cve
stringlengths
13
16
cwe
stringclasses
482 values
affected_component
stringlengths
0
177
summary
stringlengths
0
227
severity
stringclasses
5 values
cvss_v2
stringclasses
250 values
cvss_v3
stringlengths
37
48
description
stringlengths
30
4k
statement
stringlengths
31
2.49k
discovery_date
stringdate
2001-01-05 00:00:00
2025-04-25 14:00:59
release_date
stringdate
1999-01-01 00:00:00
2025-04-25 13:02:53
fixed_products
sequencelengths
0
28.2k
known_affected_products
sequencelengths
0
599
known_not_affected_products
sequencelengths
0
30.2k
under_investigation_products
sequencelengths
0
78
threat_categories
sequencelengths
0
4
threat_details
sequencelengths
0
4
threat_dates
sequencelengths
0
4
remediation_categories
sequencelengths
0
217
remediation_details
sequencelengths
0
217
remediation_dates
sequencelengths
0
217
CVE-2025-22100
CWE-362
kernel
drm/panthor: Fix race condition when gathering fdinfo group samples
Moderate
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: drm/panthor: Fix race condition when gathering fdinfo group samples Commit e16635d88fa0 ("drm/panthor: add DRM fdinfo support") failed to protect access to groups with an xarray lock, which could lead to use-after-free errors.
null
2025-04-16T00:00:00+00:00
2025-04-16T00:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[]
[]
[]
CVE-2025-21686
CWE-20
kernel
io_uring/rsrc: require cloned buffers to share accounting contexts
Moderate
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: io_uring/rsrc: require cloned buffers to share accounting contexts When IORING_REGISTER_CLONE_BUFFERS is used to clone buffers from uring instance A to uring instance B, where A and B use different MMs for accounting, the accounting can go wrong: If uring instance A is closed before uring instance B, the pinned memory counters for uring instance B will be decremented, even though the pinned memory was originally accounted through uring instance A; so the MM of uring instance B can end up with negative locked memory.
null
2025-02-10T00:00:00+00:00
2025-02-10T00:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[]
[]
[]
CVE-2025-32415
CWE-1284
libxml2
Out-of-bounds Read in xmlSchemaIDCFillNodeTables
Low
null
2.8/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
In libxml2 before 2.13.8 and 2.14.x before 2.14.2, xmlSchemaIDCFillNodeTables in xmlschemas.c has a heap-based buffer under-read. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used.
null
2025-04-17T18:00:46.954384+00:00
2025-04-17T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_6:libxml2", "red_hat_enterprise_linux_7:libxml2", "red_hat_enterprise_linux_8:libxml2", "red_hat_enterprise_linux_9:libxml2", "red_hat_jboss_core_services:libxml2", "red_hat_openshift_container_platform_4:rhcos" ]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "workaround", "none_available" ]
[ "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "Fix deferred" ]
[ null, null ]
CVE-2025-32045
CWE-862
moodle
Hidden Grades Shown to Users Without Permission on Some Grade Reports
Moderate
null
5.3/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
A flaw has been identified in Moodle where insufficient capability checks in certain grade reports allowed users without the necessary permissions to access hidden grades.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
2025-04-02T07:17:19.564000+00:00
2025-04-02T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[]
[]
[]
CVE-2025-21669
CWE-476
kernel
vsock/virtio: discard packets if the transport changes
Moderate
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: discard packets if the transport changes If the socket has been de-assigned or assigned to another transport, we must discard any packets received because they are not expected and would cause issues when we access vsk->transport. A possible scenario is described by Hyunwoo Kim in the attached link, where after a first connect() interrupted by a signal, and a second connect() failed, we can find `vsk->transport` at NULL, leading to a NULL pointer dereference.
null
2025-01-31T00:00:00+00:00
2025-01-31T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[ "red_hat_enterprise_linux_6:kernel" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "no_fix_planned", "no_fix_planned", "none_available" ]
[ "Out of support scope", "Will not fix", "Affected" ]
[ null, null, null ]
CVE-2025-22045
null
kernel
x86/mm: Fix flush_tlb_range() when used for zapping normal PMDs
Low
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: x86/mm: Fix flush_tlb_range() when used for zapping normal PMDs On the following path, flush_tlb_range() can be used for zapping normal PMD entries (PMD entries that point to page tables) together with the PTE entries in the pointed-to page table: collapse_pte_mapped_thp pmdp_collapse_flush flush_tlb_range The arm64 version of flush_tlb_range() has a comment describing that it can be used for page table removal, and does not use any last-level invalidation optimizations. Fix the X86 version by making it behave the same way. Currently, X86 only uses this information for the following two purposes, which I think means the issue doesn't have much impact: - In native_flush_tlb_multi() for checking if lazy TLB CPUs need to be IPI'd to avoid issues with speculative page table walks. - In Hyper-V TLB paravirtualization, again for lazy TLB stuff. The patch "x86/mm: only invalidate final translations with INVLPGB" which is currently under review (see <https://lore.kernel.org/all/[email protected]/>) would probably be making the impact of this a lot worse.
null
2025-04-16T00:00:00+00:00
2025-04-16T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "no_fix_planned", "none_available" ]
[ "Out of support scope", "Fix deferred" ]
[ null, null ]
CVE-2025-21844
CWE-476
kernel
smb: client: Add check for next_buffer in receive_encrypted_standard()
Moderate
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: smb: client: Add check for next_buffer in receive_encrypted_standard() Add check for the return value of cifs_buf_get() and cifs_small_buf_get() in receive_encrypted_standard() to prevent null pointer dereference.
null
2025-03-12T00:00:00+00:00
2025-03-12T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "no_fix_planned", "none_available" ]
[ "Out of support scope", "Affected" ]
[ null, null ]
CVE-2025-1247
CWE-488
io.quarkus
quarkus-rest: Quarkus REST Endpoint Request Parameter Leakage Due to Shared Instance
Important
null
8.6/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
A flaw was found in Quarkus REST that allows request parameters to leak between concurrent requests if endpoints use field injection without a CDI scope. This vulnerability allows attackers to manipulate request data, impersonate users, or access sensitive information.
This vulnerability marked as important severity rather than moderate because it leads to cross-request data leakage, which can compromise the confidentiality and integrity of user interactions. In a concurrent environment, multiple requests being served by a single, shared instance of an endpoint class means that sensitive request data—such as authentication headers, cookies, or form parameters—can be inadvertently exposed to other users. This violates fundamental HTTP request isolation principles, potentially leading to session hijacking, unauthorized access, or privilege escalation.
2025-02-12T09:30:25.106000+00:00
2025-02-12T00:00:00+00:00
[ "Red Hat Build of Apache Camel 4.8 for Quarkus 3.15", "Red Hat build of Quarkus 3.15.3.SP1", "Red Hat build of Quarkus 3.8.6.SP3" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix", "vendor_fix", "workaround" ]
[ "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\nThe References section of this erratum contains a download link (you must log in to download the update).", "Before applying this update, ensure that all previously released errata relevant to your system are applied. \n\nFor details about applying this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability." ]
[ "2025-03-03T13:23:22+00:00", "2025-02-27T13:16:16+00:00", "2025-02-27T15:15:05+00:00", null ]
CVE-2025-0905
null
PDF-XChange Editor JB2 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
null
null
null
PDF-XChange Editor JB2 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JB2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-25433.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
2025-01-30T20:36:29.436000+00:00
2025-01-31T22:07:55.139000+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-26682
CWE-770
dotnet
.NET: ASP.NET Core denial of service with HTTP/3
Important
null
7.5/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
A flaw was found in dotnet. Improper use of the HTTP/3 protocol allows an unauthorized remote attacker to cause an allocation of resources without limits or throttling in ASP.NET Core, resulting in a denial of service.
This issue can only be exploited when support for the HTTP/3 protocol is enabled. The .NET packages shipped in Red Hat Enterprise Linux do not support the HTTP/3 protocol. Therefore, Red Hat products are not affected by this vulnerability.
2025-04-07T14:56:03.993000+00:00
2025-04-08T16:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_8:dotnet8.0", "red_hat_enterprise_linux_8:dotnet9.0", "red_hat_enterprise_linux_9:dotnet6.0", "red_hat_enterprise_linux_9:dotnet7.0", "red_hat_enterprise_linux_9:dotnet8.0", "red_hat_enterprise_linux_9:dotnet9.0" ]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[]
[]
[]
CVE-2025-1302
CWE-94
jsonpath-plus
Remote Code Execution in jsonpath-plus via Improper Input Sanitization
Low
null
9.8/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
A flaw was found in jsonpath-plus. This vulnerability allows remote code execution (RCE) via improper input sanitization, exploiting the unsafe default usage of eval='safe' mode.
Red Hat's initial impact rating of critical has been downgraded to low. While the vulnerable code is technically still present within Red Hat products, there are no code paths in affected products which allow exploitation. As such, the impact to Red Hat products is low. Each of the products listed have multiple components where a fixed build could occur. This distinction does not matter for users as only one build needs fixed for the product. Additionally, in Red Hat OpenShift AI, jsonpath-plus is a dependency of a direct dependency and is never loaded, as the direct dependency's feature that requires jsonpath-plus is not used.
2025-02-15T06:00:41.095749+00:00
2025-02-15T05:00:01.061000+00:00
[]
[ "red_hat_openshift_dev_spaces:devspaces/code-rhel8", "red_hat_openshift_dev_spaces:devspaces/dashboard-rhel8" ]
[ "openshift_serverless:kn-backstage-plugins-eventmesh-rhel8", "red_hat_openshift_ai_(rhoai):odh-dashboard-container", "red_hat_openshift_ai_(rhoai):odh-operator-container" ]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "workaround", "none_available" ]
[ "Red Hat Product Security recommends updating the vulnerable software to the latest version.", "Fix deferred" ]
[ null, null ]
CVE-2025-21901
CWE-476
kernel
RDMA/bnxt_re: Add sanity checks on rdev validity
Low
null
5.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: RDMA/bnxt_re: Add sanity checks on rdev validity There is a possibility that ulp_irq_stop and ulp_irq_start callbacks will be called when the device is in detached state. This can cause a crash due to NULL pointer dereference as the rdev is already freed.
null
2025-04-01T00:00:00+00:00
2025-04-01T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt" ]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "no_fix_planned", "none_available" ]
[ "Out of support scope", "Fix deferred" ]
[ null, null ]
CVE-2025-0840
CWE-121
binutils
GNU Binutils objdump.c disassemble_bytes stack-based overflow
Moderate
null
5.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
A vulnerability, which was classified as problematic, was found in GNU Binutils up to 2.43. This affects the function disassemble_bytes of the file binutils/objdump.c. The manipulation of the argument buf leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.44 is able to address this issue. The identifier of the patch is baac6c221e9d69335bf41366a1c7d87d8ab2f893. It is recommended to upgrade the affected component.
null
2025-01-29T21:01:02.699967+00:00
2025-01-29T20:00:11.944000+00:00
[]
[ "red_hat_enterprise_linux_9:mingw-binutils" ]
[ "red_hat_enterprise_linux_6:binutils", "red_hat_enterprise_linux_7:binutils", "red_hat_enterprise_linux_7:gdb", "red_hat_enterprise_linux_8:binutils", "red_hat_enterprise_linux_8:gcc-toolset-13-binutils", "red_hat_enterprise_linux_8:gcc-toolset-13-gdb", "red_hat_enterprise_linux_8:gcc-toolset-14-binutils", "red_hat_enterprise_linux_8:gcc-toolset-14-gdb", "red_hat_enterprise_linux_8:gdb", "red_hat_enterprise_linux_8:mingw-binutils", "red_hat_enterprise_linux_9:binutils", "red_hat_enterprise_linux_9:gcc-toolset-13-binutils", "red_hat_enterprise_linux_9:gcc-toolset-13-gdb", "red_hat_enterprise_linux_9:gcc-toolset-14-binutils", "red_hat_enterprise_linux_9:gdb" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "workaround", "none_available" ]
[ "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "Fix deferred" ]
[ null, null ]
CVE-2025-1181
CWE-119
binutils
GNU Binutils ld elflink.c _bfd_elf_gc_mark_rsec memory corruption
Moderate
null
5.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
A flaw was found in GNU Binutil. This vulnerability allows memory corruption via manipulation of the _bfd_elf_gc_mark_rsec function.
null
2025-02-11T09:00:43.011812+00:00
2025-02-11T08:00:11.337000+00:00
[]
[]
[ "red_hat_enterprise_linux_6:binutils", "red_hat_enterprise_linux_7:binutils", "red_hat_enterprise_linux_7:gdb", "red_hat_enterprise_linux_8:binutils", "red_hat_enterprise_linux_8:gcc-toolset-13-binutils", "red_hat_enterprise_linux_8:gcc-toolset-13-gdb", "red_hat_enterprise_linux_8:gcc-toolset-14-binutils", "red_hat_enterprise_linux_8:gcc-toolset-14-gdb", "red_hat_enterprise_linux_8:gdb", "red_hat_enterprise_linux_8:mingw-binutils", "red_hat_enterprise_linux_9:binutils", "red_hat_enterprise_linux_9:gcc-toolset-13-binutils", "red_hat_enterprise_linux_9:gcc-toolset-13-gdb", "red_hat_enterprise_linux_9:gcc-toolset-14-binutils", "red_hat_enterprise_linux_9:gdb", "red_hat_enterprise_linux_9:mingw-binutils" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "workaround" ]
[ "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability." ]
[ null ]
CVE-2025-22012
CWE-20
kernel
Revert "arm64: dts: qcom: sdm845: Affirm IDR0.CCTW on apps_smmu"
Low
null
5.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: Revert "arm64: dts: qcom: sdm845: Affirm IDR0.CCTW on apps_smmu" There are reports that the pagetable walker cache coherency is not a given across the spectrum of SDM845/850 devices, leading to lock-ups and resets. It works fine on some devices (like the Dragonboard 845c, but not so much on the Lenovo Yoga C630). This unfortunately looks like a fluke in firmware development, where likely somewhere in the vast hypervisor stack, a change to accommodate for this was only introduced after the initial software release (which often serves as a baseline for products). Revert the change to avoid additional guesswork around crashes. This reverts commit 6b31a9744b8726c69bb0af290f8475a368a4b805.
null
2025-04-08T00:00:00+00:00
2025-04-08T00:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[]
[]
[]
CVE-2025-32911
CWE-590
libsoup
Double free on soup_message_headers_get_content_disposition() through "soup-message-headers.c" via "params" GHashTable value
Important
null
8.9/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
A flaw was found in libsoup, which is vulnerable to a use-after-free memory issue not on the heap in the soup_message_headers_get_content_disposition() function. This flaw allows a malicious HTTP client to cause memory corruption in the libsoup server.
null
2025-04-14T01:21:00.518000+00:00
2025-04-14T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_6:libsoup", "red_hat_enterprise_linux_7:libsoup", "red_hat_enterprise_linux_8:libsoup", "red_hat_enterprise_linux_9:libsoup" ]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "workaround", "no_fix_planned", "none_available" ]
[ "Currently, no mitigation is available for this vulnerability.", "Out of support scope", "Affected" ]
[ null, null, null ]
CVE-2025-2312
CWE-488
cifs-utils
kernel: cifs-utils: cifs.upcall makes an upcall to the wrong namespace in containerized environments
Moderate
null
5.9/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
A flaw was found in cifs-utils. When trying to obtain Kerberos credentials, the cifs.upcall program from the cifs-utils package makes an upcall to the wrong namespace in containerized environments. This issue may lead to disclosing sensitive data from the host's Kerberos credentials cache.
No evidence was found of the possibility of a container escape, restricting the impact to confidentiality. Hence, this flaw is rated with a Moderate impact rating. This flaws affects only the cifs-utils component but requires a two part fix. This is why the kernel component is also listed.
2025-03-14T00:00:00+00:00
2025-01-01T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_6:cifs-utils", "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:cifs-utils", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:cifs-utils", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:cifs-utils", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "workaround", "no_fix_planned", "none_available" ]
[ "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "Out of support scope", "Affected" ]
[ null, null, null ]
CVE-2025-32442
CWE-1287
Fastify
Fastify vulnerable to invalid content-type parsing, which could lead to validation bypass
Important
null
7.5/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
A flaw was found in Fastify. In affected versions, applications that specify different validation strategies for various content types can bypass validation by using a _slightly altered_ content type, such as with different casing or altered whitespace before `;`.
None of the Red Hat Products and Services are impacted by this vulnerability.
2025-04-18T17:00:46.316414+00:00
2025-04-18T15:59:06.670000+00:00
[]
[]
[ "openshift_serverless:openshift-serverless-1/kn-plugin-func-func-util-rhel8", "red_hat_openshift_ai_(rhoai):odh-dashboard-container", "red_hat_openshift_ai_(rhoai):odh-operator-container", "red_hat_openshift_ai_(rhoai):rhoai/odh-dashboard-rhel8", "red_hat_openshift_dev_spaces:devspaces/dashboard-rhel8", "red_hat_openshift_dev_spaces:devspaces/dashboard-rhel9" ]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "workaround" ]
[ "To mitigate this vulnerability, do not specify multiple content types in the schema." ]
[ null ]
CVE-2025-21794
CWE-119
kernel
HID: hid-thrustmaster: fix stack-out-of-bounds read in usb_check_int_endpoints()
Moderate
null
7.2/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: HID: hid-thrustmaster: fix stack-out-of-bounds read in usb_check_int_endpoints() Syzbot[1] has detected a stack-out-of-bounds read of the ep_addr array from hid-thrustmaster driver. This array is passed to usb_check_int_endpoints function from usb.c core driver, which executes a for loop that iterates over the elements of the passed array. Not finding a null element at the end of the array, it tries to read the next, non-existent element, crashing the kernel. To fix this, a 0 element was added at the end of the array to break the for loop. [1] https://syzkaller.appspot.com/bug?extid=9c9179ac46169c56c1ad
null
2025-02-27T00:00:00+00:00
2025-02-27T00:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[]
[]
[]
CVE-2025-21501
null
mysql
Optimizer unspecified vulnerability (CPU Jan 2025)
Moderate
null
6.7/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
null
2025-01-21T21:04:52.611944+00:00
2025-01-21T20:52:56.037000+00:00
[ "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src", "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src", "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64" ]
[]
[ "red_hat_enterprise_linux_6:mysql" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258" ]
[ "2025-02-19T11:10:11+00:00", "2025-02-19T10:31:41+00:00" ]
CVE-2025-21852
CWE-476
kernel
net: Add rx_skb of kfree_skb to raw_tp_null_args[].
Moderate
null
5.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: net: Add rx_skb of kfree_skb to raw_tp_null_args[]. Yan Zhai reported a BPF prog could trigger a null-ptr-deref [0] in trace_kfree_skb if the prog does not check if rx_sk is NULL. Commit c53795d48ee8 ("net: add rx_sk to trace_kfree_skb") added rx_sk to trace_kfree_skb, but rx_sk is optional and could be NULL. Let's add kfree_skb to raw_tp_null_args[] to let the BPF verifier validate such a prog and prevent the issue. Now we fail to load such a prog: libbpf: prog 'drop': -- BEGIN PROG LOAD LOG -- 0: R1=ctx() R10=fp0 ; int BPF_PROG(drop, struct sk_buff *skb, void *location, @ kfree_skb_sk_null.bpf.c:21 0: (79) r3 = *(u64 *)(r1 +24) func 'kfree_skb' arg3 has btf_id 5253 type STRUCT 'sock' 1: R1=ctx() R3_w=trusted_ptr_or_null_sock(id=1) ; bpf_printk("sk: %d, %d\n", sk, sk->__sk_common.skc_family); @ kfree_skb_sk_null.bpf.c:24 1: (69) r4 = *(u16 *)(r3 +16) R3 invalid mem access 'trusted_ptr_or_null_' processed 2 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0 -- END PROG LOAD LOG -- Note this fix requires commit 838a10bd2ebf ("bpf: Augment raw_tp arguments with PTR_MAYBE_NULL"). [0]: BUG: kernel NULL pointer dereference, address: 0000000000000010 PF: supervisor read access in kernel mode PF: error_code(0x0000) - not-present page PGD 0 P4D 0 PREEMPT SMP RIP: 0010:bpf_prog_5e21a6db8fcff1aa_drop+0x10/0x2d Call Trace: <TASK> ? __die+0x1f/0x60 ? page_fault_oops+0x148/0x420 ? search_bpf_extables+0x5b/0x70 ? fixup_exception+0x27/0x2c0 ? exc_page_fault+0x75/0x170 ? asm_exc_page_fault+0x22/0x30 ? bpf_prog_5e21a6db8fcff1aa_drop+0x10/0x2d bpf_trace_run4+0x68/0xd0 ? unix_stream_connect+0x1f4/0x6f0 sk_skb_reason_drop+0x90/0x120 unix_stream_connect+0x1f4/0x6f0 __sys_connect+0x7f/0xb0 __x64_sys_connect+0x14/0x20 do_syscall_64+0x47/0xc30 entry_SYSCALL_64_after_hwframe+0x4b/0x53
null
2025-03-12T00:00:00+00:00
2025-03-12T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "no_fix_planned" ]
[ "Will not fix" ]
[ null ]
CVE-2025-1744
CWE-787
radare2
Out-of-bounds Write in radare2
Critical
null
10/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Out-of-bounds Write vulnerability in radareorg radare2 allows heap-based buffer over-read or buffer overflow.This issue affects radare2: before <5.9.9.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
2025-02-28T04:00:44.321171+00:00
2025-02-28T03:24:50.301000+00:00
[]
[]
[ "red_hat_products" ]
[]
[ "impact" ]
[ "Critical" ]
[ null ]
[]
[]
[]
CVE-2025-21917
CWE-476
kernel
usb: renesas_usbhs: Flush the notify_hotplug_work
Moderate
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: usb: renesas_usbhs: Flush the notify_hotplug_work When performing continuous unbind/bind operations on the USB drivers available on the Renesas RZ/G2L SoC, a kernel crash with the message "Unable to handle kernel NULL pointer dereference at virtual address" may occur. This issue points to the usbhsc_notify_hotplug() function. Flush the delayed work to avoid its execution when driver resources are unavailable.
null
2025-04-01T00:00:00+00:00
2025-04-01T00:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[]
[]
[]
CVE-2025-24216
CWE-119
webkitgtk
Processing maliciously crafted web content may lead to an unexpected Safari crash
Important
null
8.7/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.
To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.
2025-04-07T14:29:49.645000+00:00
2025-04-07T00:00:00+00:00
[ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.48.1-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.48.1-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.48.1-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.48.1-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.48.1-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.48.1-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.48.1-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.48.1-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.48.1-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.48.1-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.48.1-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.48.1-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.48.1-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.48.1-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.48.1-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.48.1-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.48.1-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.48.1-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.48.1-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.48.1-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.48.1-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.48.1-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.48.1-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.48.1-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.48.1-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.48.1-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.48.1-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.48.1-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.48.1-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.48.1-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.48.1-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.48.1-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.48.1-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.48.1-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.48.1-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.48.1-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.48.1-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.48.1-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.48.1-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.48.1-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.48.1-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-1.el8_10.x86_64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.48.1-3.el9_2.aarch64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.48.1-3.el9_2.i686", "AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.48.1-3.el9_2.ppc64le", "AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.48.1-3.el9_2.s390x", "AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.48.1-3.el9_2.src", "AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.48.1-3.el9_2.x86_64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.48.1-3.el9_2.aarch64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.48.1-3.el9_2.i686", "AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.48.1-3.el9_2.ppc64le", "AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.48.1-3.el9_2.s390x", "AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.48.1-3.el9_2.x86_64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.48.1-3.el9_2.aarch64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.48.1-3.el9_2.i686", "AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.48.1-3.el9_2.ppc64le", "AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.48.1-3.el9_2.s390x", "AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.48.1-3.el9_2.x86_64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.48.1-3.el9_2.aarch64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.48.1-3.el9_2.i686", "AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.48.1-3.el9_2.ppc64le", "AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.48.1-3.el9_2.s390x", "AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.48.1-3.el9_2.x86_64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.48.1-3.el9_2.aarch64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.48.1-3.el9_2.i686", "AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.48.1-3.el9_2.ppc64le", "AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.48.1-3.el9_2.s390x", "AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.48.1-3.el9_2.x86_64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.48.1-3.el9_2.aarch64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.48.1-3.el9_2.i686", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.48.1-3.el9_2.ppc64le", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.48.1-3.el9_2.s390x", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.48.1-3.el9_2.x86_64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.48.1-3.el9_2.aarch64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.48.1-3.el9_2.i686", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.48.1-3.el9_2.ppc64le", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.48.1-3.el9_2.s390x", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.48.1-3.el9_2.x86_64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.48.1-3.el9_2.aarch64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.48.1-3.el9_2.i686", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.48.1-3.el9_2.ppc64le", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.48.1-3.el9_2.s390x", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.48.1-3.el9_2.x86_64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-3.el9_2.aarch64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-3.el9_2.i686", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-3.el9_2.ppc64le", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-3.el9_2.s390x", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-3.el9_2.x86_64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-0:2.48.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-0:2.48.1-2.el9_4.i686", "AppStream-9.4.0.Z.EUS:webkit2gtk3-0:2.48.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:webkit2gtk3-0:2.48.1-2.el9_4.s390x", "AppStream-9.4.0.Z.EUS:webkit2gtk3-0:2.48.1-2.el9_4.src", "AppStream-9.4.0.Z.EUS:webkit2gtk3-0:2.48.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-debuginfo-0:2.48.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-debuginfo-0:2.48.1-2.el9_4.i686", "AppStream-9.4.0.Z.EUS:webkit2gtk3-debuginfo-0:2.48.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:webkit2gtk3-debuginfo-0:2.48.1-2.el9_4.s390x", "AppStream-9.4.0.Z.EUS:webkit2gtk3-debuginfo-0:2.48.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-debugsource-0:2.48.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-debugsource-0:2.48.1-2.el9_4.i686", "AppStream-9.4.0.Z.EUS:webkit2gtk3-debugsource-0:2.48.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:webkit2gtk3-debugsource-0:2.48.1-2.el9_4.s390x", "AppStream-9.4.0.Z.EUS:webkit2gtk3-debugsource-0:2.48.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-0:2.48.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-0:2.48.1-2.el9_4.i686", "AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-0:2.48.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-0:2.48.1-2.el9_4.s390x", "AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-0:2.48.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.48.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.48.1-2.el9_4.i686", "AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.48.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.48.1-2.el9_4.s390x", "AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.48.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-0:2.48.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-0:2.48.1-2.el9_4.i686", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-0:2.48.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-0:2.48.1-2.el9_4.s390x", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-0:2.48.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.48.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.48.1-2.el9_4.i686", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.48.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.48.1-2.el9_4.s390x", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.48.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.48.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.48.1-2.el9_4.i686", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.48.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.48.1-2.el9_4.s390x", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.48.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-2.el9_4.i686", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-2.el9_4.s390x", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-2.el9_4.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.48.1-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.48.1-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.48.1-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.48.1-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.48.1-1.el9_5.src", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.48.1-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.48.1-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.48.1-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.48.1-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.48.1-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.48.1-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.48.1-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.48.1-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.48.1-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.48.1-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.48.1-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.48.1-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.48.1-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.48.1-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.48.1-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.48.1-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.48.1-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.48.1-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.48.1-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.48.1-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.48.1-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.48.1-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.48.1-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.48.1-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.48.1-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.48.1-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.48.1-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.48.1-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.48.1-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.48.1-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.48.1-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.48.1-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.48.1-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.48.1-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.48.1-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.48.1-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.48.1-1.el9_5.x86_64" ]
[ "red_hat_enterprise_linux_6:webkitgtk", "red_hat_enterprise_linux_7:webkitgtk3", "red_hat_enterprise_linux_7:webkitgtk4" ]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "workaround", "no_fix_planned", "no_fix_planned", "none_available" ]
[ "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "Out of support scope", "Will not fix", "Affected" ]
[ "2025-04-17T06:50:23+00:00", "2025-04-09T14:03:47+00:00", "2025-04-09T14:04:57+00:00", "2025-04-08T21:04:15+00:00", null, null, null, null ]
CVE-2025-2241
CWE-922
hive
Exposure of VCenter Credentials via ClusterProvision in Hive / MCE / ACM
Important
null
8.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N
A flaw was found in Hive, a component of Multicluster Engine (MCE) and Advanced Cluster Management (ACM). This vulnerability causes VCenter credentials to be exposed in the ClusterProvision object after provisioning a VSphere cluster. Users with read access to ClusterProvision objects can extract sensitive credentials even if they do not have direct access to Kubernetes Secrets. This issue can lead to unauthorized VCenter access, cluster management, and privilege escalation.
Hive is an operator which runs as a service for provisioning and perform initial configuration of OpenShift clusters. During this process users are creating instances of hive CRDs and other k8s objects, including a Secret containing credentials where Hive take these inputs and invokes openshift-install to create the spoke cluster. During this process it generations additional objects. One of these objects is an instance of a hive CRD called ClusterProvision. The ClusterProvision object contains unintentionally sensitive information, which may be accessed by unauthorized actors.
2025-03-11T12:43:34.302000+00:00
2025-03-17T15:52:50.098000+00:00
[]
[ "multicluster_engine_for_kubernetes:multicluster-engine/multicloud-manager-rhel8", "red_hat_advanced_cluster_management_for_kubernetes_2:rhacm2/cluster-backup-rhel9-operator" ]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "workaround", "none_available" ]
[ "A few mechanisms are available to reduce the risks and mitigate this vulnerability:\n\n1. Restrict Access to ClusterProvision Objects\n\nEnsure that only trusted users with valid VCenter credentials have read access to ClusterProvision objects.\nThis can be verified using the following commands:\n\noc adm policy who-can get clusterprovision\noc adm policy who-can read clusterprovision\n\n2. Rotate VCenter Credentials\n\nImmediately rotate VCenter credentials to revoke access for any users who may have already accessed the exposed credentials.\n\n3. Audit VCenter Users and Roles\n\nConduct a security audit of VCenter accounts and roles to detect any unauthorized access or configuration changes.\n\nIf any suspicious activity is found, revoke access by rotating credentials again (step 2) and taking necessary remediation actions.", "Affected" ]
[ null, null ]
CVE-2025-21782
CWE-125
kernel
orangefs: fix a oob in orangefs_debug_write
Moderate
null
7.2/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: orangefs: fix a oob in orangefs_debug_write I got a syzbot report: slab-out-of-bounds Read in orangefs_debug_write... several people suggested fixes, I tested Al Viro's suggestion and made this patch.
null
2025-02-27T00:00:00+00:00
2025-02-27T00:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[]
[]
[]
CVE-2025-2754
CWE-122
assimp
Open Asset Import Library Assimp AC3D File ACLoader.cpp ConvertObjectSection heap-based overflow
Moderate
null
6.2/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
A flaw was found in the Open Asset Import Library Assimp. The Assimp::AC3DImporter::ConvertObjectSection function of the code/AssetLib/AC/ACLoader.cpp file in the AC3D File Handler component is affected. This attack can be launched remotely, and manipulation of the argument can lead to a heap-based buffer overflow.
null
2025-03-25T09:00:43.228171+00:00
2025-03-25T08:31:07.954000+00:00
[]
[ "red_hat_enterprise_linux_9:qt5-qt3d" ]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "workaround", "none_available" ]
[ "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "Fix deferred" ]
[ null, null ]
CVE-2025-1178
CWE-119
binutils
GNU Binutils ld libbfd.c bfd_putl64 memory corruption
Moderate
null
5.6/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
A flaw was found in GNU Binutils. This vulnerability allows memory corruption via manipulation of the bfd_putl64 function.
null
2025-02-11T07:00:42.655905+00:00
2025-02-11T06:31:12.580000+00:00
[]
[ "red_hat_enterprise_linux_9:mingw-binutils" ]
[ "red_hat_enterprise_linux_6:binutils", "red_hat_enterprise_linux_7:binutils", "red_hat_enterprise_linux_7:gdb", "red_hat_enterprise_linux_8:binutils", "red_hat_enterprise_linux_8:gcc-toolset-13-binutils", "red_hat_enterprise_linux_8:gcc-toolset-13-gdb", "red_hat_enterprise_linux_8:gcc-toolset-14-binutils", "red_hat_enterprise_linux_8:gcc-toolset-14-gdb", "red_hat_enterprise_linux_8:gdb", "red_hat_enterprise_linux_8:mingw-binutils", "red_hat_enterprise_linux_9:binutils", "red_hat_enterprise_linux_9:gcc-toolset-13-binutils", "red_hat_enterprise_linux_9:gcc-toolset-13-gdb", "red_hat_enterprise_linux_9:gcc-toolset-14-binutils", "red_hat_enterprise_linux_9:gdb" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "workaround", "none_available" ]
[ "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "Fix deferred" ]
[ null, null ]
CVE-2025-32907
CWE-1050
libsoup
Denial of service in server when client requests a large amount of overlapping ranges with Range header
Important
null
7.5/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
A flaw was found in libsoup. The implementation of HTTP range requests is vulnerable to a resource consumption attack. This flaw allows a malicious client to request the same range many times in a single HTTP request, causing the server to use large amounts of memory.
null
2025-04-14T01:27:08.699000+00:00
2025-04-14T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_6:libsoup", "red_hat_enterprise_linux_7:libsoup", "red_hat_enterprise_linux_8:libsoup", "red_hat_enterprise_linux_9:libsoup" ]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "workaround", "no_fix_planned", "none_available" ]
[ "Currently, no mitigation was found for this vulnerability.", "Out of support scope", "Affected" ]
[ null, null, null ]
CVE-2025-22004
null
kernel
net: atm: fix use after free in lec_send()
Low
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: net: atm: fix use after free in lec_send() The ->send() operation frees skb so save the length before calling ->send() to avoid a use after free.
null
2025-04-03T00:00:00+00:00
2025-04-03T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "no_fix_planned", "none_available" ]
[ "Out of support scope", "Fix deferred" ]
[ null, null ]
CVE-2025-21805
null
kernel
RDMA/rtrs: Add missing deinit() call
Low
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: RDMA/rtrs: Add missing deinit() call A warning is triggered when repeatedly connecting and disconnecting the rnbd: list_add corruption. prev->next should be next (ffff88800b13e480), but was ffff88801ecd1338. (prev=ffff88801ecd1340). WARNING: CPU: 1 PID: 36562 at lib/list_debug.c:32 __list_add_valid_or_report+0x7f/0xa0 Workqueue: ib_cm cm_work_handler [ib_cm] RIP: 0010:__list_add_valid_or_report+0x7f/0xa0 ? __list_add_valid_or_report+0x7f/0xa0 ib_register_event_handler+0x65/0x93 [ib_core] rtrs_srv_ib_dev_init+0x29/0x30 [rtrs_server] rtrs_ib_dev_find_or_add+0x124/0x1d0 [rtrs_core] __alloc_path+0x46c/0x680 [rtrs_server] ? rtrs_rdma_connect+0xa6/0x2d0 [rtrs_server] ? rcu_is_watching+0xd/0x40 ? __mutex_lock+0x312/0xcf0 ? get_or_create_srv+0xad/0x310 [rtrs_server] ? rtrs_rdma_connect+0xa6/0x2d0 [rtrs_server] rtrs_rdma_connect+0x23c/0x2d0 [rtrs_server] ? __lock_release+0x1b1/0x2d0 cma_cm_event_handler+0x4a/0x1a0 [rdma_cm] cma_ib_req_handler+0x3a0/0x7e0 [rdma_cm] cm_process_work+0x28/0x1a0 [ib_cm] ? _raw_spin_unlock_irq+0x2f/0x50 cm_req_handler+0x618/0xa60 [ib_cm] cm_work_handler+0x71/0x520 [ib_cm] Commit 667db86bcbe8 ("RDMA/rtrs: Register ib event handler") introduced a new element .deinit but never used it at all. Fix it by invoking the `deinit()` to appropriately unregister the IB event handler.
null
2025-02-27T00:00:00+00:00
2025-02-27T00:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[]
[]
[]
CVE-2025-32395
CWE-200
vite
Vite has an `server.fs.deny` bypass with an invalid `request-target`
Moderate
null
6.4/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
A flaw was found in Vite. This vulnerability allows arbitrary file access via specially crafted HTTP requests containing a # character in the request URL. The issue occurs when the server is run on Node.js or Bun and exposed to the network. Improper handling of invalid request lines allows these requests to bypass security checks that restrict file access.
null
2025-04-10T14:01:21.290484+00:00
2025-04-10T13:25:19.177000+00:00
[]
[ "red_hat_ansible_automation_platform_2:automation-controller", "red_hat_ansible_automation_platform_2:automation-eda-controller", "red_hat_ansible_automation_platform_2:automation-gateway", "red_hat_jboss_enterprise_application_platform_8:org.keycloak-keycloak-parent", "red_hat_jboss_enterprise_application_platform_expansion_pack:org.keycloak-keycloak-parent", "red_hat_openshift_distributed_tracing_3:rhosdt/tempo-gateway-opa-rhel8", "red_hat_openshift_distributed_tracing_3:rhosdt/tempo-gateway-rhel8", "red_hat_openshift_distributed_tracing_3:rhosdt/tempo-jaeger-query-rhel8", "red_hat_openshift_distributed_tracing_3:rhosdt/tempo-query-rhel8", "red_hat_openshift_distributed_tracing_3:rhosdt/tempo-rhel8", "red_hat_openshift_distributed_tracing_3:rhosdt/tempo-rhel8-operator" ]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "workaround", "none_available" ]
[ "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "Fix deferred" ]
[ null, null ]
CVE-2025-21940
CWE-476
kernel
drm/amdkfd: Fix NULL Pointer Dereference in KFD queue
Moderate
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Fix NULL Pointer Dereference in KFD queue Through KFD IOCTL Fuzzing we encountered a NULL pointer derefrence when calling kfd_queue_acquire_buffers. (cherry picked from commit 049e5bf3c8406f87c3d8e1958e0a16804fa1d530)
null
2025-04-01T00:00:00+00:00
2025-04-01T00:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[]
[]
[]
CVE-2025-1713
CWE-833
xen
Deadlock Potential with VT-d and Legacy PCI Device Pass-Through
Moderate
null
6.3/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
A flaw was found in Xen's handling of interrupt remapping for legacy PCI(-X) devices when using Intel's VT-d. Specifically, acquiring a lock during the setup process in an unsafe context can lead to a deadlock. This issue can be triggered by passing through certain devices to unprivileged guests, potentially resulting in a denial of service affecting the entire host.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
2025-02-27T00:00:00+00:00
2025-02-27T15:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[]
[]
[]
CVE-2025-21690
CWE-400
kernel
scsi: storvsc: Ratelimit warning logs to prevent VM denial of service
Low
null
5.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: scsi: storvsc: Ratelimit warning logs to prevent VM denial of service If there's a persistent error in the hypervisor, the SCSI warning for failed I/O can flood the kernel log and max out CPU utilization, preventing troubleshooting from the VM side. Ratelimit the warning so it doesn't DoS the VM.
null
2025-02-10T00:00:00+00:00
2025-02-10T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "no_fix_planned", "none_available" ]
[ "Out of support scope", "Fix deferred" ]
[ null, null ]
CVE-2025-3407
CWE-125
stb
Nothings stb out-of-bounds read
Moderate
null
6.2/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
A flaw was found in stb. This vulnerability allows an out-of-bounds read via manipulation of the h_count or v_count arguments.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
2025-04-08T05:01:34.649185+00:00
2025-04-08T04:00:11.732000+00:00
[]
[]
[ "red_hat_products" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "workaround" ]
[ "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability." ]
[ null ]
CVE-2025-22116
null
kernel
idpf: check error for register_netdev() on init
Low
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: idpf: check error for register_netdev() on init Current init logic ignores the error code from register_netdev(), which will cause WARN_ON() on attempt to unregister it, if there was one, and there is no info for the user that the creation of the netdev failed. WARNING: CPU: 89 PID: 6902 at net/core/dev.c:11512 unregister_netdevice_many_notify+0x211/0x1a10 ... [ 3707.563641] unregister_netdev+0x1c/0x30 [ 3707.563656] idpf_vport_dealloc+0x5cf/0xce0 [idpf] [ 3707.563684] idpf_deinit_task+0xef/0x160 [idpf] [ 3707.563712] idpf_vc_core_deinit+0x84/0x320 [idpf] [ 3707.563739] idpf_remove+0xbf/0x780 [idpf] [ 3707.563769] pci_device_remove+0xab/0x1e0 [ 3707.563786] device_release_driver_internal+0x371/0x530 [ 3707.563803] driver_detach+0xbf/0x180 [ 3707.563816] bus_remove_driver+0x11b/0x2a0 [ 3707.563829] pci_unregister_driver+0x2a/0x250 Introduce an error check and log the vport number and error code. On removal make sure to check VPORT_REG_NETDEV flag prior to calling unregister and free on the netdev. Add local variables for idx, vport_config and netdev for readability.
null
2025-04-16T00:00:00+00:00
2025-04-16T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt" ]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "no_fix_planned", "none_available" ]
[ "Out of support scope", "Fix deferred" ]
[ null, null ]
CVE-2025-22053
CWE-413
kernel
net: ibmveth: make veth_pool_store stop hanging
Moderate
null
5.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: net: ibmveth: make veth_pool_store stop hanging v2: - Created a single error handling unlock and exit in veth_pool_store - Greatly expanded commit message with previous explanatory-only text Summary: Use rtnl_mutex to synchronize veth_pool_store with itself, ibmveth_close and ibmveth_open, preventing multiple calls in a row to napi_disable. Background: Two (or more) threads could call veth_pool_store through writing to /sys/devices/vio/30000002/pool*/*. You can do this easily with a little shell script. This causes a hang. I configured LOCKDEP, compiled ibmveth.c with DEBUG, and built a new kernel. I ran this test again and saw: Setting pool0/active to 0 Setting pool1/active to 1 [ 73.911067][ T4365] ibmveth 30000002 eth0: close starting Setting pool1/active to 1 Setting pool1/active to 0 [ 73.911367][ T4366] ibmveth 30000002 eth0: close starting [ 73.916056][ T4365] ibmveth 30000002 eth0: close complete [ 73.916064][ T4365] ibmveth 30000002 eth0: open starting [ 110.808564][ T712] systemd-journald[712]: Sent WATCHDOG=1 notification. [ 230.808495][ T712] systemd-journald[712]: Sent WATCHDOG=1 notification. [ 243.683786][ T123] INFO: task stress.sh:4365 blocked for more than 122 seconds. [ 243.683827][ T123] Not tainted 6.14.0-01103-g2df0c02dab82-dirty #8 [ 243.683833][ T123] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 243.683838][ T123] task:stress.sh state:D stack:28096 pid:4365 tgid:4365 ppid:4364 task_flags:0x400040 flags:0x00042000 [ 243.683852][ T123] Call Trace: [ 243.683857][ T123] [c00000000c38f690] [0000000000000001] 0x1 (unreliable) [ 243.683868][ T123] [c00000000c38f840] [c00000000001f908] __switch_to+0x318/0x4e0 [ 243.683878][ T123] [c00000000c38f8a0] [c000000001549a70] __schedule+0x500/0x12a0 [ 243.683888][ T123] [c00000000c38f9a0] [c00000000154a878] schedule+0x68/0x210 [ 243.683896][ T123] [c00000000c38f9d0] [c00000000154ac80] schedule_preempt_disabled+0x30/0x50 [ 243.683904][ T123] [c00000000c38fa00] [c00000000154dbb0] __mutex_lock+0x730/0x10f0 [ 243.683913][ T123] [c00000000c38fb10] [c000000001154d40] napi_enable+0x30/0x60 [ 243.683921][ T123] [c00000000c38fb40] [c000000000f4ae94] ibmveth_open+0x68/0x5dc [ 243.683928][ T123] [c00000000c38fbe0] [c000000000f4aa20] veth_pool_store+0x220/0x270 [ 243.683936][ T123] [c00000000c38fc70] [c000000000826278] sysfs_kf_write+0x68/0xb0 [ 243.683944][ T123] [c00000000c38fcb0] [c0000000008240b8] kernfs_fop_write_iter+0x198/0x2d0 [ 243.683951][ T123] [c00000000c38fd00] [c00000000071b9ac] vfs_write+0x34c/0x650 [ 243.683958][ T123] [c00000000c38fdc0] [c00000000071bea8] ksys_write+0x88/0x150 [ 243.683966][ T123] [c00000000c38fe10] [c0000000000317f4] system_call_exception+0x124/0x340 [ 243.683973][ T123] [c00000000c38fe50] [c00000000000d05c] system_call_vectored_common+0x15c/0x2ec ... [ 243.684087][ T123] Showing all locks held in the system: [ 243.684095][ T123] 1 lock held by khungtaskd/123: [ 243.684099][ T123] #0: c00000000278e370 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x50/0x248 [ 243.684114][ T123] 4 locks held by stress.sh/4365: [ 243.684119][ T123] #0: c00000003a4cd3f8 (sb_writers#3){.+.+}-{0:0}, at: ksys_write+0x88/0x150 [ 243.684132][ T123] #1: c000000041aea888 (&of->mutex#2){+.+.}-{3:3}, at: kernfs_fop_write_iter+0x154/0x2d0 [ 243.684143][ T123] #2: c0000000366fb9a8 (kn->active#64){.+.+}-{0:0}, at: kernfs_fop_write_iter+0x160/0x2d0 [ 243.684155][ T123] #3: c000000035ff4cb8 (&dev->lock){+.+.}-{3:3}, at: napi_enable+0x30/0x60 [ 243.684166][ T123] 5 locks held by stress.sh/4366: [ 243.684170][ T123] #0: c00000003a4cd3f8 (sb_writers#3){.+.+}-{0:0}, at: ksys_write+0x88/0x150 [ 243. ---truncated---
null
2025-04-16T00:00:00+00:00
2025-04-16T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[ "red_hat_enterprise_linux_6:kernel" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "no_fix_planned", "none_available" ]
[ "Out of support scope", "Fix deferred" ]
[ null, null ]
CVE-2025-32053
CWE-126
libsoup
Heap buffer overflows in sniff_feed_or_html() and skip_insignificant_space()
Moderate
null
6.4/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
A flaw was found in libsoup. A vulnerability in sniff_feed_or_html() and skip_insignificant_space() functions may lead to a heap buffer over-read.
null
2025-04-03T01:16:47.321000+00:00
2025-04-03T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_6:libsoup", "red_hat_enterprise_linux_7:libsoup", "red_hat_enterprise_linux_8:libsoup", "red_hat_enterprise_linux_9:libsoup" ]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "workaround", "no_fix_planned", "none_available" ]
[ "No mitigation is currently available for this vulnerability.", "Out of support scope", "Affected" ]
[ null, null, null ]
CVE-2025-2703
CWE-79
grafana
Cross-Site Scripting in Grafana XY Chart Panel
Moderate
null
6.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
A DOM-based Cross-site scripting vulnerability exists in Grafana's built-in XY Chart plugin. This flaw allows an attacker with editor-level privileges to inject and execute arbitrary JavaScript code by editing an XY Chart Panel. The vulnerability bypasses the Content Security Policy, allowing the script to execute when the chart is rendered.
This vulnerability is classified as a Moderate severity due to the ability of authenticated users with Editor permissions to inject arbitrary JavaScript into XY Chart panels. When the panel is rendered, the payload executes in the user's browser context, bypassing existing Content Security Policy (CSP) protections. This allows for potential session hijacking or data exfiltration. While the exploit requires some user privileges and interaction, the security boundary between trusted editors and secure rendering is violated. It is important to note that this issue affects Grafana versions 11.1.0 and later, which are not included in any Red Hat supported builds. Therefore, Red Hat customers are not impacted by this vulnerability.
2025-04-09T08:40:38.451000+00:00
2025-04-23T09:56:18.005000+00:00
[]
[]
[ "red_hat_enterprise_linux_8:grafana", "red_hat_enterprise_linux_9:grafana" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "workaround" ]
[ "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability." ]
[ null ]
CVE-2025-21691
CWE-863
kernel
cachestat: fix page cache statistics permission checking
Moderate
null
7.2/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: cachestat: fix page cache statistics permission checking When the 'cachestat()' system call was added in commit cf264e1329fb ("cachestat: implement cachestat syscall"), it was meant to be a much more convenient (and performant) version of mincore() that didn't need mapping things into the user virtual address space in order to work. But it ended up missing the "check for writability or ownership" fix for mincore(), done in commit 134fca9063ad ("mm/mincore.c: make mincore() more conservative"). This just adds equivalent logic to 'cachestat()', modified for the file context (rather than vma).
null
2025-02-10T00:00:00+00:00
2025-02-10T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[ "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "no_fix_planned", "none_available" ]
[ "Out of support scope", "Affected" ]
[ null, null ]
CVE-2025-3406
CWE-125
stb
Nothings stb Header Array out-of-bounds read
Moderate
null
4.2/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
A vulnerability was found in Nothings stb up to f056911. It has been classified as problematic. Affected is the function stbhw_build_tileset_from_image of the component Header Array Handler. The manipulation of the argument w leads to out-of-bounds read. It is possible to launch the attack remotely. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
2025-04-08T04:00:43.954434+00:00
2025-04-08T03:31:12.145000+00:00
[]
[]
[ "red_hat_products" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "workaround" ]
[ "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability." ]
[ null ]
CVE-2025-22117
null
kernel
ice: fix using untrusted value of pkt_len in ice_vc_fdir_parse_raw()
Moderate
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: ice: fix using untrusted value of pkt_len in ice_vc_fdir_parse_raw() Fix using the untrusted value of proto->raw.pkt_len in function ice_vc_fdir_parse_raw() by verifying if it does not exceed the VIRTCHNL_MAX_SIZE_RAW_PACKET value.
null
2025-04-16T00:00:00+00:00
2025-04-16T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "none_available" ]
[ "Fix deferred" ]
[ null ]
CVE-2025-22052
null
kernel
staging: gpib: Fix Oops after disconnect in ni_usb
Moderate
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: staging: gpib: Fix Oops after disconnect in ni_usb If the usb dongle is disconnected subsequent calls to the driver cause a NULL dereference Oops as the bus_interface is set to NULL on disconnect. This problem was introduced by setting usb_dev from the bus_interface for dev_xxx messages. Previously bus_interface was checked for NULL only in the the functions directly calling usb_fill_bulk_urb or usb_control_msg. Check for valid bus_interface on all interface entry points and return -ENODEV if it is NULL.
null
2025-04-16T00:00:00+00:00
2025-04-16T00:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[]
[]
[]
CVE-2025-32052
CWE-126
libsoup
Heap buffer overflow in sniff_unknown()
Moderate
null
6.4/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
A flaw was found in libsoup. A vulnerability in the sniff_unknown() function may lead to heap buffer over-read.
null
2025-04-03T01:16:47.177000+00:00
2025-04-03T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_6:libsoup", "red_hat_enterprise_linux_7:libsoup", "red_hat_enterprise_linux_8:libsoup", "red_hat_enterprise_linux_9:libsoup" ]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "workaround", "no_fix_planned", "none_available" ]
[ "No mitigation is currently available for this vulnerability.", "Out of support scope", "Affected" ]
[ null, null, null ]
CVE-2025-21804
CWE-121
kernel
PCI: rcar-ep: Fix incorrect variable used when calling devm_request_mem_region()
Low
null
3.4/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
In the Linux kernel, the following vulnerability has been resolved: PCI: rcar-ep: Fix incorrect variable used when calling devm_request_mem_region() The rcar_pcie_parse_outbound_ranges() uses the devm_request_mem_region() macro to request a needed resource. A string variable that lives on the stack is then used to store a dynamically computed resource name, which is then passed on as one of the macro arguments. This can lead to undefined behavior. Depending on the current contents of the memory, the manifestations of errors may vary. One possible output may be as follows: $ cat /proc/iomem 30000000-37ffffff : 38000000-3fffffff : Sometimes, garbage may appear after the colon. In very rare cases, if no NULL-terminator is found in memory, the system might crash because the string iterator will overrun which can lead to access of unmapped memory above the stack. Thus, fix this by replacing outbound_name with the name of the previously requested resource. With the changes applied, the output will be as follows: $ cat /proc/iomem 30000000-37ffffff : memory2 38000000-3fffffff : memory3 [kwilczynski: commit log]
null
2025-02-27T00:00:00+00:00
2025-02-27T00:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[]
[]
[]
CVE-2025-2581
CWE-191
xmedcon
xmedcon DICOM File malloc integer underflow
Moderate
null
4.2/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
A flaw was found in XMedCon. This vulnerability allows an attacker to trigger an integer underflow via manipulating the malloc function, potentially leading to memory corruption or denial of service. The attack can be launched remotely.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
2025-03-21T06:00:53.508446+00:00
2025-03-21T05:00:22.250000+00:00
[]
[]
[ "red_hat_products" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "workaround" ]
[ "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability." ]
[ null ]
CVE-2025-30346
CWE-444
varnish
Client-Side Desynchronization in Varnish Cache
Moderate
null
5.3/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
A flaw was found in Varnish Cache and Varnish Enterprise. This vulnerability allows client-side desynchronization via crafted HTTP/1 requests.
null
2025-03-21T07:00:55.725966+00:00
2025-03-21T00:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_8:varnish:6/varnish", "red_hat_enterprise_linux_9:varnish" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "workaround" ]
[ "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability." ]
[ null ]
CVE-2025-21941
CWE-476
kernel
drm/amd/display: Fix null check for pipe_ctx->plane_state in resource_build_scaling_params
Moderate
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix null check for pipe_ctx->plane_state in resource_build_scaling_params Null pointer dereference issue could occur when pipe_ctx->plane_state is null. The fix adds a check to ensure 'pipe_ctx->plane_state' is not null before accessing. This prevents a null pointer dereference. Found by code review. (cherry picked from commit 63e6a77ccf239337baa9b1e7787cde9fa0462092)
null
2025-04-01T00:00:00+00:00
2025-04-01T00:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[]
[]
[]
CVE-2025-2240
CWE-1325
smallrye-fault-tolerance
SmallRye Fault Tolerance
Important
null
7.5/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
A flaw was found in Smallrye, where smallrye-fault-tolerance is vulnerable to an out-of-memory (OOM) issue. This vulnerability is externally triggered when calling the metrics URI. Every call creates a new object within meterMap and may lead to a denial of service (DoS) issue.
This vulnerability allows a remote attacker to cause an out-of-memory issue when calling the metrics URI, resulting in a denial of service. As this flaw can be triggered via the network, it has been rated with an important severity.
2025-03-12T02:23:44.660000+00:00
2025-03-12T00:00:00+00:00
[ "Red Hat Build of Apache Camel 4.8 for Quarkus 3.15", "Red Hat build of Apache Camel 4.8.5 for Spring Boot", "Red Hat build of Quarkus 3.15.4" ]
[ "red_hat_build_of_apicurio_registry_2:io.smallrye/smallrye-fault-tolerance-core", "red_hat_build_of_apicurio_registry_3:io.smallrye/smallrye-fault-tolerance-core", "red_hat_fuse_7:io.smallrye/smallrye-fault-tolerance-core", "red_hat_integration_camel_k_1:io.smallrye/smallrye-fault-tolerance-core" ]
[ "red_hat_build_of_quarkus:io.smallrye/smallrye-fault-tolerance-apiimpl", "red_hat_jboss_enterprise_application_platform_7:io.smallrye/smallrye-fault-tolerance-core", "red_hat_jboss_enterprise_application_platform_8:io.smallrye/smallrye-fault-tolerance-core", "red_hat_jboss_enterprise_application_platform_expansion_pack:io.smallrye/smallrye-fault-tolerance-core" ]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix", "vendor_fix", "workaround", "no_fix_planned", "no_fix_planned", "none_available" ]
[ "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\nThe References section of this erratum contains a download link (you must log in to download the update).", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "Out of support scope", "Will not fix", "Affected" ]
[ "2025-04-02T16:48:42+00:00", "2025-04-02T20:19:22+00:00", "2025-04-02T13:06:42+00:00", null, null, null, null ]
CVE-2025-21783
CWE-476
kernel
gpiolib: Fix crash on error in gpiochip_get_ngpios()
Low
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: gpiolib: Fix crash on error in gpiochip_get_ngpios() The gpiochip_get_ngpios() uses chip_*() macros to print messages. However these macros rely on gpiodev to be initialised and set, which is not the case when called via bgpio_init(). In such a case the printing messages will crash on NULL pointer dereference. Replace chip_*() macros by the respective dev_*() ones to avoid such crash.
null
2025-02-27T00:00:00+00:00
2025-02-27T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[ "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt" ]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "no_fix_planned", "none_available" ]
[ "Out of support scope", "Fix deferred" ]
[ null, null ]
CVE-2025-21629
null
kernel
net: reenable NETIF_F_IPV6_CSUM offload for BIG TCP packets
Moderate
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: net: reenable NETIF_F_IPV6_CSUM offload for BIG TCP packets The blamed commit disabled hardware offoad of IPv6 packets with extension headers on devices that advertise NETIF_F_IPV6_CSUM, based on the definition of that feature in skbuff.h: * * - %NETIF_F_IPV6_CSUM * - Driver (device) is only able to checksum plain * TCP or UDP packets over IPv6. These are specifically * unencapsulated packets of the form IPv6|TCP or * IPv6|UDP where the Next Header field in the IPv6 * header is either TCP or UDP. IPv6 extension headers * are not supported with this feature. This feature * cannot be set in features for a device with * NETIF_F_HW_CSUM also set. This feature is being * DEPRECATED (see below). The change causes skb_warn_bad_offload to fire for BIG TCP packets. [ 496.310233] WARNING: CPU: 13 PID: 23472 at net/core/dev.c:3129 skb_warn_bad_offload+0xc4/0xe0 [ 496.310297] ? skb_warn_bad_offload+0xc4/0xe0 [ 496.310300] skb_checksum_help+0x129/0x1f0 [ 496.310303] skb_csum_hwoffload_help+0x150/0x1b0 [ 496.310306] validate_xmit_skb+0x159/0x270 [ 496.310309] validate_xmit_skb_list+0x41/0x70 [ 496.310312] sch_direct_xmit+0x5c/0x250 [ 496.310317] __qdisc_run+0x388/0x620 BIG TCP introduced an IPV6_TLV_JUMBO IPv6 extension header to communicate packet length, as this is an IPv6 jumbogram. But, the feature is only enabled on devices that support BIG TCP TSO. The header is only present for PF_PACKET taps like tcpdump, and not transmitted by physical devices. For this specific case of extension headers that are not transmitted, return to the situation before the blamed commit and support hardware offload. ipv6_has_hopopt_jumbo() tests not only whether this header is present, but also that it is the only extension header before a terminal (L4) header.
null
2025-01-15T00:00:00+00:00
2025-01-15T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt" ]
[ "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "no_fix_planned" ]
[ "Out of support scope" ]
[ null ]
CVE-2025-1179
CWE-119
binutils
GNU Binutils ld libbfd.c bfd_putl64 memory corruption
Moderate
null
5.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
A flaw was found in GNU Binutils. This vulnerability allows memory corruption via manipulation of the bfd_putl64 function.
null
2025-02-11T08:00:45.291258+00:00
2025-02-11T07:00:10.602000+00:00
[]
[ "red_hat_enterprise_linux_9:mingw-binutils" ]
[ "red_hat_enterprise_linux_6:binutils", "red_hat_enterprise_linux_7:binutils", "red_hat_enterprise_linux_7:gdb", "red_hat_enterprise_linux_8:binutils", "red_hat_enterprise_linux_8:gcc-toolset-13-binutils", "red_hat_enterprise_linux_8:gcc-toolset-13-gdb", "red_hat_enterprise_linux_8:gcc-toolset-14-binutils", "red_hat_enterprise_linux_8:gcc-toolset-14-gdb", "red_hat_enterprise_linux_8:gdb", "red_hat_enterprise_linux_8:mingw-binutils", "red_hat_enterprise_linux_9:binutils", "red_hat_enterprise_linux_9:gcc-toolset-13-binutils", "red_hat_enterprise_linux_9:gcc-toolset-13-gdb", "red_hat_enterprise_linux_9:gcc-toolset-14-binutils", "red_hat_enterprise_linux_9:gdb" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "workaround", "none_available" ]
[ "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "Fix deferred" ]
[ null, null ]
CVE-2025-32906
CWE-125
libsoup
Out of bounds reads in soup_headers_parse_request()
Important
null
7.5/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
A flaw was found in libsoup, where the soup_headers_parse_request() function may be vulnerable to an out-of-bound read. This flaw allows a malicious user to use a specially crafted HTTP request to crash the HTTP server.
null
2025-04-14T01:27:05.130000+00:00
2025-04-14T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_6:libsoup", "red_hat_enterprise_linux_7:libsoup", "red_hat_enterprise_linux_8:libsoup", "red_hat_enterprise_linux_9:libsoup" ]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "workaround", "no_fix_planned", "none_available" ]
[ "Currently, no mitigation was found for this vulnerability.", "Out of support scope", "Affected" ]
[ null, null, null ]
CVE-2025-22005
CWE-401
kernel
ipv6: Fix memleak of nhc_pcpu_rth_output in fib_check_nh_v6_gw().
Moderate
null
6.2/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix memleak of nhc_pcpu_rth_output in fib_check_nh_v6_gw(). fib_check_nh_v6_gw() expects that fib6_nh_init() cleans up everything when it fails. Commit 7dd73168e273 ("ipv6: Always allocate pcpu memory in a fib6_nh") moved fib_nh_common_init() before alloc_percpu_gfp() within fib6_nh_init() but forgot to add cleanup for fib6_nh->nh_common.nhc_pcpu_rth_output in case it fails to allocate fib6_nh->rt6i_pcpu, resulting in memleak. Let's call fib_nh_common_release() and clear nhc_pcpu_rth_output in the error path. Note that we can remove the fib6_nh_release() call in nh_create_ipv6() later in net-next.git.
null
2025-04-03T00:00:00+00:00
2025-04-03T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[ "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "no_fix_planned", "none_available" ]
[ "Out of support scope", "Fix deferred" ]
[ null, null ]
CVE-2025-21500
null
mysql
Optimizer unspecified vulnerability (CPU Jan 2025)
Moderate
null
6.7/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
null
2025-01-21T21:06:54.583473+00:00
2025-01-21T20:52:55.678000+00:00
[ "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src", "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src", "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64" ]
[]
[ "red_hat_enterprise_linux_6:mysql" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258" ]
[ "2025-02-19T11:10:11+00:00", "2025-02-19T10:31:41+00:00" ]
CVE-2025-0441
null
chromium-browser
Inappropriate implementation in Fenced Frames
Moderate
null
6.4/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Inappropriate implementation in Fenced Frames in Google Chrome prior to 132.0.6834.83 allowed a remote attacker to obtain potentially sensitive information from the system via a crafted HTML page. (Chromium security severity: Medium)
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
2025-01-15T12:01:51.513975+00:00
2025-01-15T10:58:53.709000+00:00
[]
[]
[ "red_hat_products" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[]
[]
[]
CVE-2025-26695
CWE-203
thunderbird
Downloading of OpenPGP keys from WKD used incorrect padding
Low
null
4.2/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
A flaw was found in Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: When requesting an OpenPGP key from a WKD server, an incorrect padding size was used, and a network observer could have learned the length of the requested email address.
Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.
2025-03-10T19:00:49.099739+00:00
2025-03-10T18:41:25.460000+00:00
[]
[ "red_hat_enterprise_linux_6:thunderbird", "red_hat_enterprise_linux_7:thunderbird", "red_hat_enterprise_linux_8:thunderbird", "red_hat_enterprise_linux_9:thunderbird", "red_hat_enterprise_linux_9:thunderbird-flatpak-container" ]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "no_fix_planned", "none_available" ]
[ "Out of support scope", "Affected" ]
[ null, null ]
CVE-2025-21853
CWE-833
kernel
bpf: avoid holding freeze_mutex during mmap operation
Moderate
null
5.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: bpf: avoid holding freeze_mutex during mmap operation We use map->freeze_mutex to prevent races between map_freeze() and memory mapping BPF map contents with writable permissions. The way we naively do this means we'll hold freeze_mutex for entire duration of all the mm and VMA manipulations, which is completely unnecessary. This can potentially also lead to deadlocks, as reported by syzbot in [0]. So, instead, hold freeze_mutex only during writeability checks, bump (proactively) "write active" count for the map, unlock the mutex and proceed with mmap logic. And only if something went wrong during mmap logic, then undo that "write active" counter increment. [0] https://lore.kernel.org/bpf/[email protected]/
null
2025-03-12T00:00:00+00:00
2025-03-12T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[ "red_hat_enterprise_linux_6:kernel" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "no_fix_planned", "none_available" ]
[ "Out of support scope", "Affected" ]
[ null, null ]
CVE-2025-27591
CWE-732
below
Privilege Escalation in Below via World-Writable Directory
Important
null
7.9/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
A flaw was found in the Below service. This vulnerability allows local, unprivileged users to escalate to root privileges via symlink attacks exploiting a world-writable directory at /var/log/below.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
2025-03-12T09:03:48.814133+00:00
2025-03-11T18:29:21.569000+00:00
[]
[]
[ "red_hat_products" ]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "workaround" ]
[ "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability." ]
[ null ]
CVE-2025-21916
null
kernel
usb: atm: cxacru: fix a flaw in existing endpoint checks
Low
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: usb: atm: cxacru: fix a flaw in existing endpoint checks Syzbot once again identified a flaw in usb endpoint checking, see [1]. This time the issue stems from a commit authored by me (2eabb655a968 ("usb: atm: cxacru: fix endpoint checking in cxacru_bind()")). While using usb_find_common_endpoints() may usually be enough to discard devices with wrong endpoints, in this case one needs more than just finding and identifying the sufficient number of endpoints of correct types - one needs to check the endpoint's address as well. Since cxacru_bind() fills URBs with CXACRU_EP_CMD address in mind, switch the endpoint verification approach to usb_check_XXX_endpoints() instead to fix incomplete ep testing. [1] Syzbot report: usb 5-1: BOGUS urb xfer, pipe 3 != type 1 WARNING: CPU: 0 PID: 1378 at drivers/usb/core/urb.c:504 usb_submit_urb+0xc4e/0x18c0 drivers/usb/core/urb.c:503 ... RIP: 0010:usb_submit_urb+0xc4e/0x18c0 drivers/usb/core/urb.c:503 ... Call Trace: <TASK> cxacru_cm+0x3c8/0xe50 drivers/usb/atm/cxacru.c:649 cxacru_card_status drivers/usb/atm/cxacru.c:760 [inline] cxacru_bind+0xcf9/0x1150 drivers/usb/atm/cxacru.c:1223 usbatm_usb_probe+0x314/0x1d30 drivers/usb/atm/usbatm.c:1058 cxacru_usb_probe+0x184/0x220 drivers/usb/atm/cxacru.c:1377 usb_probe_interface+0x641/0xbb0 drivers/usb/core/driver.c:396 really_probe+0x2b9/0xad0 drivers/base/dd.c:658 __driver_probe_device+0x1a2/0x390 drivers/base/dd.c:800 driver_probe_device+0x50/0x430 drivers/base/dd.c:830 ...
null
2025-04-01T00:00:00+00:00
2025-04-01T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "no_fix_planned", "none_available" ]
[ "Out of support scope", "Fix deferred" ]
[ null, null ]
CVE-2025-1180
CWE-119
binutils
GNU Binutils ld elf-eh-frame.c _bfd_elf_write_section_eh_frame memory corruption
Low
null
3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
A flaw was found in GNU Binutils. This vulnerability allows memory corruption via manipulation of the _bfd_elf_write_section_eh_frame function.
null
2025-02-11T08:00:50.378614+00:00
2025-02-11T07:31:06.853000+00:00
[]
[ "red_hat_enterprise_linux_9:mingw-binutils" ]
[ "red_hat_enterprise_linux_6:binutils", "red_hat_enterprise_linux_7:binutils", "red_hat_enterprise_linux_7:gdb", "red_hat_enterprise_linux_8:binutils", "red_hat_enterprise_linux_8:gcc-toolset-13-binutils", "red_hat_enterprise_linux_8:gcc-toolset-13-gdb", "red_hat_enterprise_linux_8:gcc-toolset-14-binutils", "red_hat_enterprise_linux_8:gcc-toolset-14-gdb", "red_hat_enterprise_linux_8:gdb", "red_hat_enterprise_linux_8:mingw-binutils", "red_hat_enterprise_linux_9:binutils", "red_hat_enterprise_linux_9:gcc-toolset-13-binutils", "red_hat_enterprise_linux_9:gcc-toolset-13-gdb", "red_hat_enterprise_linux_9:gcc-toolset-14-binutils", "red_hat_enterprise_linux_9:gdb" ]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "workaround", "none_available" ]
[ "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "Fix deferred" ]
[ null, null ]
CVE-2025-22013
CWE-99
kernel
KVM: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state
Moderate
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state There are several problems with the way hyp code lazily saves the host's FPSIMD/SVE state, including: * Host SVE being discarded unexpectedly due to inconsistent configuration of TIF_SVE and CPACR_ELx.ZEN. This has been seen to result in QEMU crashes where SVE is used by memmove(), as reported by Eric Auger: https://issues.redhat.com/browse/RHEL-68997 * Host SVE state is discarded *after* modification by ptrace, which was an unintentional ptrace ABI change introduced with lazy discarding of SVE state. * The host FPMR value can be discarded when running a non-protected VM, where FPMR support is not exposed to a VM, and that VM uses FPSIMD/SVE. In these cases the hyp code does not save the host's FPMR before unbinding the host's FPSIMD/SVE/SME state, leaving a stale value in memory. Avoid these by eagerly saving and "flushing" the host's FPSIMD/SVE/SME state when loading a vCPU such that KVM does not need to save any of the host's FPSIMD/SVE/SME state. For clarity, fpsimd_kvm_prepare() is removed and the necessary call to fpsimd_save_and_flush_cpu_state() is placed in kvm_arch_vcpu_load_fp(). As 'fpsimd_state' and 'fpmr_ptr' should not be used, they are set to NULL; all uses of these will be removed in subsequent patches. Historical problems go back at least as far as v5.17, e.g. erroneous assumptions about TIF_SVE being clear in commit: 8383741ab2e773a9 ("KVM: arm64: Get rid of host SVE tracking/saving") ... and so this eager save+flush probably needs to be backported to ALL stable trees.
null
2025-04-08T00:00:00+00:00
2025-04-08T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "none_available" ]
[ "Fix deferred" ]
[ null ]
CVE-2025-32910
CWE-476
libsoup
Null pointer deference on libsoup via /auth/soup-auth-digest.c through "soup_auth_digest_authenticate" on client when server omits the "realm" parameter in an Unauthorized response with Digest authentication
Moderate
null
6.4/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
A flaw was found in libsoup, where soup_auth_digest_authenticate() is vulnerable to a NULL pointer dereference. This issue may cause the libsoup client to crash.
This vulnerability is currently considered Moderate as this may only affect the client HTTP side.
2025-04-14T01:21:00.292000+00:00
2025-04-14T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_6:libsoup", "red_hat_enterprise_linux_7:libsoup", "red_hat_enterprise_linux_8:libsoup", "red_hat_enterprise_linux_9:libsoup" ]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "workaround", "no_fix_planned", "none_available" ]
[ "Currently, no mitigation is available for this vulnerability.", "Out of support scope", "Affected" ]
[ null, null, null ]
CVE-2025-21795
null
kernel
NFSD: fix hang in nfsd4_shutdown_callback
Moderate
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: NFSD: fix hang in nfsd4_shutdown_callback If nfs4_client is in courtesy state then there is no point to send the callback. This causes nfsd4_shutdown_callback to hang since cl_cb_inflight is not 0. This hang lasts about 15 minutes until TCP notifies NFSD that the connection was dropped. This patch modifies nfsd4_run_cb_work to skip the RPC call if nfs4_client is in courtesy state.
null
2025-02-27T00:00:00+00:00
2025-02-27T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[ "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "no_fix_planned", "no_fix_planned", "none_available" ]
[ "Out of support scope", "Will not fix", "Affected" ]
[ null, null, null ]
CVE-2025-21845
CWE-99
kernel
mtd: spi-nor: sst: Fix SST write failure
Moderate
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: mtd: spi-nor: sst: Fix SST write failure 'commit 18bcb4aa54ea ("mtd: spi-nor: sst: Factor out common write operation to `sst_nor_write_data()`")' introduced a bug where only one byte of data is written, regardless of the number of bytes passed to sst_nor_write_data(), causing a kernel crash during the write operation. Ensure the correct number of bytes are written as passed to sst_nor_write_data(). Call trace: [ 57.400180] ------------[ cut here ]------------ [ 57.404842] While writing 2 byte written 1 bytes [ 57.409493] WARNING: CPU: 0 PID: 737 at drivers/mtd/spi-nor/sst.c:187 sst_nor_write_data+0x6c/0x74 [ 57.418464] Modules linked in: [ 57.421517] CPU: 0 UID: 0 PID: 737 Comm: mtd_debug Not tainted 6.12.0-g5ad04afd91f9 #30 [ 57.429517] Hardware name: Xilinx Versal A2197 Processor board revA - x-prc-02 revA (DT) [ 57.437600] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 57.444557] pc : sst_nor_write_data+0x6c/0x74 [ 57.448911] lr : sst_nor_write_data+0x6c/0x74 [ 57.453264] sp : ffff80008232bb40 [ 57.456570] x29: ffff80008232bb40 x28: 0000000000010000 x27: 0000000000000001 [ 57.463708] x26: 000000000000ffff x25: 0000000000000000 x24: 0000000000000000 [ 57.470843] x23: 0000000000010000 x22: ffff80008232bbf0 x21: ffff000816230000 [ 57.477978] x20: ffff0008056c0080 x19: 0000000000000002 x18: 0000000000000006 [ 57.485112] x17: 0000000000000000 x16: 0000000000000000 x15: ffff80008232b580 [ 57.492246] x14: 0000000000000000 x13: ffff8000816d1530 x12: 00000000000004a4 [ 57.499380] x11: 000000000000018c x10: ffff8000816fd530 x9 : ffff8000816d1530 [ 57.506515] x8 : 00000000fffff7ff x7 : ffff8000816fd530 x6 : 0000000000000001 [ 57.513649] x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000 [ 57.520782] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff0008049b0000 [ 57.527916] Call trace: [ 57.530354] sst_nor_write_data+0x6c/0x74 [ 57.534361] sst_nor_write+0xb4/0x18c [ 57.538019] mtd_write_oob_std+0x7c/0x88 [ 57.541941] mtd_write_oob+0x70/0xbc [ 57.545511] mtd_write+0x68/0xa8 [ 57.548733] mtdchar_write+0x10c/0x290 [ 57.552477] vfs_write+0xb4/0x3a8 [ 57.555791] ksys_write+0x74/0x10c [ 57.559189] __arm64_sys_write+0x1c/0x28 [ 57.563109] invoke_syscall+0x54/0x11c [ 57.566856] el0_svc_common.constprop.0+0xc0/0xe0 [ 57.571557] do_el0_svc+0x1c/0x28 [ 57.574868] el0_svc+0x30/0xcc [ 57.577921] el0t_64_sync_handler+0x120/0x12c [ 57.582276] el0t_64_sync+0x190/0x194 [ 57.585933] ---[ end trace 0000000000000000 ]--- [[email protected]: add Cc stable tag]
null
2025-03-12T00:00:00+00:00
2025-03-12T00:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[]
[]
[]
CVE-2025-0904
null
PDF-XChange Editor XPS File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
null
null
null
PDF-XChange Editor XPS File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XPS files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-25422.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
2025-01-30T20:36:25.107000+00:00
2025-01-31T22:08:40.655000+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-24201
CWE-787
webkitgtk
out-of-bounds write vulnerability
Important
null
7.5/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds write due to improper checks to prevent unauthorized actions, causing a break out of Web Content sandbox.
This vulnerability is only a risk for servers which utilize a GUI for system administration. This vulnerability can only be exploited when specific packages are used with a graphical interface to process untrusted web content, via GNOME for example.
2025-03-12T22:35:00.430000+00:00
2025-03-11T00:00:00+00:00
[ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-2.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-2.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-2.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-2.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-2.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-2.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-2.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-2.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-2.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-2.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-2.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-2.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-2.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-2.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-2.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-2.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_10.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.6-2.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.6-2.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.6-2.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.6-2.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.6-2.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.6-2.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.6-2.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_2.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.6-2.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.6-2.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.6-2.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.6-2.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.6-2.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.6-2.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.6-2.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.6-2.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.6-2.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.6-2.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.6-2.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.6-2.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.6-2.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.6-2.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.6-2.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.6-2.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.6-2.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.6-2.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.6-2.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.6-2.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.6-2.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.6-2.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.6-2.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.6-2.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.6-2.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.6-2.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.6-2.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.6-2.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.6-2.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.6-2.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_4.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.6-2.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.6-2.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.6-2.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.6-2.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.6-2.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.6-2.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.6-2.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.6-2.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.6-2.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.6-2.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.6-2.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.6-2.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.6-2.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.6-2.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.6-2.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.6-2.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.6-2.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.6-2.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.6-2.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.6-2.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.6-2.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.6-2.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.6-2.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.6-2.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.6-2.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.6-2.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.6-2.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.6-2.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.6-2.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.6-2.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.6-2.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.6-2.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.6-2.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.6-2.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.6-2.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.6-2.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.6-2.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.6-2.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.6-2.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.6-2.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_6.x86_64", "AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el8_8.aarch64", "AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el8_8.i686", "AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el8_8.ppc64le", "AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el8_8.s390x", "AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el8_8.src", "AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el8_8.x86_64", "AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_8.aarch64", "AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_8.i686", "AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_8.ppc64le", "AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_8.s390x", "AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el8_8.x86_64", "AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_8.aarch64", "AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_8.i686", "AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_8.ppc64le", "AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_8.s390x", "AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el8_8.x86_64", "AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.6-2.el8_8.aarch64", "AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.6-2.el8_8.i686", "AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.6-2.el8_8.ppc64le", "AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.6-2.el8_8.s390x", "AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.6-2.el8_8.x86_64", "AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_8.aarch64", "AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_8.i686", "AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_8.ppc64le", "AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_8.s390x", "AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el8_8.x86_64", "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.6-2.el8_8.aarch64", "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.6-2.el8_8.i686", "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.6-2.el8_8.ppc64le", "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.6-2.el8_8.s390x", "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.6-2.el8_8.x86_64", "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_8.aarch64", "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_8.i686", "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_8.ppc64le", "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_8.s390x", "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el8_8.x86_64", "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_8.aarch64", "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_8.i686", "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_8.ppc64le", "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_8.s390x", "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el8_8.x86_64", "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_8.aarch64", "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_8.i686", "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_8.ppc64le", "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_8.s390x", "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el8_8.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.6-2.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.6-2.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.6-2.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.6-2.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.6-2.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.6-2.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.6-2.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.6-2.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.6-2.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.6-2.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.6-2.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.6-2.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.6-2.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.6-2.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.6-2.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.6-2.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.6-2.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.6-2.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.6-2.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.6-2.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.6-2.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.6-2.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.6-2.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.6-2.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.6-2.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.6-2.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_0.x86_64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el9_2.aarch64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el9_2.i686", "AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el9_2.ppc64le", "AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el9_2.s390x", "AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el9_2.src", "AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el9_2.x86_64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el9_2.aarch64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el9_2.i686", "AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el9_2.ppc64le", "AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el9_2.s390x", "AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el9_2.x86_64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el9_2.aarch64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el9_2.i686", "AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el9_2.ppc64le", "AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el9_2.s390x", "AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el9_2.x86_64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.6-2.el9_2.aarch64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.6-2.el9_2.i686", "AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.6-2.el9_2.ppc64le", "AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.6-2.el9_2.s390x", "AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.6-2.el9_2.x86_64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_2.aarch64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_2.i686", "AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_2.ppc64le", "AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_2.s390x", "AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_2.x86_64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.6-2.el9_2.aarch64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.6-2.el9_2.i686", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.6-2.el9_2.ppc64le", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.6-2.el9_2.s390x", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.6-2.el9_2.x86_64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_2.aarch64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_2.i686", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_2.ppc64le", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_2.s390x", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_2.x86_64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_2.aarch64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_2.i686", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_2.ppc64le", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_2.s390x", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_2.x86_64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_2.aarch64", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_2.i686", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_2.ppc64le", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_2.s390x", "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_2.x86_64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el9_4.i686", "AppStream-9.4.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el9_4.s390x", "AppStream-9.4.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el9_4.src", "AppStream-9.4.0.Z.EUS:webkit2gtk3-0:2.46.6-2.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el9_4.i686", "AppStream-9.4.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el9_4.s390x", "AppStream-9.4.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.6-2.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el9_4.i686", "AppStream-9.4.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el9_4.s390x", "AppStream-9.4.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.6-2.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-0:2.46.6-2.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-0:2.46.6-2.el9_4.i686", "AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-0:2.46.6-2.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-0:2.46.6-2.el9_4.s390x", "AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-0:2.46.6-2.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_4.i686", "AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_4.s390x", "AppStream-9.4.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-0:2.46.6-2.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-0:2.46.6-2.el9_4.i686", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-0:2.46.6-2.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-0:2.46.6-2.el9_4.s390x", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-0:2.46.6-2.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_4.i686", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_4.s390x", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_4.i686", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_4.s390x", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_4.i686", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_4.s390x", "AppStream-9.4.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_4.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-2.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-2.el9_5.src", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-2.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-2.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-2.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-2.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-2.el9_5.x86_64" ]
[ "red_hat_enterprise_linux_6:webkitgtk", "red_hat_enterprise_linux_7:webkitgtk3", "red_hat_enterprise_linux_7:webkitgtk4" ]
[]
[]
[ "exploit_status", "impact" ]
[ "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "Important" ]
[ "2025-03-13T00:00:00+00:00", null ]
[ "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "workaround", "no_fix_planned", "no_fix_planned", "none_available" ]
[ "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "Systems which do not rely on a GUI for system administration (commonly referred to as \"headless\") should confirm that GNOME shell and WebKitGTK are not present on the system.\n\nWebKitGTK3 is no longer used and can therefore be uninstalled without consequence.\n\nWebKitGTK4 is used in Red Hat Enterprise Linux 7 by the following packages: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nTo mitigate this vulnerability, consider removing certain GNOME packages. Note that uninstalling these packages will break functionality in GNOME, however the server can still be used via the terminal interface.", "Out of support scope", "Will not fix", "Affected" ]
[ "2025-03-17T01:43:28+00:00", "2025-03-18T08:17:23+00:00", "2025-03-18T09:12:48+00:00", "2025-03-19T03:47:41+00:00", "2025-03-18T03:29:42+00:00", "2025-03-18T05:22:27+00:00", "2025-03-18T07:44:23+00:00", "2025-03-18T02:28:37+00:00", null, null, null, null ]
CVE-2025-21900
CWE-667
kernel
NFSv4: Fix a deadlock when recovering state on a sillyrenamed file
Moderate
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: NFSv4: Fix a deadlock when recovering state on a sillyrenamed file If the file is sillyrenamed, and slated for delete on close, it is possible for a server reboot to triggeer an open reclaim, with can again race with the application call to close(). When that happens, the call to put_nfs_open_context() can trigger a synchronous delegreturn call which deadlocks because it is not marked as privileged. Instead, ensure that the call to nfs4_inode_return_delegation_on_close() catches the delegreturn, and schedules it asynchronously.
null
2025-04-01T00:00:00+00:00
2025-04-01T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[ "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "no_fix_planned", "none_available" ]
[ "Out of support scope", "Fix deferred" ]
[ null, null ]
CVE-2025-25294
CWE-117
envoyproxy/gateway
Envoy Gateway Log Injection Vulnerability
Moderate
null
5.3/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
A log injection vulnerability was found in Envoy Gateway. In affected versions where a default Envoy Proxy access log configuration is used, an attacker may be able use a specially crafted user-agent to perform json injection. This can allow the attacker to modify the access log.
null
2025-03-06T19:00:50.394435+00:00
2025-03-06T18:46:23.913000+00:00
[]
[ "red_hat_connectivity_link:rhcl-operator-bundle-container", "red_hat_connectivity_link:rhcl-operator-container" ]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "no_fix_planned", "none_available" ]
[ "Will not fix", "Affected" ]
[ null, null ]
CVE-2025-22101
null
kernel
net: libwx: fix Tx L4 checksum
Moderate
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: net: libwx: fix Tx L4 checksum The hardware only supports L4 checksum offload for TCP/UDP/SCTP protocol. There was a bug to set Tx checksum flag for the other protocol that results in Tx ring hang. Fix to compute software checksum for these packets.
null
2025-04-16T00:00:00+00:00
2025-04-16T00:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[]
[]
[]
CVE-2025-21687
CWE-787
kernel
vfio/platform: check the bounds of read/write syscalls
Moderate
null
7.4/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
In the Linux kernel, the following vulnerability has been resolved: vfio/platform: check the bounds of read/write syscalls count and offset are passed from user space and not checked, only offset is capped to 40 bits, which can be used to read/write out of bounds of the device.
null
2025-02-10T00:00:00+00:00
2025-02-10T00:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[]
[]
[]
CVE-2025-32414
CWE-393
libxml2
Out-of-Bounds Read in libxml2
Moderate
null
5.6/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
A flaw was found in libxml2. This vulnerability allows out-of-bounds memory access via incorrect handling of return values in xmlPythonFileRead and xmlPythonFileReadRaw, due to a mismatch between bytes and characters.
null
2025-04-08T04:00:51.284113+00:00
2025-04-08T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_6:libxml2", "red_hat_enterprise_linux_7:libxml2", "red_hat_enterprise_linux_8:libxml2", "red_hat_enterprise_linux_9:libxml2", "red_hat_jboss_core_services:libxml2", "red_hat_openshift_container_platform_4:rhcos" ]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "workaround", "none_available", "none_available" ]
[ "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "Fix deferred", "Affected" ]
[ null, null, null ]
CVE-2025-32044
CWE-200
moodle
Unauthenticated REST API User Data Exposure
Important
null
7.5/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
A flaw has been identified in Moodle where, on certain sites, unauthenticated users could retrieve sensitive user data—including names, contact information, and hashed passwords—via stack traces returned by specific API calls. Sites with PHP configured with zend.exception_ignore_args = 1 in the php.ini file are not affected by this vulnerability.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
2025-04-02T06:58:14.518000+00:00
2025-04-02T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[]
[]
[]
CVE-2025-21668
CWE-835
kernel
pmdomain: imx8mp-blk-ctrl: add missing loop break condition
Moderate
null
5.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: pmdomain: imx8mp-blk-ctrl: add missing loop break condition Currently imx8mp_blk_ctrl_remove() will continue the for loop until an out-of-bounds exception occurs. pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : dev_pm_domain_detach+0x8/0x48 lr : imx8mp_blk_ctrl_shutdown+0x58/0x90 sp : ffffffc084f8bbf0 x29: ffffffc084f8bbf0 x28: ffffff80daf32ac0 x27: 0000000000000000 x26: ffffffc081658d78 x25: 0000000000000001 x24: ffffffc08201b028 x23: ffffff80d0db9490 x22: ffffffc082340a78 x21: 00000000000005b0 x20: ffffff80d19bc180 x19: 000000000000000a x18: ffffffffffffffff x17: ffffffc080a39e08 x16: ffffffc080a39c98 x15: 4f435f464f006c72 x14: 0000000000000004 x13: ffffff80d0172110 x12: 0000000000000000 x11: ffffff80d0537740 x10: ffffff80d05376c0 x9 : ffffffc0808ed2d8 x8 : ffffffc084f8bab0 x7 : 0000000000000000 x6 : 0000000000000000 x5 : ffffff80d19b9420 x4 : fffffffe03466e60 x3 : 0000000080800077 x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000 Call trace: dev_pm_domain_detach+0x8/0x48 platform_shutdown+0x2c/0x48 device_shutdown+0x158/0x268 kernel_restart_prepare+0x40/0x58 kernel_kexec+0x58/0xe8 __do_sys_reboot+0x198/0x258 __arm64_sys_reboot+0x2c/0x40 invoke_syscall+0x5c/0x138 el0_svc_common.constprop.0+0x48/0xf0 do_el0_svc+0x24/0x38 el0_svc+0x38/0xc8 el0t_64_sync_handler+0x120/0x130 el0t_64_sync+0x190/0x198 Code: 8128c2d0 ffffffc0 aa1e03e9 d503201f
null
2025-01-31T00:00:00+00:00
2025-01-31T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "none_available" ]
[ "Affected" ]
[ null ]
CVE-2025-22044
CWE-681
kernel
acpi: nfit: fix narrowing conversion in acpi_nfit_ctl
Moderate
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: acpi: nfit: fix narrowing conversion in acpi_nfit_ctl Syzkaller has reported a warning in to_nfit_bus_uuid(): "only secondary bus families can be translated". This warning is emited if the argument is equal to NVDIMM_BUS_FAMILY_NFIT == 0. Function acpi_nfit_ctl() first verifies that a user-provided value call_pkg->nd_family of type u64 is not equal to 0. Then the value is converted to int, and only after that is compared to NVDIMM_BUS_FAMILY_MAX. This can lead to passing an invalid argument to acpi_nfit_ctl(), if call_pkg->nd_family is non-zero, while the lower 32 bits are zero. Furthermore, it is best to return EINVAL immediately upon seeing the invalid user input. The WARNING is insufficient to prevent further undefined behavior based on other invalid user input. All checks of the input value should be applied to the original variable call_pkg->nd_family. [iweiny: update commit message]
null
2025-04-16T00:00:00+00:00
2025-04-16T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "no_fix_planned", "none_available" ]
[ "Out of support scope", "Fix deferred" ]
[ null, null ]
CVE-2025-21812
CWE-416
kernel
ax25: rcu protect dev->ax25_ptr
Important
null
7.9/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
In the Linux kernel, the following vulnerability has been resolved: ax25: rcu protect dev->ax25_ptr syzbot found a lockdep issue [1]. We should remove ax25 RTNL dependency in ax25_setsockopt() This should also fix a variety of possible UAF in ax25. [1] WARNING: possible circular locking dependency detected 6.13.0-rc3-syzkaller-00762-g9268abe611b0 #0 Not tainted ------------------------------------------------------ syz.5.1818/12806 is trying to acquire lock: ffffffff8fcb3988 (rtnl_mutex){+.+.}-{4:4}, at: ax25_setsockopt+0xa55/0xe90 net/ax25/af_ax25.c:680 but task is already holding lock: ffff8880617ac258 (sk_lock-AF_AX25){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1618 [inline] ffff8880617ac258 (sk_lock-AF_AX25){+.+.}-{0:0}, at: ax25_setsockopt+0x209/0xe90 net/ax25/af_ax25.c:574 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (sk_lock-AF_AX25){+.+.}-{0:0}: lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5849 lock_sock_nested+0x48/0x100 net/core/sock.c:3642 lock_sock include/net/sock.h:1618 [inline] ax25_kill_by_device net/ax25/af_ax25.c:101 [inline] ax25_device_event+0x24d/0x580 net/ax25/af_ax25.c:146 notifier_call_chain+0x1a5/0x3f0 kernel/notifier.c:85 __dev_notify_flags+0x207/0x400 dev_change_flags+0xf0/0x1a0 net/core/dev.c:9026 dev_ifsioc+0x7c8/0xe70 net/core/dev_ioctl.c:563 dev_ioctl+0x719/0x1340 net/core/dev_ioctl.c:820 sock_do_ioctl+0x240/0x460 net/socket.c:1234 sock_ioctl+0x626/0x8e0 net/socket.c:1339 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:906 [inline] __se_sys_ioctl+0xf5/0x170 fs/ioctl.c:892 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f -> #0 (rtnl_mutex){+.+.}-{4:4}: check_prev_add kernel/locking/lockdep.c:3161 [inline] check_prevs_add kernel/locking/lockdep.c:3280 [inline] validate_chain+0x18ef/0x5920 kernel/locking/lockdep.c:3904 __lock_acquire+0x1397/0x2100 kernel/locking/lockdep.c:5226 lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5849 __mutex_lock_common kernel/locking/mutex.c:585 [inline] __mutex_lock+0x1ac/0xee0 kernel/locking/mutex.c:735 ax25_setsockopt+0xa55/0xe90 net/ax25/af_ax25.c:680 do_sock_setsockopt+0x3af/0x720 net/socket.c:2324 __sys_setsockopt net/socket.c:2349 [inline] __do_sys_setsockopt net/socket.c:2355 [inline] __se_sys_setsockopt net/socket.c:2352 [inline] __x64_sys_setsockopt+0x1ee/0x280 net/socket.c:2352 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(sk_lock-AF_AX25); lock(rtnl_mutex); lock(sk_lock-AF_AX25); lock(rtnl_mutex); *** DEADLOCK *** 1 lock held by syz.5.1818/12806: #0: ffff8880617ac258 (sk_lock-AF_AX25){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1618 [inline] #0: ffff8880617ac258 (sk_lock-AF_AX25){+.+.}-{0:0}, at: ax25_setsockopt+0x209/0xe90 net/ax25/af_ax25.c:574 stack backtrace: CPU: 1 UID: 0 PID: 12806 Comm: syz.5.1818 Not tainted 6.13.0-rc3-syzkaller-00762-g9268abe611b0 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Call Trace: <TASK> __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 print_circular_bug+0x13a/0x1b0 kernel/locking/lockdep.c:2074 check_noncircular+0x36a/0x4a0 kernel/locking/lockdep.c:2206 check_prev_add kernel/locking/lockdep.c:3161 [inline] check_prevs_add kernel/lockin ---truncated---
null
2025-02-27T00:00:00+00:00
2025-02-27T00:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[]
[]
[]
CVE-2025-22228
CWE-863
spring-security-core
Spring Security BCryptPasswordEncoder does not enforce maximum password length
Important
null
7.4/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.
null
2025-03-20T06:00:45.196050+00:00
2025-03-20T05:49:19.275000+00:00
[ "Red Hat build of Apache Camel 4.8.5 for Spring Boot" ]
[ "a-mq_clients_2:spring-security-core", "openshift_developer_tools_and_services:jenkins", "red_hat_data_grid_8:spring-security-core", "red_hat_fuse_7:org.apache.servicemix.bundles.spring-security-core", "red_hat_fuse_7:spring-security-core", "red_hat_integration_camel_k_1:spring-security-core", "red_hat_process_automation_7:spring-security-core", "streams_for_apache_kafka:spring-security-core" ]
[ "red_hat_build_of_quarkus:quarkus-bom", "red_hat_jboss_enterprise_application_platform_7:spring-security-core", "red_hat_jboss_enterprise_application_platform_8:spring-security-core", "red_hat_jboss_enterprise_application_platform_expansion_pack:spring-security-core", "red_hat_single_sign-on_7:spring-security-core" ]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "workaround", "no_fix_planned", "no_fix_planned", "none_available" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "Red Hat Product Security does not have a recommended mitigation at this time.", "Out of support scope", "Will not fix", "Affected" ]
[ "2025-04-02T20:19:22+00:00", null, null, null, null ]
CVE-2025-21957
CWE-476
kernel
scsi: qla1280: Fix kernel oops when debug level > 2
Moderate
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: scsi: qla1280: Fix kernel oops when debug level > 2 A null dereference or oops exception will eventually occur when qla1280.c driver is compiled with DEBUG_QLA1280 enabled and ql_debug_level > 2. I think its clear from the code that the intention here is sg_dma_len(s) not length of sg_next(s) when printing the debug info.
null
2025-04-01T00:00:00+00:00
2025-04-01T00:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[]
[]
[]
CVE-2025-30215
CWE-306
nats-server
NATS-Server Fails to Authorize Certain Jetstream Admin APIs
Critical
null
9.3/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H
A flaw was found in NATS-SERVER. In affected versions of NATS-SERVER, the management of JetStream assets happens with messages in the $JS. subject namespace in the system account; this is partially exposed into regular accounts to allow account holders to manage their assets. Some JS API requests were missing access controls, allowing any user with JS management permissions to perform specific administrative actions on any JS asset in any account. At least one of the unprotected APIs allows data to be deleted. This issue does not restrict who can perform specific administrative tasks on someone else's JetStream assets. None of the affected APIs allow disclosing stream contents.
The Trusted Profile Analyzer guac container is not affected by this vulnerability as guac is used without NATS and NATS is not installed with the product.
2025-04-16T00:00:43.872623+00:00
2025-04-15T23:25:43.143000+00:00
[]
[]
[ "red_hat_trusted_profile_analyzer:rhtpa/rhtpa-guac-rhel9" ]
[]
[ "impact" ]
[ "Critical" ]
[ null ]
[]
[]
[]
CVE-2025-26791
CWE-79
dompurify
Mutation XSS in DOMPurify Due to Improper Template Literal Handling
Moderate
null
4.5/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
A flaw was found in DOMPurify. This vulnerability allows attackers to execute mutation-based Cross-site scripting (mXSS) via an incorrect template literal regular expression.
null
2025-02-14T09:00:45.578144+00:00
2025-02-14T00:00:00+00:00
[ "8Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20250312-1.el8ap.noarch", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-ossmc-rhel8@sha256:28275c4c916a70999a7f6d56102f5e0d6d5a3785aeb2459fd576c6711151f8d6_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-ossmc-rhel8@sha256:6ef113bb415294738339637216f4b8e8897a0022b5a120740c4b702cfbeecdb8_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-ossmc-rhel8@sha256:782260b4d4aa670c6ad283dde50c542766780d3bf82a087b0403203f9e97bca7_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-ossmc-rhel8@sha256:d5f3ed856b5518dd838382e916efa19b3208dd947d72c5d496e31bdba74c6d9c_amd64", "9Base-Ansible-Automation-Platform-2.5:automation-gateway-server-0:2.5.20250312-1.el9ap.noarch", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:13da7e12e135cdb33c89686eca84cffae8ef691fcb4f346622ebd9b47f0a69ee_amd64", "Red Hat OpenShift AI 2.19:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:271879affee3a08fc827f6c0e8fb4c06eab240a7f0d78dd2ceeef20c81a5ae40_ppc64le", "Red Hat OpenShift AI 2.19:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:2f89b93b906739da7ad1c00e4ede3617e779fe6c02a10e566ea2bb742a713003_amd64", "Red Hat OpenShift AI 2.19:registry.redhat.io/rhoai/odh-dashboard-rhel8@sha256:5c731221878716866bfeaa1f85a7ed5323592b23d3751e489794d0087ad16a0e_s390x" ]
[ "cryostat_3:io.cryostat-cryostat3", "migration_toolkit_for_virtualization:migration-toolkit-virtualization/mtv-console-plugin-rhel9", "network_observability_operator:network-observability-console-plugin-rhel9", "openshift_serverless:kn-backstage-plugins-eventmesh-rhel8", "red_hat_advanced_cluster_management_for_kubernetes_2:rhacm2/console-rhel8", "red_hat_advanced_cluster_security_4:advanced-cluster-security/rhacs-main-rhel8", "red_hat_build_of_apicurio_registry_2:io.apicurio-apicurio-registry", "red_hat_developer_hub:rhdh/rhdh-hub-rhel9", "red_hat_enterprise_linux_8:grafana", "red_hat_enterprise_linux_9:grafana", "red_hat_integration_camel_k_1:io.apicurio-apicurio-registry", "red_hat_openshift_container_platform_4:openshift4/ose-console", "red_hat_openshift_dev_spaces:devspaces/code-rhel8", "red_hat_openshift_gitops:openshift-gitops-1/argocd-rhel8", "red_hat_openshift_gitops:openshift-gitops-1/gitops-operator-bundle", "red_hat_openshift_gitops:openshift-gitops-argocd-rhel9-container", "red_hat_openshift_virtualization_4:container-native-virtualization/kubevirt-console-plugin-rhel9", "streams_for_apache_kafka:com.github.streamshub-console" ]
[ "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-creator-0:25.0.0-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-creator-0:25.0.0-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-environment-0:25.1.0-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-environment-0:25.1.0-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:25.2.0-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:25.2.0-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:25.2.0-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:25.1.2-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:25.1.2-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:25.1.0-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:25.1.0-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.9-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.9-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.9-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.9-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.9-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.9-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.9-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.9-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.9-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:molecule-0:25.2.0-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:molecule-0:25.2.0-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-ansible-compat-0:25.1.2-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-ansible-compat-0:25.1.2-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-jsonschema-path-0:0.3.4-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-jsonschema-path-0:0.3.4-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-pytest-ansible-0:25.1.0-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-pytest-ansible-0:25.1.0-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-referencing-0:0.36.2-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-referencing-0:0.36.2-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-tox-ansible-0:25.1.0-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-tox-ansible-0:25.1.0-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-typing-extensions-0:4.9.0-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-typing-extensions-0:4.9.0-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.5.3-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.5.3-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.5.3-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.5.3-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.5.3-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.5.3-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.5.3-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.5.3-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.5.3-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.5.3-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.5.3-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.5.3-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.5.3-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.5.3-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:25.1.2-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:25.1.2-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:25.1.0-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:25.1.0-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:python3.11-ansible-compat-0:25.1.2-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:python3.11-ansible-compat-0:25.1.2-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:python3.11-referencing-0:0.36.2-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:python3.11-referencing-0:0.36.2-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:python3.11-typing-extensions-0:4.9.0-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:python3.11-typing-extensions-0:4.9.0-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.5.3-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.5.3-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.5.3-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.5.3-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.5.3-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.5.3-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.5.3-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.5.3-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.5.3-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.5.3-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.5.3-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.5.3-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.5.3-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.5.3-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:ansible-automation-platform-installer-0:2.5-9.2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:ansible-automation-platform-installer-0:2.5-9.2.el8ap.src", "8Base-Ansible-Automation-Platform-2.5:ansible-creator-0:25.0.0-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:ansible-creator-0:25.0.0-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5:ansible-dev-environment-0:25.1.0-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:ansible-dev-environment-0:25.1.0-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:25.2.0-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:25.2.0-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:25.2.0-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:25.1.2-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:ansible-lint-0:25.1.2-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:25.1.0-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:25.1.0-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5:ansible-rulebook-0:1.1.3-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:ansible-rulebook-0:1.1.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.9-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.9-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.9-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.9-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.9-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.9-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.9-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.9-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.9-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.9-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.5:automation-eda-controller-0:1.1.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:automation-eda-controller-0:1.1.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5:automation-eda-controller-base-0:1.1.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:automation-eda-controller-base-services-0:1.1.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:automation-eda-controller-event-stream-services-0:1.1.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:automation-eda-controller-worker-services-0:1.1.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20250312-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20250312-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20250312-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.2-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.2-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5:molecule-0:25.2.0-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:molecule-0:25.2.0-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5:python3.11-ansible-compat-0:25.1.2-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:python3.11-ansible-compat-0:25.1.2-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5:python3.11-django-ansible-base+activitystream-0:2.5.20250312-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:python3.11-django-ansible-base+api_documentation-0:2.5.20250312-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:python3.11-django-ansible-base+authentication-0:2.5.20250312-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:python3.11-django-ansible-base+channel_auth-0:2.5.20250312-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:python3.11-django-ansible-base+feature_flags-0:2.5.20250312-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:python3.11-django-ansible-base+jwt_consumer-0:2.5.20250312-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:python3.11-django-ansible-base+oauth2_provider-0:2.5.20250312-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:python3.11-django-ansible-base+rbac-0:2.5.20250312-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:python3.11-django-ansible-base+redis_client-0:2.5.20250312-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:python3.11-django-ansible-base+rest_filters-0:2.5.20250312-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:python3.11-django-ansible-base-0:2.5.20250312-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:python3.11-django-ansible-base-0:2.5.20250312-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.28-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.28-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.2-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.2-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5:python3.11-jsonschema-path-0:0.3.4-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:python3.11-jsonschema-path-0:0.3.4-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5:python3.11-podman-3:5.2.0-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:python3.11-podman-3:5.2.0-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5:python3.11-pytest-ansible-0:25.1.0-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:python3.11-pytest-ansible-0:25.1.0-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5:python3.11-referencing-0:0.36.2-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:python3.11-referencing-0:0.36.2-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5:python3.11-tox-ansible-0:25.1.0-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:python3.11-tox-ansible-0:25.1.0-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5:python3.11-typing-extensions-0:4.9.0-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.5:python3.11-typing-extensions-0:4.9.0-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.5:receptor-0:1.5.3-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.5:receptor-0:1.5.3-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.5:receptor-0:1.5.3-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.5:receptor-0:1.5.3-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.5:receptor-0:1.5.3-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.5.3-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.5.3-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.5.3-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.5.3-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.5.3-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.5.3-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.5.3-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.5.3-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.5.3-2.el8ap.noarch", "8Base-RHOSSM-2.5:openshift-service-mesh/grafana-rhel8@sha256:4805de50a94f6207450feec5f25f253ac91a09f09fba84fa43616fa2eb921ec6_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/grafana-rhel8@sha256:5b8df6bd69832e895d3f7b05b2faa9998e9e3651d29b4c96eb95902b486ca26f_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/grafana-rhel8@sha256:b3e692cdc02409eeabacf5800eaebbb7d2b2c9a4ee4a14456a2eed31304c128f_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/grafana-rhel8@sha256:e4771c75fd1f1799c3d0db9cb871db9ab3f9a8e72266a163c3358f0a15173eb3_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/istio-cni-rhel8@sha256:62275276d32979b98011b51affcc0d21f369baf9c028c37e4bcce7edbd8b9b67_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/istio-cni-rhel8@sha256:7e469182998be2a18bf496d6b8514e42c0d6bdc2165c9fd6ce5ec6fa4067069b_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/istio-cni-rhel8@sha256:9a8181c420067946be976f02099be2d659b46b45e56df8a3086f4eefebfd12b2_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/istio-cni-rhel8@sha256:e50212f1db1585a01a869d531c8e49a8179273eb5b64e75620875bf556947444_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-rhel8@sha256:20a229f84297303c13f142499febb92d3d1a41f58386b8a3d508ef36abb28e90_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-rhel8@sha256:382fcb486b8857cc1156f659671d61ac4cf5b80066ea03556c4a56e00af106de_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-rhel8@sha256:530de464de0fa8af6dc2bec43933a8c1e68bf39cc91922d6b58dfccbb11696ae_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-rhel8@sha256:a8e79324bc8fe14670f930a9b82dcfd7e422591e4eb917f6b0af9de61ed7372a_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/pilot-rhel8@sha256:6897d1e8f1fd54ec7ba85c48332ae9ad43084bdf67f55629cbf38113e14efa4a_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/pilot-rhel8@sha256:c35165452493f4dec7ea01295fe92e38e066d1c6ffa8767002844d478fd2226d_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/pilot-rhel8@sha256:c821e534df72e6d26d5d57f25aadc815b55e8c771bf21714baa84967af805e62_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/pilot-rhel8@sha256:d7027efeaba323064dc0c3df6463685c6de50fe156b8794f7b98ffac12b0cfcd_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/proxyv2-rhel8@sha256:0710c721d6099ee39415aac1e11a58bbed768fba8999114b64640a98f133def9_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/proxyv2-rhel8@sha256:99a8c00bddf565bca5a72cfd488711c67a7e60cbfcf7514e665db02aa9758ba0_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/proxyv2-rhel8@sha256:c97a1d7702ea5446a3856636ec8b69890d6f584a5e723a98ff3fe3f57bb0f511_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/proxyv2-rhel8@sha256:cd9ed511d0987d924f855322405342c376246a20bfbeaab5e66bb7c3a81edeb1_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/ratelimit-rhel8@sha256:1c52d4c4d2a4a8e0a985357de883f4ca56e28356bfa18584c8dc52e253af1779_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/ratelimit-rhel8@sha256:91d314da0e24a6dde0dbbdc1b302e63209bf24947579babb2e1fdbbe8f700573_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/ratelimit-rhel8@sha256:c913a84ab9deebc10eef089ab3c17ffbb64489e01af729471722cffb755f6407_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/ratelimit-rhel8@sha256:ea20bf391ab3fea744314338fd20f91dfbf668f55c8f6c9032272d57be730022_ppc64le", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-creator-0:25.0.0-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-creator-0:25.0.0-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-environment-0:25.1.0-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-environment-0:25.1.0-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools+server-0:25.2.0-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:25.2.0-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-dev-tools-0:25.2.0-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:25.1.2-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-lint-0:25.1.2-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:25.1.0-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:ansible-navigator-0:25.1.0-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.9-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.9-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.9-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.9-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-0:4.6.9-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-cli-0:4.6.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-server-0:4.6.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-ui-0:4.6.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.9-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.9-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.9-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:automation-controller-venv-tower-0:4.6.9-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:molecule-0:25.2.0-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:molecule-0:25.2.0-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-ansible-compat-0:25.1.2-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-ansible-compat-0:25.1.2-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-jsonschema-path-0:0.3.4-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-jsonschema-path-0:0.3.4-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-pytest-ansible-0:25.1.0-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-pytest-ansible-0:25.1.0-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-referencing-0:0.36.2-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-referencing-0:0.36.2-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-tox-ansible-0:25.1.0-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-tox-ansible-0:25.1.0-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-typing-extensions-0:4.9.0-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:python3.11-typing-extensions-0:4.9.0-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.5.3-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.5.3-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.5.3-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.5.3-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-0:1.5.3-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.5.3-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.5.3-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.5.3-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debuginfo-0:1.5.3-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.5.3-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.5.3-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.5.3-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptor-debugsource-0:1.5.3-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.5-Developer-1.2:receptorctl-0:1.5.3-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:25.1.2-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-lint-0:25.1.2-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:25.1.0-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:ansible-navigator-0:25.1.0-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:python3.11-ansible-compat-0:25.1.2-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:python3.11-ansible-compat-0:25.1.2-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:python3.11-referencing-0:0.36.2-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:python3.11-referencing-0:0.36.2-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:python3.11-typing-extensions-0:4.9.0-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:python3.11-typing-extensions-0:4.9.0-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.5.3-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.5.3-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.5.3-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.5.3-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-0:1.5.3-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.5.3-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.5.3-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.5.3-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debuginfo-0:1.5.3-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.5.3-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.5.3-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.5.3-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptor-debugsource-0:1.5.3-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.5-Inside-1.3:receptorctl-0:1.5.3-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:ansible-automation-platform-installer-0:2.5-9.2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:ansible-automation-platform-installer-0:2.5-9.2.el9ap.src", "9Base-Ansible-Automation-Platform-2.5:ansible-creator-0:25.0.0-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:ansible-creator-0:25.0.0-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5:ansible-dev-environment-0:25.1.0-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:ansible-dev-environment-0:25.1.0-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools+server-0:25.2.0-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:25.2.0-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:ansible-dev-tools-0:25.2.0-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:25.1.2-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:ansible-lint-0:25.1.2-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:25.1.0-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:ansible-navigator-0:25.1.0-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5:ansible-rulebook-0:1.1.3-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:ansible-rulebook-0:1.1.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.9-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.9-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.9-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.9-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5:automation-controller-0:4.6.9-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.5:automation-controller-cli-0:4.6.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:automation-controller-server-0:4.6.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:automation-controller-ui-0:4.6.9-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.9-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.9-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.9-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.5:automation-controller-venv-tower-0:4.6.9-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.5:automation-eda-controller-0:1.1.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:automation-eda-controller-0:1.1.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5:automation-eda-controller-base-0:1.1.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:automation-eda-controller-base-services-0:1.1.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:automation-eda-controller-event-stream-services-0:1.1.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:automation-eda-controller-worker-services-0:1.1.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20250312-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:automation-gateway-0:2.5.20250312-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5:automation-gateway-config-0:2.5.20250312-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.2-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:automation-hub-0:4.10.2-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5:molecule-0:25.2.0-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:molecule-0:25.2.0-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5:python3.11-ansible-compat-0:25.1.2-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:python3.11-ansible-compat-0:25.1.2-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5:python3.11-django-ansible-base+activitystream-0:2.5.20250312-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:python3.11-django-ansible-base+api_documentation-0:2.5.20250312-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:python3.11-django-ansible-base+authentication-0:2.5.20250312-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:python3.11-django-ansible-base+channel_auth-0:2.5.20250312-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:python3.11-django-ansible-base+feature_flags-0:2.5.20250312-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:python3.11-django-ansible-base+jwt_consumer-0:2.5.20250312-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:python3.11-django-ansible-base+oauth2_provider-0:2.5.20250312-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:python3.11-django-ansible-base+rbac-0:2.5.20250312-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:python3.11-django-ansible-base+redis_client-0:2.5.20250312-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:python3.11-django-ansible-base+rest_filters-0:2.5.20250312-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:python3.11-django-ansible-base-0:2.5.20250312-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:python3.11-django-ansible-base-0:2.5.20250312-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.28-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-importer-0:0.4.28-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.2-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:python3.11-galaxy-ng-0:4.10.2-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5:python3.11-jsonschema-path-0:0.3.4-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:python3.11-jsonschema-path-0:0.3.4-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5:python3.11-podman-3:5.2.0-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:python3.11-podman-3:5.2.0-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5:python3.11-pytest-ansible-0:25.1.0-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:python3.11-pytest-ansible-0:25.1.0-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5:python3.11-referencing-0:0.36.2-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:python3.11-referencing-0:0.36.2-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5:python3.11-tox-ansible-0:25.1.0-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:python3.11-tox-ansible-0:25.1.0-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5:python3.11-typing-extensions-0:4.9.0-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.5:python3.11-typing-extensions-0:4.9.0-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.5:receptor-0:1.5.3-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.5:receptor-0:1.5.3-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.5:receptor-0:1.5.3-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.5:receptor-0:1.5.3-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.5:receptor-0:1.5.3-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.5.3-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.5.3-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.5.3-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.5:receptor-debuginfo-0:1.5.3-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.5.3-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.5.3-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.5.3-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.5:receptor-debugsource-0:1.5.3-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.5:receptorctl-0:1.5.3-2.el9ap.noarch", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:04f305c44413ae7dcb7017e53570ee49a509701792c5f50efadd64f47395730b_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:8d78e6f1c302b1de6c45435a3d49c807fe5e4dbfe3e7a3d3ebfa0cac6318e79a_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:ee01e89f98feb185f6cd59c564e590a13e4d8d9ea760cca8de51426eb71b83a1_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:d7d4fa406e0fcf0507894a7676532b27f45be742467e603a86f98ea5d2615df8_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:a0f72ffefb2b74b488dd949493f5d295a39bb9c97f578bf219d0138601f65468_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:2ba2b2c4db8bb334c50f4dfb54059f060361186900a44c06eed00b7a3c43977e_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:5394cd240a8857906803affec711959da8b8da4e9a7225ddaefe9736c98949b4_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:65482864055021272a18b5b26792ab00cfa5fc9cc005d8d3a884cc82991506f3_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:036af0457f091059551ff63563d5cf68f062297a5630a869bbf3398d5e97ffdc_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:7b70af8847b0806d8b43c399e2b3109f016fd864f5e9d30c44e2baca5d1359dc_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:23d307a36b69e0df04f72a7d3b35e28d8417a8bbe23dba31e8e977569785c078_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:be47d58f1943c5b4becc8cb541d9b0a53e6811451d9010c447b2c3e9b85c06c2_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:2257fe7947959fd59346d2b322f7dbb471831880df659e57344b0d804c2c0099_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:efd039012559786deb3c521a130886c265e88d635e08baace2e573a9df270134_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:27b113d96453c2054d4c965a963d2badba6daac235eddaf23234c76e87bcb069_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:8783f8aaed686a63ed1f913364c85606b1447540608f5b7f45412ff0868a4f38_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:5192f1dbd2a9ab92ae390c4ae506efbed0970545b6122e95b014728ac937e777_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:96253b1b94bbaab87d4f8118dfee323eefebdc3734a7e01ebcf906dbc02a2a55_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:4a212ec634225c14beac09be24ddf336e562f2aa9a13555fb1196f366ddae23c_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:52613c18ed44062b6e5d5b748572dad624f773a83dbc7251ff87a807142e118a_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:5dcdcc2424602a69451f16d31dbfa1d43cb72c095ba561eb9076f0cd1e8182ed_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:f738aab1eab25854c93e1d8d4d98100a8ae7bb45a6b83f0326774e4220b1183b_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:6cf74044ae8d5308a2dfe03fa5d81086c89302db7f4cdbe2f4174a1c48b77869_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:22557a6fa52d2f311750a9ba253860f423ba697d26efa02ef8524a8258d2a909_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:de5f91180ead7d73a1825fe8b032fde9b8b01392569c9789f5ce1b4b9c08a98f_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:c499a2c4a7860a1853adf3ebfbf154f3c03c478034a78566b82711373210af39_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:4a7599f8a866eb169c9a62885906adbf6df0417c0be15857df1eef20cd9b1be2_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:11a301728573adf2b64ea72d0cb2d83ea5d4dbebea759f346e99f18c3d368c6e_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:4c5ff3496b2a2a739939d94ee9dafc02b682100785d228dc2fde480fb597b7a5_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:0471c444b4e0c6da97abf7936fe3af89fca6abbd5dca8a31db141c47a9af99db_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-operator-bundle@sha256:c249b0fb2c573efc118557d9dd1551181d7b2dabcf8a9b86d9441059124d3802_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:3463aaa8f2a06e8b43cd6a39ff86aea7c76926d72ee0f53cf0e514399e4aed33_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:c11b8f601a8a0d5fb6719c4c10bf7438ba242cc33d60e035e4cb4b0ae3c19105_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:c8456d98e90b6505957ab3686e9fd2f156e29f123c5558e581c206daf1e7d93a_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:3dc803cd65232113ec9b0bd529a4c98bd86936e5de85cc4e9b7b1f361d4db38e_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:f37e4048f3a152798286793f3abfc6ed814453fcbe2667255a7e78eee483c5a3_amd64", "Red Hat OpenShift AI 2.16:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:633984b538f027c93c5886ea1045dcbe81eeda74acf80001d5fc5f765bdbe0be_amd64", "Red Hat OpenShift AI 2.19:registry.redhat.io/rhoai/odh-codeflare-operator-rhel8@sha256:ed1221a6e826166806ec6e18e42e098cb97767471059527c7fc6f47b8d6fb58a_amd64", "Red Hat OpenShift AI 2.19:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:58ad80b2ec191778631287f5f10608db1623e8ba82d220860d81df246083de11_amd64", "Red Hat OpenShift AI 2.19:registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:2760fe9bd0846bdad2d6586254e6e0ada18c03ac02ffc5313ead7d187f66a9a2_amd64", "Red Hat OpenShift AI 2.19:registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:7bfbec509400d0642d39ca59f4389e4daed9ea1fb39fbb549eb182edc10929ac_amd64", "Red Hat OpenShift AI 2.19:registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8@sha256:57b6c232523d4ab6faafab37c4ecdad4683e27c82719223499032f42c1a24ee1_amd64", "Red Hat OpenShift AI 2.19:registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8@sha256:823f3fe491aa906352805f71d57fc446e11327f5a6f5fca42cce044ddc41c308_amd64", "Red Hat OpenShift AI 2.19:registry.redhat.io/rhoai/odh-kueue-controller-rhel8@sha256:306fa16ce1899be0dfeaba34e225c958592135ec4dde3c44e7f920fbed11937e_amd64", "Red Hat OpenShift AI 2.19:registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:da649491f5112763d9f563d64ca3455ed5e4309b15adab0886ae16e0bb367b0c_amd64", "Red Hat OpenShift AI 2.19:registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8@sha256:74e233642eb1b544ab9c3b260251bba8c11dd9015563110921940e9e5976bdd5_amd64", "Red Hat OpenShift AI 2.19:registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8@sha256:31412062bc02196bca820b65fa2492bdac6ffc8b5d1add729806144ef2aca919_amd64", "Red Hat OpenShift AI 2.19:registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:4e0c858d68f925a307ee53498aa6019563254c5b27f5d7635debc0195db2c5bd_amd64", "Red Hat OpenShift AI 2.19:registry.redhat.io/rhoai/odh-ml-pipelines-runtime-generic-rhel8@sha256:5040cf36b6261d20826df3ca408d11a186db7840560a667a24c68d78cadb9e35_amd64", "Red Hat OpenShift AI 2.19:registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:99ca5a981184f0dd3f94105172b20494328c5c7a762fb027905e108710b7b5d4_amd64", "Red Hat OpenShift AI 2.19:registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8@sha256:56c432c302bec0a7b810e037da5c649da39a5180a4fabf2fb3d0a2ac2e53ecd3_amd64", "Red Hat OpenShift AI 2.19:registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8@sha256:f0167ad11880010c6247dce02e4d1b2ec969222976c5b12612ee10bbf3fb4d18_amd64", "Red Hat OpenShift AI 2.19:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:0aefcdfbf2a3979576f5ddbfd1a0dac0be972b9b501d93ef7cd4a38491e2fa03_ppc64le", "Red Hat OpenShift AI 2.19:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:523cff7ef18c252777e211f5b1f4749110c081c1414a3df4fe9de5b4832c3922_s390x", "Red Hat OpenShift AI 2.19:registry.redhat.io/rhoai/odh-model-controller-rhel8@sha256:c013d3d264d3ef15e21ab2a3d5a08ddd725e54d8474f2d8b7e400d4d9e76ff44_amd64", "Red Hat OpenShift AI 2.19:registry.redhat.io/rhoai/odh-model-registry-operator-rhel8@sha256:fe5905f3206cfe7600682337e29c15bc6dd7285575fd9b3815b697bbdefa3de1_amd64", "Red Hat OpenShift AI 2.19:registry.redhat.io/rhoai/odh-model-registry-rhel8@sha256:b13d5304310c839720b99cd984a69482f5968663d3124feaaf1c2db0b2715cd6_amd64", "Red Hat OpenShift AI 2.19:registry.redhat.io/rhoai/odh-modelmesh-rhel8@sha256:43d98c254ad76c2eefc48a56e84e4083281c72e8b9ae38e49dfb6d5751bdb895_amd64", "Red Hat OpenShift AI 2.19:registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:12d75776a60c119d938dec28625f574f5d55a2616c49bb8773e5b87ba3141280_amd64", "Red Hat OpenShift AI 2.19:registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8@sha256:f3d8cc96fd3415efed5b5d69b7db622adc32cd9bd74ff14634d02218f1572815_amd64", "Red Hat OpenShift AI 2.19:registry.redhat.io/rhoai/odh-notebook-controller-rhel8@sha256:efa0c07e1cd20fdce0998aab507b8943e5eacbb464bc969bf1c7e9785a474eca_amd64", "Red Hat OpenShift AI 2.19:registry.redhat.io/rhoai/odh-operator-bundle@sha256:9668d85dd7a401d0fb9c4b55f92385b9626fc07f46de2bf900994774b06bda35_amd64", "Red Hat OpenShift AI 2.19:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:65bbc1f8225e1ddbf26a08003b10e4f93f1dc00f1ae2e23b20fc97b30eb288dc_s390x", "Red Hat OpenShift AI 2.19:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:88728b06c7da4b135eaa5e35d2f55411cef748bd6af69647fcb0b3cedffdabdf_amd64", "Red Hat OpenShift AI 2.19:registry.redhat.io/rhoai/odh-rhel8-operator@sha256:d7a6b499d67f1ae0e0e52b26e0a9b3affc41c5362f8904527ca8611d588d27f2_ppc64le", "Red Hat OpenShift AI 2.19:registry.redhat.io/rhoai/odh-training-operator-rhel8@sha256:cb92b95042cb633e2b3d031fbb4d80ed30212228038c80dddcc38c74d8f01cc3_amd64", "Red Hat OpenShift AI 2.19:registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8@sha256:1067eb5fc23943c6c508af77af19b823486ffadffbf5ce363107c1fb19a99dde_amd64", "Red Hat OpenShift AI 2.19:registry.redhat.io/rhoai/odh-trustyai-service-rhel8@sha256:3c6efcf160541e11cc71881edb6a0d88add89464b04d8b8e9c9954b1d2685888_amd64", "red_hat_advanced_cluster_security_4:advanced-cluster-security/rhacs-central-db-rhel8", "red_hat_advanced_cluster_security_4:advanced-cluster-security/rhacs-rhel8-operator", "red_hat_advanced_cluster_security_4:advanced-cluster-security/rhacs-roxctl-rhel8", "red_hat_advanced_cluster_security_4:advanced-cluster-security/rhacs-scanner-v4-db-rhel8", "red_hat_advanced_cluster_security_4:advanced-cluster-security/rhacs-scanner-v4-rhel8", "red_hat_ansible_automation_platform_2:automation-controller", "red_hat_ansible_automation_platform_2:automation-eda-controller", "red_hat_openshift_ai_(rhoai):odh-operator-container", "red_hat_openshift_container_platform_4:openshift4/ose-monitoring-plugin-rhel9", "red_hat_openshift_data_foundation_4:odf4/ocs-client-console-rhel9", "red_hat_openshift_data_foundation_4:odf4/odf-console-rhel9", "red_hat_openshift_data_foundation_4:odf4/odf-multicluster-console-rhel8", "red_hat_process_automation_7:org.kie-process-migration-service" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "no_fix_planned", "no_fix_planned", "none_available", "none_available" ]
[ "Red Hat Ansible Automation Platform", "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "For Red Hat OpenShift AI 2.16.0 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\nhttps://docs.redhat.com/en/documentation/red_hat_openshift_ai/", "For Red Hat OpenShift AI 2.19.0 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\nhttps://docs.redhat.com/en/documentation/red_hat_openshift_ai/", "Out of support scope", "Will not fix", "Fix deferred", "Affected" ]
[ "2025-03-10T14:46:24+00:00", "2025-02-26T14:58:54+00:00", "2025-03-27T17:45:39+00:00", "2025-04-15T07:52:02+00:00", null, null, null, null ]
CVE-2025-0752
CWE-444
envoyproxy
OpenShift Service Mesh Envoy HTTP Header Sanitization Bypass Leading to DoS and Unauthorized Access
Moderate
null
6.5/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
A flaw was found in OpenShift Service Mesh 2.6.3 and 2.5.6. Rate-limiter avoidance, access-control bypass, CPU and memory exhaustion, and replay attacks may be possible due to improper HTTP header sanitization in Envoy.
null
2025-01-21T12:07:54.692000+00:00
2025-01-21T00:00:00+00:00
[]
[ "openshift_service_mesh_2:openshift-service-mesh/proxyv2-rhel8", "openshift_service_mesh_2:openshift-service-mesh/proxyv2-rhel9" ]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "no_fix_planned", "none_available" ]
[ "Will not fix", "Fix deferred" ]
[ null, null ]
CVE-2025-21613
CWE-88
go-git
argument injection via the URL field
Important
null
8.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
An argument injection vulnerability was found in go-git. This flaw allows an attacker to set arbitrary values to git-upload-pack flags, leading to command or code execution, exposure of sensitive data, or other unintended behavior. This is only possible in configurations where the file transport protocol is being used.
This vulnerability is rated as an Important severity because an argument injection has been discovered in go-git, where an attackers can manipulate git-upload-pack flags, potentially enabling command or code execution leads to an exposure of sensitive data or other unintended actions, this vulnerability occurs exclusively in configurations using the file transport protocol.
2025-01-06T17:00:41.244449+00:00
2025-01-06T16:13:10.611000+00:00
[ "8Base-GitOps-1.15:openshift-gitops-1/argo-rollouts-rhel8@sha256:54abda352f19fd193a5890445d5c8d135f0c4044f4c62482d47f644f1a09000b_ppc64le", "8Base-GitOps-1.15:openshift-gitops-1/argo-rollouts-rhel8@sha256:70fc9ea0f6d0951f5946a4dbf89070e6323e24cb9977630be065595d6e624fa2_amd64", "8Base-GitOps-1.15:openshift-gitops-1/argo-rollouts-rhel8@sha256:a4e52634ee81ad62dff4b7d812c36a80ce847a652a84c60152dfc297692c488c_s390x", "8Base-GitOps-1.15:openshift-gitops-1/argo-rollouts-rhel8@sha256:d7f6f0ef41c85d522642ffefa773b56891ddb34d19c8a67246f60a2331009643_arm64", "8Base-GitOps-1.15:openshift-gitops-1/argocd-extensions-rhel8@sha256:70d3c68a3941408f72033ec39c13a9440eb1f03ab6ae37d46b90a7c209a4b0bf_s390x", "8Base-GitOps-1.15:openshift-gitops-1/argocd-extensions-rhel8@sha256:aaedaf766d9470b27d6fbb010eac810f46784b8d074ac532654b294f706a26fb_arm64", "8Base-GitOps-1.15:openshift-gitops-1/argocd-extensions-rhel8@sha256:ba3902b3e59e30c01ca8145bb16f2b0b51d419de59ef9e2e013cee4c98a23092_ppc64le", "8Base-GitOps-1.15:openshift-gitops-1/argocd-extensions-rhel8@sha256:eedef69c1b7496dc520b53e6e1ff7da33065c0086da79e48d794684446482ef3_amd64", "8Base-GitOps-1.15:openshift-gitops-1/argocd-rhel8@sha256:10ba43a5679d2afd61b5137abed33619d160679e9632b9d8de98c85c547d6014_amd64", "8Base-GitOps-1.15:openshift-gitops-1/argocd-rhel8@sha256:6e37e7ab0a6e55f38abef2f1cc1713570e200bac197aa5d4b8d3162a1f9660e9_ppc64le", "8Base-GitOps-1.15:openshift-gitops-1/argocd-rhel8@sha256:b9ceaf8a22e78df65ffa95fba4366e5765b851683f73589e8d85ffd38cbaa839_s390x", "8Base-GitOps-1.15:openshift-gitops-1/argocd-rhel8@sha256:ecdb61f00e9ea64cfb5ed37dcd060d76043bc35b9db90a395b247f36de88ca0b_arm64", "8Base-GitOps-1.15:openshift-gitops-1/console-plugin-rhel8@sha256:624cfcabed8a404f04cbca3b7b0f6d7e63ebff624462f2c018eabe34c62645a8_ppc64le", "8Base-GitOps-1.15:openshift-gitops-1/console-plugin-rhel8@sha256:b02c241ec40f32d9fb31cb733a0d6f86163fc1588e043cabe814380ad7506450_s390x", "8Base-GitOps-1.15:openshift-gitops-1/console-plugin-rhel8@sha256:bc671a2a360cfc25349a52014e8cdf2e458858932b0165819b30811eccba5df4_amd64", "8Base-GitOps-1.15:openshift-gitops-1/console-plugin-rhel8@sha256:e4deb2da29aa4a5f76e49553143892b23fea420eb6e5459607c399a90fcba68d_arm64", "8Base-GitOps-1.15:openshift-gitops-1/dex-rhel8@sha256:032f1df977d734277e6233215a21391bd5de169038e3f8a36ad7915308fb40c8_amd64", "8Base-GitOps-1.15:openshift-gitops-1/dex-rhel8@sha256:300308a16440280f490b15d91209b70b6125a3a3ce3ad644b2701a521e04d1c8_s390x", "8Base-GitOps-1.15:openshift-gitops-1/dex-rhel8@sha256:5d20db826bd4be6e9cda1cdddfe9b5029ea176574c5968ce8336016624fae94d_ppc64le", "8Base-GitOps-1.15:openshift-gitops-1/dex-rhel8@sha256:a45731d6088b941baf4888683fd93a8b3eb40ad1944d1fea3bbfe74614de5303_arm64", "8Base-GitOps-1.15:openshift-gitops-1/gitops-operator-bundle@sha256:8a0cde220937294ed559ee9dcbcdc840956270fdc66e917a0fe5f5971cf18f4e_amd64", "8Base-GitOps-1.15:openshift-gitops-1/gitops-rhel8-operator@sha256:0186a1987434299a9a88628c2175d9b41b4e04b7b21763b3299ba05ccbc7f1fb_s390x", "8Base-GitOps-1.15:openshift-gitops-1/gitops-rhel8-operator@sha256:6668b79c2823c75293fd6b207fa086fcf58c54f380faecccf0057cbe354b67ac_ppc64le", "8Base-GitOps-1.15:openshift-gitops-1/gitops-rhel8-operator@sha256:8da84540d819efcc3e4dc61b343b3c300e4983ce89b07b43e724ceca648d3f0b_arm64", "8Base-GitOps-1.15:openshift-gitops-1/gitops-rhel8-operator@sha256:fbfd9db0d70abb2ea55454c18c477d842af2511b3c0021b4ee9cef0dbf6cbab4_amd64", "8Base-GitOps-1.15:openshift-gitops-1/gitops-rhel8@sha256:3bb7c771c4df60f54636d2c5881650f0c6568fd6aa0ad7612ced26602f1daf14_s390x", "8Base-GitOps-1.15:openshift-gitops-1/gitops-rhel8@sha256:7e484f65fb5ee60ac88442b86b1c0b9b7445d0bf4e076adc488eea8f478ca544_ppc64le", "8Base-GitOps-1.15:openshift-gitops-1/gitops-rhel8@sha256:be7dfa0097a992b956c527adec6abc468276d388af224764b3004320583f8f67_amd64", "8Base-GitOps-1.15:openshift-gitops-1/gitops-rhel8@sha256:e72bb97d563bbe9067ae1ebb13f29fb6dc196026da35c4c79bf066b1afeee6ca_arm64", "8Base-GitOps-1.15:openshift-gitops-1/must-gather-rhel8@sha256:6ad9786a1fd4660c01c6aad2ae9b95a0b31d247958e4cd03bdc3394165daec41_amd64", "8Base-GitOps-1.15:openshift-gitops-1/must-gather-rhel8@sha256:8918cfdc043b76ee6eeffce4b98526fd5bf5dc04666dd258ab7bef24dc229505_ppc64le", "8Base-GitOps-1.15:openshift-gitops-1/must-gather-rhel8@sha256:8e0272a8be845937d59edb1672c8a04c354ca02b218e60330d2c8acc50a6fa34_s390x", "8Base-GitOps-1.15:openshift-gitops-1/must-gather-rhel8@sha256:bde5cede7067dc3fe3407101086cac1f1c61f7b5314e7df0d48b47f33701df6e_arm64", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-main-rhel8@sha256:0e867de15e3038db7274dc1d84cd8ca5b1860b661c8b16ecd8f7aeefa76077a8_amd64", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-main-rhel8@sha256:1aedb2f4b2aefa9586c8aecfff4647497f7a36fc6a547d6688645d87e90413f4_s390x", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-main-rhel8@sha256:92f98ca560ce539495108e6212737ea6cf83215fe0a5aa7a12636ee9d5fca88f_ppc64le", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-rhel8-operator@sha256:2f74522967f06958e385468a31e14bb9ede90569dec8292d61e67c6640c1ebde_ppc64le", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-rhel8-operator@sha256:38b340062dea9adc1159a326d39a214541e259e9e16582ef98efcd8e6deb3dd6_s390x", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-rhel8-operator@sha256:609205741b369f72807fcec1fd3351d56e4605fdbbee37975fad8c01a5ea0339_amd64", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:1ab2b5e9423a2edd5f663cdbf4c15dd6a5c13db13125161f4b4a9916d3c523e2_s390x", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:1e37a386006e4a7b4414dcdbe6a42191b8f41e706e1df6dfe401cbdbe342f06a_ppc64le", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:b0f32d062678d69350a3a1a18b643c8b97ebfdbd0bea1c0ee67312312d02fcba_amd64", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-main-rhel8@sha256:19a9d111b5fb8fc6a01149c56bc4c131dfd418e2ca42f889078e9d015e1ef28b_ppc64le", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-main-rhel8@sha256:87639cf63f9a0aa09ea8aed99fe8625922e61bd3cae5bbd959e68a825072788c_amd64", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-main-rhel8@sha256:a98ebdd3991efc207c83306020a4146da2bdc5678eb10efc52113093eb831915_s390x", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-rhel8-operator@sha256:257f2893d8e4600744a688fdc49499e70242cb4f93b862755b12b29fe83d44db_amd64", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-rhel8-operator@sha256:4eda1ddfd36a0a06750640c26a124a9c203bd578d8431145be35be435e0848e7_s390x", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-rhel8-operator@sha256:c617fc54457d6fcbe4d2d93ae575ef714f2ba03b82a557adac71a6408a9a33c7_ppc64le", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:9fa462358a39923f6306b016314cbe923dffa46e27b2b53a5a77934f416c840d_s390x", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:f4f22880b6ea0e5b97dd19c311ec00bf650e670373e14aaa29690481503e2fda_amd64", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:f77d20eb21bb79808805804465d5e5cdf1f390aa8029a9bad597a0813ff0bf0d_ppc64le", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-scanner-rhel8@sha256:1bf7195f2709e56a3961e58aaf3199b7f696d6f973f98fc91c76153923e72cde_amd64", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-scanner-rhel8@sha256:aae8aa35d456489ab247e1143e61bce73d20a4eee5337345ac2957b1dd9d2a61_ppc64le", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-scanner-rhel8@sha256:da2af83d28dd25c8b2255d299155308c5d03aa2ff507695297090bbef8db2b1f_s390x", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:68b336dc6aad04c2003762b310df258750d125e7e3d09743fbb3fb9570d885e7_s390x", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:d96c936f85a4d733c37f7da7b5dcde27bcad7a154abca48c3ee8f9b7baecc319_amd64", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:ee19b41a12ead98be6d8bdedee09e50f9da66057f7de6f6bc0f11021d49a61d9_ppc64le", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:9abbd37870679b1ece3da858f3bc9f107a43203ff43a4aafcb088d3e3803e678_s390x", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:b922026dc0b8dc7247ab27ffd8215bf2e958db753355871158ef4e0d5d2df33f_amd64", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:de629de8581767a407bfe73eaafd17fedf353a09e8c0f0a18d81605098704af2_ppc64le", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:c153ef8bc0473cb3f5f6498c14609c8bddfc5c0fed33442144c79f5d42be190e_amd64", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:cbb1e220e27abb38b72ed2dcb8832fd183d26a069df72ab56b57523d8076ae40_ppc64le", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:dc546d7821c65e970d5b5f05fccb98eb220a0328ec5a3c806096113397798ad4_s390x", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-central-db-rhel8@sha256:0637515b7c3a9dd832e307354154b8c7fa75339beb80ea77e7dae913a24455f3_arm64", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-central-db-rhel8@sha256:7d351aa33b448269774a2d5c68641e3175106697c41f4080bf37d5060fbb880b_ppc64le", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-central-db-rhel8@sha256:897c5db46b7bf6a19edef564e7a220e1a805ce6430befa7bb84a7b20ffa658fe_amd64", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-central-db-rhel8@sha256:db7daf08455c13fa410ef853846b3111985c44ade1ca7f1665fa00035b88116a_s390x", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-collector-rhel8@sha256:71ef8e29a7c357e4e675231edc1913936e8ad9595d0fd692aa1cc02458f32e73_s390x", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-collector-rhel8@sha256:7ac9c2c80b0890b754a9b7a85bbe728b10fad296f62c847f0efbbabf3f1f4efa_amd64", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-collector-rhel8@sha256:a927b48c033107874150cd263733a7eac32915b8ea2c31e16e4db7dbb00fd80a_arm64", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-collector-rhel8@sha256:dd50c86cd53c5318ae11b096f5c78abfabac475a8409f0bff6160653b773477b_ppc64le", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:370adafec946643bd92600cf28a609afe97f7d33f39a13c93564318212a11fba_ppc64le", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:8ba0add727872e6d0544742fffd28445c85ee416b569e23e3122d024c6f553d0_s390x", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:c5503623080ad76434ab6a409ddcdb2f8b7368b01f6c1c9accbb8590dfe0f835_amd64", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:ecf659bdaeb9cbbfd0f5178ffc83b7b8474b5dd83ce565e50c57f18599dcd0a4_arm64", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-main-rhel8@sha256:4b9a01b61e1f72eb9103718c6fd08f89f3776ba2b0807a8721e890397c158475_amd64", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-main-rhel8@sha256:5248ab4d7994e809e5cae15758231e7844dbd6772351b257cc4b0a90f4eb9ccd_ppc64le", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-main-rhel8@sha256:6b5d06e7effb97bd532375e8982ff4396924355fccb161be19df0dc121a098a1_arm64", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-main-rhel8@sha256:cf0baa500f79525bc439f9a78b9b03a0b7b830b9a9e8bcd01789773a233f625e_s390x", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-operator-bundle@sha256:1b858171a34a8675ef4fcd4edb3fa5f6dcdc26363c098ed014c3c505ddafc010_ppc64le", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-operator-bundle@sha256:27ec7980c04f5b96ad178bead12062f262897a06ac6fc51543a8b8b61d9ea269_s390x", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-operator-bundle@sha256:324eafac9e2a9000c6032f152867defb4f4402ae8772677d7a1b45eb6df1b9be_amd64", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-operator-bundle@sha256:c4413a7101e8cb95d7b553becfd69590abba5dceb436731be0c754b3e381ecc7_arm64", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-rhel8-operator@sha256:05cec447844c375d7cf670dd2c8293e35b7e81c2a126758a91c6ae04a64401db_arm64", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-rhel8-operator@sha256:55164e6fbdf6b08812cfa1f1e15a93ad735d7494dc5e7a496c6c2508c2f1e2f7_s390x", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-rhel8-operator@sha256:effc0cd6a09c7c1ce2b3a46a46ed4cb9f4b1ac65f3af783a7404a7b22a0d3db6_amd64", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-rhel8-operator@sha256:fe38999c6c30224a453027c1cb9117df9d742c4056a8997054e7f299e266e9a8_ppc64le", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:47ee46377a875b4ee7fb4922b76bb1db5035fa8e82ec1b03a48408eb6855429d_arm64", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:56cbedab509cfe2b8773aa900ffb2cd8aee062811bf896adeba0cc7ae8baa77f_amd64", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:5beee87ab3af6b57d69c5aa480adf1c5fd01a54b3e144261e05b28c62ddf6e3f_ppc64le", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:bfaf224ef748c3fed475dbcf59cf1e0d0eca143584e5e046a246ab3820fc1883_s390x", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:069f10febc09200e10c506c43d5d3481ccdc9a707c293fcc3ff923d5320ea585_s390x", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:15b02a2b037f2713fd3bad41506f606cb5bb7d4fe2263b54bc0597ecfa44bfb4_arm64", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:202d116ef0d6208b1ed44c9bfb0c1527dad0e44031d2b9babe7fa25eee0197cd_ppc64le", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:9929ec613b4bc008705bee775b56aec1c4729c2f0c1d572239a75424b246452b_amd64", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:0b71db82ac2b8f0264bee530aa272993b056d64ead4c414ccdc80876a1a2a514_s390x", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:dd878a23562cecc5f2355c9c826d3ddb4713f4c813898f61d26db3fb2135be19_arm64", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:f2109b7ec783bc98539c147b43a0b747f571a02bf78fd70220d3f9cbb5b2c9b4_ppc64le", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:f902f9109751eba20c26a8cbe89c52c18467d8166ff33716c79390d743d756a0_amd64", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-scanner-rhel8@sha256:05fc5fa02cb04737a083b29d0d344da428f8d0b8fe24229715d5d6512dbab2f1_ppc64le", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-scanner-rhel8@sha256:2b148ab44d673170159d896149c480b13d7e3e07fe7e702f61abf15fbcec8882_s390x", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-scanner-rhel8@sha256:4eb006cb064275d6e47c4fdb42e0805b4974caecaf2b9878dc06ac82e186cee5_arm64", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-scanner-rhel8@sha256:d38ac805c3a827fbc01686ec53909c919eeb4e5d62730a7ec67d29fbd00bf049_amd64", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:797637fd0bc37a7b30704a1984e577c5f0b0a3c803ac310efa89bcfb1322799c_ppc64le", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:8b8a5b8e29bdbf775d24d0b8c4c57cc9e814e2b98932885fac75ca941f1059f4_s390x", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:a660c5f705d4a5bba018c987ab3558581b0d7f897451dd161fa0b1e96d63b0c0_amd64", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:ff9b43c864927a14d216946d82ed149666a415ceb792b29333e4f5a81a2c8763_arm64", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:5f38522cec9a86c17a565cd3eff51c1960a9ea171a786d8af4244ca141f7f285_arm64", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:c7ad55ea10b42df125ebeb4088a3080d769d8566c0046b2aac79b30111a6db0d_s390x", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:cadfef388d0185bdb3e972db36be19c4cfca4ab13b416947fafbd5e6e3501eb1_ppc64le", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:dc6bc09d80acc2ca1cc43925c7dc634f4922b5e1849ff5a30280002f6767ad6e_amd64", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:00c40603219d626508f58cabbca453b88587269803c682a4a9ab68b926374c25_amd64", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:14d59c045358ddfdd8356064b5aee3c05d87da10624b57598da8adf888c3bdd5_arm64", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:c8c9b44f7d1f1d200bf305adc21fa1ad8b19159c7ffdcea1c1b3a2ea2be4646c_s390x", "8Base-RHACS-4.6:advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:e2ef716363cae00391514b83a5952e0dd925a8665af01b9a890a7c11c8079024_ppc64le", "8Base-RHOS-16.2:rhosp-rhel8/osp-director-agent@sha256:2732885be77c420c09d4b193256f98f791fbaf68b0df53ce74a075312d5909be_amd64", "8Base-RHOS-16.2:rhosp-rhel8/osp-director-downloader@sha256:d2a3d5f1197063fdfe3243eaf9ecb599e77201a06a589b9021845e4fd1d3473c_amd64", "8Base-RHOS-16.2:rhosp-rhel8/osp-director-operator-bundle@sha256:65acbffc986354da1ce64aff2f02fb32b91a307852317b50516adc19f2c75c6e_amd64", "8Base-RHOS-16.2:rhosp-rhel8/osp-director-operator@sha256:f688739a10ab007f7a8a0de75327d56a67a9da1182d9a06130d75e0b57617da9_amd64", "9Base-GitOps-1.15:openshift-gitops-1/argocd-rhel9@sha256:c9d2d89362ef62cfa399982ae562951f563c64b4eab91fa2afd46eeca12cd5ca_amd64", "9Base-GitOps-1.15:openshift-gitops-1/argocd-rhel9@sha256:da7aad32b7efbb522fbb0a1401b990ec62333d13158f5a6facc7cfc586db846b_arm64", "9Base-RHOS-17.1:rhosp-rhel9/osp-director-agent@sha256:a72382bacac1d99ee3c7391cb76b5930e9424b6e8fa3deed8dda03b054495f84_amd64", "9Base-RHOS-17.1:rhosp-rhel9/osp-director-downloader@sha256:034891a629861fa1e3947466141787d5211b97e69f0d2b7a74516bfeb9f191d7_amd64", "9Base-RHOS-17.1:rhosp-rhel9/osp-director-operator-bundle@sha256:a5a31f5e21b190a208348d5d1e3c8f791ffdf7ec7c1d65f80bd796cf4522d014_amd64", "9Base-RHOS-17.1:rhosp-rhel9/osp-director-operator@sha256:93a5bf00b2caf1f65558275f8fa18a36286134010b72d16e4b8ac72ed1e460e5_amd64", "9Base-RHOSE-4.16:openshift4/ose-helm-rhel9-operator@sha256:2c73f9f28f5788ec49cac43923e6fff443b2f687930870a3822a92bc62029829_arm64", "9Base-RHOSE-4.16:openshift4/ose-helm-rhel9-operator@sha256:592e782c5e1c5d8bd0e12e165e2fa4769db28ee80f36b38caccaa1e94ae01c82_ppc64le", "9Base-RHOSE-4.16:openshift4/ose-helm-rhel9-operator@sha256:7727d785c5c91450aa376e21e048c4dcb9c743013b6d369030c851d9dc576749_amd64", "9Base-RHOSE-4.16:openshift4/ose-helm-rhel9-operator@sha256:d469976c1a96d26c42baf02391bcac3994cac27955a10b4753b13e22b2ef4617_s390x", "9Base-RHOSE-4.16:openshift4/ose-operator-sdk-rhel9@sha256:4a71bf0d426159f85a890c762cc54c831bc5f18cebd58918e00f13d3f381da85_s390x", "9Base-RHOSE-4.16:openshift4/ose-operator-sdk-rhel9@sha256:a37bc2569541975dc85b91b0426a2a157b3c1f390c76ea79b11a1437344b1c9e_ppc64le", "9Base-RHOSE-4.16:openshift4/ose-operator-sdk-rhel9@sha256:bc2469da8833eec1f137ae8203e17be1cded1ff746da08b78d76037c99979647_amd64", "9Base-RHOSE-4.16:openshift4/ose-operator-sdk-rhel9@sha256:eeb1d99595529613cb094b8314fe28cf61692c6b2c670a05f9d2bc2b0e7db7ee_arm64", "9Base-RHOSE-4.17:openshift4/oc-mirror-plugin-rhel9@sha256:0d5e52f049e4cd68865b47d045751b601358647b8e37cefa6a4d38c50d8583fd_s390x", "9Base-RHOSE-4.17:openshift4/oc-mirror-plugin-rhel9@sha256:381d7cb58b80aec04cfcf79fe7b996b28fccb6788cb29e93723e0ced0833f034_arm64", "9Base-RHOSE-4.17:openshift4/oc-mirror-plugin-rhel9@sha256:96bcdb886ba0645b2312ef51e45e96542c9cf5b653cd7a1c3a45ba7c011e46aa_amd64", "9Base-RHOSE-4.17:openshift4/oc-mirror-plugin-rhel9@sha256:b68e54c2aa7e0255bf11589b7e66eb03fde030fdbf40ec546ae520ad6e8bc9a7_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-helm-rhel9-operator@sha256:036293189bfd0cfbb075fa212edf98077ade272388a5812ef7f3feee2ffab9d7_s390x", "9Base-RHOSE-4.17:openshift4/ose-helm-rhel9-operator@sha256:038f137f7c4e6ba3220328bae057c41bd9f6385fbf6afb6da2cf1946cc03e6b7_arm64", "9Base-RHOSE-4.17:openshift4/ose-helm-rhel9-operator@sha256:dc9a97a71651e3c04cd461ce230555b5a4cb28e101cfd59bc01ed6da19c4e6a6_amd64", "9Base-RHOSE-4.17:openshift4/ose-helm-rhel9-operator@sha256:ec75c80a4825b3646ec061e3a125706f7a6edf986d66680e2fafdbfeaeebfbd6_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-operator-sdk-rhel9@sha256:24c0960f3e30a43373e26c8929c17b9cbe2d721e97ee17603f13045a494261ba_arm64", "9Base-RHOSE-4.17:openshift4/ose-operator-sdk-rhel9@sha256:6c9b5daf583445bfd83ae87d3dd655e8eecb795a819ec4a07b90c02a413ffc88_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-operator-sdk-rhel9@sha256:8b40e9a56b60055f670a4fcc4da4a093c85d006e48053e7cd83a068aa653b724_s390x", "9Base-RHOSE-4.17:openshift4/ose-operator-sdk-rhel9@sha256:e3205b40d1b837d61d3fef16c2d304a7302bc05fa30d0d53fcf2d64dd597cbf7_amd64", "9Base-RHOSE-4.18:openshift4/oc-mirror-plugin-rhel9@sha256:15a0f6f9bcf974ea04f568d8a76d28aa3c615a5830776ef7520aa3f5d437c8fe_amd64", "9Base-RHOSE-4.18:openshift4/oc-mirror-plugin-rhel9@sha256:37623c5155848eff8a81689170355052ac7d30383d5a4438f96429e559701ab3_s390x", "9Base-RHOSE-4.18:openshift4/oc-mirror-plugin-rhel9@sha256:5b07a83d57c356541cee2448400802b80080c7646e23cbf911df40090dcc4aae_arm64", "9Base-RHOSE-4.18:openshift4/oc-mirror-plugin-rhel9@sha256:6bbe7e2d31a50b3bd96ba80ab77723a59e44abf96fe6d8dfb0df1d16b73c862f_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-olm-catalogd-rhel9@sha256:426758513bc2c2c21641497b04320146e2d81c4c66b5649ad0d1f1b58e1d3b03_amd64", "9Base-RHOSE-4.18:openshift4/ose-olm-catalogd-rhel9@sha256:6d37a3ca2daa64b5fa13c8424f6a210a12acc3691060c9f20eb5da332c652280_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-olm-catalogd-rhel9@sha256:bf96673ab34983e56625ac0e6c0abedcf0221cd2ba265235441e1c6a32d57cf4_s390x", "9Base-RHOSE-4.18:openshift4/ose-olm-catalogd-rhel9@sha256:ff46be93ed7bc575602c94fddea747f84104471140a2d4633867a994ae5c466c_arm64", "9Base-RHOSE-4.18:openshift4/ose-olm-operator-controller-rhel9@sha256:0df55fc2c5d4777103bca758928f89780d94cca9f9873616c7396e38f403adfa_s390x", "9Base-RHOSE-4.18:openshift4/ose-olm-operator-controller-rhel9@sha256:2d5c3b3b56df8608d68baa9d89921d7c34c22d6bec8e69c148c39a2d4e7c86b6_amd64", "9Base-RHOSE-4.18:openshift4/ose-olm-operator-controller-rhel9@sha256:3d02a54006f0b0edce501e1dce9c5aa6b848c822ed27007ab961a172c12a805b_arm64", "9Base-RHOSE-4.18:openshift4/ose-olm-operator-controller-rhel9@sha256:62317311780640473d064953685db0f44495a82a7e9bda6b5637644e58dbc561_ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-21.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-21.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-21.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-21.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-21.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-21.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-21.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-21.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-21.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-21.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-21.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-21.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-21.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-21.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-21.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-21.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-21.el8_10.x86_64", "AppStream-9.4.0.Z.EUS:grafana-0:9.2.10-21.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:grafana-0:9.2.10-21.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:grafana-0:9.2.10-21.el9_4.s390x", "AppStream-9.4.0.Z.EUS:grafana-0:9.2.10-21.el9_4.src", "AppStream-9.4.0.Z.EUS:grafana-0:9.2.10-21.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:grafana-debuginfo-0:9.2.10-21.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:grafana-debuginfo-0:9.2.10-21.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:grafana-debuginfo-0:9.2.10-21.el9_4.s390x", "AppStream-9.4.0.Z.EUS:grafana-debuginfo-0:9.2.10-21.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:grafana-debugsource-0:9.2.10-21.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:grafana-debugsource-0:9.2.10-21.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:grafana-debugsource-0:9.2.10-21.el9_4.s390x", "AppStream-9.4.0.Z.EUS:grafana-debugsource-0:9.2.10-21.el9_4.x86_64", "AppStream-9.4.0.Z.EUS:grafana-selinux-0:9.2.10-21.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:grafana-selinux-0:9.2.10-21.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:grafana-selinux-0:9.2.10-21.el9_4.s390x", "AppStream-9.4.0.Z.EUS:grafana-selinux-0:9.2.10-21.el9_4.x86_64", "Builds for Red Hat OpenShift 1.1.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:a580ad568b67732135f47081d17e92f2848d571f934f31ab650984cc8eb3b0f4_amd64", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:45cd2b802f8bd908cdd720114280aab2af6e1cbcb3575a454c451fe77a9aa107_amd64", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:919bec13026b0e218c8c020c3509f2caedaa7f2ef3745aaa973eca57244519c0_arm64", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:962926092da8e580676643a5484cc4120b7261efcebd267e078def5667f7e069_ppc64le", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:f99a08e2fc4b3d35af37d96da9c6d397ccd05cd3a03fcc588ed6a7e12a1d1575_s390x", "Red Hat Trusted Profile Analyzer 1.2:registry.redhat.io/rhtpa/rhtpa-guac-rhel9@sha256:2dc71ee6e8c55a29b6dd68006c7d0365154d35c850021d8b4b77e24b4e8fd1a6_amd64", "Red Hat Trusted Profile Analyzer 1.2:registry.redhat.io/rhtpa/rhtpa-trustification-service-rhel9@sha256:eb2e0b1003ef77c39b28fe9fbe2ca8141aa72160bdcd7d55eddac2c16629d7c4_amd64" ]
[ "builds_for_red_hat_openshift:openshift-builds/openshift-builds-image-bundler-rhel9", "openshift_api_for_data_protection:oadp/oadp-mustgather-rhel8", "openshift_developer_tools_and_services:odo", "openshift_serverless:openshift-serverless-1-func-utils-rhel8-container", "openshift_serverless:openshift-serverless-1/client-kn-rhel8", "openshift_serverless:openshift-serverless-1/kn-cli-artifacts-rhel8", "red_hat_advanced_cluster_management_for_kubernetes_2:rhacm2/multicluster-operators-subscription-rhel8", "red_hat_advanced_cluster_management_for_kubernetes_2:rhacm2/submariner-rhel8-operator", "red_hat_ceph_storage_7:rhceph/grafana-rhel9", "red_hat_enterprise_linux_9:grafana", "red_hat_openshift_ai_(rhoai):odh-data-science-pipelines-argo-argoexec-container", "red_hat_openshift_ai_(rhoai):odh-data-science-pipelines-argo-workflowcontroller-container", "red_hat_openshift_ai_(rhoai):rhoai/odh-data-science-pipelines-argo-argoexec-rhel8", "red_hat_openshift_ai_(rhoai):rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8", "red_hat_openshift_container_platform_4:openshift4/ose-console", "red_hat_openshift_virtualization_4:container-native-virtualization/cluster-network-addons-operator", "red_hat_openshift_virtualization_4:container-native-virtualization/cluster-network-addons-operator-rhel9", "red_hat_openstack_platform_16.2:osp-director-provisioner-container" ]
[ "8Base-RHACS-4.4:advanced-cluster-security/rhacs-central-db-rhel8@sha256:394f4fd42c292ef68abf4a9104fe668026e394c3243ebf9b184d40a4b4b0132e_amd64", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-central-db-rhel8@sha256:6478816c1b2bdeb40c77c267fff033dca5523375c64623bf56d493c4417a3c3f_s390x", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-central-db-rhel8@sha256:8b92405457c5240a4d672409a7519d28463f2f0e104f441e3d0d0839549c6215_ppc64le", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-collector-rhel8@sha256:39367ad4f4807b804eb6a95d241d99c528995f75d3264b58820cf50fa6abceef_amd64", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-collector-rhel8@sha256:a5a1e18726ce755a8f2a36a58928714d61f4426643b7f08da086004982e993ef_ppc64le", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-collector-rhel8@sha256:cd132ae4b02647d5b0f0a910539c75efb3e0795590df00056542e969605ae296_s390x", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:357fa537a29f82ca117b8ed4695456707bd9599c5057ed938a91114e94badf62_s390x", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:62ddbd8b9e0b27be7a0541c7fe085b621834facff7d83d4a2e57b56ef6c713a2_amd64", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:94b445cbaef0111d98a0ee595988ef420423aa381b36e7127e76e385be12996a_ppc64le", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-operator-bundle@sha256:123c0108bd7a190dd2accfd21786600f787147f040e57fb5f840861e2caa441d_amd64", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-operator-bundle@sha256:6f81e9b903594b0a8bd5517900f7677e09c942953d257c87da11fb779e0f9dab_ppc64le", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-operator-bundle@sha256:8c199930239623166973ea9cdb40ce2e2537d63e8c731afca3892caa84d2f16a_s390x", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:439fc3b91a4841c81355ecbb5c610c66139525df82bdb96a4ece4ffd20aca0a5_ppc64le", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:7108fcc2c26b8e735231d9bad43febbc2ccc15723b15d3bf9ba643f950f75857_amd64", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:7c4fa13ab624b17711df308a9434e529b49b259fe9c6bde4b4e9037ae45996d6_s390x", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:62df44281133dd4191848bfb861ba70eeb113b2bc0ce28c71b82524860421bed_s390x", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:844cef84fb29ee2996c284c6d517a645d4b14862c17021bd1b0052515cd364df_amd64", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:fc974b15c869a26e0ae259a39ce0ed1f1954630557c31465561eeee67bfc2797_ppc64le", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-scanner-rhel8@sha256:08c488f99ef1c837418842db1c8e52391a55f5f61a1de98edbbe3a201070168a_ppc64le", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-scanner-rhel8@sha256:20a368484142ce585e3a49a402bab10b2045ba2d89711154ae80457c01881a4c_amd64", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-scanner-rhel8@sha256:f252a2c2eaa0a4807e39df8e5fe89a8b66e8ef62a9303a144b765c4857b17e51_s390x", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:17a5ed5cea7a0b355ea13e6a95218143c351e34cee1ba0188a14c28f9605e504_ppc64le", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:1d00cc8be3101e0a0a901249545566689d1de5554f5101b8fcbb6fa1827d508b_amd64", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:d001fb8afaf083ac3b02ab7571a709183931ef37baa75908556081480ee395dc_s390x", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:1ad40dd05581bffe04db700b8b4fbfbe8112399f2bef70b69dd690458b6512ed_ppc64le", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:224bfa6af3a2a9b15657ee0adc0233608bb7a2218f9a488b537e3af4c53acacf_amd64", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-scanner-v4-db-rhel8@sha256:f2cf132ddd130c3de1e3732f35fdade709c17e8a2775df5ab47cf7583db82fd6_s390x", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:9ae99a357ee1f9e42942edc998b378960d1a4a6bd9630b802f86743965f36898_s390x", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:bcc9fd4d95422283c8d6016e1f85cd4522f43c0504cadf6aec40b9c30f2d945d_amd64", "8Base-RHACS-4.4:advanced-cluster-security/rhacs-scanner-v4-rhel8@sha256:c9713eae9be9f99e9e7382ace5f520f96f641c50d8aed1c64a0f6a0ba9ed5395_ppc64le", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-central-db-rhel8@sha256:0ae5e45fe68d907fdfc1fdc9d4b040074acb8bc36cf979fe192451d48787707b_s390x", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-central-db-rhel8@sha256:3e77d381ec1ef080140b8f4d71e3dd078096abd9409a8dfc9ea2b8f38cc66d2b_amd64", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-central-db-rhel8@sha256:d42f1ed5f7e32313c51f59b5e10d2bafba6c51c3f47a53cec92b3bfeefca9e3c_ppc64le", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-collector-rhel8@sha256:13d2f304f1a54b5809649c3118177a310368490ed45af13b385b1bf648a11216_amd64", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-collector-rhel8@sha256:4eb90f3bb36a84d01e963bddb088c1f29777ba14e3317c4007b2d373c24bc6b5_ppc64le", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-collector-rhel8@sha256:7f6314e00a332f7369908d6f64fed35ce21854ea7cb4e7f492da28fd4feb5256_s390x", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:0f2e0de230f704fd915e43aecfa5bb49bbba5ee814b32d606980403f21999dd6_s390x", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:2f831bbdc78a748b9be5b92857ba4f66fd357436520c04fe279f6dc1c6139216_amd64", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:f667a0644465523f295d7feae6f2e264e127e0e98cadd192519b8be9c4974b37_ppc64le", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-operator-bundle@sha256:0af77978ee01c000b343197ae45812e3579f521d9a7301d7ae9eb25fb0357145_ppc64le", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-operator-bundle@sha256:56772b736bb1aec1b10d38d4c2b18bcde17b450b55f8c260ac38b23bd6c85b5c_amd64", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-operator-bundle@sha256:68e30d15136c47a03a4736e4a8e569bf50593162996b04c76de89d9b541e4f52_s390x", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:2e4d3444239d131b8e50e60ba8cef0ad270750a99958c246d3c9e1a446e710e3_ppc64le", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:36c603b86b770d2ff35a98665471e6441f51ea56ffb819c6ac3d530e86d1f6c9_amd64", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:7a5735d8ea892ad522179d10d6c4701798baf1bdbc6ed4b4f555ef2a30738670_s390x", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:86e6f9339c16c873473c304220e2628593fe85c68ee9d8f7e68bda3db8106a9d_amd64", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:ad3bfe5d8946806355611ca93d5c7b4cb48e55d21f13131c43690452687f1d41_s390x", "8Base-RHACS-4.5:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:cb822f22db66571f9cbff1e0f26cb317946f43191da21e2723d8d56663278d80_ppc64le", "9Base-RHOSE-4.16:openshift4/kubernetes-nmstate-rhel9-operator@sha256:1b5af66a03bbee27b42b638518b5d7be74957ffcbc475e9cb7a5e5e739e61ca7_arm64", "9Base-RHOSE-4.16:openshift4/kubernetes-nmstate-rhel9-operator@sha256:4decb51af068d99b41641772ae0c7c8f68d6778208188349dda869380798904c_amd64", "9Base-RHOSE-4.16:openshift4/kubernetes-nmstate-rhel9-operator@sha256:8d49093751fc5268b072332a4a81105b78686ade7d1756c944f594a2a68b2376_s390x", "9Base-RHOSE-4.16:openshift4/kubernetes-nmstate-rhel9-operator@sha256:ec64a214adab3ab56bc4715eabc08cf126233581af89b6aae42efa6c6bd5a77c_ppc64le", "9Base-RHOSE-4.16:openshift4/nmstate-console-plugin-rhel9@sha256:0876977b02c66c9c436e1b709ef0890eb37ba6000cc66b359bc43a82f9c9326d_amd64", "9Base-RHOSE-4.16:openshift4/nmstate-console-plugin-rhel9@sha256:6e313156ab2ef86df934c5d99ae44c903ae746ee34f5c5cd30caa208ae5582f0_s390x", "9Base-RHOSE-4.16:openshift4/nmstate-console-plugin-rhel9@sha256:c0e47eb928f6c654311d01b6d5da68adc37107121803285e09765bb06425b915_arm64", "9Base-RHOSE-4.16:openshift4/nmstate-console-plugin-rhel9@sha256:dc5dcc9ceeea24d521bd2f4bcfedb1f55481e062742241f4f13a94329e1c3477_ppc64le", "9Base-RHOSE-4.16:openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:4f2c25fd49437dbbe01c064343441b7a1940bf6e42b434f5cf72f573c75435fa_ppc64le", "9Base-RHOSE-4.16:openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:570b11c05d8eb8967714d6168524be2d28f5a83c3e59e267c07144d5df341067_amd64", "9Base-RHOSE-4.16:openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:7662039b328d514fe1e03bd241f0a24d256f752e2a5f26dde75f29df4c10b686_arm64", "9Base-RHOSE-4.16:openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:87c9ec8b5274b20529c0b0e5871039259a1e6cd1d407c23975defd524ebb59a7_s390x", "9Base-RHOSE-4.16:openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:2d6d320242a0f7ec5b8ee1451e3539122d54f6f7def159baa342c9dee169303f_amd64", "9Base-RHOSE-4.16:openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:312ebe2043b6984aa93affed5658e8e60808a2635f4beee363a00ff92704039b_s390x", "9Base-RHOSE-4.16:openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:c9d29ddc6decd6358c7935eb1fcf8a920db2e04bdc6ebe30d09b7db83519a69e_ppc64le", "9Base-RHOSE-4.16:openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:d9f532de2030bf0c8ea5cb9b2549a8077362e72dbcd0ea876bace2ebe2ebeee7_arm64", "9Base-RHOSE-4.16:openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:69d8ba95cb2698724dc5be762e9403ce82662cd4f65d9ed824592e8b26ce44ae_arm64", "9Base-RHOSE-4.16:openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:be270a7728e5521da321031734c186f415fa8e9d51d692e8cae7df3e0e2f6919_amd64", "9Base-RHOSE-4.16:openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:e4858e291d7ad535f4aab83f314b0ab19d875c66fe87fb3538de7571542c4807_ppc64le", "9Base-RHOSE-4.16:openshift4/ose-sriov-network-rhel9-operator@sha256:4b3d4389aac7a0aa4fb350579f78bf1f8b07bc4c0fe846f9b1e27b0abed6aae2_arm64", "9Base-RHOSE-4.16:openshift4/ose-sriov-network-rhel9-operator@sha256:79da793b5c71198e6cf79363e45bb15553e167790eae84e62ef461671cff908b_ppc64le", "9Base-RHOSE-4.16:openshift4/ose-sriov-network-rhel9-operator@sha256:fec3d8df59d26d462be75e2fbc59888dfdb15fa6819bd39a6642d4356ad09d82_amd64", "9Base-RHOSE-4.16:openshift4/ptp-must-gather-rhel9@sha256:3c14f7b2d873e71f87e811f97f4ab13699225f7c93044bbb05aafabfd416738b_amd64", "9Base-RHOSE-4.16:openshift4/ptp-must-gather-rhel9@sha256:8e924b968e7e45b6c530e2689bcdf448f48ae15f1005554fa5f255ab30201fba_arm64", "9Base-RHOSE-4.16:openshift4/ptp-must-gather-rhel9@sha256:b57beca800dc3606063186d77b3df8f112054eda41bb82784ea41f7fb2df2ee7_ppc64le", "9Base-RHOSE-4.16:openshift4/sriov-network-metrics-exporter-rhel9@sha256:69d8ba95cb2698724dc5be762e9403ce82662cd4f65d9ed824592e8b26ce44ae_arm64", "9Base-RHOSE-4.16:openshift4/sriov-network-metrics-exporter-rhel9@sha256:be270a7728e5521da321031734c186f415fa8e9d51d692e8cae7df3e0e2f6919_amd64", "9Base-RHOSE-4.16:openshift4/sriov-network-metrics-exporter-rhel9@sha256:e4858e291d7ad535f4aab83f314b0ab19d875c66fe87fb3538de7571542c4807_ppc64le", "9Base-RHOSE-4.17:openshift4/driver-toolkit-rhel9@sha256:1d6591edeb05448f31914e204661e89ab92bfaad136cddff9553fb3e7a67f300_amd64", "9Base-RHOSE-4.17:openshift4/driver-toolkit-rhel9@sha256:cc42c0b3fd4f2a0ed88dd8bca6436a762260660b4464694c72dd24fc5902b11f_arm64", "9Base-RHOSE-4.17:openshift4/driver-toolkit-rhel9@sha256:e70e2c2ba514ed8f32c0499d363d271b447d461b025c4cf4b6e39202d0150231_s390x", "9Base-RHOSE-4.17:openshift4/driver-toolkit-rhel9@sha256:f8fe598e5199ba0182eceddd9d7466734a6e6693d2266a71588c83007fbadc71_ppc64le", "9Base-RHOSE-4.17:openshift4/kube-compare-artifacts-rhel9@sha256:1a4b823bb17287ae51b3d7770e0f14975b962276383573db6c2d79d1a9fd9636_amd64", "9Base-RHOSE-4.17:openshift4/kube-compare-artifacts-rhel9@sha256:8af8dfa63a2a891244144b4c0dbd47970f15b3795393b8aa19bcd21f0b9f8eb0_s390x", "9Base-RHOSE-4.17:openshift4/kube-compare-artifacts-rhel9@sha256:8f4d8e5228319e911902337fd482515ddc7de156cb491d30edb36894dc690a3d_ppc64le", "9Base-RHOSE-4.17:openshift4/kube-compare-artifacts-rhel9@sha256:a7b9531a56599925170d1c7be52958fb834ecad88468547639c0060d948ce912_arm64", "9Base-RHOSE-4.17:openshift4/metallb-rhel9-operator@sha256:589538372b29dafb22e90bfd2ddbf245b6d6b57eb5f00be241e6770793ba7022_amd64", "9Base-RHOSE-4.17:openshift4/metallb-rhel9-operator@sha256:5ee9294a12e5d60b15ee0838b3cd6b87410834d2b3b597cef6da1d41a447a2de_arm64", "9Base-RHOSE-4.17:openshift4/metallb-rhel9-operator@sha256:ad79ec41f761e8f44955f623b760fb01955bcee48afa20c17d0f362349372cf4_s390x", "9Base-RHOSE-4.17:openshift4/metallb-rhel9-operator@sha256:bed43aaabe0c0c4c1d0cac6f8c2fdf4ed48d3428bf9edf738c2450a65a54855c_ppc64le", "9Base-RHOSE-4.17:openshift4/network-tools-rhel9@sha256:03412bf6dcda82421352ea6f574078894da0766e488d9d11bd1a0901584ec9a6_ppc64le", "9Base-RHOSE-4.17:openshift4/network-tools-rhel9@sha256:17a3786f69858aae890bdfc0ffc55387acb54ae7a6f24970e95a563a922cb2b2_amd64", "9Base-RHOSE-4.17:openshift4/network-tools-rhel9@sha256:7be730a19a6b5a513bb1a05ca4e2fc081b06772eefd82b3b20b5213cba4e6eab_arm64", "9Base-RHOSE-4.17:openshift4/network-tools-rhel9@sha256:d95fbb4411b4f37394a4b05c342eb2cfe4aebab45fec522edf9799347667eced_s390x", "9Base-RHOSE-4.17:openshift4/ose-agent-installer-api-server-rhel9@sha256:5349d3de0740eae1eed53b74d8e41a74ca5daca65f94249048d8b1bc17e5de99_s390x", "9Base-RHOSE-4.17:openshift4/ose-agent-installer-api-server-rhel9@sha256:903d13939bb476bed79c815f83d0a46859ef10be165a2503ab4ded78b1d86885_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-agent-installer-api-server-rhel9@sha256:bb249ea2c8f53db57ee6e096466bf0969aeacc37fb56564c914a42d0f9598717_arm64", "9Base-RHOSE-4.17:openshift4/ose-agent-installer-api-server-rhel9@sha256:e41f9ce100d711fcf1c54f50a6ecd7e7afd43d6f5a1615718a733dfec4779ede_amd64", "9Base-RHOSE-4.17:openshift4/ose-agent-installer-csr-approver-rhel9@sha256:97eb533d848d477873620e2117b1eb25c7ba82b98eef1441f2fc794a8341b5a2_arm64", "9Base-RHOSE-4.17:openshift4/ose-agent-installer-csr-approver-rhel9@sha256:9a7aeb0a168d27553f8b348caee99116fb4f3832d841d8e6f2a85609cf1ac267_amd64", "9Base-RHOSE-4.17:openshift4/ose-agent-installer-csr-approver-rhel9@sha256:c135204f5ee36c0d861a1e133c23a61dc2c0e4250d0d0fd0c9a2a6519a90e0e6_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-agent-installer-csr-approver-rhel9@sha256:d78b17ce12fd8e44c8d654a62c50e101bf2db4cd28bf3c93c523b446dd1b847c_s390x", "9Base-RHOSE-4.17:openshift4/ose-agent-installer-node-agent-rhel9@sha256:0813b156b18d08a4ffb41932ccdccf9eca8f60c5f3398646d6a57fa166366c0b_amd64", "9Base-RHOSE-4.17:openshift4/ose-agent-installer-node-agent-rhel9@sha256:c6f201cfe735d88ff51810c4e858cb4d712d9dd7741b5d58490c0f79ac9d8658_s390x", "9Base-RHOSE-4.17:openshift4/ose-agent-installer-node-agent-rhel9@sha256:d103914de05b74ee3a43ca1150b639163883b911a5fcb64a9e7b52f34ece8407_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-agent-installer-node-agent-rhel9@sha256:fe6922ec1c1eb497bf032639b2e627d66930eab5521b68a89f093e7c5d0da024_arm64", "9Base-RHOSE-4.17:openshift4/ose-agent-installer-orchestrator-rhel9@sha256:09510453464825905e0d17e3ba38d71cb5cd2c6613ee2e544288e6dfb0f05bab_arm64", "9Base-RHOSE-4.17:openshift4/ose-agent-installer-orchestrator-rhel9@sha256:6b4b12235f67caae468806d0d60993cf4a73d332e95dbd67730cbb48eecf8c9b_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-agent-installer-orchestrator-rhel9@sha256:6cae351094cdb25b65cfe33ff8d688195360c7bea820e4c52e6926647cda283c_amd64", "9Base-RHOSE-4.17:openshift4/ose-agent-installer-orchestrator-rhel9@sha256:e967993b56d9706d362c5eec5bde335f1a3164239f99690f0b8861d3faca3c69_s390x", "9Base-RHOSE-4.17:openshift4/ose-aws-ebs-csi-driver-rhel9-operator@sha256:0556192290bd39f664f4950b9502acbbeff7b224a2df4f762df291c3fbb097fe_amd64", "9Base-RHOSE-4.17:openshift4/ose-aws-ebs-csi-driver-rhel9-operator@sha256:2ffcbfc3a7a7b6e7ac429772b7521a9136f4fad4118317ef81eb62e8314aae22_arm64", "9Base-RHOSE-4.17:openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:251dae2f76d2ac3b1a13212b2203528d9cbb10f7b6bc783ecc33a0c34015a085_arm64", "9Base-RHOSE-4.17:openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:4e41138d77ce09c459970d0de4fa53b72eaf62da154e389bf18ab6d70b1f63fc_amd64", "9Base-RHOSE-4.17:openshift4/ose-azure-disk-csi-driver-rhel9-operator@sha256:106eeafeec039a6c413979b4621eadd006637617494ddee40efb469fb8125572_arm64", "9Base-RHOSE-4.17:openshift4/ose-azure-disk-csi-driver-rhel9-operator@sha256:20ed99c4d4dfada594c5cc034bab8d5fd31cab538cd7103ff9c53c17ffd1312f_amd64", "9Base-RHOSE-4.17:openshift4/ose-azure-file-csi-driver-operator-rhel9@sha256:08e36196bcf95a8a996238640f24260ddfc2085b17d07cdf9e2e16f9c41aa6ea_amd64", "9Base-RHOSE-4.17:openshift4/ose-azure-file-csi-driver-operator-rhel9@sha256:aac3daa263cd8df334ccaf75946e7391c96b85a74295f3fdeb65d7df22943dfa_arm64", "9Base-RHOSE-4.17:openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:1a65a1c41f9fab2d5e28e69a6812327a8fbc2c00f4a75ea46671edec4771a388_arm64", "9Base-RHOSE-4.17:openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:597351828753de7d1cc6d8909d99bff05d0e79c83618a08da69321612656e500_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:5d6e11893624180d4c8073c0ab69a5a58f6dcad2edb5a144184de8bd8a10c6f0_amd64", "9Base-RHOSE-4.17:openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:d0641acbebb1a2cac4b8006c630bff22329f52733ab164e5bf4360e37679a93c_s390x", "9Base-RHOSE-4.17:openshift4/ose-baremetal-installer-rhel9@sha256:186a0d05a253cb7ae24a8d1ea0af787d084dc7bb94f95299f57c07ae2613c11c_arm64", "9Base-RHOSE-4.17:openshift4/ose-baremetal-installer-rhel9@sha256:29b5a28dc77f33733ec7a3f27efa47d3124596d2cc46bb11f45c844d1afdf94b_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-baremetal-installer-rhel9@sha256:ae9a75152a769be91688e5887f4cc56128211332bb8e067db07c08416f00f151_amd64", "9Base-RHOSE-4.17:openshift4/ose-baremetal-installer-rhel9@sha256:b4f4da544c52834dad1f031fcab8dc7a723f3920f780735f41ab4ccce8a5be49_s390x", "9Base-RHOSE-4.17:openshift4/ose-baremetal-machine-controllers-rhel9@sha256:10c78b9a41f074d7c4c08fbba3d7cf60006c1b09f303e44d9a8d2cbbc587d886_arm64", "9Base-RHOSE-4.17:openshift4/ose-baremetal-machine-controllers-rhel9@sha256:2901ebddca3a9b263aebfba36b01fbc4e43769172c36ffe345cb22c6bcf755fe_amd64", "9Base-RHOSE-4.17:openshift4/ose-baremetal-machine-controllers-rhel9@sha256:6fb800258638279e028af34c2ce34896cab48c07f6acb32c7eafc8c342c51148_s390x", "9Base-RHOSE-4.17:openshift4/ose-baremetal-machine-controllers-rhel9@sha256:da6590742baae18632ba35b2f54bec58d852b3b8d0d9c2f434d0409dc8fa1fb4_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-cli-artifacts-rhel9@sha256:4b5471bc7740a8a0a288c9fa56bafbc04720fbdced091f7759f907221ae4deb0_arm64", "9Base-RHOSE-4.17:openshift4/ose-cli-artifacts-rhel9@sha256:70eed39f585ada7b60b6cf9bba0cd08258078ba31fbd95396393693d60f6b453_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-cli-artifacts-rhel9@sha256:77b4d706322aa2b3f987449004df4c9be55697bc4140728148ca26efe717016f_amd64", "9Base-RHOSE-4.17:openshift4/ose-cli-artifacts-rhel9@sha256:d2907529d7757251bd1b8455522338129502239c29d014720340fd37f6f6de31_s390x", "9Base-RHOSE-4.17:openshift4/ose-cli-rhel9@sha256:0d5bbd3378debe73b208c02799b9a085feda66d43868ad595085de6c5d93356a_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-cli-rhel9@sha256:9f9c996b48c50256e30c18c5cf3cbccaca2ac19f92e4cf081b779d42e3135858_arm64", "9Base-RHOSE-4.17:openshift4/ose-cli-rhel9@sha256:a3236d7dc354418141eb6f28252f59de14858f52f4392baba1d82cac1a1502f3_s390x", "9Base-RHOSE-4.17:openshift4/ose-cli-rhel9@sha256:b6490ad55859cbacbe00e6c7071d93bb3eecd832dc62fc411c30acb5850437ad_amd64", "9Base-RHOSE-4.17:openshift4/ose-cluster-autoscaler-rhel9@sha256:133d553c5e0d134198ed17309c389c105cdee482a50981b126b31e5c61dd6b8c_s390x", "9Base-RHOSE-4.17:openshift4/ose-cluster-autoscaler-rhel9@sha256:802e7ded884af1c478c8cc978e2240d51f91be014d468b9042abac9cb7556891_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-cluster-autoscaler-rhel9@sha256:944035fafeb52ddbf7ac221dbbd5fc5c1d2327f12a592a74a8ae02b57053e323_arm64", "9Base-RHOSE-4.17:openshift4/ose-cluster-autoscaler-rhel9@sha256:ff0f1633d8a71bc0093c3981f9f96cfee6c697c8e494ec88932d44fdafa6b437_amd64", "9Base-RHOSE-4.17:openshift4/ose-cluster-capi-rhel9-operator@sha256:2f8eab6c452d8032377f559e51d8ef3b22495e5b61ed973fd66f05fca80c395c_arm64", "9Base-RHOSE-4.17:openshift4/ose-cluster-capi-rhel9-operator@sha256:3214c8b88075769a033864d5684076ccef7b1c490ce2cc668e03278b8e236889_amd64", "9Base-RHOSE-4.17:openshift4/ose-cluster-capi-rhel9-operator@sha256:3608b2519b789a6c857ebe8d175caf561fa22a0bfa4b02bc1f75851464be7bba_s390x", "9Base-RHOSE-4.17:openshift4/ose-cluster-capi-rhel9-operator@sha256:db28318762bf98727197091cc620cfdf216c8b95de8dc5b3c71eff4494bc84f3_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-cluster-machine-approver-rhel9@sha256:12c22c71c4f190ba1a6e301a5c79037c2a034d34ab06248a0abb0aa55a5baecd_arm64", "9Base-RHOSE-4.17:openshift4/ose-cluster-machine-approver-rhel9@sha256:8fe3d327aab99501f3b689ba6cecca505396473d4a0f20568ef1fdcde894423c_amd64", "9Base-RHOSE-4.17:openshift4/ose-cluster-machine-approver-rhel9@sha256:aa2ca44f259a9a9aa33584a9898f328a7e18a45a158b6fd8803b49f0d438375a_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-cluster-machine-approver-rhel9@sha256:cb0968af2960b2298e146df9e839161c56c83d92d43727550f2b87ff28998f06_s390x", "9Base-RHOSE-4.17:openshift4/ose-cluster-network-rhel9-operator@sha256:5982b4b3fffffa2d49f56ff979f866e97cc8c3e298c1eedcca041603f82aea09_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-cluster-network-rhel9-operator@sha256:84e73c07a27d9dd373a36e0c006b3f4b9ca12be46a91ac8ab174ec098fba7227_amd64", "9Base-RHOSE-4.17:openshift4/ose-cluster-network-rhel9-operator@sha256:a5f703bbbca063ab21025ca9c5ed2513be11001ac9b0268e5524cd60517bf0d8_s390x", "9Base-RHOSE-4.17:openshift4/ose-cluster-network-rhel9-operator@sha256:d2398db32227b23e2f87ff5c19750e66820c1ed5694e2a5a2068b15469217bfd_arm64", "9Base-RHOSE-4.17:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:335a24212743cd26e688f5b215db9162ba041d08dedd1442f67d01e9fccd78e9_amd64", "9Base-RHOSE-4.17:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:51752c6357faf6cb2fb999982f846dce061ab1b8a0d53005408846643e731a7c_arm64", "9Base-RHOSE-4.17:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:8a154fed197252a179a2ecad986efb05c3bfb9e4a3b1db70932e0f1688012326_s390x", "9Base-RHOSE-4.17:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:a614fed9e6106261773fb44128f6bfa3a7e8354d88a40d16b1dd3e70c41438ce_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-cluster-openshift-controller-manager-rhel9-operator@sha256:45570c2d71681545b0ce447a37fa5acaae0400e736a9ea2ae5896ea20b710dde_arm64", "9Base-RHOSE-4.17:openshift4/ose-cluster-openshift-controller-manager-rhel9-operator@sha256:a9bad2058a92b63e78a498882c3d215dda5493d0185de6ff68de4c2b6f9b4084_amd64", "9Base-RHOSE-4.17:openshift4/ose-cluster-openshift-controller-manager-rhel9-operator@sha256:ad1fab89dbda4aa8dada72bc00db240dd976f0c76b3e4b978d83d48121e55bd6_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-cluster-openshift-controller-manager-rhel9-operator@sha256:fc7363d9c7216e74ef7587683a12f9d0501d1c43bba0bba28bc2bf58a29c7b93_s390x", "9Base-RHOSE-4.17:openshift4/ose-console-rhel9@sha256:1305e545b9fad6949c3a6b41a3616613acd944c76f97706ae48ef232858821ca_arm64", "9Base-RHOSE-4.17:openshift4/ose-console-rhel9@sha256:1756c3f84476b1753c8760772a370e39bb137fd521757a5a2ba4ec7078b4660d_s390x", "9Base-RHOSE-4.17:openshift4/ose-console-rhel9@sha256:8887d60b36e0b88ab76f499be8efa59fc3fa01d648cf2ec05e3c0f179d888d07_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-console-rhel9@sha256:abc2a95d9fe5bd02b19353428531a23db62fc7522c2c3c25f4d68c89423a1129_amd64", "9Base-RHOSE-4.17:openshift4/ose-csi-driver-manila-rhel9@sha256:3a1904b617d4fcc9e7e08e4af7d950bd9b8d6cebc24160f2a20e0c3e9bf362c2_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-csi-driver-manila-rhel9@sha256:4ab6d76f7014762c32742f626036b9661c2b4b145f4b907ccccc5ac3007bfb04_amd64", "9Base-RHOSE-4.17:openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:28bf4960766b3cfab26714a276d101ca93eca2d943f84bb1b71fd8a9992cebdd_arm64", "9Base-RHOSE-4.17:openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:2c9493a94535682db564c76d3f9d21cc707075a0c6aed619a01ca0fcbc297031_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:5ce6d1d8275af12f5beebd50a26923ee2a3eaaf34f94b3c4115c0648253fbcb5_amd64", "9Base-RHOSE-4.17:openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:dac7a47f140321bdc554325a34c77cf5369d399834240a7959482fbb25b52ef7_s390x", "9Base-RHOSE-4.17:openshift4/ose-deployer-rhel9@sha256:34f7223c62ed5ec030d6aa630c69bd711b1c8b3c9a5e1fed000c59516cef1062_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-deployer-rhel9@sha256:6a3ef9bf0b89e7f83a0a3a362ccc0b05fa9ca0789bfd38b6162e75cb195ea658_s390x", "9Base-RHOSE-4.17:openshift4/ose-deployer-rhel9@sha256:6a83ea999bbf106563a1e54d5cdf5539f8daf7c1ae6b13a449b50ad1c747813c_amd64", "9Base-RHOSE-4.17:openshift4/ose-deployer-rhel9@sha256:e474c09f4fea1e90a047ae158dde7287980943c75f24fc0920bf3cc4b74675a4_arm64", "9Base-RHOSE-4.17:openshift4/ose-docker-builder-rhel9@sha256:24c911ab33e94814f7bd80f5814052e01e50651caf4d1ebb9438e81bd6cb823c_s390x", "9Base-RHOSE-4.17:openshift4/ose-docker-builder-rhel9@sha256:2a7da4e4886a32a444acf61b4adb06a4a249bd79e30795edd2e82a1c3144233a_arm64", "9Base-RHOSE-4.17:openshift4/ose-docker-builder-rhel9@sha256:789e1a207654cb8765508b0dcda235cc5647603ccf1e315e7b58f96a604ffa65_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-docker-builder-rhel9@sha256:f0231d60810f8df0fb3a5e79da2072198fc61bef6256fb0bdfbd3da9a34f639e_amd64", "9Base-RHOSE-4.17:openshift4/ose-hypershift-rhel9@sha256:541aba6362fd506588d1a65896571eb7da271e4d6b8bcc9c66017889dcb4d44c_amd64", "9Base-RHOSE-4.17:openshift4/ose-hypershift-rhel9@sha256:bf779f56cd94462137c0a3def71bdd8cdfd9a64d36415872f4f7e3ada48fd64d_s390x", "9Base-RHOSE-4.17:openshift4/ose-hypershift-rhel9@sha256:c2755e56582035ac0478a9aa618bcf46ce00735612ca723de66b2052dfac0155_arm64", "9Base-RHOSE-4.17:openshift4/ose-hypershift-rhel9@sha256:dbbb0bd7bf838a3d5283b6a425c4f47749c95ad4e99935a93f480c633c2dfbba_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-insights-rhel9-operator@sha256:02ac4c31c42baaa89c93c2e749b9628e3bd6b1fdaa0b252fdbd8fc24ad17a004_arm64", "9Base-RHOSE-4.17:openshift4/ose-insights-rhel9-operator@sha256:2c35ed280e1fe0aab922c50c1ee452727080fe1ae799e9af727f9bfc753eadc9_amd64", "9Base-RHOSE-4.17:openshift4/ose-insights-rhel9-operator@sha256:d11a48d1ff97db87a71a99d2862ef811a8ad8d87e4025561df5aae0f9f1a710c_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-insights-rhel9-operator@sha256:e24822c79ee5baaebadafc39964b74948a4de5e0e93528520f6efb8d1966d0be_s390x", "9Base-RHOSE-4.17:openshift4/ose-installer-altinfra-rhel9@sha256:1daaf25d41fd54d71f3277531ef62f7b4e35a81b06e63e4b54209d07b53df8dc_amd64", "9Base-RHOSE-4.17:openshift4/ose-installer-altinfra-rhel9@sha256:4164ed55bac0af1e937bd479168795c525c80f99684561419c924642da4e8099_arm64", "9Base-RHOSE-4.17:openshift4/ose-installer-altinfra-rhel9@sha256:4d8e5200a8d49a6e99245ae731b99145af8b39f049f721e7ed56ed38d133047b_s390x", "9Base-RHOSE-4.17:openshift4/ose-installer-altinfra-rhel9@sha256:cfdd0be24ba996d45937f732aad7c2d83d2d763edbb8d191cf53daed19118646_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-installer-artifacts-rhel9@sha256:40247517b007cc9cf43a625a199f640a869f054b59914fe5148c8e7f85c473f4_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-installer-artifacts-rhel9@sha256:ddccc4720ff84eb30047c5ae86b6516dcf7bb5e0a6c77e02a4509631ffb5f47a_arm64", "9Base-RHOSE-4.17:openshift4/ose-installer-artifacts-rhel9@sha256:de89d8cf2e05fba5eb5c1f2231d280fc8df44b7044a8c375c360ced4901447f1_s390x", "9Base-RHOSE-4.17:openshift4/ose-installer-artifacts-rhel9@sha256:eddb4057009605c648364d7d4850279a54f99efd8f592f414812ca794a106050_amd64", "9Base-RHOSE-4.17:openshift4/ose-installer-rhel9@sha256:3b28c965b3003ba9dd27c126236353a0894c3db055636d877667586b74decb15_arm64", "9Base-RHOSE-4.17:openshift4/ose-installer-rhel9@sha256:3e7867e01c2eb9ac52b1f75a8f30b033ae44044f6ba7044d66c23c140d6fbf9f_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-installer-rhel9@sha256:8deea0dd0d999defa28861f22ec0e746f3929c6d2b547fe9d439e600f5b3fae4_amd64", "9Base-RHOSE-4.17:openshift4/ose-installer-rhel9@sha256:d62a83ebe0be2d588eb68c7f2fae50b2cd860ee2b2df8aadd2a223f4400fac8d_s390x", "9Base-RHOSE-4.17:openshift4/ose-ironic-machine-os-downloader-rhel9@sha256:33fc47f02898c7a7c00b0f761e7a01f96100f6f43c0bcd93728e4719e0b0e592_arm64", "9Base-RHOSE-4.17:openshift4/ose-ironic-machine-os-downloader-rhel9@sha256:acbfd8d1b6da7be6cf89c1c89a341e5fe6612130eeea0585df06025d8f5837c5_amd64", "9Base-RHOSE-4.17:openshift4/ose-ironic-rhel9@sha256:5b93af63c3512096c0afb698ace77fae5cc75568b879ac67b762bea0788ad7f9_arm64", "9Base-RHOSE-4.17:openshift4/ose-ironic-rhel9@sha256:b63bcf375ff363f62f8653101128f43e33274e072031a2ee78fe38c8b3d74ce1_amd64", "9Base-RHOSE-4.17:openshift4/ose-local-storage-mustgather-rhel9@sha256:18a4daaaf65f9b34eadae4fdd3bc82c3145d7a286b7169f3851762f14a55d878_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-local-storage-mustgather-rhel9@sha256:8ab84769bcf9d725e71dc48d2943cab3565716423443dc29d922b2ef043f07cc_arm64", "9Base-RHOSE-4.17:openshift4/ose-local-storage-mustgather-rhel9@sha256:a1f0b7e5b8b1f7d9790ffd56173da47f1c5cbf1dc188216f722ca7d6f4286998_s390x", "9Base-RHOSE-4.17:openshift4/ose-local-storage-mustgather-rhel9@sha256:f0651fe33f20e08fae754e0c28e08dab068b5c6afd310dd977d7b2e2fa2df7a6_amd64", "9Base-RHOSE-4.17:openshift4/ose-local-storage-rhel9-operator@sha256:0d82e58b547202652165d35e053e299f121ae6cfcc3c850faffeec2181d74db7_amd64", "9Base-RHOSE-4.17:openshift4/ose-local-storage-rhel9-operator@sha256:52aed7ccf1d821c1b1779cbdbc72d092117f48aa8b8f3967d757c2e8966279b3_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-local-storage-rhel9-operator@sha256:7cde8ea58b6bca97a66b4f55ce8a9fccd567f869288c0574e2cbd28c343cf45f_s390x", "9Base-RHOSE-4.17:openshift4/ose-local-storage-rhel9-operator@sha256:8bfe6ace2f4be3848ea204a705d791d0f2bfb966909a538f22c828728238d319_arm64", "9Base-RHOSE-4.17:openshift4/ose-machine-api-provider-gcp-rhel9@sha256:5ad779e34c2e6862c281c079d7a9f01af069fca5100bde2b2ab60e43416883ab_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-machine-api-provider-gcp-rhel9@sha256:62a66b06654ad39dd144e079243f054b150c36e9eee5913638d7404f8e5de4e4_arm64", "9Base-RHOSE-4.17:openshift4/ose-machine-api-provider-gcp-rhel9@sha256:a8f4d8b606481e8ee1e72ff3a76d34a7cde6c1ee367066da4649f64d8f6c196b_amd64", "9Base-RHOSE-4.17:openshift4/ose-machine-config-rhel9-operator@sha256:7d1bf75a56b690157530ff3f813bfba73c33a647dd1f2bbde5df7c05a9d53556_amd64", "9Base-RHOSE-4.17:openshift4/ose-machine-config-rhel9-operator@sha256:a600915e7014e76d633cd3f84e9f405c12799fe4f506795ff1c493000a1143d9_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-machine-config-rhel9-operator@sha256:dbd9c16effae3f6837e07472031e8b827bd9dda1ea26cae742a824cdccdd3926_s390x", "9Base-RHOSE-4.17:openshift4/ose-machine-config-rhel9-operator@sha256:f75f05699483bad4e83a2fd2ca60ac736e5ea68cebe6f0178b7969d84d0d1699_arm64", "9Base-RHOSE-4.17:openshift4/ose-machine-os-images-rhel9@sha256:177d66c5918e95b440b9674b95e11266ef5ee685ae147a765837ab15ecf4e832_amd64", "9Base-RHOSE-4.17:openshift4/ose-machine-os-images-rhel9@sha256:83edaac5bdf4be8be548014cec0ca90876920a12a67eff704b4cb2b4224eab23_s390x", "9Base-RHOSE-4.17:openshift4/ose-machine-os-images-rhel9@sha256:a4e1600a49279738a5c019143c1ba6907811b8b211cf67782c898d63880bea15_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-machine-os-images-rhel9@sha256:bc60556adc47fd5214516d19d7ae3d0e2ae7fc969e18eebc94986beff616b393_arm64", "9Base-RHOSE-4.17:openshift4/ose-must-gather-rhel9@sha256:4d394fa2407396b478f60d405be1a2abb3d1ce95fa0f526f2cd6456bce8463be_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-must-gather-rhel9@sha256:8f3cf10499e29d2995f6e58cf0e921048464117d26199690464ea06b227523eb_arm64", "9Base-RHOSE-4.17:openshift4/ose-must-gather-rhel9@sha256:b90cbf61b42a3e21190f4cd9a392804f55aa8001da5ef3552435c83dced3170c_s390x", "9Base-RHOSE-4.17:openshift4/ose-must-gather-rhel9@sha256:fab2a596869c4769579dbfa58c968074ec457f704b136f1851f957536fc91357_amd64", "9Base-RHOSE-4.17:openshift4/ose-networking-console-plugin-rhel9@sha256:5f37cc664c0bffde3542c39209165fae2f68e080484f030f596e93438d786f48_amd64", "9Base-RHOSE-4.17:openshift4/ose-networking-console-plugin-rhel9@sha256:c17e3dd71ef96236ea2540fa618091964de6be2f06470e5ef4c480d8a60107f2_s390x", "9Base-RHOSE-4.17:openshift4/ose-networking-console-plugin-rhel9@sha256:da7d738f3fc95a733ae0ae96e682802d8b56f941d09264bfef4adf770fc8337c_arm64", "9Base-RHOSE-4.17:openshift4/ose-networking-console-plugin-rhel9@sha256:ddbe8de7668b1abb4c22d1682bb043442c3ec6dfaa5d689440a0c0d6f02a2009_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-oauth-apiserver-rhel9@sha256:3b9d065fba67951d80809908f48d6e8ecc7e9fa2a317e8e980af1af1845a470c_s390x", "9Base-RHOSE-4.17:openshift4/ose-oauth-apiserver-rhel9@sha256:80e8a2f68ed7f13ae80b32d5c1d14ba116917c24499e28f5b645f2f15223c245_amd64", "9Base-RHOSE-4.17:openshift4/ose-oauth-apiserver-rhel9@sha256:91e0eb64ab01895f6d9b844377e782c5fa2a44d63f7abeb4a9f57e6f632cc8ea_arm64", "9Base-RHOSE-4.17:openshift4/ose-oauth-apiserver-rhel9@sha256:9cd942dc131d195f5d21a26f706ac8046fb105126a65fb49b0549393d049f2d8_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-oauth-proxy-rhel9@sha256:27ca71fffc53f07d6235b6dfb757fb7061360a739b26518d36bcc47cec64d631_arm64", "9Base-RHOSE-4.17:openshift4/ose-oauth-proxy-rhel9@sha256:3c81320e8a09e03da426210f1ca2022b11efa860d9f57d06528570c7eb01888b_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-oauth-proxy-rhel9@sha256:ac10068784d0b632201885acf43287fc06b46962eaf69d9f052695137bc4c599_s390x", "9Base-RHOSE-4.17:openshift4/ose-oauth-proxy-rhel9@sha256:f6323d0256ae364c545d8471b34a0f8c10ac4f4a039ea5e141c84718b65feb89_amd64", "9Base-RHOSE-4.17:openshift4/ose-openshift-controller-manager-rhel9@sha256:5e678646f8d30a1cee3c75b52a51ae16e0dfafe10cf4a2e4d0740907827aca94_s390x", "9Base-RHOSE-4.17:openshift4/ose-openshift-controller-manager-rhel9@sha256:6f8ad0606855429c32f03fb1c8d2c7118c701ae034d08b38c194e84f139b195b_amd64", "9Base-RHOSE-4.17:openshift4/ose-openshift-controller-manager-rhel9@sha256:c6e025153987b54a0de883dcc1b14054ac682a3081c5f2f3853dce03abdbeddd_arm64", "9Base-RHOSE-4.17:openshift4/ose-openshift-controller-manager-rhel9@sha256:d064518a8c22787ac2073e438e02ffeaf935e5071f0fd5ad8f7b1ad5ca2edc5f_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-openstack-cinder-csi-driver-rhel9@sha256:1046cddf78e6faf9331c681a4924565818c1ac35244add0e24b26fa253bf572f_amd64", "9Base-RHOSE-4.17:openshift4/ose-openstack-cinder-csi-driver-rhel9@sha256:47a13edfb085483b767fce59731951b3aefcfcdd641bc5a8591d9941965e6c2c_arm64", "9Base-RHOSE-4.17:openshift4/ose-openstack-cinder-csi-driver-rhel9@sha256:6a0bb7d709644b86c8009da16e7a89aac1b837507a764b9d78d2d8cac2a65b88_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-openstack-cinder-csi-driver-rhel9@sha256:f821fd723c6b3a963f67f59d9a247e25df7a92ac5314fee06166cd97f9d9a312_s390x", "9Base-RHOSE-4.17:openshift4/ose-openstack-cloud-controller-manager-rhel9@sha256:03a3e29bbf8953c87c28443933115f0e50850b450f1fa2e56a15232d418ec8e5_arm64", "9Base-RHOSE-4.17:openshift4/ose-openstack-cloud-controller-manager-rhel9@sha256:2ee1db2be2dcd1f221be99017b45db36648438a72c0417d40d1f3454c7a0cf27_s390x", "9Base-RHOSE-4.17:openshift4/ose-openstack-cloud-controller-manager-rhel9@sha256:c0b27d4e9c1d50d321ba287c36c5c53651d9d055c13c35d1d88f4767f444cc05_amd64", "9Base-RHOSE-4.17:openshift4/ose-openstack-cloud-controller-manager-rhel9@sha256:f46881798235d41e3da6c561bcd2d655d9a6000a17c4f5774238bf14d4ee45bc_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-operator-framework-tools-rhel9@sha256:3b5021f33d3ce239756a95b9a6e3496466caec12d1d3a9110bf945c7b01868ba_arm64", "9Base-RHOSE-4.17:openshift4/ose-operator-framework-tools-rhel9@sha256:6647a6ce2920bec1c7f42be475b2165467733d3bdf302109aed9c644f5295d49_s390x", "9Base-RHOSE-4.17:openshift4/ose-operator-framework-tools-rhel9@sha256:7d140712a3cb496b825811a010ff9c8cccd4e29c6423f7f9ab37b080b712393d_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-operator-framework-tools-rhel9@sha256:f8662087659f42d16b293b4cbf64089029752cb3bd6c54a35d80b0a964459fb0_amd64", "9Base-RHOSE-4.17:openshift4/ose-operator-lifecycle-manager-rhel9@sha256:1fa86d08efcb430167c5f946584516a552aa5d3ca135b8b7809e40937f28f5c3_s390x", "9Base-RHOSE-4.17:openshift4/ose-operator-lifecycle-manager-rhel9@sha256:329b08d5a5fd1b36fbdce61ed3dbe123f0a045c7d33723fae9e1e6e16c4743b8_arm64", "9Base-RHOSE-4.17:openshift4/ose-operator-lifecycle-manager-rhel9@sha256:c40339d1d7d4196c4f07d6642c35d1d986feb5076ce46626afea776d4accb3c2_amd64", "9Base-RHOSE-4.17:openshift4/ose-operator-lifecycle-manager-rhel9@sha256:f7add6b6d251278790b010a9c0fe708dce87ea637975ed20a53cf3973db3c038_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-operator-registry-rhel9@sha256:36f61c65e6e01f723a8f9f293b8f6d96a549ddadbc51677f0955ae9d78e1ef28_amd64", "9Base-RHOSE-4.17:openshift4/ose-operator-registry-rhel9@sha256:480d60cb36c737c7aff383bd01e167189cafe647b21d3eb6d5b2fd29e19f5b20_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-operator-registry-rhel9@sha256:5a71e18fac203fab38f6d98ddf69ebd25e55a956521e902749af067e965d5bef_arm64", "9Base-RHOSE-4.17:openshift4/ose-operator-registry-rhel9@sha256:7fcd4ed6ab581beb231b35a08d3c85d93d15db2ea6ccbb269a836cdd77a41e0b_s390x", "9Base-RHOSE-4.17:openshift4/ose-ovn-kubernetes-rhel9@sha256:9afdfe41c2238517c64bf014420f02502d63515d9173bb25c225475565974603_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-ovn-kubernetes-rhel9@sha256:b4b96b569784d1034f2c353792530d69f81e4b23782cdce9f830516646af7f30_arm64", "9Base-RHOSE-4.17:openshift4/ose-ovn-kubernetes-rhel9@sha256:d215bff03d287b215b7a423377b0cd01cd9170675c3bb2d70948e2a7a9e1ccb1_amd64", "9Base-RHOSE-4.17:openshift4/ose-ovn-kubernetes-rhel9@sha256:f40254734ba43065cf231f4f3c8c5a0c2857de676c8e4f83b10359da0161dcc5_s390x", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:162a63f77d89e235e2f53a979e25f7e4a1ee5f4de1bb686b09d881cd2d8436e0_arm64", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:ba31ff7bd93b1aca21517cd2f603e9beb39a502c2c217eec5832d7a76c9e2db6_amd64", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:d957a9db284d307030e2455e6216ae49f920970800ced74056f25dbc0b52892b_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:de94c0c57c6ff2a340d0882f2593c1130d8f8b1f64d98adba87c257466ad122d_s390x", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:0674da22998057a50fefcf32f4e479f3df939d17fece1ea5de7b0db5e0088b47_amd64", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:400a9ac28ef61e7b6c25ce939183eb60f634a44990f0d0654f47d8ff781b229e_arm64", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:4f8c2267177f03d350feaaa243b505a26c14ba7cd182ef12cd5484689c6097dc_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:b9b7055ef70367f723208cdc886f29388a9deb2cf3ec231ea27fbbfedc3f1f7f_s390x", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-config-daemon-rhel9@sha256:a1e5aed89962552881d38c933a53a816b8655ca4c856507996561dade257227d_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-config-daemon-rhel9@sha256:a901c4f12ab7640b85283c54dc059001cf4dbcfb93d89fc0c110d21361b72bfb_arm64", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-config-daemon-rhel9@sha256:ac31d5883efa317fa0b5181382acc6790118c052e4db58a2e89b4b65b0fa6be0_amd64", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-rhel9-operator@sha256:12312e2e88530b7fbef5815ff8cfc264f8cd2cb3134b2562746e206c810b22d9_amd64", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-rhel9-operator@sha256:61f68218f0fd1915221cf2418d6d20be07bb2a6f21ae021af2949c2a103b3464_arm64", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-rhel9-operator@sha256:bb6d4fbe8a74475cc96641403448ec11e12b05ed1dc888c847a1b091cf19ba75_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-webhook-rhel9@sha256:4167166e84ee00b0bb93313175b6adde4a792a0a5f2d9d7dca395f6a98042f98_arm64", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-webhook-rhel9@sha256:e2c3c17b739d8139b100f64a059aabae9d99a4469886104847604c9fd34e963c_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-webhook-rhel9@sha256:f2e16bd06fe8a98901d1f13439a417d2b95bea2e7a5ad811db2628de4a024dd3_amd64", "9Base-RHOSE-4.17:openshift4/ose-tests-rhel9@sha256:01b8e929f9f6ce474ad89334519df9f46ed0542e3c37aac8656884c3abd8c2c2_amd64", "9Base-RHOSE-4.17:openshift4/ose-tests-rhel9@sha256:4510761f2866981719885e1544c80b2d6658f18e05ac573dbcee194085f38486_s390x", "9Base-RHOSE-4.17:openshift4/ose-tests-rhel9@sha256:b5901da5e6ed908c03847be385a7aa07bf63915b86d49cea28da027e72b438fb_arm64", "9Base-RHOSE-4.17:openshift4/ose-tests-rhel9@sha256:f4f845838bf4a881260c956139208a464a61925fd1e4f8da7db3ad18c70d7eb2_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-tools-rhel9@sha256:01592fb730bcfb8afb273cd939030f211fdf08e73683408cf777294c69f04930_s390x", "9Base-RHOSE-4.17:openshift4/ose-tools-rhel9@sha256:0b299dd0d37f405d295f8247019ba1c20df21a51035ebc0932beb6be5a3136f4_arm64", "9Base-RHOSE-4.17:openshift4/ose-tools-rhel9@sha256:cbf0496d10c0a3360b2ccfae5245b405eb30a5ab1fdaa65380ac592bf879ab11_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-tools-rhel9@sha256:faa1c4113f6c16e5c4553530d3a467d9588c9b2fc0e2769c3803dc5853e02167_amd64", "9Base-RHOSE-4.17:openshift4/ptp-must-gather-rhel9@sha256:7632d692fae57120e2a6149a3a95fc70e45b17c993bf7e258a120aef54ec4573_arm64", "9Base-RHOSE-4.17:openshift4/ptp-must-gather-rhel9@sha256:f455859949594480bcb9b8e394343f85824197857b25e759905b22e6215e493f_amd64", "9Base-RHOSE-4.17:openshift4/ptp-must-gather-rhel9@sha256:f4eea6f36a70212372061a6b1271cb35a4ce31ffc879348388ffee6514cb1c10_ppc64le", "9Base-RHOSE-4.17:rhcos@sha256:5e365f9954e6720dc3df117c5033444009d4a2c9fb6a940b934d8e46879c0c4f_aarch64", "9Base-RHOSE-4.17:rhcos@sha256:5e365f9954e6720dc3df117c5033444009d4a2c9fb6a940b934d8e46879c0c4f_ppc64le", "9Base-RHOSE-4.17:rhcos@sha256:5e365f9954e6720dc3df117c5033444009d4a2c9fb6a940b934d8e46879c0c4f_s390x", "9Base-RHOSE-4.17:rhcos@sha256:5e365f9954e6720dc3df117c5033444009d4a2c9fb6a940b934d8e46879c0c4f_x86_64", "9Base-RHOSE-4.18:openshift4/aws-kms-encryption-provider-rhel9@sha256:a8732a7ca709d9fd409f36af7cccf5a4ab809cc64b1b2ce303a1088f5500b6d7_s390x", "9Base-RHOSE-4.18:openshift4/aws-kms-encryption-provider-rhel9@sha256:ae06a68b9fada2d627a22ea047070cd5d695203ad3345efd82a8749f2960f557_arm64", "9Base-RHOSE-4.18:openshift4/aws-kms-encryption-provider-rhel9@sha256:c1e9d8836d34c95c9c013915221049ccf7a8d7c7d210b40d84f6899769bc3db4_amd64", "9Base-RHOSE-4.18:openshift4/aws-kms-encryption-provider-rhel9@sha256:c2059aca8304609132f0d217e47a3feb0a188f01dbdc6a86d0dbf35eb9721ae6_ppc64le", "9Base-RHOSE-4.18:openshift4/azure-kms-encryption-provider-rhel9@sha256:0a0dcb87609718ceb5e0ddfbe0ee6ada3c9f495c4b45b2453000351aff3c5f47_s390x", "9Base-RHOSE-4.18:openshift4/azure-kms-encryption-provider-rhel9@sha256:0eec9c0651b0caa0af7d8ef36616acfce227e0528f0626eee172e89516c69fc2_arm64", "9Base-RHOSE-4.18:openshift4/azure-kms-encryption-provider-rhel9@sha256:288e46a2b17e5ba161c40d17dbda984ca16cee861168a06766ef4575864d6783_ppc64le", "9Base-RHOSE-4.18:openshift4/azure-kms-encryption-provider-rhel9@sha256:9f425681af97666a14afc187b72c4208cbca05f6d8eab50042a97c180b96a9b8_amd64", "9Base-RHOSE-4.18:openshift4/azure-service-rhel9-operator@sha256:2658d64017fb43f5e805e912ba69051f2661769465216ae5a0154efef8555b7b_arm64", "9Base-RHOSE-4.18:openshift4/azure-service-rhel9-operator@sha256:2841e88142d3ddd1453acec692e3fe1633db82bf9f6f4820d63215f2355a5520_amd64", "9Base-RHOSE-4.18:openshift4/azure-service-rhel9-operator@sha256:43d2996fdc94a1f39c17705b41f5e37ccb4a8207dd0ff672d8f71029a3c4f2d4_ppc64le", "9Base-RHOSE-4.18:openshift4/azure-service-rhel9-operator@sha256:631be62a8786b9af9c585a25c3ad1d6ef3ee3e53e5bed1798db4251a48bc8f5a_s390x", "9Base-RHOSE-4.18:openshift4/cloud-network-config-controller-rhel9@sha256:463024ea9179879340c44b21bc2e383927270f33dbd0cf69727387a607cab544_arm64", "9Base-RHOSE-4.18:openshift4/cloud-network-config-controller-rhel9@sha256:8048f1cb0be521f09749c0a489503cd56d85b68c6ca93380e082cfd693cd97a8_amd64", "9Base-RHOSE-4.18:openshift4/cloud-network-config-controller-rhel9@sha256:b27ad99dfcc42eeabf477d14e18fb5993ff346789bf387f49cc6a014cb74c386_ppc64le", "9Base-RHOSE-4.18:openshift4/cloud-network-config-controller-rhel9@sha256:b305d789373c4bb61fbbbc86d63970e1ab9ac4ce9d8a30c8e92a253664cdc46f_s390x", "9Base-RHOSE-4.18:openshift4/container-networking-plugins-microshift-rhel9@sha256:292e79571179629e3d2435d6b9d3caf1d8727c500a2e2af8d941cefe4112ba0d_arm64", "9Base-RHOSE-4.18:openshift4/container-networking-plugins-microshift-rhel9@sha256:93031f2be17137041fec30d8d4781bb54e25e7ecbf0d12783c23de810ec33967_s390x", "9Base-RHOSE-4.18:openshift4/container-networking-plugins-microshift-rhel9@sha256:9b89cd7df668045a9fd2b158fe4c3eedc83e3259e6db78c978928c5b1fed3a8d_ppc64le", "9Base-RHOSE-4.18:openshift4/container-networking-plugins-microshift-rhel9@sha256:be0c648df082d0124b73944625c96dfc17b7cdb7a84ad7acea49e85eb6c2a8b2_amd64", "9Base-RHOSE-4.18:openshift4/driver-toolkit-rhel9@sha256:1e4bd66208652f8eb6395cbcc3c0c37897368ae051479dd04e6b87d19a3b7bb9_ppc64le", "9Base-RHOSE-4.18:openshift4/driver-toolkit-rhel9@sha256:86ea34129b0827fa58341da2f8d44dea5e89d3589e4c08c5e63111cc7ae65ddb_amd64", "9Base-RHOSE-4.18:openshift4/driver-toolkit-rhel9@sha256:c9784e3ebb982191eff2b28e61eb3b935d73f92672aa82bb48e0fd9424356f91_arm64", "9Base-RHOSE-4.18:openshift4/driver-toolkit-rhel9@sha256:f336eb9a9efcd0a3a523104da0b3f6191096db812b3c6fae178607a9e4ce7435_s390x", "9Base-RHOSE-4.18:openshift4/egress-router-cni-rhel9@sha256:3e9653bc7cf3607a8f1731ebb61cbdf3ef960516e4c4c054ea4bfb3a623a9398_s390x", "9Base-RHOSE-4.18:openshift4/egress-router-cni-rhel9@sha256:b911e5404e21a9f32ea5a7e3b43f9cf8c2705e376af8c798aa38308c58da541e_arm64", "9Base-RHOSE-4.18:openshift4/egress-router-cni-rhel9@sha256:b9e3232996902d1f35be0faac3f542a2ac475722a73436f6b38df3e4fd8934e8_ppc64le", "9Base-RHOSE-4.18:openshift4/egress-router-cni-rhel9@sha256:e40792096b162f0f9ce5f8362f51e5f8dea2c1ce4b1447235388416b5db7708c_amd64", "9Base-RHOSE-4.18:openshift4/frr-rhel9@sha256:5dbf844e49bb46b78586930149e5e5f5dc121014c8afd10fe36f3651967cc256_amd64", "9Base-RHOSE-4.18:openshift4/frr-rhel9@sha256:a9244fd2935d7fa0a5e34a127268fbe065c908e465a883258c0b66c3f96c3e34_arm64", "9Base-RHOSE-4.18:openshift4/frr-rhel9@sha256:b7ce23fed3f02b8555c466d3f95c16f407f2f2e27072968396ea7f16cc783fb8_ppc64le", "9Base-RHOSE-4.18:openshift4/frr-rhel9@sha256:d88dceeda8e23aaf7814d4bfcd7e46ca4c61df92f4380b53e5b989649da95ff3_s390x", "9Base-RHOSE-4.18:openshift4/insights-runtime-exporter-rhel9@sha256:0c0df92a673a35041d9eafffe94330f66fa78304c98a70637ffb209aaac42b7f_arm64", "9Base-RHOSE-4.18:openshift4/insights-runtime-exporter-rhel9@sha256:28aeffbd69e98a1403afd50aa53b2915df6abed605320f73ec9fcc22ec67d12e_ppc64le", "9Base-RHOSE-4.18:openshift4/insights-runtime-exporter-rhel9@sha256:81f263c897b1fb4873a4a88914aad0f7aa646b88da6d4da57ef02cb7736bc967_amd64", "9Base-RHOSE-4.18:openshift4/insights-runtime-exporter-rhel9@sha256:cb7b44ad5151c85afacf64dfd08eb638719b341e28752f5bf9f8285665d4fe6c_s390x", "9Base-RHOSE-4.18:openshift4/insights-runtime-extractor-rhel9@sha256:16d9a483880e40a56bc512d884cd23d560afb02efadaef39dc6a5026ea650be2_ppc64le", "9Base-RHOSE-4.18:openshift4/insights-runtime-extractor-rhel9@sha256:67cea7e25e03a7d0b1a417fc67d0a71c9314b1e1e3c566ca920dadd2b4f59aff_s390x", "9Base-RHOSE-4.18:openshift4/insights-runtime-extractor-rhel9@sha256:756e3f8e536dcb3148211892abfd9c78cf737a1505865b2697c7f1f120874063_amd64", "9Base-RHOSE-4.18:openshift4/insights-runtime-extractor-rhel9@sha256:e8fb8b0279428ce8faeae9999252f4c52116dc83fb2aabd3265807d60a53f7b5_arm64", "9Base-RHOSE-4.18:openshift4/kube-metrics-server-rhel9@sha256:2bdc056a9c23f987cbf567a0441aee5ff55762749f0861235d060a05ca4e73b2_arm64", "9Base-RHOSE-4.18:openshift4/kube-metrics-server-rhel9@sha256:32a5c2f4bccd6a954545e0316b721c45e6e7c95c9157aad12d5bb8376dba1624_ppc64le", "9Base-RHOSE-4.18:openshift4/kube-metrics-server-rhel9@sha256:b09f284fccdb9d3f5c699ef0573ab9a2242ebf6c222303b270dd80d19d730dfa_amd64", "9Base-RHOSE-4.18:openshift4/kube-metrics-server-rhel9@sha256:b1e32400af5465ae1879ab657d8ca9daa27a1510947dc58287bf3ad1f7b4759c_s390x", "9Base-RHOSE-4.18:openshift4/kubevirt-csi-driver-rhel9@sha256:10e0ee63b53ff6f6cdced82284b3ea9400f94cc3e5b9ead810210a837565cc9c_arm64", "9Base-RHOSE-4.18:openshift4/kubevirt-csi-driver-rhel9@sha256:778ec7389a7ea4a45f1a7fae31187faaeec45207f17f464981ccaa4afc0c385c_ppc64le", "9Base-RHOSE-4.18:openshift4/kubevirt-csi-driver-rhel9@sha256:8d19b1ed5229247fe43275922e853b1e260ebdbc531607a061ed42a0a466d928_s390x", "9Base-RHOSE-4.18:openshift4/kubevirt-csi-driver-rhel9@sha256:ee7a0a2f04e3d3ad2e43197da61c87e8b0851ac279791f6b47c22a479e4f0657_amd64", "9Base-RHOSE-4.18:openshift4/network-tools-rhel9@sha256:2e69d8070e718a8121f8996ea071517eba6974aff66cfff7c0e38c9eba26b768_arm64", "9Base-RHOSE-4.18:openshift4/network-tools-rhel9@sha256:607af545b4fd96d47c1b9dfe99eeba83f023147dc4ba506145340cd2773f896a_s390x", "9Base-RHOSE-4.18:openshift4/network-tools-rhel9@sha256:74e70a468925403949ed9163d89f9a05a65f18e2e106257303fa89573615b3fc_ppc64le", "9Base-RHOSE-4.18:openshift4/network-tools-rhel9@sha256:866b9b20c239528253763ba407ff2169b92e45b368288cc0424b4cf417161ca5_amd64", "9Base-RHOSE-4.18:openshift4/openshift-route-controller-manager-rhel9@sha256:1eda5ad6a6c5b9cd94b4b456e9116f4a0517241b614de1a99df14baee20c3e6a_amd64", "9Base-RHOSE-4.18:openshift4/openshift-route-controller-manager-rhel9@sha256:2d7cb3592429227994a05cb9cea7ecb321a9ea1ccbbe67f741767babb16945c0_ppc64le", "9Base-RHOSE-4.18:openshift4/openshift-route-controller-manager-rhel9@sha256:a05e047ae461b10af0df0c234a593f789d922e396020b169365d62d22f1d89b5_arm64", "9Base-RHOSE-4.18:openshift4/openshift-route-controller-manager-rhel9@sha256:a4a38c93fe7329bfe9130c65000fbcc1cf92ea6f9d7c421e5859989851fd486e_s390x", "9Base-RHOSE-4.18:openshift4/ose-agent-installer-api-server-rhel9@sha256:4b3ac146783e599bbd7c2b85951c981e67a6fd8aec0b423af3add6c6f48b2389_amd64", "9Base-RHOSE-4.18:openshift4/ose-agent-installer-api-server-rhel9@sha256:9186691fb8d9d22d7490c36a6b96fff9fbd7a1c08f560ecf9bc0a260f76b6512_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-agent-installer-api-server-rhel9@sha256:d4478ae7e9712f1a529432383582a99f886744d4b1721a641699de4e2649ee85_arm64", "9Base-RHOSE-4.18:openshift4/ose-agent-installer-api-server-rhel9@sha256:e5985efdb12ef8ec292ffe97d8797affea428c2a7e08d358fcbec9f524b646ec_s390x", "9Base-RHOSE-4.18:openshift4/ose-agent-installer-csr-approver-rhel9@sha256:6d8f67e9accd69ff3d0c5dd4dd6130d9ed2cd8c108e987cc0a42fcc7bc3778d1_s390x", "9Base-RHOSE-4.18:openshift4/ose-agent-installer-csr-approver-rhel9@sha256:7682279808707017a59140a2fb3f03394869fec5818cd239ee7254876ad55471_amd64", "9Base-RHOSE-4.18:openshift4/ose-agent-installer-csr-approver-rhel9@sha256:b8292b03f8008e596d34296e31b7885f03e9d9adf08e392d8ec046499fe3bdcf_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-agent-installer-csr-approver-rhel9@sha256:ea81f48c59a9cecf2e6f623ef569935bb38675664773c082b296f065e721cfbc_arm64", "9Base-RHOSE-4.18:openshift4/ose-agent-installer-node-agent-rhel9@sha256:11bbb5bb9fd1fad40f3c4f57fa73ac811d78dae76f98d1989ecf71212c0e8b84_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-agent-installer-node-agent-rhel9@sha256:121f9f0bfe828896fd505b1a323303dfe8c8a16fb032a3afd6bfeecdcde4f2e4_s390x", "9Base-RHOSE-4.18:openshift4/ose-agent-installer-node-agent-rhel9@sha256:824ca301ad5b046681e241a741c0600f50ccfb7175b68843921baf9c691b2f52_arm64", "9Base-RHOSE-4.18:openshift4/ose-agent-installer-node-agent-rhel9@sha256:e361af765256c144d6696141555795834e343044c4dd870ede8760e8a9995941_amd64", "9Base-RHOSE-4.18:openshift4/ose-agent-installer-orchestrator-rhel9@sha256:a0b260e48b0dcf90ab91e2ce697e2fc7a994be1a5a50a01c5b11f68119bac52d_arm64", "9Base-RHOSE-4.18:openshift4/ose-agent-installer-orchestrator-rhel9@sha256:bf5e2244ce6480a4a7d3927dd772d1d709b4e5bc4895a21ca0a6c1e767534add_amd64", "9Base-RHOSE-4.18:openshift4/ose-agent-installer-orchestrator-rhel9@sha256:e01e231793b172c20d1f804841316d13f6d4fe41150beb6e2eb98e8d689efb8a_s390x", "9Base-RHOSE-4.18:openshift4/ose-agent-installer-orchestrator-rhel9@sha256:ecb778557ccbbde89c98bb3eafd17b9e50dc8d8f4de1da69e1d406ed98ec4eaf_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-agent-installer-utils-rhel9@sha256:08c8d13936bdeeafd78607305dd76144f7b14058b60f33e051e92578dee33419_s390x", "9Base-RHOSE-4.18:openshift4/ose-agent-installer-utils-rhel9@sha256:596fd9a344de5a48e96803863eb51df7d3883828ceacbc387955c36242655cc9_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-agent-installer-utils-rhel9@sha256:b963ddc517ca3d0bfb11762b0432b1b19b885f47107715d30088ae82cf7dff1b_amd64", "9Base-RHOSE-4.18:openshift4/ose-agent-installer-utils-rhel9@sha256:f843f726728040485d78c170e234d885fd6b2dea2690577646168a1fb0aae248_arm64", "9Base-RHOSE-4.18:openshift4/ose-apiserver-network-proxy-rhel9@sha256:1ed6d63039033516a4cd815a06ee3a8ad45d0a21d7dc2f0d0bda7d5149630bf6_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-apiserver-network-proxy-rhel9@sha256:4c52f0a44052b58cdd5b2a218a82b30b3fff507df937c57f2ac70601a625efee_amd64", "9Base-RHOSE-4.18:openshift4/ose-apiserver-network-proxy-rhel9@sha256:6899bfce56bfa08d1304a6c956fe527655d2d527a9b13e0d0fadc315be4856cd_s390x", "9Base-RHOSE-4.18:openshift4/ose-apiserver-network-proxy-rhel9@sha256:83af093e8e84d3035710b08fca8350dc6139dd8e9467039fb6f3aeb7a04e1213_arm64", "9Base-RHOSE-4.18:openshift4/ose-aws-cloud-controller-manager-rhel9@sha256:4d6a0b57e31d1a4881f984335706ab19169b6dfadfdbc18121bad202227cd59d_amd64", "9Base-RHOSE-4.18:openshift4/ose-aws-cloud-controller-manager-rhel9@sha256:cfd2637cc7e7a2c8d87985bc6cd38711c427cd1e3a15550b40027e167f64da2c_arm64", "9Base-RHOSE-4.18:openshift4/ose-aws-cluster-api-controllers-rhel9@sha256:22014dd66701c087dcfe39d739eba7c2562ac65b2235efbcfd1e182deba3e27c_amd64", "9Base-RHOSE-4.18:openshift4/ose-aws-cluster-api-controllers-rhel9@sha256:2fd742bc5b24995f8ba22f51c4ac124ab008c2a77848f3c4367db8cd1f83a26a_arm64", "9Base-RHOSE-4.18:openshift4/ose-aws-ebs-csi-driver-rhel9-operator@sha256:6db74b1b78910c70f42aee92410217a9fca8b4ab80d0f3c8f2d63b36e3c9e8f5_arm64", "9Base-RHOSE-4.18:openshift4/ose-aws-ebs-csi-driver-rhel9-operator@sha256:d645185d3c4bb7271e24264d3343102f0b9df0308cbf7d5bdd89954e40c5964c_amd64", "9Base-RHOSE-4.18:openshift4/ose-aws-ebs-csi-driver-rhel9@sha256:529529a8ad7c586ba4a3d528dc43df55ed661160fae142f829a9da265c37747f_arm64", "9Base-RHOSE-4.18:openshift4/ose-aws-ebs-csi-driver-rhel9@sha256:8e452c6d38136744ccf6d8c1c551cb23ba5b9ff009f0fa6dc83b66cd2386f9d5_amd64", "9Base-RHOSE-4.18:openshift4/ose-aws-pod-identity-webhook-rhel9@sha256:1d4e8be3aa95f4d9cc44228b42834f6dca4e57d848742e1bb7c5283555c0f2e3_amd64", "9Base-RHOSE-4.18:openshift4/ose-aws-pod-identity-webhook-rhel9@sha256:4c6788f051b1dfcd0a3ce9c22d49e1d1617cb2bbf805cfcf417f64c4a5174797_arm64", "9Base-RHOSE-4.18:openshift4/ose-azure-cloud-controller-manager-rhel9@sha256:59bef0af514481c4554273f9e835e9176c21146c3333fd90f6221fb27b5ffe7b_amd64", "9Base-RHOSE-4.18:openshift4/ose-azure-cloud-controller-manager-rhel9@sha256:c5e61385f1d60123e2d48f0c198e4231a653c8bce33fed88f00d6b14135a81ce_arm64", "9Base-RHOSE-4.18:openshift4/ose-azure-cloud-node-manager-rhel9@sha256:a33c5f81ffad2a08e56440230c15912fc74f7f937d04da64b68438d0eb6aaaf2_amd64", "9Base-RHOSE-4.18:openshift4/ose-azure-cloud-node-manager-rhel9@sha256:ea7fe26744f7c6e560325839c1c7f676e2643270a8be7be388441703a4920ce2_arm64", "9Base-RHOSE-4.18:openshift4/ose-azure-cluster-api-controllers-rhel9@sha256:0e1101cf1e0d39c15c327487efd2e1b9c8f2eaa3711eafa3110141088b29656f_amd64", "9Base-RHOSE-4.18:openshift4/ose-azure-cluster-api-controllers-rhel9@sha256:1e7fca199acd536b6597ef3467f814efb1e4bd5bb9d2297b3e9c9b05f0fd277a_arm64", "9Base-RHOSE-4.18:openshift4/ose-azure-disk-csi-driver-rhel9-operator@sha256:3efc8cd817f4cbe189572e13c8bdea0a23ee7bb57ac9af1075c0704cbe3af78d_arm64", "9Base-RHOSE-4.18:openshift4/ose-azure-disk-csi-driver-rhel9-operator@sha256:db299d2ad05a10ce1c36054e0c5f5cfda7620112a3076e9b0c0668655ed69ecd_amd64", "9Base-RHOSE-4.18:openshift4/ose-azure-disk-csi-driver-rhel9@sha256:a29919ea27dca758be28885ebed451e69626acda9600d6d93e3b0ece56c43a41_amd64", "9Base-RHOSE-4.18:openshift4/ose-azure-disk-csi-driver-rhel9@sha256:e5c8bd76e825e3e513f7895f777efbf3b202399affd4bf2d3612ee77739582c5_arm64", "9Base-RHOSE-4.18:openshift4/ose-azure-file-csi-driver-operator-rhel9@sha256:644c30ce913de25c115a5260a7e7bc7bb08186bece4f89b7130f9bf7633fc6a5_arm64", "9Base-RHOSE-4.18:openshift4/ose-azure-file-csi-driver-operator-rhel9@sha256:dfe9e786259229b348ceb47d82b26b6059e85f87eaf4be9069fb6a3c923f4f19_amd64", "9Base-RHOSE-4.18:openshift4/ose-azure-file-csi-driver-rhel9@sha256:781ca802557955f909f7604332cfae0452a343bdba80dbff89a390974668681d_arm64", "9Base-RHOSE-4.18:openshift4/ose-azure-file-csi-driver-rhel9@sha256:a08278b79d6e8f73770d98d313e8fc6bd305e5e38da6e481d9ce847845ad0af4_amd64", "9Base-RHOSE-4.18:openshift4/ose-azure-workload-identity-webhook-rhel9@sha256:588d48fbe9e0d4263403e2ac71a6223c7cdb25a6e383869397b64e334230efe9_arm64", "9Base-RHOSE-4.18:openshift4/ose-azure-workload-identity-webhook-rhel9@sha256:ff16ed6c8df59f56ad77c60de14052adc605509fecd218caf316de01d3d50be9_amd64", "9Base-RHOSE-4.18:openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:0a6c37be05c1e7651fe136eb203a6d47d4d806c382bb8a4b613b65a3503992f2_s390x", "9Base-RHOSE-4.18:openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:1a717d543c38ec4f0eb1b7680d0401b2fe0b8b4bf5e927b41153f899de9367d0_arm64", "9Base-RHOSE-4.18:openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:9129363de12e1e8175505e1f8cead325bc662f03986ea09d95c93a8731586129_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:d0eeeba2771ae790c9f8ab80bde39f381b3cbe94275febc916f3454bbda77f90_amd64", "9Base-RHOSE-4.18:openshift4/ose-baremetal-installer-rhel9@sha256:1b67c88de954ff17d679cd0bd3bf0dcdfb3623e6bfb30d092f60eb7f9f551f0f_arm64", "9Base-RHOSE-4.18:openshift4/ose-baremetal-installer-rhel9@sha256:c8636a92b5665988f030ed0948225276fea7428f2fe1f227142c988dc409a515_amd64", "9Base-RHOSE-4.18:openshift4/ose-baremetal-installer-rhel9@sha256:e9896bc73d3ac900d26e62bd73a8aed2f232be8618b2c3a26524563d48cc5ff5_s390x", "9Base-RHOSE-4.18:openshift4/ose-baremetal-installer-rhel9@sha256:fe8884d0d35cb6cb852524340993dae8f5df145dea58c5b037208763ccf279cf_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-baremetal-machine-controllers-rhel9@sha256:4430daf845e5e71bb5875448013b4632f1c4629006da0a652fcf82c4ce986fcc_arm64", "9Base-RHOSE-4.18:openshift4/ose-baremetal-machine-controllers-rhel9@sha256:a11163a5749a4183fd5f99fab80b08cd05a31d585d72b9c9ac46bf0e1924c09a_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-baremetal-machine-controllers-rhel9@sha256:e7cfe9b34f103f4a9262cdab9b57bbe5393b248f4554c9ebe3805577dba7912b_s390x", "9Base-RHOSE-4.18:openshift4/ose-baremetal-machine-controllers-rhel9@sha256:f49b7a3783ddbbb4c1957116c3ad6833153fd584d139fbc9929627435e9e6eda_amd64", "9Base-RHOSE-4.18:openshift4/ose-baremetal-rhel9-operator@sha256:21dba9d655bb6c92ef7166f07b2a05fe12c841a4d7f99b58ccd55f644cced3ee_s390x", "9Base-RHOSE-4.18:openshift4/ose-baremetal-rhel9-operator@sha256:8eb6332787dc58033937e49ef65973de31b3e5e6a92c0740e4c567729675500f_arm64", "9Base-RHOSE-4.18:openshift4/ose-baremetal-rhel9-operator@sha256:975fcde559519326d43d892b8bcd81aea7f7cf0c28a2e72277bb6f6d2b5351cd_amd64", "9Base-RHOSE-4.18:openshift4/ose-baremetal-rhel9-operator@sha256:e09977352b5c19260fa7e1e76db8affd4bda4bfd8d24c74fa14c6a8c4d9e1f84_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-baremetal-runtimecfg-rhel9@sha256:14e1dd3575de3aad78a40e2916d2bda16fd95211ab11cc8dbaa55310ade9f125_arm64", "9Base-RHOSE-4.18:openshift4/ose-baremetal-runtimecfg-rhel9@sha256:237e976b6f141da4d99e895021d71be9e7e6d02811462fa22722f66b530cfb22_s390x", "9Base-RHOSE-4.18:openshift4/ose-baremetal-runtimecfg-rhel9@sha256:444745da9664bfda459f7e736889e7ae7f2de184d8a725f60d29faae02800e42_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-baremetal-runtimecfg-rhel9@sha256:862f4a4bed52f372056b6d368e2498ebfb063075b31cf48dbdaaeedfcf0396cb_amd64", "9Base-RHOSE-4.18:openshift4/ose-cli-artifacts-rhel9@sha256:374e0bc60279911b67ab3118edb6f96599585e208ef692feecf07d842211ca80_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cli-artifacts-rhel9@sha256:b9ea248f8ca33258fe1683da51d2b16b94630be1b361c65f68a16c1a34b94887_amd64", "9Base-RHOSE-4.18:openshift4/ose-cli-artifacts-rhel9@sha256:c49f62e5c6123d4d198a8b50405ebb5fe24c89fd49e1343c962a795d60b3188b_s390x", "9Base-RHOSE-4.18:openshift4/ose-cli-artifacts-rhel9@sha256:cc349d7da6c45f47db2374d4e09c1831f376f3c19d8bf588402da21c03cf4290_arm64", "9Base-RHOSE-4.18:openshift4/ose-cli-rhel9@sha256:0730b0c09e2f2e0a25a9b7bd65f2ecf65012465124b87ffdcbf6cd847a3ed8d0_arm64", "9Base-RHOSE-4.18:openshift4/ose-cli-rhel9@sha256:29ca58e11a10a02f0d1d0004411b78b4dd8eee25a3e52b53cf78ee6fe704adb7_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cli-rhel9@sha256:35512335ac39aed0f55b7f799f416f4f6445c20c1b19888cf2bb72bb276703f2_amd64", "9Base-RHOSE-4.18:openshift4/ose-cli-rhel9@sha256:b2bfd2cacec1d684d3caf3336fa7647306f59306a6022c1636ced75da81abca4_s390x", "9Base-RHOSE-4.18:openshift4/ose-cloud-credential-rhel9-operator@sha256:5bbfd458673fdd65027d35401db88251d22df8087c7ada5fd7103eb0d2295f3e_arm64", "9Base-RHOSE-4.18:openshift4/ose-cloud-credential-rhel9-operator@sha256:7c8e6e53c7f88cf7779cb2f738d2d8d5b39a4cfd85c6297617213b7ca2d1ff4d_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cloud-credential-rhel9-operator@sha256:8dcb53720aec67a496e4ff00600ad9db7b1912630f444499deac713c4173c33e_amd64", "9Base-RHOSE-4.18:openshift4/ose-cloud-credential-rhel9-operator@sha256:f3708d7e379155d92c404b22b958594521649247ebfafc72e672e0e4141abdd5_s390x", "9Base-RHOSE-4.18:openshift4/ose-cluster-api-rhel9@sha256:342aba511321415afd1b3c9613d69354c891bf95c47727cee6f23bc99196b3f3_s390x", "9Base-RHOSE-4.18:openshift4/ose-cluster-api-rhel9@sha256:36d5dc240ee4ba5ee4918ebf838d145e1868c0b6f802dc90bb279e47f219c329_arm64", "9Base-RHOSE-4.18:openshift4/ose-cluster-api-rhel9@sha256:5d457dd39003d9752d26b34097f2ad2af14fb6f3d16d7ff0f932ef6b6a4ec8ec_amd64", "9Base-RHOSE-4.18:openshift4/ose-cluster-api-rhel9@sha256:c51d1aa0543650ef21ad78e28b53dcff4ef97461e39882d3c227af6e44c44eb5_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cluster-authentication-rhel9-operator@sha256:0ffe12c13096110aea44337521b3c2638e1d90f110bd49c450cce395bfadd92b_arm64", "9Base-RHOSE-4.18:openshift4/ose-cluster-authentication-rhel9-operator@sha256:7e9e7dd2b1a8394b7490ca6df8a3ee8cdfc6193ecc6fb6173ed9a1868116a207_amd64", "9Base-RHOSE-4.18:openshift4/ose-cluster-authentication-rhel9-operator@sha256:d0eac706acfd29a150216a0e6beff12fc6ca807a860d814976bf445c16c5baa3_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cluster-authentication-rhel9-operator@sha256:f71453f0c3dbd5b33b6dfb844aa936b1e6743ab500335b9ad2757e9cb6817056_s390x", "9Base-RHOSE-4.18:openshift4/ose-cluster-autoscaler-rhel9-operator@sha256:6020a6a4b43236623e58b31df5ac0e4b594cee6405a7fa023052e95c4a3ee926_arm64", "9Base-RHOSE-4.18:openshift4/ose-cluster-autoscaler-rhel9-operator@sha256:b58f0b29917ffd40641259a4f9e3542872223a1057080fa2ae23a89667329090_s390x", "9Base-RHOSE-4.18:openshift4/ose-cluster-autoscaler-rhel9-operator@sha256:c9a882993f5201423b33d84b9e678774071d3cff48041cab99e806cdb1c241f0_amd64", "9Base-RHOSE-4.18:openshift4/ose-cluster-autoscaler-rhel9-operator@sha256:e269d3344ecca8e186c24d7026bb4b6cf838a61d9179a8ba6d0061d65cacbae1_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cluster-autoscaler-rhel9@sha256:4e1cb4f37add067a58d6c113ae0388c4b86df3859e850def8e433ff9974a7a53_amd64", "9Base-RHOSE-4.18:openshift4/ose-cluster-autoscaler-rhel9@sha256:86125d17ef0364ca8f07b9fbdebbe56fd063d323302895f18c3aa5c46f87bbb6_s390x", "9Base-RHOSE-4.18:openshift4/ose-cluster-autoscaler-rhel9@sha256:c3fee7ad21093191468b21d24e235fc3abd17aa31f746c2c54b27650abf01747_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cluster-autoscaler-rhel9@sha256:c46148ff8f04200ce05a0af8c09c6e6d41af6946106f6e57f8db5d62c26c971c_arm64", "9Base-RHOSE-4.18:openshift4/ose-cluster-baremetal-operator-rhel9@sha256:3f36ac62d3074e1ab6a51763aee0fae25fa50c5ee127775311d403e1a0a6f42d_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cluster-baremetal-operator-rhel9@sha256:460b65a3f150b9292482bc93af7c0b2ea953d8676d74c07a54521f7cc6175d0d_arm64", "9Base-RHOSE-4.18:openshift4/ose-cluster-baremetal-operator-rhel9@sha256:abbf665ad8727d7e480cb80d346c332fad5b4eb64c316a3243c73c7a7dfdb58f_s390x", "9Base-RHOSE-4.18:openshift4/ose-cluster-baremetal-operator-rhel9@sha256:e8996d054ddcae8a72eb1967c3eed916f640934b04763693d946d365b5c84d8f_amd64", "9Base-RHOSE-4.18:openshift4/ose-cluster-bootstrap-rhel9@sha256:19e5d7f14b88597a7dff1e1b5914e45799c97048c18efba6dbb8abb267ba87d6_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cluster-bootstrap-rhel9@sha256:39bdde7abdd86bd1cac0fb0a33860bc7e0293b41c6387cf84068072c0d9680c1_amd64", "9Base-RHOSE-4.18:openshift4/ose-cluster-bootstrap-rhel9@sha256:7a3d9e5d035e642a0ad0f2f1508ef48f3af3a07b4a8ec57651d5cd6080c583e0_arm64", "9Base-RHOSE-4.18:openshift4/ose-cluster-bootstrap-rhel9@sha256:dfc4d2d0ebac62166982c47848779ef4ec9d8a4a64a80afa934c1d683727fc77_s390x", "9Base-RHOSE-4.18:openshift4/ose-cluster-capi-rhel9-operator@sha256:309c35e79d6a31f88034cecb13af03a6e85df63c1f71ec854b52f28c9f452d8b_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cluster-capi-rhel9-operator@sha256:496c503f0602a5877bb097267bc8b1b6d779a85a6f6d85cdcb591b483cc606b2_s390x", "9Base-RHOSE-4.18:openshift4/ose-cluster-capi-rhel9-operator@sha256:a9530009d2f9425c6cc03ef087ee429a9c45d8b26bba769e1ff2cc63c4f99dc1_arm64", "9Base-RHOSE-4.18:openshift4/ose-cluster-capi-rhel9-operator@sha256:b99002d9d804e68e6371ba304207a79c79984afdb089ba54c5a54e880a91cc90_amd64", "9Base-RHOSE-4.18:openshift4/ose-cluster-cloud-controller-manager-rhel9-operator@sha256:4d409dd4ec51910f7b87cc9ecccc943d37dabe003739d405f5199d7116f57bbf_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cluster-cloud-controller-manager-rhel9-operator@sha256:9bcf74410f99618648d7694fa2d54a2cb64424921089a9b79decff84072df811_arm64", "9Base-RHOSE-4.18:openshift4/ose-cluster-cloud-controller-manager-rhel9-operator@sha256:ca4ac8143e1b9fd0f22367215f48b59a041d70997b436b4acb72b84a9f7132f3_s390x", "9Base-RHOSE-4.18:openshift4/ose-cluster-cloud-controller-manager-rhel9-operator@sha256:d740c550e79661d1ce69625527814b48db657762c59f9edd28ea1a9376e9dad4_amd64", "9Base-RHOSE-4.18:openshift4/ose-cluster-config-api-rhel9@sha256:114f65f102a21c63c9be3ca80e77f239eecf56b9ecb8ec6bcede8a0d448e595e_amd64", "9Base-RHOSE-4.18:openshift4/ose-cluster-config-api-rhel9@sha256:1871e6db10aa5758bd0cec19170103c6b23c1ef72897c760052e4d1faccd64f9_arm64", "9Base-RHOSE-4.18:openshift4/ose-cluster-config-api-rhel9@sha256:25e1de88f204e2b077a5c2cb2abdba955458220b646c2219ee2bcf8f1c088a64_s390x", "9Base-RHOSE-4.18:openshift4/ose-cluster-config-api-rhel9@sha256:8adfd33b980e96fabe8972b6434b6bb8c5f59ea3c2ae8b7724c9d0195b5373dc_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cluster-config-rhel9-operator@sha256:737e9019a072c74321e0a909ca95481f5c545044dd4f151a34d0e1c8b9cf273f_amd64", "9Base-RHOSE-4.18:openshift4/ose-cluster-config-rhel9-operator@sha256:ebd357674216124b6c4fefd995f64d87575e79a8741a8fd371efe2e56af4fb85_s390x", "9Base-RHOSE-4.18:openshift4/ose-cluster-config-rhel9-operator@sha256:ecfe52421ce2e06a7ab489a13e5b767755361fe0760b0d91703a3d10782de78e_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cluster-config-rhel9-operator@sha256:ee2bea65b33f6c058a814014bd48134a2e2316198a0d27d025bbf2a0c0e896ac_arm64", "9Base-RHOSE-4.18:openshift4/ose-cluster-control-plane-machine-set-rhel9-operator@sha256:32f9e10dfb8a7c812ea8b3e71a42bed9cef05305be18cc368b666df4643ba717_amd64", "9Base-RHOSE-4.18:openshift4/ose-cluster-control-plane-machine-set-rhel9-operator@sha256:e0198b568c9f4764dfc6f89f0c66bb82edb25e31c9e7c6efa2377cb9290389bb_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cluster-control-plane-machine-set-rhel9-operator@sha256:e8ca59bf7abe002b39103dacfe02e8a2ffdc32a214852fe6e1bb8452d74d6031_s390x", "9Base-RHOSE-4.18:openshift4/ose-cluster-control-plane-machine-set-rhel9-operator@sha256:f4369c5da91433e049d52454bacae499901892228668601deae4e6a58be86ba1_arm64", "9Base-RHOSE-4.18:openshift4/ose-cluster-csi-snapshot-controller-rhel9-operator@sha256:8d4d132f36c2779b1c3dcab61f7018b5fac10aa7d22ec9a2915374b2d909dc9d_amd64", "9Base-RHOSE-4.18:openshift4/ose-cluster-csi-snapshot-controller-rhel9-operator@sha256:9fd2d9cf834de1868038b773db00952153310e5101cf3b1ff007448e7eaa1077_arm64", "9Base-RHOSE-4.18:openshift4/ose-cluster-csi-snapshot-controller-rhel9-operator@sha256:a1f36b471adf16c76b217d4bc7e47e3a03dbd907418675780d9d224fe215b379_s390x", "9Base-RHOSE-4.18:openshift4/ose-cluster-csi-snapshot-controller-rhel9-operator@sha256:d641a6e10238a3b5af9bb27d08f842a62bb8437ff3e6e8d743a8556782d98b79_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cluster-dns-rhel9-operator@sha256:64fd7b3d7338b6091263e1e5dcb23f693d15d5c3d36f2f5499061aa0cee54e2e_arm64", "9Base-RHOSE-4.18:openshift4/ose-cluster-dns-rhel9-operator@sha256:83ed14ed14a5e14c7c59893a37e8df9fd84688836218690e87ae72121b9e1fea_s390x", "9Base-RHOSE-4.18:openshift4/ose-cluster-dns-rhel9-operator@sha256:8fdf28927b06a42ea8af3985d558c84d9efd142bb32d3892c4fa9f5e0d98133c_amd64", "9Base-RHOSE-4.18:openshift4/ose-cluster-dns-rhel9-operator@sha256:9f5707d3c6a8dbcdc284044f13c7c4ffac4dc742dffcee4d22ef8e6caf6c03fb_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cluster-etcd-rhel9-operator@sha256:5fc3ac5c7182001c0bcfe2aeda7e3500952bdaf5c97597b8ef9a9155c1b51d1e_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cluster-etcd-rhel9-operator@sha256:a0fa3723269019bee1847b26702f42928e779036cc2f58408f8ee7866be30a93_amd64", "9Base-RHOSE-4.18:openshift4/ose-cluster-etcd-rhel9-operator@sha256:ad1c0128cf15f0fcca1748e11d51cf6ae5a0a31439af07c3ec6c3406b276472e_s390x", "9Base-RHOSE-4.18:openshift4/ose-cluster-etcd-rhel9-operator@sha256:eda715812b7a489a58e4dac5058070f390fbce5c2d2dd03c081786f56942ea2c_arm64", "9Base-RHOSE-4.18:openshift4/ose-cluster-image-registry-rhel9-operator@sha256:075389e8720c6779fa4482a2d2c25ab8c0c4dae21560370db56b728b20b027fd_arm64", "9Base-RHOSE-4.18:openshift4/ose-cluster-image-registry-rhel9-operator@sha256:10f20a39f16ae3019c62261eda8beb9e4d8c36cbb7b500b3bae1312987f0685d_amd64", "9Base-RHOSE-4.18:openshift4/ose-cluster-image-registry-rhel9-operator@sha256:4fc8ff01c431cc4452714aa14fb4e2d38193e51af66e3173e9287d54efbe1c2f_s390x", "9Base-RHOSE-4.18:openshift4/ose-cluster-image-registry-rhel9-operator@sha256:d5c93e57ddd2acaf781b1aa5c81e438a7d74fd7277a301ebd89d5bc8fbed542d_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cluster-ingress-rhel9-operator@sha256:0cee0300ca70d6b9507dad32d03dfa13bb7d05d9016b43f1c6d6d9f19d0d4d05_s390x", "9Base-RHOSE-4.18:openshift4/ose-cluster-ingress-rhel9-operator@sha256:23caa90e71230e1ecda98a82600eab5e6ab9f0e25bb7f650c6b2b867fe3ef5a1_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cluster-ingress-rhel9-operator@sha256:87c6c92dc2d3af196666793400d02b8252be76cea9b0e91baf5721a71263eced_arm64", "9Base-RHOSE-4.18:openshift4/ose-cluster-ingress-rhel9-operator@sha256:e51e6f78ec20ef91c82e94a49f950e427e77894e582dcc406eec4df807ddd76e_amd64", "9Base-RHOSE-4.18:openshift4/ose-cluster-kube-apiserver-rhel9-operator@sha256:60ac5fd347987074441712975747a0544d20468463f9a3633b17f33d021a803c_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cluster-kube-apiserver-rhel9-operator@sha256:6b1876df7e369ab1f3f62292439b3a6c8939750e539b3e8bb5b8f13cdd0f6e2e_amd64", "9Base-RHOSE-4.18:openshift4/ose-cluster-kube-apiserver-rhel9-operator@sha256:bf4d8f1d2e3a158cc3d0417b0e77017619b1e95e4de71350cb6513f379ac6ea1_arm64", "9Base-RHOSE-4.18:openshift4/ose-cluster-kube-apiserver-rhel9-operator@sha256:f258ee473410c1cd1e02a928bed782c3794e06fa139490425b07f77a84df1dd5_s390x", "9Base-RHOSE-4.18:openshift4/ose-cluster-kube-cluster-api-rhel9-operator@sha256:2253600dc6b4dba06a4f658158581397f806d9ee97fcc3ade8f4432d324ee1b2_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cluster-kube-cluster-api-rhel9-operator@sha256:28f4e5dd1c9dbf2139477f688b8fcafdfb0720f84384903c396483bf4214a77a_arm64", "9Base-RHOSE-4.18:openshift4/ose-cluster-kube-cluster-api-rhel9-operator@sha256:641e24700ea21af85f590e12f6d76942d15b4e54bf52d8428eb33b6a3af250a9_s390x", "9Base-RHOSE-4.18:openshift4/ose-cluster-kube-cluster-api-rhel9-operator@sha256:cfb8d51820f995931ed631ae68f95b979bf95f1b6ef8c664b19c3a4790b9eff8_amd64", "9Base-RHOSE-4.18:openshift4/ose-cluster-kube-controller-manager-rhel9-operator@sha256:93b0dca8b67c608ef832c95dd85e8bae8df49898b6a9f619e77ef424e5bf56ce_s390x", "9Base-RHOSE-4.18:openshift4/ose-cluster-kube-controller-manager-rhel9-operator@sha256:cfc8ea9fda1593846d08eecae454565cb88132276e4d573aaedaf0d65778e0f9_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cluster-kube-controller-manager-rhel9-operator@sha256:ded7024d5746abb97fe37dde60ea2fc2387762d46ec8e205a13c54e4e5079811_amd64", "9Base-RHOSE-4.18:openshift4/ose-cluster-kube-controller-manager-rhel9-operator@sha256:fa67d98aaaa160d9f3e93027f725d6b252c2e09af0f02f01d0ea80864b533568_arm64", "9Base-RHOSE-4.18:openshift4/ose-cluster-kube-scheduler-rhel9-operator@sha256:13397e621a9056d7e9983b2af68e2b6016a9a523e5278f26a983e70202b60a02_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cluster-kube-scheduler-rhel9-operator@sha256:5b881c97aa8e440c6b3ca001edfd789a9380066b8f11f35a8dd8d88c5c7dbf86_amd64", "9Base-RHOSE-4.18:openshift4/ose-cluster-kube-scheduler-rhel9-operator@sha256:7442cabac137c3554d5ffbf9930023fb5d1715ceb65360d5f4f8ab2317c9c642_arm64", "9Base-RHOSE-4.18:openshift4/ose-cluster-kube-scheduler-rhel9-operator@sha256:b2f6421cd9b8228dd8ae68e6a53297335e37ef490b59313b6775cb6f1d90dfa7_s390x", "9Base-RHOSE-4.18:openshift4/ose-cluster-kube-storage-version-migrator-rhel9-operator@sha256:345888b42d5dc080f64525e7d1eee48f4bcb430c4b162182c18fea14468ff1cf_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cluster-kube-storage-version-migrator-rhel9-operator@sha256:4711fb6e19c85f7e6cf3419ed00037a449ac046fe916b2a8d4e8686b6bd0c9da_s390x", "9Base-RHOSE-4.18:openshift4/ose-cluster-kube-storage-version-migrator-rhel9-operator@sha256:81ce53434ae413754e833e09057c6470bb1d431b1c230f9fee528f83e5c21531_arm64", "9Base-RHOSE-4.18:openshift4/ose-cluster-kube-storage-version-migrator-rhel9-operator@sha256:88b1f0a05a1b1c91e1212b40f0e7d04c9351ec9d34c52097bfdc5897b46f2f0e_amd64", "9Base-RHOSE-4.18:openshift4/ose-cluster-machine-approver-rhel9@sha256:9095a7985ac20b757c336063011b4c570122d38a81bd25eae3aadcbfca8288fd_s390x", "9Base-RHOSE-4.18:openshift4/ose-cluster-machine-approver-rhel9@sha256:cfde01407df05505f93369b52f7cbc5bd141a4f145b5e49fb5722b51a4598b36_arm64", "9Base-RHOSE-4.18:openshift4/ose-cluster-machine-approver-rhel9@sha256:d47fcb2e7601858197796ca93b47b4f79f7da5ff080893467569134dd326f4ea_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cluster-machine-approver-rhel9@sha256:dd0628f89ad843d82d5abfdc543ffab6a861a23cc3005909bd88fa7383b71113_amd64", "9Base-RHOSE-4.18:openshift4/ose-cluster-monitoring-rhel9-operator@sha256:2cc287a15b8e72cfa68f1fd381a5fb9e95e212e6a33f069a4b3ff4308cec807a_s390x", "9Base-RHOSE-4.18:openshift4/ose-cluster-monitoring-rhel9-operator@sha256:774bdddb35515990234f9c3b96f9ecbb9a48d198c71d3f538819947791d40a11_arm64", "9Base-RHOSE-4.18:openshift4/ose-cluster-monitoring-rhel9-operator@sha256:779b2be282cd33e82cb7d34369f1bf8bb081b891c17607d7ef624309882a6a75_amd64", "9Base-RHOSE-4.18:openshift4/ose-cluster-monitoring-rhel9-operator@sha256:bf60dad943e29dc10f74225d5a61ac63b4099c037adbedaf97d3a1639a33c8ba_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cluster-network-rhel9-operator@sha256:06528e2beda155c0a4a307d7a14afb6f126780ab57af6bc0802812eb6f83ddd1_arm64", "9Base-RHOSE-4.18:openshift4/ose-cluster-network-rhel9-operator@sha256:1c595953c62affd9dec94783f2de4df470963ea2d95bc019c56d3ea219545a64_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cluster-network-rhel9-operator@sha256:83f0d56a26a9bc09d92493e4140d2634153de75da2a5a86e418aa89d026be932_s390x", "9Base-RHOSE-4.18:openshift4/ose-cluster-network-rhel9-operator@sha256:e1baa38811c04bd8909e01a1f3be7421a1cb99d608d3dc4cf86d95b17de2ab8b_amd64", "9Base-RHOSE-4.18:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:1e531166f04813b9646092659af962912b9673285dc86399c049934f20c28b20_amd64", "9Base-RHOSE-4.18:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:911f7a68967d2304192f52151731e7c32779919a5e073e9fac4358673db13b3e_s390x", "9Base-RHOSE-4.18:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:a63135bc419e2dc280b4429a65f266efb31bc4cf9f2b77adab923fe0b8ab5ee6_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cluster-node-tuning-rhel9-operator@sha256:c0328f61efe150c0446a48727eacf70e0aa1a25fd4afdd763942d5f62cda2d66_arm64", "9Base-RHOSE-4.18:openshift4/ose-cluster-olm-rhel9-operator@sha256:8f2a312742708b133b6787b717707b05d6cd8364ec407448cf0b1561041ac057_arm64", "9Base-RHOSE-4.18:openshift4/ose-cluster-olm-rhel9-operator@sha256:98f6d4e6173f7088cd741986a318498729ee5b49800ec333388223a291255830_s390x", "9Base-RHOSE-4.18:openshift4/ose-cluster-olm-rhel9-operator@sha256:9df7370df8f124c45ded2f7040ad5f0d0a64312d7192206c4c24009b186f4ee4_amd64", "9Base-RHOSE-4.18:openshift4/ose-cluster-olm-rhel9-operator@sha256:f72d74fbb6b079635fee22e9790dc3892ac5f25171eaf2439cca43add24ecb12_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cluster-openshift-apiserver-rhel9-operator@sha256:094bb6a6641b4edbaf932f0551bcda20b0d4e012cbe84207348b24eeabd351e9_amd64", "9Base-RHOSE-4.18:openshift4/ose-cluster-openshift-apiserver-rhel9-operator@sha256:2b6abb7b31924a39037a8613564c832d89277f135ec063d4b465adbda629527a_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cluster-openshift-apiserver-rhel9-operator@sha256:44abc98c85dbc5714e2744351691febf8f69aa94db3bb53c9e18cb28666d9f39_arm64", "9Base-RHOSE-4.18:openshift4/ose-cluster-openshift-apiserver-rhel9-operator@sha256:ecfbfca8f0cabc4ce3a8d7495b091b8da72fc36c9c1c30fe5a7350a417f18ae4_s390x", "9Base-RHOSE-4.18:openshift4/ose-cluster-openshift-controller-manager-rhel9-operator@sha256:3a741253807c962189819d879b8fef94a9452fb3f5f3969ec3207eb2d9862205_amd64", "9Base-RHOSE-4.18:openshift4/ose-cluster-openshift-controller-manager-rhel9-operator@sha256:6734bdfc8c6db6a0f9c1225b9a9b55c166ec66e769394e2cb40b0af866463b26_arm64", "9Base-RHOSE-4.18:openshift4/ose-cluster-openshift-controller-manager-rhel9-operator@sha256:d75f81f0f7ccc5e760eaceebbb27b3503ac7a832d603ec106b1d5708f0fa8198_s390x", "9Base-RHOSE-4.18:openshift4/ose-cluster-openshift-controller-manager-rhel9-operator@sha256:e9449c6358e068c84dc2de8ac53f7a1c04b2f73eac199f8e72461d506cb0050f_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cluster-policy-controller-rhel9@sha256:0934e0779a79a5a84b25bdab38007d62cafb698fe8f8d3b900ee6042ee230255_s390x", "9Base-RHOSE-4.18:openshift4/ose-cluster-policy-controller-rhel9@sha256:67bbeb347774a192d3dd9f6d16b5a3dbf4005bf66a554113c236829c84857d4a_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cluster-policy-controller-rhel9@sha256:c0f9da410c07372b6c9ad6a79379b491cd10fdee88051c026b084652d85aed21_amd64", "9Base-RHOSE-4.18:openshift4/ose-cluster-policy-controller-rhel9@sha256:f5118ff6112f24582e667f7268a223c3289d1ca7b27c0d77a9b6743818df5786_arm64", "9Base-RHOSE-4.18:openshift4/ose-cluster-samples-rhel9-operator@sha256:1f124d48858b3ef57c33bb4fe6788f37ca9b0dddca18c5c3c91bf0de5a581a22_arm64", "9Base-RHOSE-4.18:openshift4/ose-cluster-samples-rhel9-operator@sha256:4088b9839cb857e8dbd8165e38223cd079aa63da150a2617d86f7fe1fd2204b1_s390x", "9Base-RHOSE-4.18:openshift4/ose-cluster-samples-rhel9-operator@sha256:e5c1fa39037a568c92154afe3803b846b9579fb92842fe2ad46bc712c417333e_amd64", "9Base-RHOSE-4.18:openshift4/ose-cluster-samples-rhel9-operator@sha256:ef5569027916185b6e8ec90453b9594139c434be04ed0a0617fa24638720b0f4_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cluster-storage-rhel9-operator@sha256:0ba0f513b210c6e8d667ebaba1154dd5ce8d4f4e19a34f5eeee1cd031469c417_arm64", "9Base-RHOSE-4.18:openshift4/ose-cluster-storage-rhel9-operator@sha256:5064f15a70df2a982857b7c30e05e67bb6d71b202a4fea4278d1f53cb523c58d_s390x", "9Base-RHOSE-4.18:openshift4/ose-cluster-storage-rhel9-operator@sha256:c5217a5e8a0b4eea4b2e1721d99ea5aa29f89d2f595a77b9ea5a48359b8a383e_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cluster-storage-rhel9-operator@sha256:ee4bff047ca0ede9c8b84af79e4ef56d390c568e8c9531f2718b9411be8ff836_amd64", "9Base-RHOSE-4.18:openshift4/ose-cluster-update-keys-rhel9@sha256:65b0fbe79e054f16db3fac99ee3f0da14eb69bc49f06a585350a75dc4700f5b0_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cluster-update-keys-rhel9@sha256:987887a5a286ae1b37724b5e77347d5e219f8cc5233b5486b5356f8f9f428dff_arm64", "9Base-RHOSE-4.18:openshift4/ose-cluster-update-keys-rhel9@sha256:aec4a55186774e944167d3b8a18d1c9605e1afb304a65ef1778e470ba3becb46_amd64", "9Base-RHOSE-4.18:openshift4/ose-cluster-update-keys-rhel9@sha256:d384e68f38b14181eacce0b04eadba209e1d9f51f65155ed7537e27e35895cf5_s390x", "9Base-RHOSE-4.18:openshift4/ose-cluster-version-rhel9-operator@sha256:2b6167accac97c57b14efa0d47eea157b98a7c5fd3c3c89f98ba0014c690106d_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-cluster-version-rhel9-operator@sha256:3d65068492fcc018f2ff1b43216a9db0f2e15e1d41d23006b6a49399a53535e3_amd64", "9Base-RHOSE-4.18:openshift4/ose-cluster-version-rhel9-operator@sha256:5adcfb3186135240bbaf63ae9286574dca9589656e8b1f34d669388ed570f751_s390x", "9Base-RHOSE-4.18:openshift4/ose-cluster-version-rhel9-operator@sha256:8676895c86fcf1ca402304605909e3e357a05614dde64ed075be3d8ae748f2f5_arm64", "9Base-RHOSE-4.18:openshift4/ose-configmap-reloader-rhel9@sha256:2d02a555ec465899924809a1c2fe02eaacc5cb8ba04bbccaf8f97af11fb3ffd4_s390x", "9Base-RHOSE-4.18:openshift4/ose-configmap-reloader-rhel9@sha256:8a402bd717015c656f3cfc2b65f42051bbbdd0ec91e94a5bd9b750699df64352_arm64", "9Base-RHOSE-4.18:openshift4/ose-configmap-reloader-rhel9@sha256:ddf534f1b737fe6a569f23b6c263a3c6859504cf71681e355483cd355b5c82a1_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-configmap-reloader-rhel9@sha256:fd9ce402edc64eb3c352669632b1887432aef4d582a3b7421360d5d84952f049_amd64", "9Base-RHOSE-4.18:openshift4/ose-console-rhel9-operator@sha256:6c10dcfe1b0a49778674e8b936ad06055e725d65bdb6b9fce553267b964caf1a_s390x", "9Base-RHOSE-4.18:openshift4/ose-console-rhel9-operator@sha256:9d240d5cbef743c17c0f01b7cef8bd8295899ade15504d52fc7b823493cd1fdb_arm64", "9Base-RHOSE-4.18:openshift4/ose-console-rhel9-operator@sha256:b8c0419f3b546929cbcf561ed113c23f3d4d28628dd605ec2eaa1c1e94c2db58_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-console-rhel9-operator@sha256:c69fe7a98a744b7a7b61b2a8db81a338f373cd2b1d46c6d3f02864b30c37e46c_amd64", "9Base-RHOSE-4.18:openshift4/ose-console-rhel9@sha256:041d7ea0f1bb24d06018e4a65bb3a3a2ced56fb3ef21afb017c7eedaee2a3ecd_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-console-rhel9@sha256:19a180326e90753349d4910bf1622864452d93ad6da5a131dfa8a24febf850d0_s390x", "9Base-RHOSE-4.18:openshift4/ose-console-rhel9@sha256:e4f3b2fce631f9d06972052d987346bfcaf2e0eb11975e0a1c81e9b79aba4834_arm64", "9Base-RHOSE-4.18:openshift4/ose-console-rhel9@sha256:f247257b0885cf5d303e3612c7714b33ae51404cfa2429822060c6c025eb17dd_amd64", "9Base-RHOSE-4.18:openshift4/ose-container-networking-plugins-rhel9@sha256:2991c168864649f6aaef7e3bee2fc651d15b948ec3edf40437e23b043a11ca53_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-container-networking-plugins-rhel9@sha256:5cf3bfff3f82bef13679d24d4e63bb63d782eedba223594a236374939e1b2d11_s390x", "9Base-RHOSE-4.18:openshift4/ose-container-networking-plugins-rhel9@sha256:687fddfbb085a1688df312ce4ec8c857df9b2daed8ff4a7ed6163a1154afa2cc_amd64", "9Base-RHOSE-4.18:openshift4/ose-container-networking-plugins-rhel9@sha256:d2b9473d80e7ef1b78cab5be6d006d999a2396d9affaf1c85ccc16e95556127c_arm64", "9Base-RHOSE-4.18:openshift4/ose-coredns-rhel9@sha256:419f8e79712482517a331012d338610011aee0d4f8fba5f14608b9e42e63b651_arm64", "9Base-RHOSE-4.18:openshift4/ose-coredns-rhel9@sha256:487c0a8d5200bcdce484ab1169229d8fcb8e91a934be45afff7819c4f7612f57_amd64", "9Base-RHOSE-4.18:openshift4/ose-coredns-rhel9@sha256:de2e5be5dc2738c4722e7f0070b3f3217cd265b2d412aa8c56169727ec876be0_s390x", "9Base-RHOSE-4.18:openshift4/ose-coredns-rhel9@sha256:f43c7d3c085b925b53baf10c1cb5d7e94c055eafe59a87c9c796c673f8dc9ec2_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-csi-driver-manila-rhel9-operator@sha256:30d285d4aa5a6989810b1d451207665480323555b1341673555da2d2dffa5fe6_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-csi-driver-manila-rhel9-operator@sha256:5dc6cbd2a58a715054a4ad9b7547a1dbd462c23f28ddee0a72ca9f1f4f7db3a8_amd64", "9Base-RHOSE-4.18:openshift4/ose-csi-driver-manila-rhel9@sha256:1b7c4975bbf6cb14e52af08a696cb82056f73ea425c64e7019c49f64d940340b_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-csi-driver-manila-rhel9@sha256:56d35202aca51e9f23d4d26e2e4d6a0d64776afedf964ff3372bfbad0b5f6992_amd64", "9Base-RHOSE-4.18:openshift4/ose-csi-driver-nfs-rhel9@sha256:4cb2538e4bd2009e29137febd7c38bf4fb63f0aff34b363bde96caa80d1128d2_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-csi-driver-nfs-rhel9@sha256:7b29e12946d7d0322d0d77e5bbafa429aa934db17d96935b181417a728d8d64b_amd64", "9Base-RHOSE-4.18:openshift4/ose-csi-external-attacher-rhel9@sha256:08dc6783718f3e5f67c73c813a31af4997a2b165e33fd2c5595b7e7201203ffd_amd64", "9Base-RHOSE-4.18:openshift4/ose-csi-external-attacher-rhel9@sha256:207baa9c2469561007fb1df84f4f7cb1a2d2da237358feba68ebf97b2d84ab30_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-csi-external-attacher-rhel9@sha256:25ae7b08a2fd128ea02549f910ef223857d529ddf03c855b21162457cde861a4_s390x", "9Base-RHOSE-4.18:openshift4/ose-csi-external-attacher-rhel9@sha256:de78d44e7b1193c9a0ad82d325c3d5e485b7808451c1140ed291b82d1c76d205_arm64", "9Base-RHOSE-4.18:openshift4/ose-csi-external-provisioner-rhel9@sha256:11d4c83a5e0f5e0ff93245124883ea382bc4e6641e174d5625e98e9aca0e82b6_arm64", "9Base-RHOSE-4.18:openshift4/ose-csi-external-provisioner-rhel9@sha256:4eb4fc1e417d49ea5aa72bcfd218b56bd15a5e9bb486d78c33680a4bf4ab65ef_amd64", "9Base-RHOSE-4.18:openshift4/ose-csi-external-provisioner-rhel9@sha256:815e3c120b4733248bd3501b2de82c694bd7fa44ebd8e10ec62c29d5f4a7df1e_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-csi-external-provisioner-rhel9@sha256:fca272ecb17ef80c0834cbcca08ea395e586687f7abb4c1c39beeb6d1811dac0_s390x", "9Base-RHOSE-4.18:openshift4/ose-csi-external-resizer-rhel9@sha256:23c57922caa9b6cec49c9a0905e57def6005f563a8948aea0d4b5dfd0cb28638_arm64", "9Base-RHOSE-4.18:openshift4/ose-csi-external-resizer-rhel9@sha256:7ea8aea9f5d5569ee64a5c5e3abb2dbd57eb81a55a78a131857ee1ba0fe85536_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-csi-external-resizer-rhel9@sha256:a59822cff84728981f83c5a8b75e49a02a0e00379208bc232f593a40887c660d_amd64", "9Base-RHOSE-4.18:openshift4/ose-csi-external-resizer-rhel9@sha256:d01a5d3466f3928e3cc464e864bd9980e8e2471023ffdfcfefabb6dc2d5b2196_s390x", "9Base-RHOSE-4.18:openshift4/ose-csi-external-snapshotter-rhel9@sha256:27a04a519b150c897b97ed0667ed1b27021e948e551bbd054fbb5f54736c014a_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-csi-external-snapshotter-rhel9@sha256:2feed2a301a3dc0c7a41989eeb2ed19f73acd31b58b517e14553d06948822f8d_arm64", "9Base-RHOSE-4.18:openshift4/ose-csi-external-snapshotter-rhel9@sha256:647ce2a827dd7b11aeff246db09e6f4e99595bcc5bf3f97c2a881e8355b82d58_amd64", "9Base-RHOSE-4.18:openshift4/ose-csi-external-snapshotter-rhel9@sha256:7e54b3709d0880b13392a12ccda1fc7824d06642cf0a2719de62e11683ff0031_s390x", "9Base-RHOSE-4.18:openshift4/ose-csi-livenessprobe-rhel9@sha256:8f19b542397ad022ff107cfa899d756d0d91262fc16f30ef0be84c2494171e9b_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-csi-livenessprobe-rhel9@sha256:ccb1f13b4a6ad25f23e41cac107c114a1e62e9d691830da303946ca89431399d_s390x", "9Base-RHOSE-4.18:openshift4/ose-csi-livenessprobe-rhel9@sha256:f2ad5e703af622922a30f24035a03254c5de8d95ae560f89cf2be19f56c3d0d1_amd64", "9Base-RHOSE-4.18:openshift4/ose-csi-livenessprobe-rhel9@sha256:f72565f2a8d0f7e80d46b43307ea3027474681891bb68ca8b93930524b3ce6f2_arm64", "9Base-RHOSE-4.18:openshift4/ose-csi-node-driver-registrar-rhel9@sha256:2a19383c7d005c1fb7f4927d6d63118255ac6e65bb0cefa9c67c1cf30d8f9473_arm64", "9Base-RHOSE-4.18:openshift4/ose-csi-node-driver-registrar-rhel9@sha256:3478cca418b915dea19efb929c1c6255229b780ac4b09e23c9bd0e57f1c1e097_amd64", "9Base-RHOSE-4.18:openshift4/ose-csi-node-driver-registrar-rhel9@sha256:ccc53cc9e2832ccd3b7c73c29218ecc23768db7c0dca8c3141b3a0ef451f3f43_s390x", "9Base-RHOSE-4.18:openshift4/ose-csi-node-driver-registrar-rhel9@sha256:d6d39ab04f164c38d4738eba3e6039ab0088b56c29c33f91dcc61e47177ea35a_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-csi-snapshot-controller-rhel9@sha256:2c65e01940e2f328afd7440f8aa49a116149609208a0fd2e4300b04ed5bd8621_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-csi-snapshot-controller-rhel9@sha256:378ae24874ed2bb07cf87a444e2491cbe94753460f039cc73b2e12fd56db68f1_s390x", "9Base-RHOSE-4.18:openshift4/ose-csi-snapshot-controller-rhel9@sha256:cc0122a02bb15b0bebb834153ca4edb2ea47245c2f183fc6ada74fd158608795_arm64", "9Base-RHOSE-4.18:openshift4/ose-csi-snapshot-controller-rhel9@sha256:d38bd1b30905149a8ec481e37ddb8812e9ea66b25333a80f08f09c467b805a39_amd64", "9Base-RHOSE-4.18:openshift4/ose-csi-snapshot-validation-webhook-rhel9@sha256:57a302cb6f5655a176b80649d3afbb6d73cc2620db3cfe67956faf3a64573a15_amd64", "9Base-RHOSE-4.18:openshift4/ose-csi-snapshot-validation-webhook-rhel9@sha256:c1fcc70f7e7ccb546e9ff4cd8752cf04b23fbe033bfb280ea2a3a3ff4541f849_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-csi-snapshot-validation-webhook-rhel9@sha256:ddaff910dd4a690cc5b2e11e7a2ac44530c6a15a1093b110d8605920ba756419_arm64", "9Base-RHOSE-4.18:openshift4/ose-csi-snapshot-validation-webhook-rhel9@sha256:e31c3631dbcc8b5eb2964cf0875f48412b8e23f223c2f382989c2559f8cc472e_s390x", "9Base-RHOSE-4.18:openshift4/ose-deployer-rhel9@sha256:560b40ba44031ab891d55cf3685792b127ce315f45765a1ef810f802a8b23b23_arm64", "9Base-RHOSE-4.18:openshift4/ose-deployer-rhel9@sha256:a1b87279cc287fd75c2f021dca102e3e7d1e7feface412ec0cd67cf0beed651e_amd64", "9Base-RHOSE-4.18:openshift4/ose-deployer-rhel9@sha256:a6e41d260688ce5c165dcfcada6abe6a4c02057b9e763dafde8cc46d90a2890f_s390x", "9Base-RHOSE-4.18:openshift4/ose-deployer-rhel9@sha256:d2093a464f8ab9cc3f96745b1a206c48929039342fc4dc8f9d5287066e7540bf_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-docker-builder-rhel9@sha256:74107a2eee910f045cc1bd6ff5a9f06311e108207cbd4f46f363a44a380cb6aa_arm64", "9Base-RHOSE-4.18:openshift4/ose-docker-builder-rhel9@sha256:c7d2bf1935e5cccb71b8f88bb174980844928a79aafbe809e77e465d0151a9dc_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-docker-builder-rhel9@sha256:d7a908a23111a624c3fa04dc3105a7a97f48ee60105308bbb6ed42a40d63c2fe_amd64", "9Base-RHOSE-4.18:openshift4/ose-docker-builder-rhel9@sha256:f3de5c5a522444994b508f916dfdf6ad069d8a671ec6f00d13c01fd1881badcf_s390x", "9Base-RHOSE-4.18:openshift4/ose-docker-registry-rhel9@sha256:0531034b836e0345d9dd48801791da7c67b8ed234cad082ddf41568d7b1de846_arm64", "9Base-RHOSE-4.18:openshift4/ose-docker-registry-rhel9@sha256:4333da584b7eb3bb92ecb27c5454a10a73d253e47bd52014afc0bfe1bf961ee2_s390x", "9Base-RHOSE-4.18:openshift4/ose-docker-registry-rhel9@sha256:9fa29d188c85a8b1e1bd15c9c18e96f1b235da9bd4a45dbc086a4a69520ed63f_amd64", "9Base-RHOSE-4.18:openshift4/ose-docker-registry-rhel9@sha256:fbad093a8e12c0cfb1a025db5e7cab4f999324b4d316b478963ba10cf98db6aa_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-etcd-rhel9@sha256:07b7c6877441ecd6a5646fb68e33e9be8b90092272e49117b54b4a67314731ca_amd64", "9Base-RHOSE-4.18:openshift4/ose-etcd-rhel9@sha256:3f7fd36eedb83f764095ed716282a76f58b94a7cdf70ad3e10da052d83d9891e_arm64", "9Base-RHOSE-4.18:openshift4/ose-etcd-rhel9@sha256:52ef9cf239eb64fd99c2b2a27fe6f49110169c8daf01f239cecfde25a57b1bba_s390x", "9Base-RHOSE-4.18:openshift4/ose-etcd-rhel9@sha256:d0f6a35cf822d1d54b7d136496cf88723e1c210745e12dde8ac8784d9eb72012_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-gcp-cloud-controller-manager-rhel9@sha256:35863e828736c1da987e1043432fa19b778ad4c5ff8c88dbbcf945412f9bd98d_amd64", "9Base-RHOSE-4.18:openshift4/ose-gcp-cloud-controller-manager-rhel9@sha256:b40f2a34837e7bc9813b558a88c5cbbd79c27bbd73eed93a97541b435224e1ad_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-gcp-cloud-controller-manager-rhel9@sha256:e10d239bdda01f5a9594294929f9f3b18928f6d70db48057a2dec39e26ccf444_arm64", "9Base-RHOSE-4.18:openshift4/ose-gcp-cluster-api-controllers-rhel9@sha256:2cb0db0e49a66ca5405012f7856196888ab8fbb986e46d539bc2b03ab8f11581_amd64", "9Base-RHOSE-4.18:openshift4/ose-gcp-cluster-api-controllers-rhel9@sha256:7e2152c706b83f9c55303bedcce88448b3b6818c685b9feda041960ab8147aca_arm64", "9Base-RHOSE-4.18:openshift4/ose-gcp-cluster-api-controllers-rhel9@sha256:9d63163a7f3c9fa820ba089cbdfbd04c9cc30d4fe1f2cd52402483ea40b0eda4_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-gcp-pd-csi-driver-operator-rhel9@sha256:2f54f3dc135e149d6b7c5f9ef3b5d1ce4cabc447d6f0181de14185bb9ab29d41_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-gcp-pd-csi-driver-operator-rhel9@sha256:3a6ea02d29bd5bd911f59770cb169ea606686e6c0e3212f2589228324a9aaa5b_amd64", "9Base-RHOSE-4.18:openshift4/ose-gcp-pd-csi-driver-operator-rhel9@sha256:9a4e2204031b33d2c01cf610ea622f07e8cf4e2b939951700e17dd0c51ae4e2f_arm64", "9Base-RHOSE-4.18:openshift4/ose-gcp-pd-csi-driver-rhel9@sha256:1e72156a3046c15138ee264551d42072b1685473e5f8f9a40876c8f0b2e55bdb_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-gcp-pd-csi-driver-rhel9@sha256:29a76402c665b7c7682f127f7a1e2d42d364d30ef2ef5160405da87e3eaf475b_amd64", "9Base-RHOSE-4.18:openshift4/ose-gcp-pd-csi-driver-rhel9@sha256:94351c287dab96ca42aea7099d0e312e773d45671394fd05ab9ab33ea05af843_arm64", "9Base-RHOSE-4.18:openshift4/ose-gcp-workload-identity-federation-webhook-rhel9@sha256:617d2b9c3f0f1eced2dc1c8b8b02a937cabafc251b8f5c6acb89f5a6d198324e_arm64", "9Base-RHOSE-4.18:openshift4/ose-gcp-workload-identity-federation-webhook-rhel9@sha256:a072609b79a24d8c2bfe920148048811191d5504015393699d39f4315ab815e5_s390x", "9Base-RHOSE-4.18:openshift4/ose-gcp-workload-identity-federation-webhook-rhel9@sha256:c0c66ab82ef6dbda0bcadce4c8efdb537a2036a29a81e5f87bdb58d51c62bd18_amd64", "9Base-RHOSE-4.18:openshift4/ose-gcp-workload-identity-federation-webhook-rhel9@sha256:c2f6337bcc2948852b8bc3865695539191a4b93a2e843edf40821debee536251_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-haproxy-router-rhel9@sha256:0a1695a2a0178836842cc65b9765e2476155c96cf550596d06fdbd5be2bb68f5_arm64", "9Base-RHOSE-4.18:openshift4/ose-haproxy-router-rhel9@sha256:22810b7c95092a87329e91a2c9bb56f8f555fe467d4d6dbe031938e942013b73_s390x", "9Base-RHOSE-4.18:openshift4/ose-haproxy-router-rhel9@sha256:9a38a15baeae03105ffd1a920b8689cc8570277dc992e2c39c5def1f60710523_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-haproxy-router-rhel9@sha256:fe009d03910e18795e3bd60a3fd84938311d464d2730a2af5ded5b24e4d05a6b_amd64", "9Base-RHOSE-4.18:openshift4/ose-hyperkube-rhel9@sha256:06bc35825771aee1220d34720243b89c4ba8a8b335e6de2597126bd791fd90d4_amd64", "9Base-RHOSE-4.18:openshift4/ose-hyperkube-rhel9@sha256:08fc6ac48c81a03e48ff2770246470397747f57e6dcff97fe98231f28b3595da_arm64", "9Base-RHOSE-4.18:openshift4/ose-hyperkube-rhel9@sha256:2361471ea3179517d7dcdeb14d6317c7fcd37852eb756ab4214869aab55122df_s390x", "9Base-RHOSE-4.18:openshift4/ose-hyperkube-rhel9@sha256:33cbc7f5d6235206133583514bb70e4fc007591a67672b7b993f79c6b7556153_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-hypershift-rhel9@sha256:33767d454632d54ac5f77872253f312ee3bbf10bb527d682e6a11ab7019d2c0b_amd64", "9Base-RHOSE-4.18:openshift4/ose-hypershift-rhel9@sha256:5ac651ed0e4e5083a4f21daba42b0f24b4f4350de4332ef13afdd82a84b91157_s390x", "9Base-RHOSE-4.18:openshift4/ose-hypershift-rhel9@sha256:5e766d21db64887d3cb96f61b7037971f8e7d6a4209ad69e6d8df12218e55fd6_arm64", "9Base-RHOSE-4.18:openshift4/ose-hypershift-rhel9@sha256:ce2a33cc2e0f8afdbf3ba4b8191b3270f7f9066992ab888312028ed3f807295a_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-ibm-cloud-controller-manager-rhel9@sha256:2dc97dc371ce7dcdb7a37099b9d6af39efd38007b56984f67282714e6101075a_s390x", "9Base-RHOSE-4.18:openshift4/ose-ibm-cloud-controller-manager-rhel9@sha256:89446988ba865ea836d1019ebc53831a52dd6a4bd272782c15517749a7cc4a54_amd64", "9Base-RHOSE-4.18:openshift4/ose-ibm-vpc-block-csi-driver-rhel9-operator@sha256:64c8bd841fbd6686592081ac8d3ea97b9dfe65cecce16604444c5a34f1436fbc_s390x", "9Base-RHOSE-4.18:openshift4/ose-ibm-vpc-block-csi-driver-rhel9-operator@sha256:af84400dd3946be4e4e7389bbdec3ae9a781fc20cec3cf4b6fad57af9cfb5604_amd64", "9Base-RHOSE-4.18:openshift4/ose-ibm-vpc-block-csi-driver-rhel9@sha256:0da1f522df11da5a92251277c82aee01c7b9b0c7083a3242f0c99736dc003356_s390x", "9Base-RHOSE-4.18:openshift4/ose-ibm-vpc-block-csi-driver-rhel9@sha256:ffad7ffc6069ac44065b5527c225d0be9f646852cb37335e9e70da8182e553d7_amd64", "9Base-RHOSE-4.18:openshift4/ose-ibmcloud-cluster-api-controllers-rhel9@sha256:1247175682fcb1170b868c5472b5b7b284358e3d1f3cf11d481edf7edc4638de_amd64", "9Base-RHOSE-4.18:openshift4/ose-ibmcloud-cluster-api-controllers-rhel9@sha256:82ddb90d61816c2e417acba231a57d7f5b62a11411ce7a4ae96930402a74a08c_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-ibmcloud-cluster-api-controllers-rhel9@sha256:b2bc464ef970aa0720648bcabaf4872398f1c5ec67194263a1f4aa05292dc301_s390x", "9Base-RHOSE-4.18:openshift4/ose-ibmcloud-machine-controllers-rhel9@sha256:0f6b4ed6763fa6be46081ea90bc3f7c17d3599f30aaa79c1fbbba085fa5c57cb_s390x", "9Base-RHOSE-4.18:openshift4/ose-ibmcloud-machine-controllers-rhel9@sha256:40c4595260b34779d9383218c34e064c2de931defce8270d75a159ec12cfca65_amd64", "9Base-RHOSE-4.18:openshift4/ose-image-customization-controller-rhel9@sha256:278049c8e1d86c63a9ba5f6bbab8fac7f8b90ca793b2a7c3e9fc3fa4fc34d0ac_arm64", "9Base-RHOSE-4.18:openshift4/ose-image-customization-controller-rhel9@sha256:85159f0f13b53abb594a6b8fdf58501d4247bfc7abb6348917618ceee702d1d5_amd64", "9Base-RHOSE-4.18:openshift4/ose-insights-rhel9-operator@sha256:0091a1db3d4e6d893d071b834a8131187043c739bb1a74396fa24dc1a8e11b5b_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-insights-rhel9-operator@sha256:3204a5f6925a859e59657ff4b086f43feaee48c30ec5f8bb55fd22c111bf676a_amd64", "9Base-RHOSE-4.18:openshift4/ose-insights-rhel9-operator@sha256:bb36ef56430f657222740ad9b38b3b4a47448e7f2ce5013f245f74433a38299d_s390x", "9Base-RHOSE-4.18:openshift4/ose-insights-rhel9-operator@sha256:f802f1400532e989c0acf37d15afc02b841f39361e440495a89150f43393b812_arm64", "9Base-RHOSE-4.18:openshift4/ose-installer-altinfra-rhel9@sha256:194f0eb946f3cfe1f1ec5bb07d05d9620a517bc93c61cf422c1fe2054261b047_amd64", "9Base-RHOSE-4.18:openshift4/ose-installer-altinfra-rhel9@sha256:46600ac56405c020ce6519b8e8de7859d952d56a577a653863fb975c1d48573a_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-installer-altinfra-rhel9@sha256:6972070f933269931b8a093815a1e6c89f2473bdd3905805517e3dc8ba552814_s390x", "9Base-RHOSE-4.18:openshift4/ose-installer-altinfra-rhel9@sha256:6f06d00f4afbae1074b1408cbab87c610ed836f1511dc424fedb2743665d0600_arm64", "9Base-RHOSE-4.18:openshift4/ose-installer-artifacts-rhel9@sha256:7cd87da4f04ead5c3569dfef2c46401e861d01e0fde1a258e982e4b5472835b1_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-installer-artifacts-rhel9@sha256:a4aa14e50db8d02bb14a5878eb3005ce4b9533d4f5e904ca4854bca6a60e0d4d_s390x", "9Base-RHOSE-4.18:openshift4/ose-installer-artifacts-rhel9@sha256:d181c4b72cd8a9d00c3f7ce3fe362294155de1f28fc24e308eb19e0f52e0f326_arm64", "9Base-RHOSE-4.18:openshift4/ose-installer-artifacts-rhel9@sha256:e887ebe393ef6fb107e49bf0410a4d7c66eddcfbe9ed38c74e22ed06e96eeb56_amd64", "9Base-RHOSE-4.18:openshift4/ose-installer-rhel9@sha256:0095d5167e296361c254f3a7caf94137d8fa3acffd976ec8d46001a18d71b840_s390x", "9Base-RHOSE-4.18:openshift4/ose-installer-rhel9@sha256:1edbc8607d94df7ef1321ca28bdd8926b3e7fd2834bc25de07b971023e26ab05_amd64", "9Base-RHOSE-4.18:openshift4/ose-installer-rhel9@sha256:613dd96324920b37fac5be5684a708e7b9d39bb1577377a9112be532824384b3_arm64", "9Base-RHOSE-4.18:openshift4/ose-installer-rhel9@sha256:fd47ca6c251280d9dbba1f431690cb2790368e772d689a16131144ad2426cdd4_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-ironic-agent-rhel9@sha256:5f24e0d91535caa2f42d20e3c25685737525407fe8e9fb080e2ec73a7ba4d75c_amd64", "9Base-RHOSE-4.18:openshift4/ose-ironic-agent-rhel9@sha256:636787d31b97b658681dffb8802cb1ad6f282c46e3527ca14754ada5f885e626_arm64", "9Base-RHOSE-4.18:openshift4/ose-ironic-machine-os-downloader-rhel9@sha256:3faa4edcd8f0266230c5e20d613fdf3097725f08db166ded5ebe3c4320d20b82_amd64", "9Base-RHOSE-4.18:openshift4/ose-ironic-machine-os-downloader-rhel9@sha256:e55ca64b9012a0dcc87fc79d251f6489d6eb364351fe6930ccb9046c508ecf4e_arm64", "9Base-RHOSE-4.18:openshift4/ose-ironic-rhel9@sha256:79fb6a35e8b3209d923a9bf9be1e965772a432ca8043c3be5eaa29017248193a_amd64", "9Base-RHOSE-4.18:openshift4/ose-ironic-rhel9@sha256:aeef2dda442d45eef70c5a045b94d21ede86e083e64f0bbe0d94996fbeaf3a73_arm64", "9Base-RHOSE-4.18:openshift4/ose-ironic-static-ip-manager-rhel9@sha256:6384a10f65a91e4b9975670f95482c350a7f6a77dfda34375ac00e83ca4b96d4_arm64", "9Base-RHOSE-4.18:openshift4/ose-ironic-static-ip-manager-rhel9@sha256:f149990adef6a081263ac4ef810271b23a2502bc4251a58870f0acfc414238f7_amd64", "9Base-RHOSE-4.18:openshift4/ose-keepalived-ipfailover-rhel9@sha256:50ea7a01b9cc3c2a4b5f23f6c5fed3a956a10a6678e2384ed23e5b056a27426d_arm64", "9Base-RHOSE-4.18:openshift4/ose-keepalived-ipfailover-rhel9@sha256:89925aced14314ea8c7840ef338f2135b9e36903ff6787d48604542defb3f66e_s390x", "9Base-RHOSE-4.18:openshift4/ose-keepalived-ipfailover-rhel9@sha256:93f365433f67af682cd5bb3274eb09338c8b8798d8c8a9cd0bca61ee86d7bfd7_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-keepalived-ipfailover-rhel9@sha256:996a61001d1ce08f4765b76a5837aafd708ab7e9400b51d5d8eab544ce0b2558_amd64", "9Base-RHOSE-4.18:openshift4/ose-kube-proxy-rhel9@sha256:261e9c241e00ce4546ea463ee670a2ebd8793feb793eec8d44bc20701e28fde3_s390x", "9Base-RHOSE-4.18:openshift4/ose-kube-proxy-rhel9@sha256:26fead236b9fb74d4c551ba700f58c778072d7fe4b183bbbd4841d9603966e0b_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-kube-proxy-rhel9@sha256:753a514f66057942d177bc207c8a775726ab8fe34a93b069aa0b1f40cf950ddb_arm64", "9Base-RHOSE-4.18:openshift4/ose-kube-proxy-rhel9@sha256:b97554198294bf544fbc116c94a0a1fb2ec8a4de0e926bf9d9e320135f0bee6f_amd64", "9Base-RHOSE-4.18:openshift4/ose-kube-rbac-proxy-rhel9@sha256:242b3d66438c42745f4ef318bdeaf3d793426f12962a42ea83e18d06c08aaf09_amd64", "9Base-RHOSE-4.18:openshift4/ose-kube-rbac-proxy-rhel9@sha256:258c0b8d31226677694d37fa634ffd12ad62089d1fca00e55fca1d0d7f4dfb5c_arm64", "9Base-RHOSE-4.18:openshift4/ose-kube-rbac-proxy-rhel9@sha256:4607cb9ab49dec582c9a738bee8f5f6893881a2cba6ff9d583818ad086a6ed06_s390x", "9Base-RHOSE-4.18:openshift4/ose-kube-rbac-proxy-rhel9@sha256:b9b244761d3bbaf5ce9c0c4115b316312c85c7293be3c40f606bbdcdfae547b2_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-kube-state-metrics-rhel9@sha256:47dcd507a8ad265c7ebd6b128bb9bdaeb7688b5731503817b94ae1d1badd6a77_amd64", "9Base-RHOSE-4.18:openshift4/ose-kube-state-metrics-rhel9@sha256:8a3e651a20572d0a63facc3c2c0508aa7360563a6454f9c848551691a3a8f27c_s390x", "9Base-RHOSE-4.18:openshift4/ose-kube-state-metrics-rhel9@sha256:dad7caa433bd669adca0c726130e8c4e21b05ee1bb02c14a3318c43539297703_arm64", "9Base-RHOSE-4.18:openshift4/ose-kube-state-metrics-rhel9@sha256:fb07f2e65f7831d446efd533bf95f8a1275e4a9cc7bfbe53b4905150ee7d5a2c_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-kube-storage-version-migrator-rhel9@sha256:46cf6c165bf3e4b8a2561784fe9ff72e640aee96036e838b358e033baaf443a7_s390x", "9Base-RHOSE-4.18:openshift4/ose-kube-storage-version-migrator-rhel9@sha256:57fe85cf917630b3a02a2bdac377cf34109afcc3c75018cd097256d78639ca52_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-kube-storage-version-migrator-rhel9@sha256:8ade76669833871830b62812e76783577e96b3a957dd97e92d4f5d10dc220eb6_amd64", "9Base-RHOSE-4.18:openshift4/ose-kube-storage-version-migrator-rhel9@sha256:d5c6dcbfc7afe73c5bdea12946470326be84d63362ab2c8a5ded0756f727f013_arm64", "9Base-RHOSE-4.18:openshift4/ose-kubevirt-cloud-controller-manager-rhel9@sha256:6d81de580be99c1d77ff77de872f931187e129684857a9ca3e134c0f52a65a7c_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-kubevirt-cloud-controller-manager-rhel9@sha256:e55c2d10d727e8b0db2015d2d3113c3aa86bac41ab2806e127f99b8347bfb386_s390x", "9Base-RHOSE-4.18:openshift4/ose-kubevirt-cloud-controller-manager-rhel9@sha256:e9ee33559a960ffc668828d3f2537ba7f478bc4215972bb5c2dfebb407115718_arm64", "9Base-RHOSE-4.18:openshift4/ose-kubevirt-cloud-controller-manager-rhel9@sha256:f8188b1032617166f35b38ce028e4cc3a484dbeca839b88afeb54b561bb37a1c_amd64", "9Base-RHOSE-4.18:openshift4/ose-libvirt-machine-controllers-rhel9@sha256:6cd87ea5c57aa0c81b9ee90ea1ee36f51d682035c3d8df29d249ad692fae8aa9_s390x", "9Base-RHOSE-4.18:openshift4/ose-libvirt-machine-controllers-rhel9@sha256:75c9a14c1bbe60695bade05f73a10d563c065595c17d06d520fdb82d12e3d420_arm64", "9Base-RHOSE-4.18:openshift4/ose-libvirt-machine-controllers-rhel9@sha256:ac16572a9c4832178a0d06aa11c0b7b5106f1f75108e894d97d8fc9c1789b199_amd64", "9Base-RHOSE-4.18:openshift4/ose-libvirt-machine-controllers-rhel9@sha256:e807311dd847b4d27ba342310e74836cd08f30d7e7c818e5295dbd63df245cc4_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-machine-api-provider-aws-rhel9@sha256:291de9e9f1f0c03ec655df7bdbe2d6e1fd2457837c253f7d7c1953f436bd1417_arm64", "9Base-RHOSE-4.18:openshift4/ose-machine-api-provider-aws-rhel9@sha256:32f26fc424ddfcfa3f2463a27c7ea353f27ed989d7dc29a3c62c499a0da829f6_amd64", "9Base-RHOSE-4.18:openshift4/ose-machine-api-provider-azure-rhel9@sha256:1d25468455be62291f08030f62934f07175add163457e15fa08f182d7c34f696_arm64", "9Base-RHOSE-4.18:openshift4/ose-machine-api-provider-azure-rhel9@sha256:4baed776832368dd687f5abb1deacddd98a605f656576c648a3595f3f007bc93_amd64", "9Base-RHOSE-4.18:openshift4/ose-machine-api-provider-gcp-rhel9@sha256:317ab425ac82440394b732c0f7a10e2b2bf52fcd5d683052f15a4d23efc0ddcb_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-machine-api-provider-gcp-rhel9@sha256:6adbcd26d7746428dfbe4f8d63d2b230fde42e2797865563d8e3622701fe6e88_arm64", "9Base-RHOSE-4.18:openshift4/ose-machine-api-provider-gcp-rhel9@sha256:966c1651137e391f10026740d2c57ab71a59af874c79a306e37306b27d6bd21c_amd64", "9Base-RHOSE-4.18:openshift4/ose-machine-api-provider-openstack-rhel9@sha256:042d433c68171e6c93b28908884daf369fa32301ba121c3dbf916b33682e6a2c_amd64", "9Base-RHOSE-4.18:openshift4/ose-machine-api-provider-openstack-rhel9@sha256:2b31e378008691aa2d24724d3fb4c6a696f19727957ee58e68a1f52f05b1e678_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-machine-api-provider-openstack-rhel9@sha256:3ce4faa80d2dde0c7057f211d583c87017976576c91a798cd52fd1b3942d62d9_s390x", "9Base-RHOSE-4.18:openshift4/ose-machine-api-provider-openstack-rhel9@sha256:d20d3b77483fd599ee72ec076aafd9564b3ed48bb69b55d5909664ff4c8801ed_arm64", "9Base-RHOSE-4.18:openshift4/ose-machine-api-rhel9-operator@sha256:101f295e2eae0755ae1865f7de885db1f17b9368e4120a713bb5f79e17ce8f93_amd64", "9Base-RHOSE-4.18:openshift4/ose-machine-api-rhel9-operator@sha256:950569acc8b6512413c6bd60c343097121973c661b2ac5b6788e61e719a37a43_s390x", "9Base-RHOSE-4.18:openshift4/ose-machine-api-rhel9-operator@sha256:aa686553c257ce66b8261f0a9201403d33405b87e5a0f6621779845da1f765d9_arm64", "9Base-RHOSE-4.18:openshift4/ose-machine-api-rhel9-operator@sha256:cbd27942289d7d0b1893fea21e8e07ba4783775365c59a481ebd8ca3fbe389a1_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-machine-config-rhel9-operator@sha256:02709feb8d2bcffe2a1f13b0db84a96ba6c64113d5e397deec51232a37b67e9c_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-machine-config-rhel9-operator@sha256:a4f64f23e472c1e2a3a55dc714e0dad7c223288872660c34065d9096ee6e310b_s390x", "9Base-RHOSE-4.18:openshift4/ose-machine-config-rhel9-operator@sha256:c915fb8ba96e911699a1ae34a8e95ca8a9fbe1bf8c28fea177225c63a8bdfc0a_amd64", "9Base-RHOSE-4.18:openshift4/ose-machine-config-rhel9-operator@sha256:d90eb8d3537ba64b9b866f91a9a9151fb6ab2bd8c39d95ef8349aefade8b7423_arm64", "9Base-RHOSE-4.18:openshift4/ose-machine-os-images-rhel9@sha256:33ac0ea9d842458cfa4bba37ee3d633a848e49df4f7bbdb64d829ebfa7030459_s390x", "9Base-RHOSE-4.18:openshift4/ose-machine-os-images-rhel9@sha256:6c1590e346c5adb7605d97e80a79a7c708e78b14cc70971ee2bd02d88b754e33_amd64", "9Base-RHOSE-4.18:openshift4/ose-machine-os-images-rhel9@sha256:9125c835060b413dd84597e169f4bd2525df45a8d9b27e39183f90dd68e13474_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-machine-os-images-rhel9@sha256:e80c1b156027aa218fb35360542c1a9acaecd9c78f623009cbdb802f6329a492_arm64", "9Base-RHOSE-4.18:openshift4/ose-monitoring-plugin-rhel9@sha256:060d6951635b8de31065dd239cb784957b91ca658118c233614846e0ce3db1f8_arm64", "9Base-RHOSE-4.18:openshift4/ose-monitoring-plugin-rhel9@sha256:acc85f88ced14cd06c1b563ce298b763c9432bd209afa13322607b53f7f136cf_s390x", "9Base-RHOSE-4.18:openshift4/ose-monitoring-plugin-rhel9@sha256:b5e205b553835b386518450db730ab666280a63d52f6df4e582571fc1d44fd5c_amd64", "9Base-RHOSE-4.18:openshift4/ose-monitoring-plugin-rhel9@sha256:c78e9a55078f3e139a50fb6b8f1dfcbca39a4e372f17e0279affbb221ffe3cff_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-multus-admission-controller-rhel9@sha256:099d416d5528b5f6782fbbf6985a7d919282af4b0f4c587744cb1e9cf243f0b3_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-multus-admission-controller-rhel9@sha256:1730541aad2d017eb0c4b248be49bb211eae5932e4c75b88bc30f4e31163456f_s390x", "9Base-RHOSE-4.18:openshift4/ose-multus-admission-controller-rhel9@sha256:342dca43b5b09123737ccda5e41b4a5d564e54333d8ce04d867d3fb968600317_amd64", "9Base-RHOSE-4.18:openshift4/ose-multus-admission-controller-rhel9@sha256:9752b74794d81e667765bbf9d53f7684afae36dafce704e1d96718599d77217e_arm64", "9Base-RHOSE-4.18:openshift4/ose-multus-cni-microshift-rhel9@sha256:098bab222712ecdbf85e748e0b676814b0e08debfdbc15127b057b63c136fcab_amd64", "9Base-RHOSE-4.18:openshift4/ose-multus-cni-microshift-rhel9@sha256:2d434c4034b0732faf612943b23a6bcbe800d6230a016d9d39aa4a0ca387904f_s390x", "9Base-RHOSE-4.18:openshift4/ose-multus-cni-microshift-rhel9@sha256:b276df0601320f6773890d38b59f4b2d1a3341a47964d58c61adf2fcaed40ab5_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-multus-cni-microshift-rhel9@sha256:cff936abaaf77fcae90d16563afaffa5fabed681ff6a84cd0d07cd753f23483e_arm64", "9Base-RHOSE-4.18:openshift4/ose-multus-cni-rhel9@sha256:696d84c770d2e6099308dcb4ed831e0d71cb0d1a9c31062b874e8a3ff2a58bbb_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-multus-cni-rhel9@sha256:7eeaee65f2808b819eedb413bdcabb9144e12f0dd97f13fd1afba93a95b67b26_amd64", "9Base-RHOSE-4.18:openshift4/ose-multus-cni-rhel9@sha256:97510a9ffb43193c5a31a526dd92e505c23fb936b1405bbe288ef5901dac2a69_s390x", "9Base-RHOSE-4.18:openshift4/ose-multus-cni-rhel9@sha256:a5e416b1ef62e55ac0761f4e496c40888193405744a09b0bf288ef205c555cb1_arm64", "9Base-RHOSE-4.18:openshift4/ose-multus-networkpolicy-rhel9@sha256:23f833d3738d68706eb2f2868bd76bd71cee016cffa6faf5f045a60cc8c6eddd_amd64", "9Base-RHOSE-4.18:openshift4/ose-multus-networkpolicy-rhel9@sha256:459cab2f7a1e87ecf35554a16bfa8c5f95b2aeb7b7f9b5c389cda8b3bac9cbea_s390x", "9Base-RHOSE-4.18:openshift4/ose-multus-networkpolicy-rhel9@sha256:9e33b3d5e63961e10efb58f4bdb5cd565f0e3b3c6b88faedbd48cb9e6d9c3dbd_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-multus-networkpolicy-rhel9@sha256:dab7089a2d0adf3633da4cd68f9181cc30a62d18da9a8fed9963af5308e9a4e2_arm64", "9Base-RHOSE-4.18:openshift4/ose-multus-route-override-cni-rhel9@sha256:59dd7ed6a34455e6bb45cce48836f7f00bfcc9e1a6ef3d82678b65bd2165e7af_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-multus-route-override-cni-rhel9@sha256:d44a7b2d9fa5760259a84f562b7a5a23e77bf2977743b6ce438d358d8e5537f0_arm64", "9Base-RHOSE-4.18:openshift4/ose-multus-route-override-cni-rhel9@sha256:f567acb85146b5ed81451ec3e79f2de0c62e28c69b2eeade0abdf5d0c388e7aa_amd64", "9Base-RHOSE-4.18:openshift4/ose-multus-route-override-cni-rhel9@sha256:fa819829204be8d08a81ec7d5715419edbc2a9f87d8ba81e614e1557a5bab849_s390x", "9Base-RHOSE-4.18:openshift4/ose-multus-whereabouts-ipam-cni-rhel9@sha256:0ef9067ed283ea30ce68e11ec9cc0901997500095e2a4ec9811def0d62801abd_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-multus-whereabouts-ipam-cni-rhel9@sha256:972d869b2a1dcaa88876b1d58366fd58f7f5dec162ba56e7a09712cc894682d8_arm64", "9Base-RHOSE-4.18:openshift4/ose-multus-whereabouts-ipam-cni-rhel9@sha256:98100674616e54319f6713d742fd0c3bdbc84e6e6173e8ccf4a2473a714c2bc4_amd64", "9Base-RHOSE-4.18:openshift4/ose-multus-whereabouts-ipam-cni-rhel9@sha256:f2d6d15cc43dc0fae757386376ae0468b6f2d9fdf9cfffc832b46ea592784f94_s390x", "9Base-RHOSE-4.18:openshift4/ose-must-gather-rhel9@sha256:1e1ffd7e4d03d9d4f9da5ec454a29d332dd5631906b04e555a8ebf3d09975986_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-must-gather-rhel9@sha256:3f3a5f9b3ff50c97fe04e24327b9213490216ba39f8e7e996365606430ada0cc_s390x", "9Base-RHOSE-4.18:openshift4/ose-must-gather-rhel9@sha256:c42913ee663e9555d04701f9f19934a740281cf71a4448329007f8a23fddb6d8_arm64", "9Base-RHOSE-4.18:openshift4/ose-must-gather-rhel9@sha256:d67abdf4c370cff9f16456ea6aef2af78a86f2886291a15a14cc4360c604b221_amd64", "9Base-RHOSE-4.18:openshift4/ose-network-interface-bond-cni-rhel9@sha256:218f89056d41b269d0c08fb959ddaaf68b9ee0ce66cbe27d612cf208cbf3bbee_arm64", "9Base-RHOSE-4.18:openshift4/ose-network-interface-bond-cni-rhel9@sha256:383f4cceeeaead203bb2327fdd367c64b64d729d7fa93089f249e496fcef0c78_amd64", "9Base-RHOSE-4.18:openshift4/ose-network-interface-bond-cni-rhel9@sha256:74f438af5aca85f05b18b2838cbc0471c319c4e2a2516564e82a30aa0d262f20_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-network-interface-bond-cni-rhel9@sha256:839c7650a678713ae1521a0985d1a3ef38690860656a72559b826a638b34e07c_s390x", "9Base-RHOSE-4.18:openshift4/ose-network-metrics-daemon-rhel9@sha256:acece26da3cf38e7c6b02c3a923ec10e9d629503c0745c99aaf3639226a8f21e_arm64", "9Base-RHOSE-4.18:openshift4/ose-network-metrics-daemon-rhel9@sha256:b5a4abf1cf079995b1bf056263c3a4941f158aabba59646bf7f42def1b5f7fbe_s390x", "9Base-RHOSE-4.18:openshift4/ose-network-metrics-daemon-rhel9@sha256:c9edde73130266f25942f8b210c35d3ee944cb9c90ebc76d819e87e17baa9410_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-network-metrics-daemon-rhel9@sha256:d98bb346a17feae024d92663df92b25c120938395ab7043afbed543c6db9ca8d_amd64", "9Base-RHOSE-4.18:openshift4/ose-networking-console-plugin-rhel9@sha256:4f2947d82b6cc3eb432c3a1f6e4225cbf27641dfcbace20e07ef1a44a8c44f83_arm64", "9Base-RHOSE-4.18:openshift4/ose-networking-console-plugin-rhel9@sha256:5048e014361fc2039cd4deec1b994d96cfe240ddb0472f7c649bef563742bd94_s390x", "9Base-RHOSE-4.18:openshift4/ose-networking-console-plugin-rhel9@sha256:ae647598ec35cda5766806d3d44a91e3b9d4dee48ff154f3d8490165399873fd_amd64", "9Base-RHOSE-4.18:openshift4/ose-networking-console-plugin-rhel9@sha256:e2b8a612a01d849c86e3b46b95c083c1a9a91e11001e82d6871bf18eaf9978ac_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-nutanix-cloud-controller-manager-rhel9@sha256:4e436f73b346f15d55502b27f269153a720ec6a63de2b336f19cf26b60d0c6fb_amd64", "9Base-RHOSE-4.18:openshift4/ose-nutanix-machine-controllers-rhel9@sha256:fe38f4050c0847bcc0f7330f6c706a74d0bac68c4bb999cdb6c4fd78b5f6a987_amd64", "9Base-RHOSE-4.18:openshift4/ose-oauth-apiserver-rhel9@sha256:01a3d2cea9db7873e693a5c4c70b1656a987e581c2ec3cc29deaaef14d7a656e_arm64", "9Base-RHOSE-4.18:openshift4/ose-oauth-apiserver-rhel9@sha256:5aa9e5379bfeb63f4e517fb45168eb6820138041641bbdfc6f4db6427032fa37_amd64", "9Base-RHOSE-4.18:openshift4/ose-oauth-apiserver-rhel9@sha256:c8c0118206617a9ee07ff7218244ef12435b5230b14708ca85b6efd16d0cec01_s390x", "9Base-RHOSE-4.18:openshift4/ose-oauth-apiserver-rhel9@sha256:d87e6b5aefe1db4bf5d8d977f9632b21c78c24116b6127f02e8e7424d878e5e6_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-oauth-proxy-rhel9@sha256:227cd1dab721e23d2032846a118bb266ee68f4129de15ca7b205c9eff0887539_arm64", "9Base-RHOSE-4.18:openshift4/ose-oauth-proxy-rhel9@sha256:a85bf366913cafd9e8244a83b91169199f07ee27af7edb8cfbdb404e7f4bd37f_amd64", "9Base-RHOSE-4.18:openshift4/ose-oauth-proxy-rhel9@sha256:cd222821924515633ab564964d8643c5f97f223f7aaca48bd62c34d86f1688cf_s390x", "9Base-RHOSE-4.18:openshift4/ose-oauth-proxy-rhel9@sha256:fa5b4aa0345c827d0aa40a9e916983068b9ff23e05f16386ee6ea33ab6184e3f_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-oauth-server-rhel9@sha256:6d1508bc259ed7687e8012f09dc292f250dcae7f0e6ef6bcdc401280444ba347_s390x", "9Base-RHOSE-4.18:openshift4/ose-oauth-server-rhel9@sha256:7db03da3a0720d2e0b9d1012b570afd8732a2ce4afad3e70832128dd0fa715c2_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-oauth-server-rhel9@sha256:b641ed0d63034b23d07eb0b2cd455390e83b186e77375e2d3f37633c1ddb0495_amd64", "9Base-RHOSE-4.18:openshift4/ose-oauth-server-rhel9@sha256:bd190f100ceab5e9f020dd4e7a44819edab216deaf9c955251ea2f915b042b13_arm64", "9Base-RHOSE-4.18:openshift4/ose-openshift-apiserver-rhel9@sha256:1900f46b4940d7ab5ee9c29b8b3bfb5017432221e4e2cd7382c340fe2e4ddfe6_arm64", "9Base-RHOSE-4.18:openshift4/ose-openshift-apiserver-rhel9@sha256:611a61afe51ccb2963e15a0a792c644757d1133fa204c1f7f3851b4e2fc7e0f6_s390x", "9Base-RHOSE-4.18:openshift4/ose-openshift-apiserver-rhel9@sha256:7e3e9dc0b02b9351edf7c46b1d46d724abd1ac38ecbd6bc541cee84a209258d8_amd64", "9Base-RHOSE-4.18:openshift4/ose-openshift-apiserver-rhel9@sha256:c634818405195c15752a93e6ffdd49bbf5c373ea6ad42ddbb0768cc67d419234_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-openshift-controller-manager-rhel9@sha256:c1b4aa2735035e55864ed10d4ea38f2cfee0d1d536751b1957e0489d203cf312_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-openshift-controller-manager-rhel9@sha256:ce578e64e82b46d145ceed8e89825ac836ed7a74bbbe8196245b940c5c69e3a9_s390x", "9Base-RHOSE-4.18:openshift4/ose-openshift-controller-manager-rhel9@sha256:ebfc290b9c5c8a39a2b3274dd90f55d988718c8200a999b4ff93d9e2cf86a397_arm64", "9Base-RHOSE-4.18:openshift4/ose-openshift-controller-manager-rhel9@sha256:ee8d8f089ec1488067444c7e276c4e47cc93840280f3b3295484d67af2232002_amd64", "9Base-RHOSE-4.18:openshift4/ose-openshift-state-metrics-rhel9@sha256:1f76e76294435f3a25bdd5507e6a7265053381c5b79e54b0705ddc71303406c3_s390x", "9Base-RHOSE-4.18:openshift4/ose-openshift-state-metrics-rhel9@sha256:564a1256814dad40427dfb6f16e0b95b5caacbeb57e565bfb77b7e9ca07fd315_amd64", "9Base-RHOSE-4.18:openshift4/ose-openshift-state-metrics-rhel9@sha256:ae657becf48a79cd669aca13c29e470af9206ab073dd8cc5e9b485eabb94368c_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-openshift-state-metrics-rhel9@sha256:f7938ce0a7c1168b92dc111c681f77ea7452e0a84f7d550c8a6963eb864d923c_arm64", "9Base-RHOSE-4.18:openshift4/ose-openstack-cinder-csi-driver-rhel9-operator@sha256:2323ca9ab5b4a272bdc7a0d1f4da194771bc2c27248c02ae615d29117108c6a2_arm64", "9Base-RHOSE-4.18:openshift4/ose-openstack-cinder-csi-driver-rhel9-operator@sha256:7104531512d0f3e8edb7a5a118b6a616e28edb9ace1683c900ed006894a77c34_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-openstack-cinder-csi-driver-rhel9-operator@sha256:aea5c60ff4235e28004d490554b8b5b8b9afafbf088204990ffc9e7bb286b1ff_s390x", "9Base-RHOSE-4.18:openshift4/ose-openstack-cinder-csi-driver-rhel9-operator@sha256:f593fdeacb7faf5bd1cd34eac130d148b8d2a9e57368a7b2d592163b6491be0e_amd64", "9Base-RHOSE-4.18:openshift4/ose-openstack-cinder-csi-driver-rhel9@sha256:061b77dc3c30bdfc52dd6b6b88a5aae976a74ca6afc0b40e36be12d7ae14eaa2_s390x", "9Base-RHOSE-4.18:openshift4/ose-openstack-cinder-csi-driver-rhel9@sha256:4745692450579308686c8e291e0b3e8fcbd75c07df50f06268de5361413b0554_arm64", "9Base-RHOSE-4.18:openshift4/ose-openstack-cinder-csi-driver-rhel9@sha256:4ec2036bb800fcbcdae55e259b1b4505e7b339b569d2ec3164e9b1dbcb889141_amd64", "9Base-RHOSE-4.18:openshift4/ose-openstack-cinder-csi-driver-rhel9@sha256:7ea1fa618badab36227716ccfceeddbc2cf1f7668b3e1ba0a4274a346cc22d81_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-openstack-cloud-controller-manager-rhel9@sha256:4acb823e888ee7d089829fa0458c495c011798968bc1b114f4208d077ab21ec6_amd64", "9Base-RHOSE-4.18:openshift4/ose-openstack-cloud-controller-manager-rhel9@sha256:7c2567ee1449263c0a881aefe25846aa89b9881a8575930cc2a18fa016f115be_arm64", "9Base-RHOSE-4.18:openshift4/ose-openstack-cloud-controller-manager-rhel9@sha256:994966700474b57c6be832f78333e8286c2c85b98d7df3cc53980782794c2846_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-openstack-cloud-controller-manager-rhel9@sha256:9f23e20e9623028d706015fee779299bc48a2a7782d34f49b41ea5984302905e_s390x", "9Base-RHOSE-4.18:openshift4/ose-openstack-cluster-api-controllers-rhel9@sha256:3bdca319ff44a6974faf2c6f976a5543cdde5fabb57e6f132f7476693038c78f_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-openstack-cluster-api-controllers-rhel9@sha256:6ddd4ac62a8e23a90c347f72103e23d9681e2e1baf975a49edfe60db125f199b_amd64", "9Base-RHOSE-4.18:openshift4/ose-openstack-cluster-api-controllers-rhel9@sha256:ad1c5f947462ac102ccd6fc99586e6d5464a845f1a9e0df19469099fde0641be_s390x", "9Base-RHOSE-4.18:openshift4/ose-openstack-cluster-api-controllers-rhel9@sha256:c0a1cd87ef870545722a96d17e15feb6613f4ef768d936869d034c6f96fb6c51_arm64", "9Base-RHOSE-4.18:openshift4/ose-operator-framework-tools-rhel9@sha256:0946b4a629bff7040ef4b2673ed0bc7fd7d67695ad22cbb93c0866b14a8689ed_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-operator-framework-tools-rhel9@sha256:58a7d3ccfb9d9dc2b6c938e455c14d9800dfa8f92b60201bf0dcc253b5167525_amd64", "9Base-RHOSE-4.18:openshift4/ose-operator-framework-tools-rhel9@sha256:b25176d117bfd8db15140b060d5d6dfffda593ec6f290d66248163aa5f1c0547_arm64", "9Base-RHOSE-4.18:openshift4/ose-operator-framework-tools-rhel9@sha256:e174ff038db560b9e2e268b13a5369399e9539d90465bf246fd9da760f416885_s390x", "9Base-RHOSE-4.18:openshift4/ose-operator-lifecycle-manager-rhel9@sha256:47b0670fa1051335fd2d2c9e8361e4ed77c7760c33a2180b136f7c7f59863ec2_amd64", "9Base-RHOSE-4.18:openshift4/ose-operator-lifecycle-manager-rhel9@sha256:59d382cae197546c034725058de573b0fe7ef75d7ae290a31571c6588fb7db35_s390x", "9Base-RHOSE-4.18:openshift4/ose-operator-lifecycle-manager-rhel9@sha256:77b44abd29994f5e934a1158c909eaa4a944e10c12c580fca1ff1e18b13f0427_arm64", "9Base-RHOSE-4.18:openshift4/ose-operator-lifecycle-manager-rhel9@sha256:84d113f8688f0f39245d7850664f0dbf56696d0d379813f7bd961cd7c3141cf4_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-operator-marketplace-rhel9@sha256:003d92cd34d10c6a640ec83dade2451a8f3b62283db858849ca8ef67d081011d_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-operator-marketplace-rhel9@sha256:18f2cc55b61afd5c7ccc0a8862dd3650eed0dd7b42a3f635dd4f142eca5a225f_arm64", "9Base-RHOSE-4.18:openshift4/ose-operator-marketplace-rhel9@sha256:3812da92dc78494748a6ea0f7425a5d7c14c179eabbcc4bd6c1804877e5ac5f8_s390x", "9Base-RHOSE-4.18:openshift4/ose-operator-marketplace-rhel9@sha256:adabc3456bf4f799f893d792cdf9e8cbc735b070be346552bcc99f741b0a83aa_amd64", "9Base-RHOSE-4.18:openshift4/ose-operator-registry-rhel9@sha256:18812b2983d2e1f5ddb2cd9d37a404e0d56479633e6884ec9f8ac2b3cd39901e_s390x", "9Base-RHOSE-4.18:openshift4/ose-operator-registry-rhel9@sha256:42f29f47cee949af3779321664008fc5d1fbe81a3130f8ed6e1e0db886370a53_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-operator-registry-rhel9@sha256:4c3d971c498f6b7ef2917ba931eb20e21c96e730a4ece8d4bbd1e031a74f8024_arm64", "9Base-RHOSE-4.18:openshift4/ose-operator-registry-rhel9@sha256:c3cc3840d7a81ce1b420f06e07a923861faf37d9c10688aa3aa0b7b76c8706ad_amd64", "9Base-RHOSE-4.18:openshift4/ose-ovirt-machine-controllers-rhel9@sha256:70f9b25f6439a633f6f253dd5401ae15c2ef5c6bdcd5b9b2f9c2f2cbfaaa4821_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-ovirt-machine-controllers-rhel9@sha256:d4477c21f22774056f68f1346beb17a098a3cef28efdf48a45772f9e519b392a_amd64", "9Base-RHOSE-4.18:openshift4/ose-ovirt-machine-controllers-rhel9@sha256:f317c469be82f8fb4c67f9de872e00b6117413060554a4086ad86a735dd341bc_s390x", "9Base-RHOSE-4.18:openshift4/ose-ovirt-machine-controllers-rhel9@sha256:fb375b493b9c2dd44bb49ea10fcbafb1cbb7e899abab3a5662cbe16f6df2521b_arm64", "9Base-RHOSE-4.18:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:10035642ceabcd8925a829fe744240e05899cced6a59620ff4949e184851de13_arm64", "9Base-RHOSE-4.18:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:4058e7d716cae77274c40f346975657d671f010648cd20fe55f4dc165bea6666_amd64", "9Base-RHOSE-4.18:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:604f78fbb2cfdc30b4f8ee907029809f60a811113fcc7e0c037d7a8a777f7c06_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-ovn-kubernetes-microshift-rhel9@sha256:f8f1864070b6045e97ed785e07fda6fd8f5606a13d48833231157bed5736cf06_s390x", "9Base-RHOSE-4.18:openshift4/ose-ovn-kubernetes-rhel9@sha256:174f36cdd47ef0d1d2099482919d773257453265a2af0b17b154edc32fa41ac2_amd64", "9Base-RHOSE-4.18:openshift4/ose-ovn-kubernetes-rhel9@sha256:256049e61658e67c746291d763ed6e578192b89499d26c8e240b28a23cd6438c_arm64", "9Base-RHOSE-4.18:openshift4/ose-ovn-kubernetes-rhel9@sha256:44eaca3e1e0c760da38bc9d11d107df19788ac066f35b1460da56cf39325ea74_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-ovn-kubernetes-rhel9@sha256:e493f58fc419c9662583ed9f2d93209e351609d2c4cf29ac91b2474fc72ae6c1_s390x", "9Base-RHOSE-4.18:openshift4/ose-pod-rhel9@sha256:33549946e22a9ffa738fd94b1345f90921bc8f92fa6137784cb33c77ad806f9d_amd64", "9Base-RHOSE-4.18:openshift4/ose-pod-rhel9@sha256:347ff42a31233f4d54d551cfcf513cd03fd11b4bbc71a6529fe3e6e6aa18153e_s390x", "9Base-RHOSE-4.18:openshift4/ose-pod-rhel9@sha256:613d5067935b0f6ae54eacda771ef1fb60da43409664dca2d150906e9dbc80ad_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-pod-rhel9@sha256:feba216e445c3bbfa47871a9a3125b5eadf1d9b3a2b86e226ebfea8ded3067d9_arm64", "9Base-RHOSE-4.18:openshift4/ose-powervs-block-csi-driver-rhel9-operator@sha256:5343a4a18789930e4ccbdf07b76fb14d5f851d0fe432c1ca10316b9ded5f6b60_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-powervs-block-csi-driver-rhel9-operator@sha256:db7d0411dd221a69b9cb443f9923359f50853dfa82b5c1f667ca32645504a59a_amd64", "9Base-RHOSE-4.18:openshift4/ose-powervs-block-csi-driver-rhel9@sha256:af47e62d1b421d26f27a3da28ecdc5db703465e68e776badc0a70c07537fda5f_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-powervs-block-csi-driver-rhel9@sha256:ead4f2df414aac42dfe14853898a769384f6e784d32da89bafc80ae167b70e4e_amd64", "9Base-RHOSE-4.18:openshift4/ose-powervs-cloud-controller-manager-rhel9@sha256:1ac656ec8fda4609e6698f8920d31f65cc67d969e573a1413cde4bca0415c93b_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-powervs-cloud-controller-manager-rhel9@sha256:c565c2fbd38779ef23db8c2e2abc46834081be83e950ce64b6a44e871b0a6fc6_amd64", "9Base-RHOSE-4.18:openshift4/ose-powervs-machine-controllers-rhel9@sha256:4832690beeba7c831b56e3b91732d1b2d7b6e1763332447b47778bb3c43710f4_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-powervs-machine-controllers-rhel9@sha256:64325bd4edf754bbe6bb6cb5cf426b8994b12694dba70b875d3aab3d930965ba_amd64", "9Base-RHOSE-4.18:openshift4/ose-prom-label-proxy-rhel9@sha256:5723249df421e54984ffd76d142ecd1a756d7cc5134b7360f522f2b1dbb6726e_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-prom-label-proxy-rhel9@sha256:65071bc587ce1c4d99b1ec2cb0d3c40d453d605d153fa4fc9912defafe74c322_s390x", "9Base-RHOSE-4.18:openshift4/ose-prom-label-proxy-rhel9@sha256:ab427d2c0179346f66923120af1f800f15efcb5e14f7f1391d265cee251e1f4c_amd64", "9Base-RHOSE-4.18:openshift4/ose-prom-label-proxy-rhel9@sha256:f16fda5b1c08ee6ed458d99eddb5fadb6b6380edb99f64a68291e736523ba4c3_arm64", "9Base-RHOSE-4.18:openshift4/ose-prometheus-alertmanager-rhel9@sha256:52d62c183b35a94e41e1cf49901b6ceacdd0f07abe73780abff12d1ed87f7d28_amd64", "9Base-RHOSE-4.18:openshift4/ose-prometheus-alertmanager-rhel9@sha256:585d5628ca354a82c7217d6a40b89dcd883ab28b8d57ee306337bd8fa935651a_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-prometheus-alertmanager-rhel9@sha256:8b085182f1691127f28e6dbcdc54678816897484ad3a3537419c798c68c6ba8d_s390x", "9Base-RHOSE-4.18:openshift4/ose-prometheus-alertmanager-rhel9@sha256:e8902c2cd94130bef3d38a20b96c846f71600f6e65c39dd41fe5413fe7398586_arm64", "9Base-RHOSE-4.18:openshift4/ose-prometheus-config-reloader-rhel9@sha256:b51fe337495d490eda5164247b15073cb83da1f7bc629071c18ca9168b7f0461_amd64", "9Base-RHOSE-4.18:openshift4/ose-prometheus-config-reloader-rhel9@sha256:b66107714794733c11349ecc9f39dc92539398b0377aa3d70a530f93f6904e2f_s390x", "9Base-RHOSE-4.18:openshift4/ose-prometheus-config-reloader-rhel9@sha256:ca8fddc9f987579c1ce6cafcc2fa472ddb95b32db2744221aff82a473cd22599_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-prometheus-config-reloader-rhel9@sha256:ca9e0e0c0ec0c889549be89e80e68d1f5a827f39245e4b828d3489e61e4cffa0_arm64", "9Base-RHOSE-4.18:openshift4/ose-prometheus-node-exporter-rhel9@sha256:1f7bf97ab3690e6374b721abe31a8f43b831fac8cd775c11b053cf6e5f6e53af_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-prometheus-node-exporter-rhel9@sha256:2316329b73d8499d8efa6a35c1a33089564bd6daf217872fd71ae1bc6181f9a3_arm64", "9Base-RHOSE-4.18:openshift4/ose-prometheus-node-exporter-rhel9@sha256:7e1456825b53fc7e6ea6aa2003b3f3626ad7846802f9fd9dc69874e349b849ad_amd64", "9Base-RHOSE-4.18:openshift4/ose-prometheus-node-exporter-rhel9@sha256:ac368184ee975f50a00711815d2dc9bf187d9b51068bfd85fd87a58f8e7c1fe2_s390x", "9Base-RHOSE-4.18:openshift4/ose-prometheus-operator-admission-webhook-rhel9@sha256:0b8eb2b8f9a20afadc45b447a3632668c3dbb700f1caba5f685e86c2832414e1_arm64", "9Base-RHOSE-4.18:openshift4/ose-prometheus-operator-admission-webhook-rhel9@sha256:58e54ef368c77b010e22ee1d7f68c312e8319623dca773863a87b55fe968f2c5_s390x", "9Base-RHOSE-4.18:openshift4/ose-prometheus-operator-admission-webhook-rhel9@sha256:9a5bb579b430966fe19523f5b1549c6203528cdc864f6bdc13544f8df32333ca_amd64", "9Base-RHOSE-4.18:openshift4/ose-prometheus-operator-admission-webhook-rhel9@sha256:fe622bb66abf1f10b6f7d9a98d67efec52b16f1d08258a403d033800a6ad0d9b_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-prometheus-rhel9-operator@sha256:34cc360945940a6edacf669a0c75fc084d27c7b180765106a0ae3ce04c2f9bd0_amd64", "9Base-RHOSE-4.18:openshift4/ose-prometheus-rhel9-operator@sha256:55cfb919af50cce97a2088fa6778ecd060142dda728fd721f8c5fb7cdad7bd73_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-prometheus-rhel9-operator@sha256:e47317445d04da9ea69617de037d8ff55f9e9f92707e0fe2ed97f7ee85a6fe07_arm64", "9Base-RHOSE-4.18:openshift4/ose-prometheus-rhel9-operator@sha256:ffc9cf9706b6d2c3eabb1b9c64d304a0eafb86b094e23f364462f1d6c74b5bbc_s390x", "9Base-RHOSE-4.18:openshift4/ose-prometheus-rhel9@sha256:3ce0959e1aa771ad6f58717b7575630787b2f57a3177f9c9f9eb4af08d2c19e1_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-prometheus-rhel9@sha256:8dc01ca790389fe157de250778a259c382c2a89236436ecc06f3e97393737835_amd64", "9Base-RHOSE-4.18:openshift4/ose-prometheus-rhel9@sha256:ce5cc4c2969a3d8c82e4b8d55d1f3436b0d9ba7bdbb320cc510135dfed5b17df_s390x", "9Base-RHOSE-4.18:openshift4/ose-prometheus-rhel9@sha256:df40147338757d8185ae5dfc01ffb5fbde67eda44b8ae2f21101eae4300a178a_arm64", "9Base-RHOSE-4.18:openshift4/ose-service-ca-rhel9-operator@sha256:01747f8e66e5240b627fe3ade522f52d8474a8dc13d66a602775689808a3fb06_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-service-ca-rhel9-operator@sha256:8281de11ed2b0eccf83ca63dcf9ffa9874d5043b5366d061c4e530de3c66558d_s390x", "9Base-RHOSE-4.18:openshift4/ose-service-ca-rhel9-operator@sha256:898cae57123c5006d397b24af21b0f24a0c42c9b0be5ee8251e1824711f65820_amd64", "9Base-RHOSE-4.18:openshift4/ose-service-ca-rhel9-operator@sha256:a8a9f8d1e9eb9ce227bb761ca924c1723e7204ac1c96b4a4abcb7ba9e25ecdda_arm64", "9Base-RHOSE-4.18:openshift4/ose-telemeter-rhel9@sha256:0e4ba3d7333c25283b4115847ebd652f56b2047dcabb0373f9baecedba5afa68_s390x", "9Base-RHOSE-4.18:openshift4/ose-telemeter-rhel9@sha256:24fa7951fd7e8e882a27a19e8aeee63251bebf8110d6bda839a0dbda23ad5f38_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-telemeter-rhel9@sha256:eff72d42fdd17c7a058d7183c574f736fb86b1997e04d634d2dcc9afd6d002ab_amd64", "9Base-RHOSE-4.18:openshift4/ose-telemeter-rhel9@sha256:fa1896741b6a75eca6d26e209d8f0825621d564376fc89e16ec406c7d452ac21_arm64", "9Base-RHOSE-4.18:openshift4/ose-tests-rhel9@sha256:6b24176b283ba0cca9eee865d32e055d847f7f138b57c2e4cf36f9ad706fca62_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-tests-rhel9@sha256:6d9863fbef321ccdfaab76172b2502d5762bf5e8ad2b83691a28c476b676f1a0_s390x", "9Base-RHOSE-4.18:openshift4/ose-tests-rhel9@sha256:9834990116ed22d789bba11e27aaec4ba503fdfe268dee4e13630a1b0c1e25e4_arm64", "9Base-RHOSE-4.18:openshift4/ose-tests-rhel9@sha256:d6e53256e8b68d617e06833e57d787d7189af3a89ebada94a23d98e395940fa6_amd64", "9Base-RHOSE-4.18:openshift4/ose-thanos-rhel9@sha256:239bd2b5cc6b51728a19372f4fef7aa030fb8e3fc82c997f3d25bb2bb7122b5a_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-thanos-rhel9@sha256:502a9d9c24380b076839c3fa50c218dea62bdb3662b6c6bda56aaa9dac4143da_arm64", "9Base-RHOSE-4.18:openshift4/ose-thanos-rhel9@sha256:ce1b009e3163235bcd7ec5431b438aca7821b6e80dda48c37d2c4fbff592f830_amd64", "9Base-RHOSE-4.18:openshift4/ose-thanos-rhel9@sha256:f2ae85d911d85ed82749fd941014053f873321040071fc1776b134a8c636ad52_s390x", "9Base-RHOSE-4.18:openshift4/ose-tools-rhel9@sha256:6ab858aed98e4fe57e6b144da8e90ad5d6698bb4cc5521206f5c05809f0f9296_amd64", "9Base-RHOSE-4.18:openshift4/ose-tools-rhel9@sha256:8bf5a32a8894a4c608dd58e48b7fa880b26370d5cafebe1a7cd14be4852026e5_s390x", "9Base-RHOSE-4.18:openshift4/ose-tools-rhel9@sha256:af93bfb5b183c30ef99fb99cf6c301afc5a7e48e3976acb102dc0f48c8e35a8b_ppc64le", "9Base-RHOSE-4.18:openshift4/ose-tools-rhel9@sha256:c1c75b3a71aadb8bd823d86428378e32b4dd0dcb3b95e3971738b6cf825510ae_arm64", "9Base-RHOSE-4.18:openshift4/ose-vmware-vsphere-csi-driver-rhel9-operator@sha256:8fea352cb3dee309224639ae993201fba487eae149157220aa760673dd6e36c6_amd64", "9Base-RHOSE-4.18:openshift4/ose-vmware-vsphere-csi-driver-rhel9@sha256:69f5f77429dbc7b8e344d55c97c57f377e4e9381ad3cd3a918ca146ff17bcf48_amd64", "9Base-RHOSE-4.18:openshift4/ose-vsphere-cloud-controller-manager-rhel9@sha256:5c57cde8b9df5eb7d3a6385ad041ab3a3e48a740859ab43b60f02c0fdc6eb3a6_amd64", "9Base-RHOSE-4.18:openshift4/ose-vsphere-cluster-api-controllers-rhel9@sha256:b2186a43986b373ffc7a05f53545610e4468f5f0d565c12bb9c888ca79e72d4f_amd64", "9Base-RHOSE-4.18:openshift4/ose-vsphere-csi-driver-rhel9-operator@sha256:8fea352cb3dee309224639ae993201fba487eae149157220aa760673dd6e36c6_amd64", "9Base-RHOSE-4.18:openshift4/ose-vsphere-csi-driver-rhel9@sha256:69f5f77429dbc7b8e344d55c97c57f377e4e9381ad3cd3a918ca146ff17bcf48_amd64", "9Base-RHOSE-4.18:openshift4/ose-vsphere-csi-driver-syncer-rhel9@sha256:2f15f9523859b2bd3ad91b1695d51bdc179b3343467eb2dffde7307d9b0567bb_amd64", "9Base-RHOSE-4.18:openshift4/ose-vsphere-problem-detector-rhel9@sha256:b8b73b819842f3fc06b398fac564d44e4eb0a556598a3074a52953d3136136f0_amd64", "9Base-RHOSE-4.18:openshift4/ovirt-csi-driver-rhel9-operator@sha256:45ad665d78b69e52baf800c701e62a2c3e559d7b6c1f26b0e7212bb8fd5df1cf_ppc64le", "9Base-RHOSE-4.18:openshift4/ovirt-csi-driver-rhel9-operator@sha256:77db2d4a94c877073d5e68aede1f189c5e5ac4cd2dc1b810d4635f75f763532b_arm64", "9Base-RHOSE-4.18:openshift4/ovirt-csi-driver-rhel9-operator@sha256:dfdc9db8b32e801711ed90e1c73a578f1bebe927355e4f3765817fc0bdf90281_amd64", "9Base-RHOSE-4.18:openshift4/ovirt-csi-driver-rhel9-operator@sha256:f2966a7120b6bffdaecc3feb865e871c7e5180fa93f34bd6927f31f94b8f4f7d_s390x", "9Base-RHOSE-4.18:openshift4/ovirt-csi-driver-rhel9@sha256:6e4c86c40885726441bc4687edddc4ae7aa3004e9018d134afe6eb329097fdc9_arm64", "9Base-RHOSE-4.18:openshift4/ovirt-csi-driver-rhel9@sha256:941e0a256737042e70f7b1239e60a0ffd6f476d04d742208a6615d98878a68ca_s390x", "9Base-RHOSE-4.18:openshift4/ovirt-csi-driver-rhel9@sha256:a8e92ab070a2e8dc8267d66a31954199eaef9dff69e6d5eb0aee0c45acbfab69_ppc64le", "9Base-RHOSE-4.18:openshift4/ovirt-csi-driver-rhel9@sha256:b6d837f8507495938065e2055cebd050424fe95d2f1262a3a381157c538dc3a9_amd64", "9Base-RHOSE-4.18:redhat/redhat-operator-index@sha256:18812b2983d2e1f5ddb2cd9d37a404e0d56479633e6884ec9f8ac2b3cd39901e_s390x", "9Base-RHOSE-4.18:redhat/redhat-operator-index@sha256:42f29f47cee949af3779321664008fc5d1fbe81a3130f8ed6e1e0db886370a53_ppc64le", "9Base-RHOSE-4.18:redhat/redhat-operator-index@sha256:4c3d971c498f6b7ef2917ba931eb20e21c96e730a4ece8d4bbd1e031a74f8024_arm64", "9Base-RHOSE-4.18:redhat/redhat-operator-index@sha256:c3cc3840d7a81ce1b420f06e07a923861faf37d9c10688aa3aa0b7b76c8706ad_amd64", "9Base-RHOSE-4.18:rhcos@sha256:46576a8bc3260c2310a1debfd4d25308bb318b8926fe92f7084f693d4b1e2664_aarch64", "9Base-RHOSE-4.18:rhcos@sha256:46576a8bc3260c2310a1debfd4d25308bb318b8926fe92f7084f693d4b1e2664_ppc64le", "9Base-RHOSE-4.18:rhcos@sha256:46576a8bc3260c2310a1debfd4d25308bb318b8926fe92f7084f693d4b1e2664_s390x", "9Base-RHOSE-4.18:rhcos@sha256:46576a8bc3260c2310a1debfd4d25308bb318b8926fe92f7084f693d4b1e2664_x86_64", "Builds for Red Hat OpenShift 1.1.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:9bbd9d38a700243149d85de444fc791482b662983b8ac7138e7fc88bcbb0c313_amd64", "Builds for Red Hat OpenShift 1.1.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:3659611492469f291f150de9992e0203191802a6644e9683396ac6da091ababb_amd64", "Builds for Red Hat OpenShift 1.1.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:38f7fa15300fa1d43d99bf8445bfd95ff3fc606e0368db8fd5ac254badaa41cc_amd64", "Builds for Red Hat OpenShift 1.1.1:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:056cb6529d8c49c4bde46a3ebe6eee99eb862548ec3d09cca9de09b84425562a_s390x", "Builds for Red Hat OpenShift 1.1.1:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:3d1f0a767d7a5edee964ebde6a2fe12a15e13ba1f9a3195e0d45b9cfa138e0c0_ppc64le", "Builds for Red Hat OpenShift 1.1.1:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:a96dc3ac5b32324b9f313c094772931dd1e2f181072660d8d5e05d5a2a4cd165_arm64", "Builds for Red Hat OpenShift 1.1.1:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:bc0a898b1b27dcd61dcd16a02aaa6d3352b85d1ccf90d74c3444aee26df97d2c_amd64", "Builds for Red Hat OpenShift 1.1.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:57fe2bd68e574c5bdc64c7ac8ef9d6fbf1fe678b9cc43a1968e4c28f13d0f558_arm64", "Builds for Red Hat OpenShift 1.1.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:6f5dab86d3edda704397fd94cad49cfd308da715e98bf91124ba4b7a8c9b93d3_amd64", "Builds for Red Hat OpenShift 1.1.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:8be1fbaed842014321e803ffdc6dc5e8351fb99b1528f88d1b963ac7132c50dd_ppc64le", "Builds for Red Hat OpenShift 1.1.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:f0672aa3e52b14b392a4ee5340f9d2606178bb69c7c313a0296409014acab0ac_s390x", "Builds for Red Hat OpenShift 1.1.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:15bf534c1bf978be37fd01b663c44d24de7d2f4c6c5de5ffe0399f60ffb36c73_s390x", "Builds for Red Hat OpenShift 1.1.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:a4199d96e6b0a223665c72c5da134d644bec5794f7995dd94078e644e0514ddf_amd64", "Builds for Red Hat OpenShift 1.1.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b8a53e29421a49e9a13c9fff6032b8c5c3f948501875976c3df064c379589dee_arm64", "Builds for Red Hat OpenShift 1.1.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:c78db1721876e5a4740964c0414dbbc34b7e85f9fa067286fa64c492c78d4b96_ppc64le", "Builds for Red Hat OpenShift 1.1.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:8a0a2891cbcb138cfb812538c6027590301fe174d19aa7f78ddeca0f5a7dff2c_s390x", "Builds for Red Hat OpenShift 1.1.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:b90b790fb82b5f62e8ec1febac24dcc58be226da92b64e79775580a485b002c5_arm64", "Builds for Red Hat OpenShift 1.1.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:c4016dadd1e0dcf22953ad64788988aa20de1e8cff46077cf2f01258e6b702ab_ppc64le", "Builds for Red Hat OpenShift 1.1.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:fd8858d7afa32ed73ad71f2b5f69c3481666706613567c512b99b3fcecf18f03_amd64", "Builds for Red Hat OpenShift 1.1.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:a475193c257b6fde4e1bd82e65f9e9270704ff58a5b62e23bf08ffa99fa34533_amd64", "Builds for Red Hat OpenShift 1.1.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:1ecd92acf7eea8497d73845d978e0ecf0c2662b54251716a355536745dac818e_amd64", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:1e433bcec606fa432a50dc8fc06af6f373e7580f4c468cb3ad4bd670d858085a_ppc64le", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:4cddf9997c3866a4a54bec84b2e3dd04765af10f75b5c8898382d066371b6b1f_arm64", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:af7695430c347cbdf66800a913fa48fb500f820047fed127989d92919e85d22a_s390x", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:e4aaf133f2e2095a272d7d2637d5e0af28eb248f553421da5188745414b357f2_amd64", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:41ce2e480329f54ac9032587853c8840b3f08fb4b0042dfcaf90e3ce05e29da1_ppc64le", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:7fdc7ed3871c57ae2b738d7e6601abc092390efb0c45dfcbc176abb8b4242c33_amd64", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:c2d909f2f3965550739900e86df7861ea1277e716c2ba71fdc4e456d89a75677_arm64", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:c680f2e4327dcbb0730cee7f583d18f49fefb6f02af0dcdf716390af0f889924_s390x", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:1bf88febc30c130741d0aef797a1c0f24ce236aa60ea52a862051c4edc85a5ac_s390x", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:58c57406cf878fe4030197a4179873878b03b7da2182c3ca684256f4bc5d71ca_amd64", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:b8ed9fd4a031cedc89219e5d15ffc9b02212c0cee40664b094d6e91574d33fb9_ppc64le", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:bc294587eed0aee2b83fc8513ed2110b198aa612a2619217d30476818146cf06_arm64", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:03aeca699a2df3d3a11f7a176e0938213558c2b8cf483eb01a84c6a4bdcf0416_amd64", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:c0e2c88765dab9373bf71f6c9359e338b83f133d170d6dd32130e6023e3a4a2a_ppc64le", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:c38eacdbff091462292da4711fd895fcdb15fa7e6cbc08272a284aadd66b09df_s390x", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:de73e5109e1f292154d1680a66c9f8ac402990e1134691c10872b02c44b2382f_arm64", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:43c0194a3c6bc63c1a0e390199cc267f9a5aef571b9f222d984323ecd4c15993_arm64", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:8b8b301eafc5d1ae8d298cbe64b09cb912b2ed924fdabdb77f5f0c78e782e8dd_s390x", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b4bc12f0b9394f1e252bbb192d7ec2173612d7ff1d963ffce452b073e7c5e26d_amd64", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:f314b7fe88ac8aaed72eb22b0c7e6c66ce4794a1b007a281b90af3850c08ad4b_ppc64le", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:5c6e3c839ec91ea949ab7187629033a936292c6b1b105a78f7368ff4958e2999_amd64", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:6c650122e407d9e01373b10168c225aceeba1aa0052f4a8debe2590df96f4867_s390x", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:7e1931fd50dcc5889a1ebeafc348dbf5059d0c191f2061f786490e387ff54888_arm64", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:b788f6e6ff1a762f7ac326fefc74f8ad331ac458e81b3aa4e3b7d59044465a6b_ppc64le", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:63cc07e6cda1cf015cfcf0d0b0abab67ba44df3b02ce57094b3fc201e6b19907_s390x", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:96dc86543b9f09ea5590c144ade9361ce3184ce028cac8e76652d762961c5b44_amd64", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:de285edaae627da5783ccef71caeff4f0d615a3b1c30d8a736e13e199c13a836_ppc64le", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:efd861373abd7163ac078f32832f851790d2bbb88c73b299ab7d16df4eb51305_arm64", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:2b5a541fd5c8dbbd7c17b6acb2c1c65c0d94c58c53105b3d6771009acbe0a76a_ppc64le", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:3553c225d36710d406dad8668da18ed4c5b3ccc3e5824314cfec23d5a66faf85_amd64", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:4afa2f58993bc0351821eff2c3bf2b16de2f142ab99853015d7c330c5e1ccc30_s390x", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:be11429cf704ee2ffb2b0c81b29bc9a659e1fc3f61e0f6586ab28d8d871ed01b_arm64", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:230a283cb6ee5aabd9de16954dbb712d5ca973f2c58b4e930d92122d705eca6d_arm64", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:30ba6df3b96f9cc0586fd2ae851da0d953ff26d283e1e12da1963b4376fe35ba_ppc64le", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:42864a1d636646b64c6d052785b38add98f46da25618b17ffdaac8c6b26a7add_s390x", "Builds for Red Hat OpenShift 1.2.1:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:70139f8265cdbfb3f034d775f29176666e303558ace8c5b655248ce811353747_amd64", "red_hat_openshift_container_platform_4:cri-o", "red_hat_openshift_container_platform_4:openshift-clients", "red_hat_openshift_container_platform_4:openshift4/ose-ansible-operator", "red_hat_openshift_container_platform_4:openshift4/ose-cli", "red_hat_openshift_container_platform_4:openshift4/ose-cli-artifacts", "red_hat_openshift_container_platform_4:openshift4/ose-deployer", "red_hat_openshift_container_platform_4:openshift4/ose-olm-rukpak-rhel8", "red_hat_openshift_container_platform_4:openshift4/ose-operator-framework-tools-rhel9", "red_hat_openshift_container_platform_4:openshift4/ose-operator-lifecycle-manager", "red_hat_openshift_container_platform_4:openshift4/ose-operator-registry-rhel9", "red_hat_openshift_container_platform_4:openshift4/ose-tools-rhel8", "red_hat_openshift_container_platform_4:redhat/redhat-operator-index", "red_hat_openshift_dev_spaces:devspaces/devspaces-rhel8-operator" ]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "workaround", "no_fix_planned", "none_available" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "If you are using an earlier version of RHACS 4.4, you are advised to upgrade to this patch release 4.4.8.", "If you are using an earlier version of RHACS 4.5, you are advised to upgrade to this patch release 4.5.6.", "If you are using an earlier version of RHACS 4.6, you are advised to upgrade to this patch release 4.6.2", "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "For OpenShift Container Platform 4.16 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.16/release_notes/ocp-4-16-release-notes.html", "For OpenShift Container Platform 4.17 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\n https://docs.openshift.com/container-platform/4.17/release_notes/ocp-4-17-release-notes.html\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is sha256:ae82d76cd15164a68c1762d5deb6aa53cc0b0b436e2d6429d8503e7a5d5c6780\n\n (For s390x architecture)\n The image digest is sha256:68602e06425f94f0489f4bb9cb2e3b0248a4a34d4e11db73c6a9819d631de695\n\n (For ppc64le architecture)\n The image digest is sha256:aa2d12a6002cdd0146da5a528b24caca832a2c5b93ca43536c2604a0c88e85db\n\n (For aarch64 architecture)\n The image digest is sha256:1740ed2fc124d84e6d2470b8cd819882a3c79a30f8922bdfd91c3a5e86fcdfe8\n\nAll OpenShift Container Platform 4.17 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.17/updating/updating_a_cluster/updating-cluster-cli.html", "For OpenShift Container Platform 4.17 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.17/release_notes/ocp-4-17-release-notes.html", "For OpenShift Container Platform 4.18 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\n https://docs.openshift.com/container-platform/4.18/release_notes/ocp-4-18-release-notes.html\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is sha256:d9c985464c0315160971b3e79f5fbec628d403a572f7a6d893c04627c066c0bb\n\n (For s390x architecture)\n The image digest is sha256:bd033a80f4586380ee46ac0ab9147e2157942e1f41ec92fdb6d3d32f839afcbd\n\n (For ppc64le architecture)\n The image digest is sha256:4a690927d43044e2b42d6e64b04be8dcf164b2b95d0fde03163b88852ff0188d\n\n (For aarch64 architecture)\n The image digest is sha256:d285ba31afa245c14f9354626b44abf833fe600774c1fd110ea5e712531bf914\n\nAll OpenShift Container Platform 4.18 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.18/updating/updating_a_cluster/updating-cluster-cli.htmla", "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "It is recommended that existing users of Red Hat OpenShift Builds 1.0 to 1.1.", "It is recommended that existing users of Red Hat OpenShift Builds 1.1 to 1.2.", "It is recommended that existing users of RHTPA 1.2.1 upgrade to 1.2.2. For more information please refer to the Release Notes.", "It is recommended that existing users of RHTPA 1.2.1 upgrade to 1.2.2. For more information please refer to the Release Notes.", "In cases where it is not possible to update to the latest version of go-git, it is recommended to enforce validation rules for values passed in the URL field.", "Will not fix", "Affected" ]
[ "2025-02-26T19:14:08+00:00", "2025-02-13T18:14:31+00:00", "2025-02-11T21:20:30+00:00", "2025-02-03T22:40:53+00:00", "2025-02-26T13:39:37+00:00", "2025-02-26T13:47:46+00:00", "2025-02-27T00:33:09+00:00", "2025-01-28T04:28:50+00:00", "2025-02-11T10:53:54+00:00", "2025-02-25T04:38:13+00:00", "2025-01-20T01:40:19+00:00", "2025-01-23T09:34:23+00:00", "2025-01-27T17:03:08+00:00", "2025-01-28T06:43:08+00:00", "2025-01-20T21:35:36+00:00", "2025-01-20T21:49:53+00:00", null, null, null ]
CVE-2025-25200
CWE-1333
koa
Koa has Inefficient Regular Expression Complexity
Low
null
5.3/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
A denial of service flaw was found in the koa library. An improperly designed regex is used to parse some specific HTTP headers. If untrusted requests are passed to koa, it can cause excessive resource usage on the server.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
2025-02-12T19:01:08.292685+00:00
2025-02-12T17:59:04.615000+00:00
[]
[]
[ "red_hat_products" ]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[]
[]
[]
CVE-2025-1006
CWE-416
chromium-browser
From CVEorg collector
Important
null
8.7/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Use after free in Network in Google Chrome prior to 133.0.6943.126 allowed a remote attacker to potentially exploit heap corruption via a crafted web app. (Chromium security severity: Medium)
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
2025-02-19T21:00:41.209759+00:00
2025-02-19T16:55:31.747000+00:00
[]
[]
[ "red_hat_products" ]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[]
[]
[]
CVE-2025-21756
null
kernel
vsock: Keep the binding until socket destruction
Moderate
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: vsock: Keep the binding until socket destruction Preserve sockets bindings; this includes both resulting from an explicit bind() and those implicitly bound through autobind during connect(). Prevents socket unbinding during a transport reassignment, which fixes a use-after-free: 1. vsock_create() (refcnt=1) calls vsock_insert_unbound() (refcnt=2) 2. transport->release() calls vsock_remove_bound() without checking if sk was bound and moved to bound list (refcnt=1) 3. vsock_bind() assumes sk is in unbound list and before __vsock_insert_bound(vsock_bound_sockets()) calls __vsock_remove_bound() which does: list_del_init(&vsk->bound_table); // nop sock_put(&vsk->sk); // refcnt=0 BUG: KASAN: slab-use-after-free in __vsock_bind+0x62e/0x730 Read of size 4 at addr ffff88816b46a74c by task a.out/2057 dump_stack_lvl+0x68/0x90 print_report+0x174/0x4f6 kasan_report+0xb9/0x190 __vsock_bind+0x62e/0x730 vsock_bind+0x97/0xe0 __sys_bind+0x154/0x1f0 __x64_sys_bind+0x6e/0xb0 do_syscall_64+0x93/0x1b0 entry_SYSCALL_64_after_hwframe+0x76/0x7e Allocated by task 2057: kasan_save_stack+0x1e/0x40 kasan_save_track+0x10/0x30 __kasan_slab_alloc+0x85/0x90 kmem_cache_alloc_noprof+0x131/0x450 sk_prot_alloc+0x5b/0x220 sk_alloc+0x2c/0x870 __vsock_create.constprop.0+0x2e/0xb60 vsock_create+0xe4/0x420 __sock_create+0x241/0x650 __sys_socket+0xf2/0x1a0 __x64_sys_socket+0x6e/0xb0 do_syscall_64+0x93/0x1b0 entry_SYSCALL_64_after_hwframe+0x76/0x7e Freed by task 2057: kasan_save_stack+0x1e/0x40 kasan_save_track+0x10/0x30 kasan_save_free_info+0x37/0x60 __kasan_slab_free+0x4b/0x70 kmem_cache_free+0x1a1/0x590 __sk_destruct+0x388/0x5a0 __vsock_bind+0x5e1/0x730 vsock_bind+0x97/0xe0 __sys_bind+0x154/0x1f0 __x64_sys_bind+0x6e/0xb0 do_syscall_64+0x93/0x1b0 entry_SYSCALL_64_after_hwframe+0x76/0x7e refcount_t: addition on 0; use-after-free. WARNING: CPU: 7 PID: 2057 at lib/refcount.c:25 refcount_warn_saturate+0xce/0x150 RIP: 0010:refcount_warn_saturate+0xce/0x150 __vsock_bind+0x66d/0x730 vsock_bind+0x97/0xe0 __sys_bind+0x154/0x1f0 __x64_sys_bind+0x6e/0xb0 do_syscall_64+0x93/0x1b0 entry_SYSCALL_64_after_hwframe+0x76/0x7e refcount_t: underflow; use-after-free. WARNING: CPU: 7 PID: 2057 at lib/refcount.c:28 refcount_warn_saturate+0xee/0x150 RIP: 0010:refcount_warn_saturate+0xee/0x150 vsock_remove_bound+0x187/0x1e0 __vsock_release+0x383/0x4a0 vsock_release+0x90/0x120 __sock_release+0xa3/0x250 sock_close+0x14/0x20 __fput+0x359/0xa80 task_work_run+0x107/0x1d0 do_exit+0x847/0x2560 do_group_exit+0xb8/0x250 __x64_sys_exit_group+0x3a/0x50 x64_sys_call+0xfec/0x14f0 do_syscall_64+0x93/0x1b0 entry_SYSCALL_64_after_hwframe+0x76/0x7e
null
2025-02-27T00:00:00+00:00
2025-02-27T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[ "red_hat_enterprise_linux_6:kernel" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "no_fix_planned", "no_fix_planned", "none_available" ]
[ "Out of support scope", "Will not fix", "Affected" ]
[ null, null, null ]
CVE-2025-0247
CWE-120
firefox
thunderbird: Memory safety bugs fixed in Firefox 134 and Thunderbird 134
Important
null
8.7/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
The Mozilla Foundation's Security Advisory: Memory safety bugs are present in Firefox 133 and Thunderbird 133. Some of these bugs show evidence of memory corruption, and with enough effort, some of these could be exploited to run arbitrary code.
Red Hat Product Security rates this flaw as determined by the Mozilla Foundation Security Advisory.
2025-01-07T17:01:31.771702+00:00
2025-01-07T16:07:07.636000+00:00
[]
[ "red_hat_enterprise_linux_6:firefox", "red_hat_enterprise_linux_6:thunderbird", "red_hat_enterprise_linux_7:firefox", "red_hat_enterprise_linux_7:thunderbird", "red_hat_enterprise_linux_8:firefox", "red_hat_enterprise_linux_8:thunderbird", "red_hat_enterprise_linux_9:firefox", "red_hat_enterprise_linux_9:firefox:flatpak/firefox", "red_hat_enterprise_linux_9:thunderbird", "red_hat_enterprise_linux_9:thunderbird:flatpak/thunderbird" ]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "no_fix_planned", "none_available" ]
[ "Out of support scope", "Fix deferred" ]
[ null, null ]
CVE-2025-21886
null
kernel
RDMA/mlx5: Fix implicit ODP hang on parent deregistration
Moderate
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx5: Fix implicit ODP hang on parent deregistration Fix the destroy_unused_implicit_child_mr() to prevent hanging during parent deregistration as of below [1]. Upon entering destroy_unused_implicit_child_mr(), the reference count for the implicit MR parent is incremented using: refcount_inc_not_zero(). A corresponding decrement must be performed if free_implicit_child_mr_work() is not called. The code has been updated to properly manage the reference count that was incremented. [1] INFO: task python3:2157 blocked for more than 120 seconds. Not tainted 6.12.0-rc7+ #1633 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:python3 state:D stack:0 pid:2157 tgid:2157 ppid:1685 flags:0x00000000 Call Trace: <TASK> __schedule+0x420/0xd30 schedule+0x47/0x130 __mlx5_ib_dereg_mr+0x379/0x5d0 [mlx5_ib] ? __pfx_autoremove_wake_function+0x10/0x10 ib_dereg_mr_user+0x5f/0x120 [ib_core] ? lock_release+0xc6/0x280 destroy_hw_idr_uobject+0x1d/0x60 [ib_uverbs] uverbs_destroy_uobject+0x58/0x1d0 [ib_uverbs] uobj_destroy+0x3f/0x70 [ib_uverbs] ib_uverbs_cmd_verbs+0x3e4/0xbb0 [ib_uverbs] ? __pfx_uverbs_destroy_def_handler+0x10/0x10 [ib_uverbs] ? lock_acquire+0xc1/0x2f0 ? ib_uverbs_ioctl+0xcb/0x170 [ib_uverbs] ? ib_uverbs_ioctl+0x116/0x170 [ib_uverbs] ? lock_release+0xc6/0x280 ib_uverbs_ioctl+0xe7/0x170 [ib_uverbs] ? ib_uverbs_ioctl+0xcb/0x170 [ib_uverbs] __x64_sys_ioctl+0x1b0/0xa70 ? kmem_cache_free+0x221/0x400 do_syscall_64+0x6b/0x140 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7f20f21f017b RSP: 002b:00007ffcfc4a77c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007ffcfc4a78d8 RCX: 00007f20f21f017b RDX: 00007ffcfc4a78c0 RSI: 00000000c0181b01 RDI: 0000000000000003 RBP: 00007ffcfc4a78a0 R08: 000056147d125190 R09: 00007f20f1f14c60 R10: 0000000000000001 R11: 0000000000000246 R12: 00007ffcfc4a7890 R13: 000000000000001c R14: 000056147d100fc0 R15: 00007f20e365c9d0 </TASK>
null
2025-03-27T00:00:00+00:00
2025-03-27T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[ "red_hat_enterprise_linux_6:kernel" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "no_fix_planned", "none_available" ]
[ "Out of support scope", "Fix deferred" ]
[ null, null ]
CVE-2025-2016
null
Ashlar-Vellum Cobalt VC6 File Parsing Type Confusion Remote Code Execution Vulnerability
null
null
null
Ashlar-Vellum Cobalt VC6 File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of VC6 files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25238.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
2025-03-05T23:40:09.766000+00:00
2025-03-10T22:00:55.951000+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-21490
CWE-404
mysql
High Privilege Denial of Service Vulnerability in MySQL Server
Moderate
null
5.9/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
A flaw was found in the MySQL Server component: InnoDB. This vulnerability allows a high-privileged attacker to cause a denial of service, which causes frequent crashes or hangs, via multiple network protocols.
null
2025-01-21T21:01:19.331302+00:00
2025-01-21T20:52:52.253000+00:00
[ "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x", "AppStream-8.10.0.Z.MAIN.EUS:mysql:8.0:8100020250212154709:489197e6:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src", "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src", "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64", "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64", "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le", "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x", "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64" ]
[]
[ "red_hat_enterprise_linux_6:mysql" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258" ]
[ "2025-02-19T11:10:11+00:00", "2025-02-19T10:31:41+00:00" ]
CVE-2025-24368
CWE-89
cacti
Cacti has a SQL Injection vulnerability when using tree rules through Automation API
Moderate
null
6.5/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Cacti is an open source performance and fault management framework. Some of the data stored in automation_tree_rules.php is not thoroughly checked and is used to concatenate the SQL statement in build_rule_item_filter() function from lib/api_automation.php, resulting in SQL injection. This vulnerability is fixed in 1.2.29.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
2025-01-27T18:01:27.453448+00:00
2025-01-27T17:16:17.236000+00:00
[]
[]
[ "red_hat_products" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[]
[]
[]
CVE-2025-2915
CWE-122
hdf5
HDF5 H5Faccum.c H5F__accum_free heap-based overflow
Low
null
3.4/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
A vulnerability classified as problematic was found in HDF5 up to 1.14.6. This vulnerability affects the function H5F__accum_free of the file src/H5Faccum.c. The manipulation of the argument overlap_size leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.
null
2025-03-28T18:01:01.391122+00:00
2025-03-28T17:00:08.968000+00:00
[]
[ "red_hat_enterprise_linux_ai_(rhel_ai):hdf5" ]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "workaround", "none_available" ]
[ "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "Fix deferred" ]
[ null, null ]
CVE-2025-21869
null
kernel
powerpc/code-patching: Disable KASAN report during patching via temporary mm
Low
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: powerpc/code-patching: Disable KASAN report during patching via temporary mm Erhard reports the following KASAN hit on Talos II (power9) with kernel 6.13: [ 12.028126] ================================================================== [ 12.028198] BUG: KASAN: user-memory-access in copy_to_kernel_nofault+0x8c/0x1a0 [ 12.028260] Write of size 8 at addr 0000187e458f2000 by task systemd/1 [ 12.028346] CPU: 87 UID: 0 PID: 1 Comm: systemd Tainted: G T 6.13.0-P9-dirty #3 [ 12.028408] Tainted: [T]=RANDSTRUCT [ 12.028446] Hardware name: T2P9D01 REV 1.01 POWER9 0x4e1202 opal:skiboot-bc106a0 PowerNV [ 12.028500] Call Trace: [ 12.028536] [c000000008dbf3b0] [c000000001656a48] dump_stack_lvl+0xbc/0x110 (unreliable) [ 12.028609] [c000000008dbf3f0] [c0000000006e2fc8] print_report+0x6b0/0x708 [ 12.028666] [c000000008dbf4e0] [c0000000006e2454] kasan_report+0x164/0x300 [ 12.028725] [c000000008dbf600] [c0000000006e54d4] kasan_check_range+0x314/0x370 [ 12.028784] [c000000008dbf640] [c0000000006e6310] __kasan_check_write+0x20/0x40 [ 12.028842] [c000000008dbf660] [c000000000578e8c] copy_to_kernel_nofault+0x8c/0x1a0 [ 12.028902] [c000000008dbf6a0] [c0000000000acfe4] __patch_instructions+0x194/0x210 [ 12.028965] [c000000008dbf6e0] [c0000000000ade80] patch_instructions+0x150/0x590 [ 12.029026] [c000000008dbf7c0] [c0000000001159bc] bpf_arch_text_copy+0x6c/0xe0 [ 12.029085] [c000000008dbf800] [c000000000424250] bpf_jit_binary_pack_finalize+0x40/0xc0 [ 12.029147] [c000000008dbf830] [c000000000115dec] bpf_int_jit_compile+0x3bc/0x930 [ 12.029206] [c000000008dbf990] [c000000000423720] bpf_prog_select_runtime+0x1f0/0x280 [ 12.029266] [c000000008dbfa00] [c000000000434b18] bpf_prog_load+0xbb8/0x1370 [ 12.029324] [c000000008dbfb70] [c000000000436ebc] __sys_bpf+0x5ac/0x2e00 [ 12.029379] [c000000008dbfd00] [c00000000043a228] sys_bpf+0x28/0x40 [ 12.029435] [c000000008dbfd20] [c000000000038eb4] system_call_exception+0x334/0x610 [ 12.029497] [c000000008dbfe50] [c00000000000c270] system_call_vectored_common+0xf0/0x280 [ 12.029561] --- interrupt: 3000 at 0x3fff82f5cfa8 [ 12.029608] NIP: 00003fff82f5cfa8 LR: 00003fff82f5cfa8 CTR: 0000000000000000 [ 12.029660] REGS: c000000008dbfe80 TRAP: 3000 Tainted: G T (6.13.0-P9-dirty) [ 12.029735] MSR: 900000000280f032 <SF,HV,VEC,VSX,EE,PR,FP,ME,IR,DR,RI> CR: 42004848 XER: 00000000 [ 12.029855] IRQMASK: 0 GPR00: 0000000000000169 00003fffdcf789a0 00003fff83067100 0000000000000005 GPR04: 00003fffdcf78a98 0000000000000090 0000000000000000 0000000000000008 GPR08: 0000000000000000 0000000000000000 0000000000000000 0000000000000000 GPR12: 0000000000000000 00003fff836ff7e0 c000000000010678 0000000000000000 GPR16: 0000000000000000 0000000000000000 00003fffdcf78f28 00003fffdcf78f90 GPR20: 0000000000000000 0000000000000000 0000000000000000 00003fffdcf78f80 GPR24: 00003fffdcf78f70 00003fffdcf78d10 00003fff835c7239 00003fffdcf78bd8 GPR28: 00003fffdcf78a98 0000000000000000 0000000000000000 000000011f547580 [ 12.030316] NIP [00003fff82f5cfa8] 0x3fff82f5cfa8 [ 12.030361] LR [00003fff82f5cfa8] 0x3fff82f5cfa8 [ 12.030405] --- interrupt: 3000 [ 12.030444] ================================================================== Commit c28c15b6d28a ("powerpc/code-patching: Use temporary mm for Radix MMU") is inspired from x86 but unlike x86 is doesn't disable KASAN reports during patching. This wasn't a problem at the begining because __patch_mem() is not instrumented. Commit 465cabc97b42 ("powerpc/code-patching: introduce patch_instructions()") use copy_to_kernel_nofault() to copy several instructions at once. But when using temporary mm the destination is not regular kernel memory but a kind of kernel-like memory located in user address space. ---truncated---
null
2025-03-27T00:00:00+00:00
2025-03-27T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[ "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt" ]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "no_fix_planned", "none_available" ]
[ "Out of support scope", "Fix deferred" ]
[ null, null ]
CVE-2025-22068
null
kernel
ublk: make sure ubq->canceling is set when queue is frozen
Important
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: ublk: make sure ubq->canceling is set when queue is frozen Now ublk driver depends on `ubq->canceling` for deciding if the request can be dispatched via uring_cmd & io_uring_cmd_complete_in_task(). Once ubq->canceling is set, the uring_cmd can be done via ublk_cancel_cmd() and io_uring_cmd_done(). So set ubq->canceling when queue is frozen, this way makes sure that the flag can be observed from ublk_queue_rq() reliably, and avoids use-after-free on uring_cmd.
null
2025-04-16T00:00:00+00:00
2025-04-16T00:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[]
[]
[]
CVE-2025-21644
CWE-476
kernel
drm/xe: Fix tlb invalidation when wedging
Low
null
5.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: drm/xe: Fix tlb invalidation when wedging If GuC fails to load, the driver wedges, but in the process it tries to do stuff that may not be initialized yet. This moves the xe_gt_tlb_invalidation_init() to be done earlier: as its own doc says, it's a software-only initialization and should had been named with the _early() suffix. Move it to be called by xe_gt_init_early(), so the locks and seqno are initialized, avoiding a NULL ptr deref when wedging: xe 0000:03:00.0: [drm] *ERROR* GT0: load failed: status: Reset = 0, BootROM = 0x50, UKernel = 0x00, MIA = 0x00, Auth = 0x01 xe 0000:03:00.0: [drm] *ERROR* GT0: firmware signature verification failed xe 0000:03:00.0: [drm] *ERROR* CRITICAL: Xe has declared device 0000:03:00.0 as wedged. ... BUG: kernel NULL pointer dereference, address: 0000000000000000 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 0 P4D 0 Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI CPU: 9 UID: 0 PID: 3908 Comm: modprobe Tainted: G U W 6.13.0-rc4-xe+ #3 Tainted: [U]=USER, [W]=WARN Hardware name: Intel Corporation Alder Lake Client Platform/AlderLake-S ADP-S DDR5 UDIMM CRB, BIOS ADLSFWI1.R00.3275.A00.2207010640 07/01/2022 RIP: 0010:xe_gt_tlb_invalidation_reset+0x75/0x110 [xe] This can be easily triggered by poking the GuC binary to force a signature failure. There will still be an extra message, xe 0000:03:00.0: [drm] *ERROR* GT0: GuC mmio request 0x4100: no reply 0x4100 but that's better than a NULL ptr deref. (cherry picked from commit 5001ef3af8f2c972d6fd9c5221a8457556f8bea6)
null
2025-01-19T00:00:00+00:00
2025-01-19T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt" ]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "none_available" ]
[ "Fix deferred" ]
[ null ]
CVE-2025-2368
CWE-122
wabt
WebAssembly wabt Malformed File binary-reader-interp.cc OnExport heap-based overflow
Moderate
null
6.2/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
A vulnerability was found in WebAssembly wabt 1.0.36 and classified as critical. This issue affects the function wabt::interp::(anonymous namespace)::BinaryReaderInterp::OnExport of the file wabt/src/interp/binary-reader-interp.cc of the component Malformed File Handler. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.
null
2025-03-17T09:00:45.657652+00:00
2025-03-17T08:00:05.922000+00:00
[]
[ "red_hat_enterprise_linux_7:firefox", "red_hat_enterprise_linux_7:thunderbird", "red_hat_enterprise_linux_8:firefox", "red_hat_enterprise_linux_8:thunderbird", "red_hat_enterprise_linux_9:firefox", "red_hat_enterprise_linux_9:firefox:flatpak/firefox", "red_hat_enterprise_linux_9:thunderbird", "red_hat_enterprise_linux_9:thunderbird:flatpak/thunderbird" ]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "no_fix_planned", "none_available" ]
[ "Out of support scope", "Fix deferred" ]
[ null, null ]
CVE-2025-21701
CWE-362
kernel
net: avoid race between device unregistration and ethnl ops
Low
null
4.7/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: net: avoid race between device unregistration and ethnl ops The following trace can be seen if a device is being unregistered while its number of channels are being modified. DEBUG_LOCKS_WARN_ON(lock->magic != lock) WARNING: CPU: 3 PID: 3754 at kernel/locking/mutex.c:564 __mutex_lock+0xc8a/0x1120 CPU: 3 UID: 0 PID: 3754 Comm: ethtool Not tainted 6.13.0-rc6+ #771 RIP: 0010:__mutex_lock+0xc8a/0x1120 Call Trace: <TASK> ethtool_check_max_channel+0x1ea/0x880 ethnl_set_channels+0x3c3/0xb10 ethnl_default_set_doit+0x306/0x650 genl_family_rcv_msg_doit+0x1e3/0x2c0 genl_rcv_msg+0x432/0x6f0 netlink_rcv_skb+0x13d/0x3b0 genl_rcv+0x28/0x40 netlink_unicast+0x42e/0x720 netlink_sendmsg+0x765/0xc20 __sys_sendto+0x3ac/0x420 __x64_sys_sendto+0xe0/0x1c0 do_syscall_64+0x95/0x180 entry_SYSCALL_64_after_hwframe+0x76/0x7e This is because unregister_netdevice_many_notify might run before the rtnl lock section of ethnl operations, eg. set_channels in the above example. In this example the rss lock would be destroyed by the device unregistration path before being used again, but in general running ethnl operations while dismantle has started is not a good idea. Fix this by denying any operation on devices being unregistered. A check was already there in ethnl_ops_begin, but not wide enough. Note that the same issue cannot be seen on the ioctl version (__dev_ethtool) because the device reference is retrieved from within the rtnl lock section there. Once dismantle started, the net device is unlisted and no reference will be found.
null
2025-02-13T00:00:00+00:00
2025-02-13T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt" ]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "no_fix_planned", "none_available" ]
[ "Out of support scope", "Fix deferred" ]
[ null, null ]
CVE-2025-22087
null
kernel
bpf: Fix array bounds error with may_goto
Low
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix array bounds error with may_goto may_goto uses an additional 8 bytes on the stack, which causes the interpreters[] array to go out of bounds when calculating index by stack_size. 1. If a BPF program is rewritten, re-evaluate the stack size. For non-JIT cases, reject loading directly. 2. For non-JIT cases, calculating interpreters[idx] may still cause out-of-bounds array access, and just warn about it. 3. For jit_requested cases, the execution of bpf_func also needs to be warned. So move the definition of function __bpf_prog_ret0_warn out of the macro definition CONFIG_BPF_JIT_ALWAYS_ON.
null
2025-04-16T00:00:00+00:00
2025-04-16T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-rt", "red_hat_enterprise_linux_9:kernel", "red_hat_enterprise_linux_9:kernel-rt" ]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_8:kernel", "red_hat_enterprise_linux_8:kernel-rt" ]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "no_fix_planned", "none_available" ]
[ "Out of support scope", "Fix deferred" ]
[ null, null ]
CVE-2025-0569
null
Sante PACS Server DCM File Parsing Memory Corruption Denial-of-Service Vulnerability
null
null
null
Sante PACS Server DCM File Parsing Memory Corruption Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-25303.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
2025-01-19T03:31:47.363000+00:00
2025-01-20T13:10:43.913000+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2025-1378
CWE-119
radare2
radare2 rasm2 rasm2.c memory corruption
Low
null
3.4/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
A flaw was found in radare2 rasm2. This vulnerability allows memory corruption via local access and manipulation of the /libr/main/rasm2.c library.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
2025-02-17T07:00:45.875772+00:00
2025-02-17T06:00:09.606000+00:00
[]
[]
[ "red_hat_products" ]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[]
[]
[]