5b9dcfb343a0973695acd
openshift4/ose-csi-external-attacher-rhel8@sha256:761605e8bde9fefe0db47b9efe7ab1c81fe37f120082649a88c4c1c833d0112e
openshift4/ose-csi-external-attacher@sha256:761605e8bde9fefe0db47b9efe7ab1c81fe37f120082649a88c4c1c833d0112e
openshift4/ose-csi-external-provisioner-rhel8@sha256:8a6a2c1609caa8f767e46a608991be9090d39a5a900d8588b9697a00a7ca6ff8
openshift4/ose-csi-external-provisioner@sha256:8a6a2c1609caa8f767e46a608991be9090d39a5a900d8588b9697a00a7ca6ff8
openshift4/ose-csi-external-resizer@sha256:175526d9518e2e2c731dc5b60fc29f997ade4d3be027269a77d5a07126636af0
openshift4/ose-csi-external-resizer-rhel8@sha256:175526d9518e2e2c731dc5b60fc29f997ade4d3be027269a77d5a07126636af0
openshift4/ose-csi-external-snapshotter-rhel8@sha256:6d21f827b1cb037ed839524c7bf0313ccec3cd0121efb3c367cca77aac0bdf40
openshift4/ose-csi-external-snapshotter@sha256:6d21f827b1cb037ed839524c7bf0313ccec3cd0121efb3c367cca77aac0bdf40
openshift4/ose-csi-livenessprobe-rhel8@sha256:258878e0cef6008a90fee12686da290e1ffde78e19e1f3849e73509325707db7
openshift4/ose-csi-livenessprobe@sha256:258878e0cef6008a90fee12686da290e1ffde78e19e1f3849e73509325707db7
openshift4/ose-csi-node-driver-registrar@sha256:2ca6d6fc5784c398e723f7845ac04c5f298b53393adbfe950ef3ec1cd81456bc
openshift4/ose-csi-node-driver-registrar-rhel8@sha256:2ca6d6fc5784c398e723f7845ac04c5f298b53393adbfe950ef3ec1cd81456bc
openshift4/ose-csi-snapshot-controller-rhel8@sha256:730dc4d43f12a504c4a69a7f0923395d9bdd3716c6719ae727a9efadb55fbc72
openshift4/ose-csi-snapshot-controller@sha256:730dc4d43f12a504c4a69a7f0923395d9bdd3716c6719ae727a9efadb55fbc72
openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:a34a7c0c933b6896465ac3eae776dc76b4013952ddfcda9527b087c7729130df
openshift4/ose-deployer@sha256:cb54e2084cd3658a10ce959379a655f849b1ca6da6bbfe26f803d215ddd69774
openshift4/ose-docker-builder@sha256:d908001726d30ca23af429fb114643f5c61bf2a23df3be6c6932fccf7fcd6f7e
openshift4/ose-docker-registry@sha256:617b1ae4d98d9df9a3587f312e6d591120a02678b479af7b9c2d84f575b73a58
openshift4/ose-etcd@sha256:61b5820fd1a48566f59f63d2df396ad95664a73d0c006bb0816ebf47cb8cd92b
openshift4/ose-grafana@sha256:164836bf7669b774fbcfb88447c00e69acb9a4ef6a569a05b07acb40565925c4
openshift4/ose-haproxy-router@sha256:188cdf3202157db1dbf029d4dd1b51eaf61e2b3a20c06f7102ea066db1ec4a4e
openshift4/ose-hyperkube@sha256:8366c5cac056cff7d956c8eb4373e95bdefb5948f831359b30a1f4fa261df6a8
openshift4/ose-insights-rhel8-operator@sha256:5b28e730728ec0306f6bcc9d984e9b906ea80334b7463395ee1806f3599038db
openshift4/ose-installer@sha256:51ea919647c69c68354b3299db1ce094ef64be44839e8b35322e11f1c727c64a
openshift4/ose-installer-artifacts@sha256:f84036ac2fb2071f7231391df83cb4e8568b56edb911d8f91d422418a7ade576
openshift4/ose-jenkins@sha256:35c5a9d81333a5d4e89096e260644e1ab98acee9bdbbf050b7755be440316342
openshift4/ose-jenkins-agent-base@sha256:06aa049881c3620bf559e1ff7cc0094cd17fe24bd9e79b84a35296a4aeea8caf
openshift4/ose-jenkins-agent-maven@sha256:3ebe8ab7f364f3b424333583dd664239c5351c5fb128ce8d5f0afaa6d96845cc
openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:73ec9599cca875802a6d484066c03e3f6bfebd1b7f7b7dd481ff8f7ed86b0638
openshift4/ose-k8s-prometheus-adapter@sha256:0fa906ebd5391618b58383169afd268bf476c70e27252cae14ae5fbe94df6bee
openshift4/ose-keepalived-ipfailover@sha256:ae413787585721a42260dbdbd0e874df95ce3503b52832d0a395f1c638e56ea3
openshift4/ose-kube-proxy@sha256:e1b7547b5a5127d19095deb443eae878e03089612947104e1e7267ec544ded03
openshift4/ose-kube-rbac-proxy@sha256:9793c4fb092c2c3d747169f1b7702a5218d021cf482f3e9c6d0544c3940de33c
openshift4/ose-kube-state-metrics@sha256:d117b4f5b6035e69c2ad6e9a3d1da0d3a3855cf082c2f5e41b4031422b316c90
openshift4/ose-kube-storage-version-migrator-rhel8@sha256:738ecf5ac28b5b0a1e1f2ff19f034fc5f38070cb835bce5ee2d05ff96f546c47
openshift4/ose-libvirt-machine-controllers@sha256:455eae9780c1db79f8aa55313ed6c60a2b89313a8cbded8f8f201286681c73fa
openshift4/ose-machine-api-operator@sha256:ad16cac834d4afdd28b7acd762a77a0d7299988f112c54016c75de1eb0fd4998
openshift4/ose-machine-config-operator@sha256:b83910d927f175461e2fa4be0f5dcabc7b70c7857081d886d547ee1f6623f5d2
openshift4/ose-mdns-publisher-rhel8@sha256:41efde6da9c09ebed8512353ef50fd140b19172fb5e3b8ccf958535cd1dbd394
openshift4/ose-multus-admission-controller@sha256:e16a8ed7b64d693de97c726837efc19c01d039799da363bf5a0ed1ae77ed971b
openshift4/ose-multus-cni@sha256:ce5e36a60af21ed7bf4bdba40fe42c5717166e95ecf4370214763dc76555d5df
openshift4/ose-multus-networkpolicy-rhel8@sha256:ca2c78794100445bd16e802f407ee965e6e08f22928b4fa2bbe38e19119c8370
openshift4/ose-multus-route-override-cni-rhel8@sha256:eaca551084989d447274d55070c141652fdf10236ab55838af4188d45875876f
openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:57452074d1a3641344871f2d49daed2657fc20b3b5cfaaba8e49eb52f4f79ef1
openshift4/ose-must-gather@sha256:e05e8ab7adade5b365343df73497a23a0d47432ca50fd0fa543fffa11c5b788e
openshift4/ose-network-metrics-daemon-rhel8@sha256:dffb7b7d66997263a0aa5c1f955c539a8124c415acc7af139fdf64a5a783c9bb
openshift4/ose-oauth-apiserver-rhel8@sha256:3e8760a34acb05c478db94072242ea0346a15b567eab21c5706991a590af197c
openshift4/ose-oauth-proxy@sha256:9bbd4d458e7a8001850cac7108bd91ed1c56bd63105e817b8a9358e5e82992af
openshift4/ose-oauth-server-rhel8@sha256:68a3ee5a91e52a36b7e246672017fd7602af71bb283928daf49724751aebeba6
openshift4/ose-openshift-apiserver-rhel8@sha256:f066d98b2c41c7cd9cba786849ca225fe857c24ac78361b0ce6a3fe69851af53
openshift4/ose-openshift-controller-manager-rhel8@sha256:052ebdd488c4315bae1c09a0e4be660e9fd35710e34a7814346dcb74bdc8f447
openshift4/ose-openshift-state-metrics-rhel8@sha256:43f6079d114d4cf482c63dcc0152b64c8cc356e9459e5c3e9d848775b1f88152
openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:4427dbb83485e7632c8e5748322424de9edf73946fb65c541755e8ca1739e39d
openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:39292ce516dd12dd77ee71cd5241a8f149568a252b4a307e5eac9f266da20bc5
openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:9dd54d72d0d463f3ad084a8dccb6f08d8df9f56496484ac228ee06439d850354
openshift4/ose-openstack-machine-controllers@sha256:e10cc6f6ddf82834efcc334a133a2c7a864f94f933bfc5a02c36bac8a1d6aaac
openshift4/ose-operator-lifecycle-manager@sha256:4fb887929e093a47f539c258376fdd0a5ade5b7b44c6ab1d87930bd210254aae
openshift4/ose-operator-marketplace@sha256:2bc85e6270c5caff05bb8270b4d1f8ead987a3da90fcad7f4c2371952ebf261e
openshift4/ose-operator-registry@sha256:70c9bf29e633fed840411452dc9ff8346de606a995c21eb385f23002f4de8402
openshift4/ose-ovirt-machine-controllers-rhel8@sha256:188c5aac9e8c051860eb3e039adb343020dff3fb88308fb90319f45857de51be
openshift4/ose-ovn-kubernetes@sha256:c864a13f098385a0f14854aa75ac60fb4a9cea2f0e573e323e1228e017785bb7
openshift4/ose-pod@sha256:9f5050548bce8b51fe7425aaed07a16e58697de889d1b45ea663061fa7b235b9
openshift4/ose-prom-label-proxy@sha256:24bc601239432668417593f53468636311831b4c43f8e746f5f6017f586d45e4
openshift4/ose-prometheus@sha256:7160ba3510d7fd27a79ba0a5bc6b15a35636463e7734cb8473e37bbce2dcbb6f
openshift4/ose-prometheus-alertmanager@sha256:00334cecebd22d52fdf90e1e9160a8a3bedc2d88e0324f2a129d085fea8649ab
openshift4/ose-prometheus-config-reloader@sha256:e2887c01242eeda288c7639aff2bb9626249963847c5f23a4fdf762e80991122
openshift4/ose-prometheus-node-exporter@sha256:612cb758376a4a8ba8e1f1fd422d036dfbdf1a83610c8bbd610a9fe7bcd8eb3b
openshift4/ose-prometheus-operator@sha256:efb5a619665d183d8242c957b83f69e3a9b292996ec7bd4cb608afd21220e3ad
openshift4/ose-sdn-rhel8@sha256:e04bccea1d2df7ca625d6a0a579d496f6b3bce24daed5686c765ff0a610d351f
openshift4/ose-service-ca-operator@sha256:b6a2c9664f295963a77c0b13fcf6b86c3a22e9eab9fd525c98ab137c72629d6d
openshift4/ose-telemeter@sha256:ebd9039f59953369eabec1079ee9ba3823038f743462b228b2931ddad3c9448f
openshift4/ose-tests@sha256:5ffaf6e8324c80616806eae6eb65b72c20b07f148c610791f38740f413c6c31f
openshift4/ose-thanos-rhel8@sha256:1214c3fb8dea700ee0325f21b53c179e7ed54c8aa596aa84276bdb85e2a1cf2d
openshift4/ose-tools-rhel8@sha256:6a3cb0552fbaa2cdfc414baac9962961b3f16785288fb7104fc5db8fff4dabcc
openshift4/ovirt-csi-driver-rhel8@sha256:672d92ae5516c3763f8ba315956eba6ef82a1ae0dba1acd4551d408b9a4e53df
openshift4/ovirt-csi-driver-rhel8-operator@sha256:8fbae5ade8480a230ddd43d92d15fe7d3711a1a976c4655e8d3413fcfce0283b
x86_64
openshift4/driver-toolkit-rhel8@sha256:bfad1018f5fdd4724a4372f8c65164e3ee3d05d7011fa5b1f451948497440542
openshift4/egress-router-cni-alt-rhel8@sha256:584a0c2c5a65c5e44b301de332f0acfe90c146f77367fd16954ca2f0e5e83722
openshift4/egress-router-cni-rhel8@sha256:2a6cacce9fdcc5ddddb75552d1bdcbcfe8da894fb34ee4fb81b315fa8ee69d14
openshift4/network-tools-rhel8@sha256:39d7368ef33eb1e15b0e999cc608520f677e64caa2c3a17720bb6b81836f65b7
openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:69fa9c6f191de2a9690dd6e8f6f449f54b77e28e27e584c803da343939751930
openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:56de5afcf832516e085d7b075da1570e8c26abd9016e6a6d2c4c220cf85b1866
openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:163983eec94411f3955d05571f3a721f89eb5278ac112dc528cdabb0a44db60c
openshift4/ose-aws-machine-controllers@sha256:7cb94f338c632854510e1820521281ca6b78639f99f332ef402208c67c7aa4a2
openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:05cde9b05a6252c4f8a0ac328052971c51fe1e26877479bb22c87cec28ffb9b3
openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:61b91020d1f534ff429d59bbf861216e0d655f387fcda47ef6be98025de08839
openshift4/ose-azure-cloud-node-manager-rhel8@sha256:5463d8659aefa9f1b1715545d147c1160bfcdc64ca24dc0bd64e9c959a59c035
openshift4/ose-azure-disk-csi-driver-rhel8@sha256:c37e290cd62b86f68e1f1da7fb1c2c9b41d6d0de072c19f85b9593dc97e812ba
openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:350268c72488c924518c03ede2a2eb708155901b253742141afb0053f703207f
openshift4/ose-azure-machine-controllers@sha256:005a04f086d125a50d990c00960f7005c5db4e7bc5418fdd71f8524e48f495bf
openshift4/ose-baremetal-installer-rhel8@sha256:cf2ab96df6aa03fce29f416b6565007a29a2fc7ff910e48895d691982d8d5a57
openshift4/ose-baremetal-machine-controllers@sha256:00d19b79fd13cd08595ceed2e409c9aa0582b645571b7ce7d1d1df5bb319d480
openshift4/ose-baremetal-rhel8-operator@sha256:1135c04995fe99ade81233ae0c20b0a32c39569c4f56ad578e723b3e279989bd
openshift4/ose-baremetal-runtimecfg-rhel8@sha256:cd09bf092dcf1349e1aa8b78059a742735cae93ecb5f712a512ad2dc8ddcfe0f
openshift4/ose-cli@sha256:63c627d981a492954a91e5ebfd274ba3cef622b4678635f08579ec0c4885e6d1
openshift4/ose-cli-alt-rhel8@sha256:77a1d07089ef8be7de4b62260b9833507b2119d28ae20cdcc0d1740b40483921
openshift4/ose-cli-artifacts@sha256:15ead7b4dda4dc53020ba96778957b42eee2adac74a0ec29f11931f18ed11dec
openshift4/ose-cli-artifacts-alt-rhel8@sha256:0acc5f3e146209f4391a61780eb7193a754c43f85a9868d2ae48759a86c3a71a
openshift4/ose-cloud-credential-operator@sha256:743e330445ee95df14414ed494bfff664986887b23da9dba5bb364c7850860fc
openshift4/ose-cluster-authentication-operator@sha256:8616425332e9342d646f29c146cd64dfa7188a82104cef8e6ec1555fef855091
openshift4/ose-cluster-autoscaler@sha256:747227a15b7cf9308d1583c3cffb8aec384879447ea1b54608dad92ccaeeafe3
openshift4/ose-cluster-autoscaler-operator@sha256:06aef1fdfb60b4f00bdc7b44ce2e7c44232d521a7ab0dd9db7d14cf1354ae017
openshift4/ose-cluster-baremetal-operator-rhel8@sha256:00787c0abc194a356d34d837a2e500fff4b6bb17002b8cf70ede63e5ae35baf0
openshift4/ose-cluster-bootstrap@sha256:24acb2db0046d54bca5eebf4a2d635fdcd9cc2ea9f5f559803ba52938957a104
openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:27c88d829e5cdcd0c6a8a10233a2844a6f48ad9f47d26c4cfb03c9d2c0475810
openshift4/ose-cluster-config-operator@sha256:9fc5098d18553829daaf8a32a27398511b6d0ba3621bbe7dfc6b162af5b9f2e4
openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:cc1ade4d410350b7b3d7cf12208bf4443d7c8f072773ef370b86ac6eecf597f1
openshift4/ose-cluster-dns-operator@sha256:5d88bf3f35582c0c794ee984794d8f88aa6a616733e3e07bb702ec8e15f9bba4
openshift4/ose-cluster-etcd-rhel8-operator@sha256:657de525c63f036f38bda97454d86bfba9ef1a8e30bf8b335b1436c94744b475
openshift4/ose-cluster-image-registry-operator@sha256:2f40ae13622f8ae0050c1cb570d59e18e32e15d0f8de0fbb0848915327cc6c90
openshift4/ose-cluster-ingress-operator@sha256:eee6bf8dde74821535b06a1ef5223a9c3e8e9545805fb2b18401855f84597563
openshift4/ose-cluster-kube-apiserver-operator@sha256:327cdc811edc07ed71c1d162b332019d18c9ab9c0538f919e6a559665830fed6
openshift4/ose-cluster-kube-controller-manager-operator@sha256:2f7132639bf2c86908bfcb7b64fd7648ba43c9ebc3fe619b9f350097b66ac974
openshift4/ose-cluster-kube-scheduler-operator@sha256:4223fe42002cb6707fa05cb7b510d55bb2f1cc83e4f0f70e9cae987dcd28db29
openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:f31cc7c6b016fea2b8647530dd88407531252474868775575a7957b4b2449a32
openshift4/ose-cluster-machine-approver@sha256:3c2a7643a365606df1c634d61ac9723f95c68e36d62a39f8fe738f8e16acff90
openshift4/ose-cluster-monitoring-operator@sha256:8ac830edb024d9960fef7a77474c56e8be6f58c42d38cbd60f1b92aaf81714f5
openshift4/ose-cluster-network-operator@sha256:700a79b6a422b312bc7bc1e09e659fa4aae6e9ef5a88254754c8e78a425cd3b9
openshift4/ose-cluster-node-tuning-operator@sha256:159179e2f8bc5e466a21ce4573c998dcf2b48676cf2a067739cd8436ac88b18e
openshift4/ose-cluster-openshift-apiserver-operator@sha256:aad018279a837814364deabe6426afcd9f73d0aaa48eebb0b093e762412c0e20
openshift4/ose-cluster-openshift-controller-manager-operator@sha256:d42ba2567c3b815926aa8f856b0df634ce735697cbe9f04d2c0e6e20691a68bb
openshift4/ose-cluster-policy-controller-rhel8@sha256:7169ffa380dea352013123b898b001ba32598a9542c4c27cadda4e9f79e1be94
openshift4/ose-cluster-samples-operator@sha256:09569070a65b11c19049161186f6c6984c8cc8b13a7af630acd285e8230a3234
openshift4/ose-cluster-storage-operator@sha256:267d09bdf161b8ce562efdd78904ce56697c445a0c30868b70dae21d1a2ee47f
openshift4/ose-cluster-update-keys@sha256:6c8e1258051021d88ced9aa03c0a69415e87303bd82fec22d8f3132555cfbb72
openshift4/ose-cluster-version-operator@sha256:35dc2bb26608133f1768118ead2bbd181e14d722af1d9852234c6dfa0a9874ab
openshift4/ose-configmap-reloader@sha256:77ecbdebc78a358654d2b3c0a2248c62b1105153e6102269daadf6910a2ecc55
openshift4/ose-console@sha256:2403145d7c8d169aed2dec5035650cb5243fe8826cd77b3343f5451a7eaab976
openshift4/ose-console-operator@sha256:a942ae5ccbaf6cb5bc1e0c4d8adc6f9ce9676b3e3d66a73ae84bc5bd580e7240
openshift4/ose-container-networking-plugins-alt-rhel8@sha256:cd0a12b7b13c6506fbbed1fc52a9b4cd28ae5559811c09f4e2c4141bb393d4cf
openshift4/ose-container-networking-plugins-rhel8@sha256:f524a403543854a854df2f76002d367533305d90e4710fced983b8fa3b6e5c61
openshift4/ose-coredns@sha256:c85911b110f00dccf9ba3915a2c3bcdb25f1c54948dea34498c9598a5af4fdfe
openshift4/ose-csi-driver-manila-rhel8@sha256:ee0340b009f2e14e31c63e11c5a61fa066d15cf532cba6ebd82060fb277d119e
openshift4/ose-csi-driver-manila-rhel8-operator@sha256:40235e8d987e9cfcba8ada2ced56d785a1e179bd7f68d466c34f8a7be6396b3e
openshift4/ose-csi-driver-nfs-rhel8@sha256:cfdadf484f956a5575d923d42366962ec37227e178861e0627347ff971ecba45
openshift4/ose-csi-external-attacher-rhel8@sha256:0d713da674d51482a0143d11c64221b4e9ed42d510feee5f1cdc01d6674eb51f
openshift4/ose-csi-external-attacher@sha256:0d713da674d51482a0143d11c64221b4e9ed42d510feee5f1cdc01d6674eb51f
openshift4/ose-csi-external-provisioner-rhel8@sha256:171650646415738808c520d5e6ebe33327fd4efd9f3ae00e26665172f5d7cd9c
openshift4/ose-csi-external-provisioner@sha256:171650646415738808c520d5e6ebe33327fd4efd9f3ae00e26665172f5d7cd9c
openshift4/ose-csi-external-resizer@sha256:e5e6c93ae7fe4af19e865a5eeb6aa0e2d31d79ce79d69e5f897a59c669a872c9
openshift4/ose-csi-external-resizer-rhel8@sha256:e5e6c93ae7fe4af19e865a5eeb6aa0e2d31d79ce79d69e5f897a59c669a872c9
openshift4/ose-csi-external-snapshotter-rhel8@sha256:b308a0afe80e7194515b7ffe28a419b27ba8605a7146c92c01b7c2f3d60a325e
openshift4/ose-csi-external-snapshotter@sha256:b308a0afe80e7194515b7ffe28a419b27ba8605a7146c92c01b7c2f3d60a325e
openshift4/ose-csi-livenessprobe-rhel8@sha256:04ac0ead670682acad6afaaab719d8063948ff03cc01b05ff4376e7ab03cebf1
openshift4/ose-csi-livenessprobe@sha256:04ac0ead670682acad6afaaab719d8063948ff03cc01b05ff4376e7ab03cebf1
openshift4/ose-csi-node-driver-registrar@sha256:7cec2acc261261fdc948734f9097691b687599142a51942eb1803899eb7545c2
openshift4/ose-csi-node-driver-registrar-rhel8@sha256:7cec2acc261261fdc948734f9097691b687599142a51942eb1803899eb7545c2
openshift4/ose-csi-snapshot-controller-rhel8@sha256:ee300c403deb2602189c5ddfaafbeeecb82b0f097b905577f0e185f576bc142e
openshift4/ose-csi-snapshot-controller@sha256:ee300c403deb2602189c5ddfaafbeeecb82b0f097b905577f0e185f576bc142e
openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:99cabc427c7530ac921fc4db450a74b89574bd34404ebe4c33e567150747fed1
openshift4/ose-deployer@sha256:d7332c3bce3c868a39d04551d01a6654ecc81622d5624d102c804259068fe38f
openshift4/ose-docker-builder@sha256:ee93b0b87823944fd0b4192854eefc73a539e5539f20d0de47c907362102ece2
openshift4/ose-docker-registry@sha256:ff41204eea0c22fb20306126895cf0a931ed90f84c680cee01da53521b5c3a32
openshift4/ose-etcd@sha256:c9fd240107948c0eb6cdff3955f45d26328a1cc1e630b58d43fb548830536102
openshift4/ose-gcp-machine-controllers-rhel8@sha256:cf19eb2407a4c41c54616c789881ba165f16bfd22f73648e1010e02fcac1a9ef
openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:e2e37c1011c2ac18a2b7a4d6b364ca551ed0bd130fccfe01b336bb808a8be095
openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:3016cc6623242c979b29e08eecb065213fedc3d2258ade7b7d78e0e397b20355
openshift4/ose-grafana@sha256:95502049d5e40a32e0df146a0a69ef572b99e37442b567586b9a443b93d8da2a
openshift4/ose-haproxy-router@sha256:fa0302d13b803821c17a94249747292de88422fc7dc9033e5dd56be399665aca
openshift4/ose-hyperkube@sha256:0cc71f56205cf95d0a6f6215a9296d826cefc70d8faafaf2021d8483770eaa22
openshift4/ose-insights-rhel8-operator@sha256:7b5e8eae7eb4afc1b5188f94314e8f997d62209966940e66c2521de1bc3f26ef
openshift4/ose-installer@sha256:4a2bfa7e3f6667c3b70ed2c1960299eb1167e70ed77665951ce3f82851327828
openshift4/ose-installer-artifacts@sha256:560945736162a22e8d69592a88d6f6b30fc87f846bef3826756659ab275a06d5
openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:6c7a2804bb7993c3af61dc9b94b832796872ac3c683d6867ed7825c773920e83
openshift4/ose-ironic-inspector-rhel8@sha256:8967c0214bdd4ae2b22216b7076fcdc0dd7b5792ed6913af0b5985f10f1234a8
openshift4/ose-ironic-ipa-downloader-rhel8@sha256:0aa406c9c04123c945948e2b25df5dcb9107b84f8bb1c9073ec8a0cd415cdc5e
openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:3d390d18acc79366695d1ca53a424d9150f84c150ab9adb588c2aaa97a71e84a
openshift4/ose-ironic-rhel8@sha256:6a8ebe0e76b7d1c2fae13b33549681a5c180c5e9b74d4ff75d777f2e243b3871
openshift4/ose-ironic-static-ip-manager-rhel8@sha256:0041a7e1f25bab9744f479cadc8308bd79cd29c96445fa0fee67eaac1a802306
openshift4/ose-jenkins@sha256:c42af2e7b134af1e3a466c6c274282056428edb6a6d1b62d77dbe8e9957a4260
openshift4/ose-jenkins-agent-base@sha256:ab7493f2c60d0f8d536e844b63f3506c8fb28a57aac6b3ffa170e929ce6ecfb5
openshift4/ose-jenkins-agent-maven@sha256:a9b5f4fbe764e5d8d7e928366a7d1ba8ff57d389e7db8c1860891cf1883ff444
openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:2ec4e293877229b3b596ac33c92d6cd15f31cf4acfac10a15b9864ca63efd136
openshift4/ose-k8s-prometheus-adapter@sha256:a741a9c0bc48bb1c2a3b3a50f90ee0a897f7e833ca0f6d3e6dd771aef0f8ecc7
openshift4/ose-keepalived-ipfailover@sha256:fb66ff5b3854595cf5ff1dfffa83bb12a596a841cb383c3804bf37bf6f9f9bac
openshift4/ose-kube-proxy@sha256:837928b4076cde632947b330ca3824741441ea571e2a8b2b9656e00e43e5b89b
openshift4/ose-kube-rbac-proxy@sha256:8455540375239b72fe2d321d44ecf93ac7ef37c8457ccbe94bda04cf5810052b
openshift4/ose-kube-state-metrics@sha256:19bcec06a43139c9b467b624484a4a96de121188b3f6542f8f6e776fe9c294aa
openshift4/ose-kube-storage-version-migrator-rhel8@sha256:cb9d092369a782dd28cc882d22e9ca8c9780499ee12aa45770621381e744b09d
openshift4/ose-kuryr-cni-rhel8@sha256:26d9daa73f5c9a59a11ba4ef08df6314a94fefb368474b3a9c4e66e9135b6050
openshift4/ose-kuryr-controller-rhel8@sha256:1ef229d9272b2f7880ff1ceff890abe034a8d78d721ab6c53ec63b54f1e3cdfd
openshift4/ose-libvirt-machine-controllers@sha256:d00d6b2f11795ad211a99ab05caa902a5202f3194305df22ee4a4850d5a8c534
openshift4/ose-machine-api-operator@sha256:5f7273505b1144524e6b81194fd9bb2150bb8c41133bce58050fcf70a36e4dcb
openshift4/ose-machine-config-operator@sha256:347366529c956acc577b3409e2f3e9e5dc38bbc263e702657402e5209c7d9ca7
openshift4/ose-mdns-publisher-rhel8@sha256:90492d9249c97cba1b2c8cc32169bd5ebfdab4ccaba34b407cc2da15754ae704
openshift4/ose-multus-admission-controller@sha256:84683dcf95b10cc66e9350de96f80e105f01bef067f47e7b810049bea0238626
openshift4/ose-multus-cni@sha256:55955c53ca2018920fbc102fdd48a12bd01d51ff3af05f6cffc8219899be8fcd
openshift4/ose-multus-cni-alt-rhel8@sha256:29f9f00dba4ab58f06da87cb6eb097290a3483116d091d253d39b547c54c7182
openshift4/ose-multus-networkpolicy-rhel8@sha256:2bd517e3919acab3a6a7c98987056448c1522b23d61693ee0a8bd926417247a4
openshift4/ose-multus-route-override-cni-alt-rhel8@sha256:a09e6301d02c640ef260a1c683bde05adb0b4e375a6f4530dd879cf1210bc424
openshift4/ose-multus-route-override-cni-rhel8@sha256:a8e06365ee0ce65a135e59ab2f682966c8f908ea130bb7da504905d204947f29
openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8@sha256:634164cd9e33c9806c24405492bceab579ef194c88b62a753bc781426119aff6
openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:4b4d2beba710e974157249a5f48e7075614ec80472250647499e4376c077c2b0
openshift4/ose-must-gather@sha256:60a3bd7b220ab2480115632cde8eed292535944b3f9eafd5e5730f115e52095b
openshift4/ose-network-metrics-daemon-rhel8@sha256:6f0a9efe9e1f7f72c0f106aed97bb693633fe7350b81272f761b479ac2aaf4b2
openshift4/ose-oauth-apiserver-rhel8@sha256:616b71408c0812a4440920215b07ec0faba45d80cc06d316c45e8c204ede91eb
openshift4/ose-oauth-proxy@sha256:b6d63fb752ef333115243399955157e4d493b5f5f1e4624862ce6e1fae714343
openshift4/ose-oauth-server-rhel8@sha256:f79e87638576b930bd4bd53d9846d641af7830297bb46b98d722172beb458698
openshift4/ose-openshift-apiserver-rhel8@sha256:0709c00b9b75608208678005c7d493578cb4c44dc6c1fd4605fe5c89b2b059ce
openshift4/ose-openshift-controller-manager-rhel8@sha256:f91236b0ce479a5a4a5e1365a830dfd930563b8990938bf0dc78f9c6287645f3
openshift4/ose-openshift-state-metrics-rhel8@sha256:9436153384f323e20373517220dcd8df1daf12fde561673ef1b2fa4ee04672bf
openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:357a9b01e0b6d1d27dbb520a2ae1e0fd5b0ca02237af31546fbfd8512e07aa76
openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:b05a6721ce2b1a91b35a2e4e44bd03098dad467f6fad07ae6910173607072016
openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:cdb4b3d9aec1ef874771a72d90401f33dc98a01ae8b9c29fbdc33de949b94032
openshift4/ose-openstack-machine-controllers@sha256:18577224d6a4195066feaaa82186533a4f5be3b6dc4ba81164ab1e0cbd641d63
openshift4/ose-operator-lifecycle-manager@sha256:bf12e7e2cabd6b5e63b8c4f5579169fbe185368acf53fd6e66eb1accbd438ee2
openshift4/ose-operator-marketplace@sha256:10968f23188b54fb84c810df3095e19428ed92eb359bb8d91932e85716588a14
openshift4/ose-operator-registry@sha256:561641ed49d40c2d7de4f0581b2fbaf4ea60ddcaf3d38baa51e8521487ef5083
openshift4/ose-ovirt-machine-controllers-rhel8@sha256:7663b43d05775a611a3fc024029d0122b9374592b374a6d14612b00dcf72a187
openshift4/ose-ovn-kubernetes@sha256:0709fd435c7ab2f6100619766a64249b59c90ff9e3795feecda09988c27d3c27
openshift4/ose-pod@sha256:0b7aa6d09fadc2495ec8103ec7618cade2b374e0d842b00d7b801bc71458841d
openshift4/ose-prom-label-proxy@sha256:c9925c9e38857096eb5bc657b6f6f4a48ad8e3aa9fdf89510449b86d406decb1
openshift4/ose-prometheus@sha256:4878428b172101e7b8e1cb891c04cf70616e88368e9884dfa9af3e13cda503ff
openshift4/ose-prometheus-alertmanager@sha256:8c225850ed93316ad24950d437938d4dd96fb7f93b22fb6575df3cb370af75f9
openshift4/ose-prometheus-config-reloader@sha256:727fdbbfa79748bdaae2d9175f43a730f4e2ba56c3196caad846e897fbbc73e8
openshift4/ose-prometheus-node-exporter@sha256:365d8e7c395731def1687f234b7eceb81881951a46f7d834b6ad7793ffa58a4c
openshift4/ose-prometheus-operator@sha256:1522a943ab0ffec1e9de4c2de0d7988edce9e5730a715ee4eb39eca55d830e7e
openshift4/ose-sdn-rhel8@sha256:7580f41f98fb1b240f9c77b7c26aa17636a4b543ba06160aea23d362ee0d5d38
openshift4/ose-service-ca-operator@sha256:f34b066cef99c84e659a039a6bfa6faf9cc3294fe8e85754e3e670a6bca6c552
openshift4/ose-telemeter@sha256:61829aae577b90e4ad98f305e1eabf778adc8b4ae1e00766ad5cf72f0de73b7b
openshift4/ose-tests@sha256:a5e24b59c8cd1ff4c6eee6a3323dcf17e56b695a116bbb8b12a9a40023cfb628
openshift4/ose-thanos-rhel8@sha256:0db9a798a6aa8a2768dfb6ae761143dfd1270c33399ce76769f457050db83a15
openshift4/ose-tools-rhel8@sha256:2de5611984eda2acadd37a7904cf06604aed47155d6266623d0fae98f888e1cb
openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:76bbe5be9d5890fed611af9ddab3516f594bf9aa6a11640023452ec21f2baf4d
openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:76bbe5be9d5890fed611af9ddab3516f594bf9aa6a11640023452ec21f2baf4d
openshift4/ose-vsphere-csi-driver-rhel8@sha256:2f9eaed67c538fac2ec1ebda0d9a0accb24114d9272d4c3811bc22831203a351
openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:2f9eaed67c538fac2ec1ebda0d9a0accb24114d9272d4c3811bc22831203a351
openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:83bce06a9c2274fcfae8514ca1c9cdf98a2d2aa721cc0d862d0dc5de4536a4a1
openshift4/ose-vsphere-problem-detector-rhel8@sha256:32831afd46fa1ec7ea206a40d06ebc5b1a2933314d0629f67e5636f7a1bde0ae
openshift4/ovirt-csi-driver-rhel8@sha256:25cbaf2f2328996a2e25b14d7c385397bfcc33e4eea1dc4dd591d9db839e7300
openshift4/ovirt-csi-driver-rhel8-operator@sha256:a92803ec82f767168228224ded95dfb094db386534744301c0fceb91374707c5
Related news
Red Hat Security Advisory 2024-0775-03 - An update for jenkins and jenkins-2-plugins is now available for OpenShift Developer Tools and Services for OCP 4.11. Issues addressed include bypass, code execution, cross site scripting, deserialization, information leakage, and insecure permissions vulnerabilities.
Red Hat Security Advisory 2024-0193-03 - An update is now available for Red Hat OpenShift Container Platform 4.13.
An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21216: A flaw was found in the Linux kernel. A potential security vulnerability in some Intel(R) Atom(R) and Intel(R) Xeon(R) Scalable Processors may allow privilege escalation. This flaw may allow a privileged user to enable privilege escalation via adjacent network...
Red Hat Security Advisory 2023-4730-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.10.
Red Hat Security Advisory 2023-4421-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 4.12.5 images.
IBM Security Guardium 11.3 could allow an authenticated user to cause a denial of service due to improper input validation. IBM X-Force ID: 240903.
IBM Watson Knowledge Catalog on Cloud Pak for Data 4.0 could allow an authenticated user send a specially crafted request that could cause a denial of service. IBM X-Force ID: 251704.
Red Hat Security Advisory 2023-3645-01 - Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an OpenShift Container Platform installation. This advisory covers the RPM packages for the release. Issues addressed include a denial of service vulnerability.
Red Hat OpenShift Service Mesh 2.2.7 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-20329: A flaw was found in Mongo. Specific cstrings input may not be properly validated in the MongoDB Go Driver when marshaling Go objects into BSON. This flaw allows a malicious user to use a Go object with a specific string to inject additional fields into marshaled documents. * CVE-2021-43138: A vulnerability was found in the async package. This flaw allows a malicious user to obtai...
The Migration Toolkit for Containers (MTC) 1.7.10 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service. * CVE-2023-24536: A flaw was found in Golang Go, where it is vulnerable to a denial of service cause...
An update is now available for Red Hat JBoss Core Services Apache HTTP Server 2.4.51 Service Pack 2 on Red Hat Enterprise Linux versions 7 and 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2006-20001: A flaw was found in the mod_dav module of httpd. A specially crafted "If:" request header can cause a memory read or write of a single zero byte due to a missing error check, resulting in a Denial of Service. * CVE-2022-4304: A timing-based side channel exists in the Open...
Red Hat Security Advisory 2023-3296-01 - Multicluster Engine for Kubernetes 2.2.4 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy.
Dell VxRail versions earlier than 7.0.450, contain(s) an OS command injection vulnerability in VxRail Manager. A local authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.
Red Hat Security Advisory 2023-1328-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include denial of service and out of bounds read vulnerabilities.
Red Hat Security Advisory 2023-1326-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.0. Issues addressed include bypass, denial of service, information leakage, out of bounds read, and remote SQL injection vulnerabilities.
Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: A flaw was found in go-yaml. This issue occurs due to unbounded alias chasing, where a maliciously crafted YAML file can cause the system to consume significant system resources. If p...
Red Hat OpenShift Container Platform release 4.12.16 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-46146: A flaw was found in exporter-toolkit. A request can be forged by an attacker to poison the internal cache used to cache hashes and make subsequent successful requests. This cache is ...
Red Hat Security Advisory 2023-2107-01 - The Migration Toolkit for Containers (MTC) 1.7.9 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. Issues addressed include a denial of service vulnerability.
Red Hat Advanced Cluster Management for Kubernetes 2.6.5 General Availability release images, which fix bugs and security updates container images. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3841: A Server-Side Request Forgery (SSRF) vulnerability was found in the console API endpoint from Red Hat Advanced Cluster Management for Kubernetes (RHACM). An attacker could take advantage of this as the console API endpoint is missing an authentication check, allowing unauth...
Red Hat Security Advisory 2023-2061-01 - Multicluster Engine for Kubernetes 2.1.6 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy. Issues addressed include a denial of service vulnerability.
Migration Toolkit for Applications 6.1.0 release Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3782: A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. An attacker can use this flaw to construct a malicious request to bypass validation and access other URLs and potentially sensitive information within the domain or possibly conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect ...
Red Hat Security Advisory 2023-2023-01 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Data Foundation. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform.
Red Hat Security Advisory 2023-1893-01 - Red Hat Multicluster Engine Hotfix Security Update for Console. Red Hat Product Security has rated this update as having a security impact of Critical.
Red Hat Multicluster Engine Hotfix Security Update for Console Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-29017: A flaw was found in vm2 where the component was not properly handling asynchronous errors. This flaw allows a remote, unauthenticated attacker to escape the restrictions of the sandbox and execute code on the host. * CVE-2023-29199: There exists a vulnerability in source code transformer (exception sanitization logic) of vm2 for versions up to 3.9.15, al...
Multicluster Engine for Kubernetes 2.2.3 General Availability release images, which fix bugs and security updates container images. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-25881: A flaw was found in http-cache-semantics. When the server reads the cache policy from the request using this library, a Regular Expression Denial of Service occurs, caused by malicious request header values sent to the server. * CVE-2023-29017: A flaw was found in vm2 where the component...
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through...
Updated images that fix several bugs are now available for Red Hat OpenShift Data Foundation 4.12.2 on Red Hat Enterprise Linux 8 from Red Hat Container Registry. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While ...
Red Hat Security Advisory 2023-1656-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.56.
Red Hat Security Advisory 2023-1525-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.9.59.
Red Hat Security Advisory 2023-1504-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.34.
Dell Streaming Data Platform prior to 1.4 contains Open Redirect vulnerability. An attacker with privileges same as a legitimate user can phish the legitimate the user to redirect to malicious website leading to information disclosure and launch of phishing attacks.
Red Hat OpenShift Container Platform release 4.11.34 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-20329: A flaw was found in Mongo. Specific cstrings input may not be properly validated in the MongoDB Go Driver when marshaling Go objects into BSON. This flaw allows a malicious user to u...
Red Hat Security Advisory 2023-1392-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.55.
Red Hat OpenShift Container Platform release 4.10.55 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-20329: A flaw was found in Mongo. Specific cstrings input may not be properly validated in the MongoDB Go Driver when marshaling Go objects into BSON. This flaw allows a malicious user to use a Go object with a specific string to inject additional fields into marshaled docume...
Red Hat Security Advisory 2023-1409-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.9.
Red Hat OpenShift Container Platform release 4.12.9 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-20329: A flaw was found in Mongo. Specific cstrings input may not be properly validated in the MongoDB Go Driver when marshaling Go objects into BSON. This flaw allows a malicious user to us...
Red Hat Security Advisory 2023-1440-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library.
Red Hat Security Advisory 2023-1439-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library.
Red Hat Security Advisory 2023-1438-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library.
An update for openssl is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0286: A type confusion vulnerability was found in OpenSSL when OpenSSL X.400 addresses processing inside an X.509 GeneralName. When CRL checking is enabled (for example, the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to r...
An update for openssl is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0286: A type confusion vulnerability was found in OpenSSL when OpenSSL X.400 addresses processing inside an X.509 GeneralName. When CRL checking is enabled (for example, the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to r...
An update for openssl is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0286: A type confusion vulnerability was found in OpenSSL when OpenSSL X.400 addresses processing inside an X.509 GeneralName. When CRL checking is enabled (for example, the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to r...
Red Hat Security Advisory 2023-1335-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library.
An update for nss is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0767: The Mozilla Foundation Security Advisory describes this flaw as: An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled.
An update for nss is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0767: The Mozilla Foundation Security Advisory describes this flaw as: An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled.
An update for openssl is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4203: A flaw was found in Open SSL. A read buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification, and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite...
Ubuntu Security Notice 5892-1 - It was discovered that NSS incorrectly handled client authentication without a user certificate in the database. A remote attacker could possibly use this issue to cause a NSS client to crash, resulting in a denial of service. This issue only affected Ubuntu 22.10. Christian Holler discovered that NSS incorrectly handled certain PKCS 12 certificated bundles. A remote attacker could use this issue to cause NSS to crash, leading to a denial of service, or possibly execute arbitrary code.
Red Hat Security Advisory 2023-0809-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.8.0 ESR. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-0805-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.8.0 ESR. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-0806-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.8.0 ESR. Issues addressed include a use-after-free vulnerability.
An update for thunderbird is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0616: The Mozilla Foundation Security Advisory describes this flaw as: If a MIME email combines OpenPGP and OpenPGP MIME data in a certain way Thunderbird repeatedly attempts to process and display the message, which could cause Thunderbird's user interface to lock up and no longer respond to the user's actions. An attacke...
An update for thunderbird is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0616: The Mozilla Foundation Security Advisory describes this flaw as: If a MIME email combines OpenPGP and OpenPGP MIME data in a certain way Thunderbird repeatedly attempts to process and display the message, which could cause Thunderbird's user interface to lock up and no longer respond to the user's actions. An attacker could send a crafted mes...
An update for firefox is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0767: The Mozilla Foundation Security Advisory describes this flaw as: An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled. * CVE-2023-25728: The Mozilla Foundation Security Advisory describes this flaw as: The `Content-Se...
An update for firefox is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0767: The Mozilla Foundation Security Advisory describes this flaw as: An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe...
OX App Suite suffers from cross site scripting and server-side request forgery vulnerabilities.
Your fortnightly rundown of AppSec vulnerabilities, new hacking techniques, and other cybersecurity news
Ubuntu Security Notice 5845-2 - USN-5845-1 fixed several vulnerabilities in OpenSSL. This update provides the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. David Benjamin discovered that OpenSSL incorrectly handled X.400 address processing. A remote attacker could possibly use this issue to read arbitrary memory contents or cause OpenSSL to crash, resulting in a denial of service.
Red Hat Security Advisory 2023-0261-02 - Red Hat Satellite is a system management solution that allows organizations to configure and maintain their systems without the necessity to provide public Internet access to their servers or other client systems. It performs provisioning and configuration management of predefined standard operating environments.
Updated Satellite 6.12 packages that fixes critical security bugs and several regular bugs are now available for Red Hat Satellite.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32224: activerecord: Possible RCE escalation bug with Serialized Columns in Active Record * CVE-2022-42889: apache-commons-text: variable interpolation RCE
Gentoo Linux Security Advisory 202301-5 - A vulnerability has been discovered in Apache Commons Text which could result in arbitrary code execution. Versions less than 1.10.0 are affected.
IBM Security Guardium 11.4 could allow a privileged user to obtain sensitive information inside of an HTTP response. IBM X-Force ID: 235405.
Red Hat Security Advisory 2022-8902-01 - This release of Camel for Spring Boot 3.18.3 serves as a replacement for Camel for Spring Boot 3.14.2 and includes bug fixes and enhancements, which are documented in the Release Notes document linked in the References. Issues addressed include a denial of service vulnerability.
A minor version update (from 3.14.5 to 3.18.3) is now available for Camel for Spring Boot. The purpose of this text-only errata is to inform you about the security issues fixed in this release. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-25897: sdk-server: Denial of Service * CVE-2022-31684: reactor-netty-http: Log request headers in some cases of invalid HTTP requests * CVE-2022-42889: apache-commons-text: variable interpolation RCE
Log4Shell-like bug is serious but less dangerous than notorious Log4j vulnerability
There's nothing yet to suggest CVE-2022-42889 is the next Log4j. But proof-of-concept code is available, and interest appears to be ticking up.
Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolator...
Specific cstrings input may not be properly validated in the MongoDB Go Driver when marshalling Go objects into BSON. A malicious user could use a Go object with specific string to potentially inject additional fields into marshalled documents. This issue affects all MongoDB GO Drivers up to (and including) 1.5.0.