Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-53547 (GCVE-0-2025-53547)
Vulnerability from cvelistv5
- CWE-94 - Improper Control of Generation of Code ('Code Injection')
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-53547", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-07-09T13:26:40.496995Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-09T13:26:56.673Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2025-07-09T17:05:52.255Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://news.ycombinator.com/item?id=44506696" } ], "title": "CVE Program Container", "x_generator": { "engine": "ADPogram 0.0.1" } } ], "cna": { "affected": [ { "product": "helm", "vendor": "helm", "versions": [ { "status": "affected", "version": "\u003c 3.18.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, a specially crafted Chart.yaml file along with a specially linked Chart.lock file can lead to local code execution when dependencies are updated. Fields in a Chart.yaml file, that are carried over to a Chart.lock file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., a bash.rc file or shell script). If the Chart.lock file is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking. This issue has been resolved in Helm v3.18.4." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.5, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-08T21:39:59.075Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm" }, { "name": "https://github.com/helm/helm/commit/4b8e61093d8f579f1165cdc6bd4b43fa5455f571", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/helm/helm/commit/4b8e61093d8f579f1165cdc6bd4b43fa5455f571" } ], "source": { "advisory": "GHSA-557j-xg8c-q2mm", "discovery": "UNKNOWN" }, "title": "Helm Chart Dependency Updating With Malicious Chart.yaml Content And Symlink Can Lead To Code Execution" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-53547", "datePublished": "2025-07-08T21:39:59.075Z", "dateReserved": "2025-07-02T15:15:11.516Z", "dateUpdated": "2025-07-09T17:05:52.255Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-53547\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2025-07-08T22:15:27.897\",\"lastModified\":\"2025-09-03T16:26:24.770\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, a specially crafted Chart.yaml file along with a specially linked Chart.lock file can lead to local code execution when dependencies are updated. Fields in a Chart.yaml file, that are carried over to a Chart.lock file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., a bash.rc file or shell script). If the Chart.lock file is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking. This issue has been resolved in Helm v3.18.4.\"},{\"lang\":\"es\",\"value\":\"Helm es un gestor de paquetes para Charts para Kubernetes. Antes de la versi\u00f3n 3.18.4, un archivo Chart.yaml especialmente manipulado, junto con un archivo Chart.lock con un enlace espec\u00edfico, pod\u00eda provocar la ejecuci\u00f3n de c\u00f3digo local al actualizar las dependencias. Los campos de un archivo Chart.yaml que se transfieren a un archivo Chart.lock al actualizar las dependencias y escribirse en este archivo, pueden modificarse de forma que provoquen la ejecuci\u00f3n si ese mismo contenido estuviera en un archivo en ejecuci\u00f3n (por ejemplo, un archivo bash.rc o un script de shell). Si el archivo Chart.lock tiene un enlace simb\u00f3lico a uno de estos archivos, al actualizar las dependencias, el contenido del archivo bloqueado se escribir\u00e1 en el archivo enlazado. Esto puede provocar una ejecuci\u00f3n no deseada. Helm advierte del archivo enlazado, pero no detiene la ejecuci\u00f3n debido al enlace simb\u00f3lico. Este problema se ha resuelto en Helm v3.18.4.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H\",\"baseScore\":8.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":6.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H\",\"baseScore\":8.6,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-94\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:helm:helm:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.17.4\",\"matchCriteriaId\":\"9DD30189-318F-4401-AED5-0A45EBDF8763\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:helm:helm:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.18.0\",\"versionEndExcluding\":\"3.18.4\",\"matchCriteriaId\":\"24A3B062-2A69-4083-AE07-83F0FE989512\"}]}]}],\"references\":[{\"url\":\"https://github.com/helm/helm/commit/4b8e61093d8f579f1165cdc6bd4b43fa5455f571\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://news.ycombinator.com/item?id=44506696\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://news.ycombinator.com/item?id=44506696\"}], \"x_generator\": {\"engine\": \"ADPogram 0.0.1\"}, \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-07-09T17:05:52.255Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-53547\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-07-09T13:26:40.496995Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-07-09T13:26:44.941Z\"}}], \"cna\": {\"title\": \"Helm Chart Dependency Updating With Malicious Chart.yaml Content And Symlink Can Lead To Code Execution\", \"source\": {\"advisory\": \"GHSA-557j-xg8c-q2mm\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 8.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}], \"affected\": [{\"vendor\": \"helm\", \"product\": \"helm\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 3.18.4\"}]}], \"references\": [{\"url\": \"https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm\", \"name\": \"https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/helm/helm/commit/4b8e61093d8f579f1165cdc6bd4b43fa5455f571\", \"name\": \"https://github.com/helm/helm/commit/4b8e61093d8f579f1165cdc6bd4b43fa5455f571\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, a specially crafted Chart.yaml file along with a specially linked Chart.lock file can lead to local code execution when dependencies are updated. Fields in a Chart.yaml file, that are carried over to a Chart.lock file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., a bash.rc file or shell script). If the Chart.lock file is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking. This issue has been resolved in Helm v3.18.4.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-94\", \"description\": \"CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2025-07-08T21:39:59.075Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2025-53547\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-07-09T17:05:52.255Z\", \"dateReserved\": \"2025-07-02T15:15:11.516Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2025-07-08T21:39:59.075Z\", \"assignerShortName\": \"GitHub_M\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
opensuse-su-2025:15406-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "kubeshark-cli-52.8.0-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the kubeshark-cli-52.8.0-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15406", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15406-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53547 page", "url": "https://www.suse.com/security/cve/CVE-2025-53547/" } ], "title": "kubeshark-cli-52.8.0-1.1 on GA media", "tracking": { "current_release_date": "2025-08-04T00:00:00Z", "generator": { "date": "2025-08-04T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15406-1", "initial_release_date": "2025-08-04T00:00:00Z", "revision_history": [ { "date": "2025-08-04T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kubeshark-cli-52.8.0-1.1.aarch64", "product": { "name": "kubeshark-cli-52.8.0-1.1.aarch64", "product_id": "kubeshark-cli-52.8.0-1.1.aarch64" } }, { "category": "product_version", "name": "kubeshark-cli-bash-completion-52.8.0-1.1.aarch64", "product": { "name": "kubeshark-cli-bash-completion-52.8.0-1.1.aarch64", "product_id": "kubeshark-cli-bash-completion-52.8.0-1.1.aarch64" } }, { "category": "product_version", "name": "kubeshark-cli-fish-completion-52.8.0-1.1.aarch64", "product": { "name": "kubeshark-cli-fish-completion-52.8.0-1.1.aarch64", "product_id": "kubeshark-cli-fish-completion-52.8.0-1.1.aarch64" } }, { "category": "product_version", "name": "kubeshark-cli-zsh-completion-52.8.0-1.1.aarch64", "product": { "name": "kubeshark-cli-zsh-completion-52.8.0-1.1.aarch64", "product_id": "kubeshark-cli-zsh-completion-52.8.0-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kubeshark-cli-52.8.0-1.1.ppc64le", "product": { "name": "kubeshark-cli-52.8.0-1.1.ppc64le", "product_id": "kubeshark-cli-52.8.0-1.1.ppc64le" } }, { "category": "product_version", "name": "kubeshark-cli-bash-completion-52.8.0-1.1.ppc64le", "product": { "name": "kubeshark-cli-bash-completion-52.8.0-1.1.ppc64le", "product_id": "kubeshark-cli-bash-completion-52.8.0-1.1.ppc64le" } }, { "category": "product_version", "name": "kubeshark-cli-fish-completion-52.8.0-1.1.ppc64le", "product": { "name": "kubeshark-cli-fish-completion-52.8.0-1.1.ppc64le", "product_id": "kubeshark-cli-fish-completion-52.8.0-1.1.ppc64le" } }, { "category": "product_version", "name": "kubeshark-cli-zsh-completion-52.8.0-1.1.ppc64le", "product": { "name": "kubeshark-cli-zsh-completion-52.8.0-1.1.ppc64le", "product_id": "kubeshark-cli-zsh-completion-52.8.0-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kubeshark-cli-52.8.0-1.1.s390x", "product": { "name": "kubeshark-cli-52.8.0-1.1.s390x", "product_id": "kubeshark-cli-52.8.0-1.1.s390x" } }, { "category": "product_version", "name": "kubeshark-cli-bash-completion-52.8.0-1.1.s390x", "product": { "name": "kubeshark-cli-bash-completion-52.8.0-1.1.s390x", "product_id": "kubeshark-cli-bash-completion-52.8.0-1.1.s390x" } }, { "category": "product_version", "name": "kubeshark-cli-fish-completion-52.8.0-1.1.s390x", "product": { "name": "kubeshark-cli-fish-completion-52.8.0-1.1.s390x", "product_id": "kubeshark-cli-fish-completion-52.8.0-1.1.s390x" } }, { "category": "product_version", "name": "kubeshark-cli-zsh-completion-52.8.0-1.1.s390x", "product": { "name": "kubeshark-cli-zsh-completion-52.8.0-1.1.s390x", "product_id": "kubeshark-cli-zsh-completion-52.8.0-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kubeshark-cli-52.8.0-1.1.x86_64", "product": { "name": "kubeshark-cli-52.8.0-1.1.x86_64", "product_id": "kubeshark-cli-52.8.0-1.1.x86_64" } }, { "category": "product_version", "name": "kubeshark-cli-bash-completion-52.8.0-1.1.x86_64", "product": { "name": "kubeshark-cli-bash-completion-52.8.0-1.1.x86_64", "product_id": "kubeshark-cli-bash-completion-52.8.0-1.1.x86_64" } }, { "category": "product_version", "name": "kubeshark-cli-fish-completion-52.8.0-1.1.x86_64", "product": { "name": "kubeshark-cli-fish-completion-52.8.0-1.1.x86_64", "product_id": "kubeshark-cli-fish-completion-52.8.0-1.1.x86_64" } }, { "category": "product_version", "name": "kubeshark-cli-zsh-completion-52.8.0-1.1.x86_64", "product": { "name": "kubeshark-cli-zsh-completion-52.8.0-1.1.x86_64", "product_id": "kubeshark-cli-zsh-completion-52.8.0-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kubeshark-cli-52.8.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubeshark-cli-52.8.0-1.1.aarch64" }, "product_reference": "kubeshark-cli-52.8.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubeshark-cli-52.8.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubeshark-cli-52.8.0-1.1.ppc64le" }, "product_reference": "kubeshark-cli-52.8.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubeshark-cli-52.8.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubeshark-cli-52.8.0-1.1.s390x" }, "product_reference": "kubeshark-cli-52.8.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubeshark-cli-52.8.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubeshark-cli-52.8.0-1.1.x86_64" }, "product_reference": "kubeshark-cli-52.8.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubeshark-cli-bash-completion-52.8.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubeshark-cli-bash-completion-52.8.0-1.1.aarch64" }, "product_reference": "kubeshark-cli-bash-completion-52.8.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubeshark-cli-bash-completion-52.8.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubeshark-cli-bash-completion-52.8.0-1.1.ppc64le" }, "product_reference": "kubeshark-cli-bash-completion-52.8.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubeshark-cli-bash-completion-52.8.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubeshark-cli-bash-completion-52.8.0-1.1.s390x" }, "product_reference": "kubeshark-cli-bash-completion-52.8.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubeshark-cli-bash-completion-52.8.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubeshark-cli-bash-completion-52.8.0-1.1.x86_64" }, "product_reference": "kubeshark-cli-bash-completion-52.8.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubeshark-cli-fish-completion-52.8.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubeshark-cli-fish-completion-52.8.0-1.1.aarch64" }, "product_reference": "kubeshark-cli-fish-completion-52.8.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubeshark-cli-fish-completion-52.8.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubeshark-cli-fish-completion-52.8.0-1.1.ppc64le" }, "product_reference": "kubeshark-cli-fish-completion-52.8.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubeshark-cli-fish-completion-52.8.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubeshark-cli-fish-completion-52.8.0-1.1.s390x" }, "product_reference": "kubeshark-cli-fish-completion-52.8.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubeshark-cli-fish-completion-52.8.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubeshark-cli-fish-completion-52.8.0-1.1.x86_64" }, "product_reference": "kubeshark-cli-fish-completion-52.8.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubeshark-cli-zsh-completion-52.8.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubeshark-cli-zsh-completion-52.8.0-1.1.aarch64" }, "product_reference": "kubeshark-cli-zsh-completion-52.8.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubeshark-cli-zsh-completion-52.8.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubeshark-cli-zsh-completion-52.8.0-1.1.ppc64le" }, "product_reference": "kubeshark-cli-zsh-completion-52.8.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubeshark-cli-zsh-completion-52.8.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubeshark-cli-zsh-completion-52.8.0-1.1.s390x" }, "product_reference": "kubeshark-cli-zsh-completion-52.8.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubeshark-cli-zsh-completion-52.8.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubeshark-cli-zsh-completion-52.8.0-1.1.x86_64" }, "product_reference": "kubeshark-cli-zsh-completion-52.8.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-53547", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53547" } ], "notes": [ { "category": "general", "text": "Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, a specially crafted Chart.yaml file along with a specially linked Chart.lock file can lead to local code execution when dependencies are updated. Fields in a Chart.yaml file, that are carried over to a Chart.lock file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., a bash.rc file or shell script). If the Chart.lock file is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking. This issue has been resolved in Helm v3.18.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kubeshark-cli-52.8.0-1.1.aarch64", "openSUSE Tumbleweed:kubeshark-cli-52.8.0-1.1.ppc64le", "openSUSE Tumbleweed:kubeshark-cli-52.8.0-1.1.s390x", "openSUSE Tumbleweed:kubeshark-cli-52.8.0-1.1.x86_64", "openSUSE Tumbleweed:kubeshark-cli-bash-completion-52.8.0-1.1.aarch64", "openSUSE Tumbleweed:kubeshark-cli-bash-completion-52.8.0-1.1.ppc64le", "openSUSE Tumbleweed:kubeshark-cli-bash-completion-52.8.0-1.1.s390x", "openSUSE Tumbleweed:kubeshark-cli-bash-completion-52.8.0-1.1.x86_64", "openSUSE Tumbleweed:kubeshark-cli-fish-completion-52.8.0-1.1.aarch64", "openSUSE Tumbleweed:kubeshark-cli-fish-completion-52.8.0-1.1.ppc64le", "openSUSE Tumbleweed:kubeshark-cli-fish-completion-52.8.0-1.1.s390x", "openSUSE Tumbleweed:kubeshark-cli-fish-completion-52.8.0-1.1.x86_64", "openSUSE Tumbleweed:kubeshark-cli-zsh-completion-52.8.0-1.1.aarch64", "openSUSE Tumbleweed:kubeshark-cli-zsh-completion-52.8.0-1.1.ppc64le", "openSUSE Tumbleweed:kubeshark-cli-zsh-completion-52.8.0-1.1.s390x", "openSUSE Tumbleweed:kubeshark-cli-zsh-completion-52.8.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53547", "url": "https://www.suse.com/security/cve/CVE-2025-53547" }, { "category": "external", "summary": "SUSE Bug 1246150 for CVE-2025-53547", "url": "https://bugzilla.suse.com/1246150" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kubeshark-cli-52.8.0-1.1.aarch64", "openSUSE Tumbleweed:kubeshark-cli-52.8.0-1.1.ppc64le", "openSUSE Tumbleweed:kubeshark-cli-52.8.0-1.1.s390x", "openSUSE Tumbleweed:kubeshark-cli-52.8.0-1.1.x86_64", "openSUSE Tumbleweed:kubeshark-cli-bash-completion-52.8.0-1.1.aarch64", "openSUSE Tumbleweed:kubeshark-cli-bash-completion-52.8.0-1.1.ppc64le", "openSUSE Tumbleweed:kubeshark-cli-bash-completion-52.8.0-1.1.s390x", "openSUSE Tumbleweed:kubeshark-cli-bash-completion-52.8.0-1.1.x86_64", "openSUSE Tumbleweed:kubeshark-cli-fish-completion-52.8.0-1.1.aarch64", "openSUSE Tumbleweed:kubeshark-cli-fish-completion-52.8.0-1.1.ppc64le", "openSUSE Tumbleweed:kubeshark-cli-fish-completion-52.8.0-1.1.s390x", "openSUSE Tumbleweed:kubeshark-cli-fish-completion-52.8.0-1.1.x86_64", "openSUSE Tumbleweed:kubeshark-cli-zsh-completion-52.8.0-1.1.aarch64", "openSUSE Tumbleweed:kubeshark-cli-zsh-completion-52.8.0-1.1.ppc64le", "openSUSE Tumbleweed:kubeshark-cli-zsh-completion-52.8.0-1.1.s390x", "openSUSE Tumbleweed:kubeshark-cli-zsh-completion-52.8.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kubeshark-cli-52.8.0-1.1.aarch64", "openSUSE Tumbleweed:kubeshark-cli-52.8.0-1.1.ppc64le", "openSUSE Tumbleweed:kubeshark-cli-52.8.0-1.1.s390x", "openSUSE Tumbleweed:kubeshark-cli-52.8.0-1.1.x86_64", "openSUSE Tumbleweed:kubeshark-cli-bash-completion-52.8.0-1.1.aarch64", "openSUSE Tumbleweed:kubeshark-cli-bash-completion-52.8.0-1.1.ppc64le", "openSUSE Tumbleweed:kubeshark-cli-bash-completion-52.8.0-1.1.s390x", "openSUSE Tumbleweed:kubeshark-cli-bash-completion-52.8.0-1.1.x86_64", "openSUSE Tumbleweed:kubeshark-cli-fish-completion-52.8.0-1.1.aarch64", "openSUSE Tumbleweed:kubeshark-cli-fish-completion-52.8.0-1.1.ppc64le", "openSUSE Tumbleweed:kubeshark-cli-fish-completion-52.8.0-1.1.s390x", "openSUSE Tumbleweed:kubeshark-cli-fish-completion-52.8.0-1.1.x86_64", "openSUSE Tumbleweed:kubeshark-cli-zsh-completion-52.8.0-1.1.aarch64", "openSUSE Tumbleweed:kubeshark-cli-zsh-completion-52.8.0-1.1.ppc64le", "openSUSE Tumbleweed:kubeshark-cli-zsh-completion-52.8.0-1.1.s390x", "openSUSE Tumbleweed:kubeshark-cli-zsh-completion-52.8.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53547" } ] }
opensuse-su-2025:15405-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "govulncheck-vulndb-0.0.20250730T213748-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the govulncheck-vulndb-0.0.20250730T213748-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15405", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15405-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2024-44905 page", "url": "https://www.suse.com/security/cve/CVE-2024-44905/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-44906 page", "url": "https://www.suse.com/security/cve/CVE-2024-44906/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-56731 page", "url": "https://www.suse.com/security/cve/CVE-2024-56731/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-0928 page", "url": "https://www.suse.com/security/cve/CVE-2025-0928/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-1088 page", "url": "https://www.suse.com/security/cve/CVE-2025-1088/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-30086 page", "url": "https://www.suse.com/security/cve/CVE-2025-30086/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-32019 page", "url": "https://www.suse.com/security/cve/CVE-2025-32019/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-3227 page", "url": "https://www.suse.com/security/cve/CVE-2025-3227/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-3228 page", "url": "https://www.suse.com/security/cve/CVE-2025-3228/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-3415 page", "url": "https://www.suse.com/security/cve/CVE-2025-3415/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4563 page", "url": "https://www.suse.com/security/cve/CVE-2025-4563/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4656 page", "url": "https://www.suse.com/security/cve/CVE-2025-4656/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-46702 page", "url": "https://www.suse.com/security/cve/CVE-2025-46702/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4674 page", "url": "https://www.suse.com/security/cve/CVE-2025-4674/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-47281 page", "url": "https://www.suse.com/security/cve/CVE-2025-47281/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-47871 page", "url": "https://www.suse.com/security/cve/CVE-2025-47871/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-47943 page", "url": "https://www.suse.com/security/cve/CVE-2025-47943/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4922 page", "url": "https://www.suse.com/security/cve/CVE-2025-4922/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-4981 page", "url": "https://www.suse.com/security/cve/CVE-2025-4981/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-49825 page", "url": "https://www.suse.com/security/cve/CVE-2025-49825/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-5030 page", "url": "https://www.suse.com/security/cve/CVE-2025-5030/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-51471 page", "url": "https://www.suse.com/security/cve/CVE-2025-51471/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52477 page", "url": "https://www.suse.com/security/cve/CVE-2025-52477/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52889 page", "url": "https://www.suse.com/security/cve/CVE-2025-52889/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52890 page", "url": "https://www.suse.com/security/cve/CVE-2025-52890/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52893 page", "url": "https://www.suse.com/security/cve/CVE-2025-52893/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52894 page", "url": "https://www.suse.com/security/cve/CVE-2025-52894/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52900 page", "url": "https://www.suse.com/security/cve/CVE-2025-52900/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52901 page", "url": "https://www.suse.com/security/cve/CVE-2025-52901/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52902 page", "url": "https://www.suse.com/security/cve/CVE-2025-52902/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52903 page", "url": "https://www.suse.com/security/cve/CVE-2025-52903/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52904 page", "url": "https://www.suse.com/security/cve/CVE-2025-52904/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52995 page", "url": "https://www.suse.com/security/cve/CVE-2025-52995/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52996 page", "url": "https://www.suse.com/security/cve/CVE-2025-52996/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-52997 page", "url": "https://www.suse.com/security/cve/CVE-2025-52997/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53512 page", "url": "https://www.suse.com/security/cve/CVE-2025-53512/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53513 page", "url": "https://www.suse.com/security/cve/CVE-2025-53513/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53547 page", "url": "https://www.suse.com/security/cve/CVE-2025-53547/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53632 page", "url": "https://www.suse.com/security/cve/CVE-2025-53632/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53633 page", "url": "https://www.suse.com/security/cve/CVE-2025-53633/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53634 page", "url": "https://www.suse.com/security/cve/CVE-2025-53634/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53826 page", "url": "https://www.suse.com/security/cve/CVE-2025-53826/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53893 page", "url": "https://www.suse.com/security/cve/CVE-2025-53893/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53945 page", "url": "https://www.suse.com/security/cve/CVE-2025-53945/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-54059 page", "url": "https://www.suse.com/security/cve/CVE-2025-54059/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-54379 page", "url": "https://www.suse.com/security/cve/CVE-2025-54379/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-5689 page", "url": "https://www.suse.com/security/cve/CVE-2025-5689/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-5981 page", "url": "https://www.suse.com/security/cve/CVE-2025-5981/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6023 page", "url": "https://www.suse.com/security/cve/CVE-2025-6023/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6032 page", "url": "https://www.suse.com/security/cve/CVE-2025-6032/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6224 page", "url": "https://www.suse.com/security/cve/CVE-2025-6224/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6226 page", "url": "https://www.suse.com/security/cve/CVE-2025-6226/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6227 page", "url": "https://www.suse.com/security/cve/CVE-2025-6227/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6233 page", "url": "https://www.suse.com/security/cve/CVE-2025-6233/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6264 page", "url": "https://www.suse.com/security/cve/CVE-2025-6264/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6624 page", "url": "https://www.suse.com/security/cve/CVE-2025-6624/" } ], "title": "govulncheck-vulndb-0.0.20250730T213748-1.1 on GA media", "tracking": { "current_release_date": "2025-08-04T00:00:00Z", "generator": { "date": "2025-08-04T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15405-1", "initial_release_date": "2025-08-04T00:00:00Z", "revision_history": [ { "date": "2025-08-04T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "product": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "product_id": "govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "product": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "product_id": "govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "product": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "product_id": "govulncheck-vulndb-0.0.20250730T213748-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64", "product": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64", "product_id": "govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64" }, "product_reference": "govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le" }, "product_reference": "govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x" }, "product_reference": "govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" }, "product_reference": "govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-44905", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-44905" } ], "notes": [ { "category": "general", "text": "go-pg pg v10.13.0 was discovered to contain a SQL injection vulnerability via the component /types/append_value.go.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-44905", "url": "https://www.suse.com/security/cve/CVE-2024-44905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-44905" }, { "cve": "CVE-2024-44906", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-44906" } ], "notes": [ { "category": "general", "text": "uptrace pgdriver v1.2.1 was discovered to contain a SQL injection vulnerability via the appendArg function in /pgdriver/format.go. The maintainer has stated that the issue is fixed in v1.2.15.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-44906", "url": "https://www.suse.com/security/cve/CVE-2024-44906" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-44906" }, { "cve": "CVE-2024-56731", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-56731" } ], "notes": [ { "category": "general", "text": "Gogs is an open source self-hosted Git service. Prior to version 0.13.3, it\u0027s still possible to delete files under the .git directory and achieve remote command execution due to an insufficient patch for CVE-2024-39931. Unprivileged user accounts can execute arbitrary commands on the Gogs instance with the privileges of the account specified by RUN_USER in the configuration. Allowing attackers to access and alter any users\u0027 code hosted on the same instance. This issue has been patched in version 0.13.3.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-56731", "url": "https://www.suse.com/security/cve/CVE-2024-56731" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "critical" } ], "title": "CVE-2024-56731" }, { "cve": "CVE-2025-0928", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-0928" } ], "notes": [ { "category": "general", "text": "In Juju versions prior to 3.6.8 and 2.9.52, any authenticated controller user was allowed to upload arbitrary agent binaries to any model or to the controller itself, without verifying model membership or requiring explicit permissions. This enabled the distribution of poisoned binaries to new or upgraded machines, potentially resulting in remote code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-0928", "url": "https://www.suse.com/security/cve/CVE-2025-0928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-0928" }, { "cve": "CVE-2025-1088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-1088" } ], "notes": [ { "category": "general", "text": "In Grafana, an excessively long dashboard title or panel name will cause Chromium browsers to become unresponsive due to Improper Input Validation vulnerability in Grafana.\nThis issue affects Grafana: before 11.6.2 and is fixed in 11.6.2 and higher.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-1088", "url": "https://www.suse.com/security/cve/CVE-2025-1088" }, { "category": "external", "summary": "SUSE Bug 1245224 for CVE-2025-1088", "url": "https://bugzilla.suse.com/1245224" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-1088" }, { "cve": "CVE-2025-30086", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-30086" } ], "notes": [ { "category": "general", "text": "CNCF Harbor 2.13.x before 2.13.1 and 2.12.x before 2.12.4 allows information disclosure by administrators who can exploit an ORM Leak present in the /api/v2.0/users endpoint to leak users\u0027 password hash and salt values. The q URL parameter allows a user to filter users by any column, and filter password=~ could be abused to leak out a user\u0027s password hash character by character. An attacker with administrator access could exploit this to leak highly sensitive information stored in the Harbor database. All endpoints that support the q URL parameter are vulnerable to this ORM leak attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-30086", "url": "https://www.suse.com/security/cve/CVE-2025-30086" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-30086" }, { "cve": "CVE-2025-32019", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-32019" } ], "notes": [ { "category": "general", "text": "Harbor is an open source trusted cloud native registry project that stores, signs, and scans content. Versions 2.11.2 and below, as well as versions 2.12.0-rc1 and 2.13.0-rc1, contain a vulnerability where the markdown field in the info tab page can be exploited to inject XSS code. This is fixed in versions 2.11.3 and 2.12.3.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-32019", "url": "https://www.suse.com/security/cve/CVE-2025-32019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-32019" }, { "cve": "CVE-2025-3227", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-3227" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.5, 9.11.x \u003c= 9.11.15, 10.8.x \u003c= 10.8.0, 10.7.x \u003c= 10.7.2, 10.6.x \u003c= 10.6.5 fail to properly enforce channel member management permissions in playbook runs, allowing authenticated users without the \u0027Manage Channel Members\u0027 permission to add or remove users from public and private channels by manipulating playbook run participants when the run is linked to a channel.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-3227", "url": "https://www.suse.com/security/cve/CVE-2025-3227" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-3227" }, { "cve": "CVE-2025-3228", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-3228" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.5, 9.11.x \u003c= 9.11.15, 10.8.x \u003c= 10.8.0, 10.7.x \u003c= 10.7.2, 10.6.x \u003c= 10.6.5 fail to properly retrieve requestorInfo from playbooks handler for guest users which allows an attacker access to the playbook run.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-3228", "url": "https://www.suse.com/security/cve/CVE-2025-3228" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-3228" }, { "cve": "CVE-2025-3415", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-3415" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. The Grafana Alerting DingDing integration was not properly protected and could be exposed to users with Viewer permission. \nFixed in versions 10.4.19+security-01, 11.2.10+security-01, 11.3.7+security-01, 11.4.5+security-01, 11.5.5+security-01, 11.6.2+security-01 and 12.0.1+security-01", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-3415", "url": "https://www.suse.com/security/cve/CVE-2025-3415" }, { "category": "external", "summary": "SUSE Bug 1245302 for CVE-2025-3415", "url": "https://bugzilla.suse.com/1245302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-3415" }, { "cve": "CVE-2025-4563", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4563" } ], "notes": [ { "category": "general", "text": "A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4563", "url": "https://www.suse.com/security/cve/CVE-2025-4563" }, { "category": "external", "summary": "SUSE Bug 1245185 for CVE-2025-4563", "url": "https://bugzilla.suse.com/1245185" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-4563" }, { "cve": "CVE-2025-4656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4656" } ], "notes": [ { "category": "general", "text": "Vault Community and Vault Enterprise rekey and recovery key operations can lead to a denial of service due to uncontrolled cancellation by a Vault operator. This vulnerability (CVE-2025-4656) has been remediated in Vault Community Edition 1.20.0 and Vault Enterprise 1.20.0, 1.19.6, 1.18.11, 1.17.17, and 1.16.22.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4656", "url": "https://www.suse.com/security/cve/CVE-2025-4656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "low" } ], "title": "CVE-2025-4656" }, { "cve": "CVE-2025-46702", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-46702" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.5, 9.11.x \u003c= 9.11.15, 10.8.x \u003c= 10.8.0, 10.7.x \u003c= 10.7.2, 10.6.x \u003c= 10.6.5 fail to properly enforce channel member management permissions when adding participants to playbook runs. This allows authenticated users with member-level permissions to bypass system admin restrictions and add or remove users to/from private channels via the playbook run participants feature, even when the \u0027Manage Members\u0027 permission has been explicitly removed. This can lead to unauthorized access to sensitive channel content and allow guest users to gain channel management privileges.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-46702", "url": "https://www.suse.com/security/cve/CVE-2025-46702" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-46702" }, { "cve": "CVE-2025-4674", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4674" } ], "notes": [ { "category": "general", "text": "The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \"go get\", are not affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4674", "url": "https://www.suse.com/security/cve/CVE-2025-4674" }, { "category": "external", "summary": "SUSE Bug 1246118 for CVE-2025-4674", "url": "https://bugzilla.suse.com/1246118" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-4674" }, { "cve": "CVE-2025-47281", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-47281" } ], "notes": [ { "category": "general", "text": "Kyverno is a policy engine designed for cloud native platform engineering teams. In versions 1.14.1 and below, a Denial of Service (DoS) vulnerability exists due to improper handling of JMESPath variable substitutions. Attackers with permissions to create or update Kyverno policies can craft expressions using the {{@}} variable combined with a pipe and an invalid JMESPath function (e.g., {{@ | non_existent_function }}). This leads to a nil value being substituted into the policy structure. Subsequent processing by internal functions, specifically getValueAsStringMap, which expect string values, results in a panic due to a type assertion failure (interface {} is nil, not string). This crashes Kyverno worker threads in the admission controller and causes continuous crashes of the reports controller pod. This is fixed in version 1.14.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-47281", "url": "https://www.suse.com/security/cve/CVE-2025-47281" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-47281" }, { "cve": "CVE-2025-47871", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-47871" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.5, 9.11.x \u003c= 9.11.15, 10.8.x \u003c= 10.8.0, 10.7.x \u003c= 10.7.2, 10.6.x \u003c= 10.6.5 fail to properly validate channel membership when retrieving playbook run metadata, allowing authenticated users who are playbook members but not channel members to access sensitive information about linked private channels including channel name, display name, and participant count through the run metadata API endpoint.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-47871", "url": "https://www.suse.com/security/cve/CVE-2025-47871" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-47871" }, { "cve": "CVE-2025-47943", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-47943" } ], "notes": [ { "category": "general", "text": "Gogs is an open source self-hosted Git service. In application version 0.14.0+dev and prior, there is a stored cross-site scripting (XSS) vulnerability present in Gogs, which allows client-side Javascript code execution. The vulnerability is caused by the usage of a vulnerable and outdated component: pdfjs-1.4.20 under public/plugins/. This issue has been fixed for gogs.io/gogs in version 0.13.3.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-47943", "url": "https://www.suse.com/security/cve/CVE-2025-47943" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-47943" }, { "cve": "CVE-2025-4922", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4922" } ], "notes": [ { "category": "general", "text": "Nomad Community and Nomad Enterprise (\"Nomad\") prefix-based ACL policy lookup can lead to incorrect rule application and shadowing. This vulnerability, identified as CVE-2025-4922, is fixed in Nomad Community Edition 1.10.2 and Nomad Enterprise 1.10.2, 1.9.10, and 1.8.14.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4922", "url": "https://www.suse.com/security/cve/CVE-2025-4922" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-4922" }, { "cve": "CVE-2025-4981", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-4981" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.5, 9.11.x \u003c= 9.11.15, 10.8.x \u003c= 10.8.0, 10.7.x \u003c= 10.7.2, 10.6.x \u003c= 10.6.5 fail to sanitize filenames in the archive extractor which allows authenticated users to write files to arbitrary locations on the filesystem via uploading archives with path traversal sequences in filenames, potentially leading to remote code execution. The vulnerability impacts instances where file uploads and document search by content is enabled (FileSettings.EnableFileAttachments = true and FileSettings.ExtractContent = true). These configuration settings are enabled by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-4981", "url": "https://www.suse.com/security/cve/CVE-2025-4981" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "critical" } ], "title": "CVE-2025-4981" }, { "cve": "CVE-2025-49825", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-49825" } ], "notes": [ { "category": "general", "text": "Teleport provides connectivity, authentication, access controls and audit for infrastructure. Community Edition versions before and including 17.5.1 are vulnerable to remote authentication bypass. At time of posting, there is no available open-source patch.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-49825", "url": "https://www.suse.com/security/cve/CVE-2025-49825" }, { "category": "external", "summary": "SUSE Bug 1244718 for CVE-2025-49825", "url": "https://bugzilla.suse.com/1244718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "critical" } ], "title": "CVE-2025-49825" }, { "cve": "CVE-2025-5030", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-5030" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in Ackites KillWxapkg up to 2.4.1. It has been declared as critical. This vulnerability affects the function processFile of the file internal/unpack/unpack.go of the component wxapkg File Parser. The manipulation leads to os command injection. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-5030", "url": "https://www.suse.com/security/cve/CVE-2025-5030" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-5030" }, { "cve": "CVE-2025-51471", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-51471" } ], "notes": [ { "category": "general", "text": "Cross-Domain Token Exposure in server.auth.getAuthorizationToken in Ollama 0.6.7 allows remote attackers to steal authentication tokens and bypass access controls via a malicious realm value in a WWW-Authenticate header returned by the /api/pull endpoint.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-51471", "url": "https://www.suse.com/security/cve/CVE-2025-51471" }, { "category": "external", "summary": "SUSE Bug 1246915 for CVE-2025-51471", "url": "https://bugzilla.suse.com/1246915" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-51471" }, { "cve": "CVE-2025-52477", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52477" } ], "notes": [ { "category": "general", "text": "Octo-STS is a GitHub App that acts like a Security Token Service (STS) for the GitHub API. Octo-STS versions before v0.5.3 are vulnerable to unauthenticated SSRF by abusing fields in OpenID Connect tokens. Malicious tokens were shown to trigger internal network requests which could reflect error logs with sensitive information. Upgrade to v0.5.3 to resolve this issue. This version includes patch sets to sanitize input and redact logging.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52477", "url": "https://www.suse.com/security/cve/CVE-2025-52477" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52477" }, { "cve": "CVE-2025-52889", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52889" } ], "notes": [ { "category": "general", "text": "Incus is a system container and virtual machine manager. When using an ACL on a device connected to a bridge, Incus version 6.12 and 6.13 generates nftables rules for local services (DHCP, DNS...) that partially bypass security options `security.mac_filtering`, `security.ipv4_filtering` and `security.ipv6_filtering`. This can lead to DHCP pool exhaustion and opens the door for other attacks. A patch is available at commit 2516fb19ad8428454cb4edfe70c0a5f0dc1da214.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52889", "url": "https://www.suse.com/security/cve/CVE-2025-52889" }, { "category": "external", "summary": "SUSE Bug 1245365 for CVE-2025-52889", "url": "https://bugzilla.suse.com/1245365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-52889" }, { "cve": "CVE-2025-52890", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52890" } ], "notes": [ { "category": "general", "text": "Incus is a system container and virtual machine manager. When using an ACL on a device connected to a bridge, Incus versions 6.12 and 6.13generates nftables rules that partially bypass security options `security.mac_filtering`, `security.ipv4_filtering` and `security.ipv6_filtering`. This can lead to ARP spoofing on the bridge and to fully spoof another VM/container on the same bridge. Commit 254dfd2483ab8de39b47c2258b7f1cf0759231c8 contains a patch for the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52890", "url": "https://www.suse.com/security/cve/CVE-2025-52890" }, { "category": "external", "summary": "SUSE Bug 1245367 for CVE-2025-52890", "url": "https://bugzilla.suse.com/1245367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52890" }, { "cve": "CVE-2025-52893", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52893" } ], "notes": [ { "category": "general", "text": "OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. OpenBao before v2.3.0 may leak sensitive information in logs when processing malformed data. This is separate from the earlier HCSEC-2025-09 / CVE-2025-4166. This issue has been fixed in OpenBao v2.3.0 and later. Like with HCSEC-2025-09, there is no known workaround except to ensure properly formatted requests from all clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52893", "url": "https://www.suse.com/security/cve/CVE-2025-52893" }, { "category": "external", "summary": "SUSE Bug 1245381 for CVE-2025-52893", "url": "https://bugzilla.suse.com/1245381" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-52893" }, { "cve": "CVE-2025-52894", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52894" } ], "notes": [ { "category": "general", "text": "OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. OpenBao before v2.3.0 allowed an attacker to perform unauthenticated, unaudited cancellation of root rekey and recovery rekey operations, effecting a denial of service. In OpenBao v2.2.0 and later, manually setting the configuration option `disable_unauthed_rekey_endpoints=true` allows an operator to deny these rarely-used endpoints on global listeners. A patch is available at commit fe75468822a22a88318c6079425357a02ae5b77b. In a future OpenBao release communicated on OpenBao\u0027s website, the maintainers will set this to `true` for all users and provide an authenticated alternative. As a workaround, if an active proxy or load balancer sits in front of OpenBao, an operator can deny requests to these endpoints from unauthorized IP ranges.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52894", "url": "https://www.suse.com/security/cve/CVE-2025-52894" }, { "category": "external", "summary": "SUSE Bug 1245389 for CVE-2025-52894", "url": "https://bugzilla.suse.com/1245389" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52894" }, { "cve": "CVE-2025-52900", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52900" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. The file access permissions for files uploaded to or created from File Browser are never explicitly set by the application. The same is true for the database used by File Browser. On standard servers using File Browser prior to version 2.33.7 where the umask configuration has not been hardened before, this makes all the stated files readable by any operating system account. Version 2.33.7 fixes the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52900", "url": "https://www.suse.com/security/cve/CVE-2025-52900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-52900" }, { "cve": "CVE-2025-52901", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52901" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to version 2.33.9, access tokens are used as GET parameters. The JSON Web Token (JWT) which is used as a session identifier will get leaked to anyone having access to the URLs accessed by the user. This will give an attacker full access to a user\u0027s account and, in consequence, to all sensitive files the user has access to. This issue has been patched in version 2.33.9.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52901", "url": "https://www.suse.com/security/cve/CVE-2025-52901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-52901" }, { "cve": "CVE-2025-52902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52902" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. The Markdown preview function of File Browser prior to v2.33.7 is vulnerable to Stored Cross-Site-Scripting (XSS). Any JavaScript code that is part of a Markdown file uploaded by a user will be executed by the browser. Version 2.33.7 contains a fix for the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52902", "url": "https://www.suse.com/security/cve/CVE-2025-52902" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52902" }, { "cve": "CVE-2025-52903", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52903" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. In version 2.32.0, the Command Execution feature of File Browser only allows the execution of shell command which have been predefined on a user-specific allowlist. Many tools allow the execution of arbitrary different commands, rendering this limitation void. The concrete impact depends on the commands being granted to the attacker, but the large number of standard commands allowing the execution of subcommands makes it likely that every user having the `Execute commands` permissions can exploit this vulnerability. Everyone who can exploit it will have full code execution rights with the uid of the server process. Until this issue is fixed, the maintainers recommend to completely disable `Execute commands` for all accounts. Since the command execution is an inherently dangerous feature that is not used by all deployments, it should be possible to completely disable it in the application\u0027s configuration. As a defense-in-depth measure, organizations not requiring command execution should operate the Filebrowser from a distroless container image. A patch version has been pushed to disable the feature for all existent installations, and making it opt-in. A warning has been added to the documentation and is printed on the console if the feature is enabled. Due to the project being in maintenance-only mode, the bug has not been fixed. The fix is tracked on pull request 5199.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52903", "url": "https://www.suse.com/security/cve/CVE-2025-52903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52903" }, { "cve": "CVE-2025-52904", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52904" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. In version 2.32.0 of the web application, all users have a scope assigned, and they only have access to the files within that scope. The Command Execution feature of Filebrowser allows the execution of shell commands which are not restricted to the scope, potentially giving an attacker read and write access to all files managed by the server. Until this issue is fixed, the maintainers recommend to completely disable `Execute commands` for all accounts. Since the command execution is an inherently dangerous feature that is not used by all deployments, it should be possible to completely disable it in the application\u0027s configuration. As a defense-in-depth measure, organizations not requiring command execution should operate the Filebrowser from a distroless container image. A patch version has been pushed to disable the feature for all existent installations, and making it opt-in. A warning has been added to the documentation and is printed on the console if the feature is enabled. Due to the project being in maintenance-only mode, the bug has not been fixed. Fix is tracked on pull request 5199.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52904", "url": "https://www.suse.com/security/cve/CVE-2025-52904" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52904" }, { "cve": "CVE-2025-52995", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52995" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to version 2.33.10, the implementation of the allowlist is erroneous, allowing a user to execute more shell commands than they are authorized for. The concrete impact of this vulnerability depends on the commands configured, and the binaries installed on the server or in the container image. Due to the missing separation of scopes on the OS-level, this could give an attacker access to all files managed the application, including the File Browser database. This issue has been patched in version 2.33.10.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52995", "url": "https://www.suse.com/security/cve/CVE-2025-52995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52995" }, { "cve": "CVE-2025-52996", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52996" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. In versions 2.32.0 and prior, the implementation of password protected links is error-prone, resulting in potential unprotected sharing of a file through a direct download link. This link can either be shared unknowingly by a user or discovered from various locations such as the browser history or the log of a proxy server used. At time of publication, no known patched versions are available.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52996", "url": "https://www.suse.com/security/cve/CVE-2025-52996" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-52996" }, { "cve": "CVE-2025-52997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-52997" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to version 2.34.1, a missing password policy and brute-force protection makes the authentication process insecure. Attackers could mount a brute-force attack to retrieve the passwords of all accounts in a given instance. This issue has been patched in version 2.34.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-52997", "url": "https://www.suse.com/security/cve/CVE-2025-52997" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-52997" }, { "cve": "CVE-2025-53512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53512" } ], "notes": [ { "category": "general", "text": "The /log endpoint on a Juju controller lacked sufficient authorization checks, allowing unauthorized users to access debug messages that could contain sensitive information.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53512", "url": "https://www.suse.com/security/cve/CVE-2025-53512" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-53512" }, { "cve": "CVE-2025-53513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53513" } ], "notes": [ { "category": "general", "text": "The /charms endpoint on a Juju controller lacked sufficient authorization checks, allowing any user with an account on the controller to upload a charm. Uploading a malicious charm that exploits a Zip Slip vulnerability could allow an attacker to gain access to a machine running a unit through the affected charm.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53513", "url": "https://www.suse.com/security/cve/CVE-2025-53513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53513" }, { "cve": "CVE-2025-53547", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53547" } ], "notes": [ { "category": "general", "text": "Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, a specially crafted Chart.yaml file along with a specially linked Chart.lock file can lead to local code execution when dependencies are updated. Fields in a Chart.yaml file, that are carried over to a Chart.lock file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., a bash.rc file or shell script). If the Chart.lock file is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking. This issue has been resolved in Helm v3.18.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53547", "url": "https://www.suse.com/security/cve/CVE-2025-53547" }, { "category": "external", "summary": "SUSE Bug 1246150 for CVE-2025-53547", "url": "https://bugzilla.suse.com/1246150" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53547" }, { "cve": "CVE-2025-53632", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53632" } ], "notes": [ { "category": "general", "text": "Chall-Manager is a platform-agnostic system able to start Challenges on Demand of a player. When decoding a scenario (i.e. a zip archive), the path of the file to write is not checked, potentially leading to zip slips. Exploitation does not require authentication nor authorization, so anyone can exploit it. It should nonetheless not be exploitable as it is highly recommended to bury Chall-Manager deep within the infrastructure due to its large capabilities, so no users could reach the system. Patch has been implemented by commit 47d188f and shipped in v0.1.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53632", "url": "https://www.suse.com/security/cve/CVE-2025-53632" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53632" }, { "cve": "CVE-2025-53633", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53633" } ], "notes": [ { "category": "general", "text": "Chall-Manager is a platform-agnostic system able to start Challenges on Demand of a player. When decoding a scenario (i.e. a zip archive), the size of the decoded content is not checked, potentially leading to zip bombs decompression. Exploitation does not require authentication nor authorization, so anyone can exploit it. It should nonetheless not be exploitable as it is highly recommended to bury Chall-Manager deep within the infrastructure due to its large capabilities, so no users could reach the system. Patch has been implemented by commit 14042aa and shipped in v0.1.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53633", "url": "https://www.suse.com/security/cve/CVE-2025-53633" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53633" }, { "cve": "CVE-2025-53634", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53634" } ], "notes": [ { "category": "general", "text": "Chall-Manager is a platform-agnostic system able to start Challenges on Demand of a player. The HTTP Gateway processes headers, but with no timeout set. With a slow loris attack, an attacker could cause Denial of Service (DoS). Exploitation does not require authentication nor authorization, so anyone can exploit it. It should nonetheless not be exploitable as it is highly recommended to bury Chall-Manager deep within the infrastructure due to its large capabilities, so no users could reach the system. Patch has been implemented by commit 1385bd8 and shipped in v0.1.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53634", "url": "https://www.suse.com/security/cve/CVE-2025-53634" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53634" }, { "cve": "CVE-2025-53826", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53826" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename, and edit files. In version 2.39.0, File Browser\u0027s authentication system issues long-lived JWT tokens that remain valid even after the user logs out. As of time of publication, no known patches exist.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53826", "url": "https://www.suse.com/security/cve/CVE-2025-53826" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53826" }, { "cve": "CVE-2025-53893", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53893" } ], "notes": [ { "category": "general", "text": "File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename, and edit files. In version 2.38.0, a Denial of Service (DoS) vulnerability exists in the file processing logic when reading a file on endpoint `Filebrowser-Server-IP:PORT/files/{file-name}` . While the server correctly handles and stores uploaded files, it attempts to load the entire content into memory during read operations without size checks or resource limits. This allows an authenticated user to upload a large file and trigger uncontrolled memory consumption on read, potentially crashing the server and making it unresponsive. As of time of publication, no known patches are available.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53893", "url": "https://www.suse.com/security/cve/CVE-2025-53893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53893" }, { "cve": "CVE-2025-53945", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53945" } ], "notes": [ { "category": "general", "text": "apko allows users to build and publish OCI container images built from apk packages. Starting in version 0.27.0 and prior to version 0.29.5, critical files were inadvertently set to 0666, which could likely be abused for root escalation. Version 0.29.5 contains a fix for the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53945", "url": "https://www.suse.com/security/cve/CVE-2025-53945" }, { "category": "external", "summary": "SUSE Bug 1246746 for CVE-2025-53945", "url": "https://bugzilla.suse.com/1246746" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53945" }, { "cve": "CVE-2025-54059", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-54059" } ], "notes": [ { "category": "general", "text": "melange allows users to build apk packages using declarative pipelines. Starting in version 0.23.0 and prior to version 0.29.5, SBOM files generated by melange in apks had file system permissions mode 666. This potentially allows an unprivileged user to tamper with apk SBOMs on a running image, potentially confusing security scanners. An attacker could also perform a DoS under special circumstances. Version 0.29.5 fixes the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-54059", "url": "https://www.suse.com/security/cve/CVE-2025-54059" }, { "category": "external", "summary": "SUSE Bug 1246745 for CVE-2025-54059", "url": "https://bugzilla.suse.com/1246745" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-54059" }, { "cve": "CVE-2025-54379", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-54379" } ], "notes": [ { "category": "general", "text": "LF Edge eKuiper is a lightweight IoT data analytics and stream processing engine running on resource-constraint edge devices. In versions before 2.2.1, there is a critical SQL Injection vulnerability in the getLast API functionality of the eKuiper project. This flaw allows unauthenticated remote attackers to execute arbitrary SQL statements on the underlying SQLite database by manipulating the table name input in an API request. Exploitation can lead to data theft, corruption, or deletion, and full database compromise. This is fixed in version 2.2.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-54379", "url": "https://www.suse.com/security/cve/CVE-2025-54379" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "not set" } ], "title": "CVE-2025-54379" }, { "cve": "CVE-2025-5689", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-5689" } ], "notes": [ { "category": "general", "text": "A flaw was found in the temporary user record that authd uses in the pre-auth NSS. As a result, a user login for the first time will be considered to be part of the root group in the context of that SSH session.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-5689", "url": "https://www.suse.com/security/cve/CVE-2025-5689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-5689" }, { "cve": "CVE-2025-5981", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-5981" } ], "notes": [ { "category": "general", "text": "Arbitrary file write as the OSV-SCALIBR user on the host system via a path traversal vulnerability when using OSV-SCALIBR\u0027s unpack() function for container images. Particularly, when using the CLI flag --remote-image on untrusted container images.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-5981", "url": "https://www.suse.com/security/cve/CVE-2025-5981" }, { "category": "external", "summary": "SUSE Bug 1244726 for CVE-2025-5981", "url": "https://bugzilla.suse.com/1244726" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-5981" }, { "cve": "CVE-2025-6023", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6023" } ], "notes": [ { "category": "general", "text": "An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0.\n\nThe open redirect can be chained with path traversal vulnerabilities to achieve XSS.\n\nFixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6023", "url": "https://www.suse.com/security/cve/CVE-2025-6023" }, { "category": "external", "summary": "SUSE Bug 1246735 for CVE-2025-6023", "url": "https://bugzilla.suse.com/1246735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-6023" }, { "cve": "CVE-2025-6032", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6032" } ], "notes": [ { "category": "general", "text": "A flaw was found in Podman. The podman machine init command fails to verify the TLS certificate when downloading the VM images from an OCI registry. This issue results in a Man In The Middle attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6032", "url": "https://www.suse.com/security/cve/CVE-2025-6032" }, { "category": "external", "summary": "SUSE Bug 1245320 for CVE-2025-6032", "url": "https://bugzilla.suse.com/1245320" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-6032" }, { "cve": "CVE-2025-6224", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6224" } ], "notes": [ { "category": "general", "text": "Certificate generation in juju/utils using the cert.NewLeaf function could include private information. If this certificate were then transferred over the network in plaintext, an attacker listening on that network could sniff the certificate and trivially extract the private key from it.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6224", "url": "https://www.suse.com/security/cve/CVE-2025-6224" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-6224" }, { "cve": "CVE-2025-6226", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6226" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.6, 10.8.x \u003c= 10.8.1, 10.7.x \u003c= 10.7.3, 9.11.x \u003c= 9.11.16 fail to verify authorization when retrieving cached posts by PendingPostID which allows an authenticated user to read posts in private channels they don\u0027t have access to via guessing the PendingPostID of recently created posts.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6226", "url": "https://www.suse.com/security/cve/CVE-2025-6226" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-6226" }, { "cve": "CVE-2025-6227", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6227" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.5.x \u003c= 10.5.7, 9.11.x \u003c= 9.11.16 fail to negotiate a new token when accepting the invite which allows a user that intercepts both invite and password to send synchronization payloads to the server that originally created the invite via the REST API.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6227", "url": "https://www.suse.com/security/cve/CVE-2025-6227" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "low" } ], "title": "CVE-2025-6227" }, { "cve": "CVE-2025-6233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6233" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.8.x \u003c= 10.8.1, 10.7.x \u003c= 10.7.3, 10.5.x \u003c= 10.5.7, 9.11.x \u003c= 9.11.16 fail to sanitize input paths of file attachments in the bulk import JSONL file, which allows a system admin to read arbitrary system files via path traversal.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6233", "url": "https://www.suse.com/security/cve/CVE-2025-6233" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-6233" }, { "cve": "CVE-2025-6264", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6264" } ], "notes": [ { "category": "general", "text": "Velociraptor allows collection of VQL queries packaged into Artifacts from endpoints. These artifacts can be used to do anything and usually run with elevated permissions. To limit access to some dangerous artifact, Velociraptor allows for those to require high permissions like EXECVE to launch.\n\nThe Admin.Client.UpdateClientConfig is an artifact used to update the client\u0027s configuration. This artifact did not enforce an additional required permission, allowing users with COLLECT_CLIENT permissions (normally given by the \"Investigator\" role) to collect it from endpoints and update the configuration. \n\nThis can lead to arbitrary command execution and endpoint takeover.\n\nTo successfully exploit this vulnerability the user must already have access to collect artifacts from the endpoint (i.e. have the COLLECT_CLIENT given typically by the \"Investigator\u0027 role).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6264", "url": "https://www.suse.com/security/cve/CVE-2025-6264" }, { "category": "external", "summary": "SUSE Bug 1245123 for CVE-2025-6264", "url": "https://bugzilla.suse.com/1245123" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-6264" }, { "cve": "CVE-2025-6624", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6624" } ], "notes": [ { "category": "general", "text": "Versions of the package snyk before 1.1297.3 are vulnerable to Insertion of Sensitive Information into Log File through local Snyk CLI debug logs. Container Registry credentials provided via environment variables or command line arguments can be exposed when executing Snyk CLI in DEBUG or DEBUG/TRACE mode.\r\rThe issue affects the following Snyk commands:\r\r1. When snyk container test or snyk container monitor commands are run against a container registry, with debug mode enabled, the container registry credentials may be written into the local Snyk CLI debug log. This only happens with credentials specified in environment variables (SNYK_REGISTRY_USERNAME and SNYK_REGISTRY_PASSWORD), or in the CLI (--password/-p and --username/-u).\r\r2. When snyk auth command is executed with debug mode enabled AND the log level is set to TRACE, the Snyk access / refresh credential tokens used to connect the CLI to Snyk may be written into the local CLI debug logs.\r\r3. When snyk iac test is executed with a Remote IAC Custom rules bundle, debug mode enabled, AND the log level is set to TRACE, the docker registry token may be written into the local CLI debug logs.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6624", "url": "https://www.suse.com/security/cve/CVE-2025-6624" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250730T213748-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-04T00:00:00Z", "details": "important" } ], "title": "CVE-2025-6624" } ] }
opensuse-su-2025:15331-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "helm-3.18.4-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the helm-3.18.4-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15331", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15331-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53547 page", "url": "https://www.suse.com/security/cve/CVE-2025-53547/" } ], "title": "helm-3.18.4-1.1 on GA media", "tracking": { "current_release_date": "2025-07-09T00:00:00Z", "generator": { "date": "2025-07-09T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15331-1", "initial_release_date": "2025-07-09T00:00:00Z", "revision_history": [ { "date": "2025-07-09T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "helm-3.18.4-1.1.aarch64", "product": { "name": "helm-3.18.4-1.1.aarch64", "product_id": "helm-3.18.4-1.1.aarch64" } }, { "category": "product_version", "name": "helm-bash-completion-3.18.4-1.1.aarch64", "product": { "name": "helm-bash-completion-3.18.4-1.1.aarch64", "product_id": "helm-bash-completion-3.18.4-1.1.aarch64" } }, { "category": "product_version", "name": "helm-fish-completion-3.18.4-1.1.aarch64", "product": { "name": "helm-fish-completion-3.18.4-1.1.aarch64", "product_id": "helm-fish-completion-3.18.4-1.1.aarch64" } }, { "category": "product_version", "name": "helm-zsh-completion-3.18.4-1.1.aarch64", "product": { "name": "helm-zsh-completion-3.18.4-1.1.aarch64", "product_id": "helm-zsh-completion-3.18.4-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "helm-3.18.4-1.1.ppc64le", "product": { "name": "helm-3.18.4-1.1.ppc64le", "product_id": "helm-3.18.4-1.1.ppc64le" } }, { "category": "product_version", "name": "helm-bash-completion-3.18.4-1.1.ppc64le", "product": { "name": "helm-bash-completion-3.18.4-1.1.ppc64le", "product_id": "helm-bash-completion-3.18.4-1.1.ppc64le" } }, { "category": "product_version", "name": "helm-fish-completion-3.18.4-1.1.ppc64le", "product": { "name": "helm-fish-completion-3.18.4-1.1.ppc64le", "product_id": "helm-fish-completion-3.18.4-1.1.ppc64le" } }, { "category": "product_version", "name": "helm-zsh-completion-3.18.4-1.1.ppc64le", "product": { "name": "helm-zsh-completion-3.18.4-1.1.ppc64le", "product_id": "helm-zsh-completion-3.18.4-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "helm-3.18.4-1.1.s390x", "product": { "name": "helm-3.18.4-1.1.s390x", "product_id": "helm-3.18.4-1.1.s390x" } }, { "category": "product_version", "name": "helm-bash-completion-3.18.4-1.1.s390x", "product": { "name": "helm-bash-completion-3.18.4-1.1.s390x", "product_id": "helm-bash-completion-3.18.4-1.1.s390x" } }, { "category": "product_version", "name": "helm-fish-completion-3.18.4-1.1.s390x", "product": { "name": "helm-fish-completion-3.18.4-1.1.s390x", "product_id": "helm-fish-completion-3.18.4-1.1.s390x" } }, { "category": "product_version", "name": "helm-zsh-completion-3.18.4-1.1.s390x", "product": { "name": "helm-zsh-completion-3.18.4-1.1.s390x", "product_id": "helm-zsh-completion-3.18.4-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "helm-3.18.4-1.1.x86_64", "product": { "name": "helm-3.18.4-1.1.x86_64", "product_id": "helm-3.18.4-1.1.x86_64" } }, { "category": "product_version", "name": "helm-bash-completion-3.18.4-1.1.x86_64", "product": { "name": "helm-bash-completion-3.18.4-1.1.x86_64", "product_id": "helm-bash-completion-3.18.4-1.1.x86_64" } }, { "category": "product_version", "name": "helm-fish-completion-3.18.4-1.1.x86_64", "product": { "name": "helm-fish-completion-3.18.4-1.1.x86_64", "product_id": "helm-fish-completion-3.18.4-1.1.x86_64" } }, { "category": "product_version", "name": "helm-zsh-completion-3.18.4-1.1.x86_64", "product": { "name": "helm-zsh-completion-3.18.4-1.1.x86_64", "product_id": "helm-zsh-completion-3.18.4-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "helm-3.18.4-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:helm-3.18.4-1.1.aarch64" }, "product_reference": "helm-3.18.4-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "helm-3.18.4-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:helm-3.18.4-1.1.ppc64le" }, "product_reference": "helm-3.18.4-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "helm-3.18.4-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:helm-3.18.4-1.1.s390x" }, "product_reference": "helm-3.18.4-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "helm-3.18.4-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:helm-3.18.4-1.1.x86_64" }, "product_reference": "helm-3.18.4-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "helm-bash-completion-3.18.4-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:helm-bash-completion-3.18.4-1.1.aarch64" }, "product_reference": "helm-bash-completion-3.18.4-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "helm-bash-completion-3.18.4-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:helm-bash-completion-3.18.4-1.1.ppc64le" }, "product_reference": "helm-bash-completion-3.18.4-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "helm-bash-completion-3.18.4-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:helm-bash-completion-3.18.4-1.1.s390x" }, "product_reference": "helm-bash-completion-3.18.4-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "helm-bash-completion-3.18.4-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:helm-bash-completion-3.18.4-1.1.x86_64" }, "product_reference": "helm-bash-completion-3.18.4-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "helm-fish-completion-3.18.4-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:helm-fish-completion-3.18.4-1.1.aarch64" }, "product_reference": "helm-fish-completion-3.18.4-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "helm-fish-completion-3.18.4-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:helm-fish-completion-3.18.4-1.1.ppc64le" }, "product_reference": "helm-fish-completion-3.18.4-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "helm-fish-completion-3.18.4-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:helm-fish-completion-3.18.4-1.1.s390x" }, "product_reference": "helm-fish-completion-3.18.4-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "helm-fish-completion-3.18.4-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:helm-fish-completion-3.18.4-1.1.x86_64" }, "product_reference": "helm-fish-completion-3.18.4-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "helm-zsh-completion-3.18.4-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:helm-zsh-completion-3.18.4-1.1.aarch64" }, "product_reference": "helm-zsh-completion-3.18.4-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "helm-zsh-completion-3.18.4-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:helm-zsh-completion-3.18.4-1.1.ppc64le" }, "product_reference": "helm-zsh-completion-3.18.4-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "helm-zsh-completion-3.18.4-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:helm-zsh-completion-3.18.4-1.1.s390x" }, "product_reference": "helm-zsh-completion-3.18.4-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "helm-zsh-completion-3.18.4-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:helm-zsh-completion-3.18.4-1.1.x86_64" }, "product_reference": "helm-zsh-completion-3.18.4-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-53547", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53547" } ], "notes": [ { "category": "general", "text": "Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, a specially crafted Chart.yaml file along with a specially linked Chart.lock file can lead to local code execution when dependencies are updated. Fields in a Chart.yaml file, that are carried over to a Chart.lock file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., a bash.rc file or shell script). If the Chart.lock file is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking. This issue has been resolved in Helm v3.18.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:helm-3.18.4-1.1.aarch64", "openSUSE Tumbleweed:helm-3.18.4-1.1.ppc64le", "openSUSE Tumbleweed:helm-3.18.4-1.1.s390x", "openSUSE Tumbleweed:helm-3.18.4-1.1.x86_64", "openSUSE Tumbleweed:helm-bash-completion-3.18.4-1.1.aarch64", "openSUSE Tumbleweed:helm-bash-completion-3.18.4-1.1.ppc64le", "openSUSE Tumbleweed:helm-bash-completion-3.18.4-1.1.s390x", "openSUSE Tumbleweed:helm-bash-completion-3.18.4-1.1.x86_64", "openSUSE Tumbleweed:helm-fish-completion-3.18.4-1.1.aarch64", "openSUSE Tumbleweed:helm-fish-completion-3.18.4-1.1.ppc64le", "openSUSE Tumbleweed:helm-fish-completion-3.18.4-1.1.s390x", "openSUSE Tumbleweed:helm-fish-completion-3.18.4-1.1.x86_64", "openSUSE Tumbleweed:helm-zsh-completion-3.18.4-1.1.aarch64", "openSUSE Tumbleweed:helm-zsh-completion-3.18.4-1.1.ppc64le", "openSUSE Tumbleweed:helm-zsh-completion-3.18.4-1.1.s390x", "openSUSE Tumbleweed:helm-zsh-completion-3.18.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53547", "url": "https://www.suse.com/security/cve/CVE-2025-53547" }, { "category": "external", "summary": "SUSE Bug 1246150 for CVE-2025-53547", "url": "https://bugzilla.suse.com/1246150" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:helm-3.18.4-1.1.aarch64", "openSUSE Tumbleweed:helm-3.18.4-1.1.ppc64le", "openSUSE Tumbleweed:helm-3.18.4-1.1.s390x", "openSUSE Tumbleweed:helm-3.18.4-1.1.x86_64", "openSUSE Tumbleweed:helm-bash-completion-3.18.4-1.1.aarch64", "openSUSE Tumbleweed:helm-bash-completion-3.18.4-1.1.ppc64le", "openSUSE Tumbleweed:helm-bash-completion-3.18.4-1.1.s390x", "openSUSE Tumbleweed:helm-bash-completion-3.18.4-1.1.x86_64", "openSUSE Tumbleweed:helm-fish-completion-3.18.4-1.1.aarch64", "openSUSE Tumbleweed:helm-fish-completion-3.18.4-1.1.ppc64le", "openSUSE Tumbleweed:helm-fish-completion-3.18.4-1.1.s390x", "openSUSE Tumbleweed:helm-fish-completion-3.18.4-1.1.x86_64", "openSUSE Tumbleweed:helm-zsh-completion-3.18.4-1.1.aarch64", "openSUSE Tumbleweed:helm-zsh-completion-3.18.4-1.1.ppc64le", "openSUSE Tumbleweed:helm-zsh-completion-3.18.4-1.1.s390x", "openSUSE Tumbleweed:helm-zsh-completion-3.18.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:helm-3.18.4-1.1.aarch64", "openSUSE Tumbleweed:helm-3.18.4-1.1.ppc64le", "openSUSE Tumbleweed:helm-3.18.4-1.1.s390x", "openSUSE Tumbleweed:helm-3.18.4-1.1.x86_64", "openSUSE Tumbleweed:helm-bash-completion-3.18.4-1.1.aarch64", "openSUSE Tumbleweed:helm-bash-completion-3.18.4-1.1.ppc64le", "openSUSE Tumbleweed:helm-bash-completion-3.18.4-1.1.s390x", "openSUSE Tumbleweed:helm-bash-completion-3.18.4-1.1.x86_64", "openSUSE Tumbleweed:helm-fish-completion-3.18.4-1.1.aarch64", "openSUSE Tumbleweed:helm-fish-completion-3.18.4-1.1.ppc64le", "openSUSE Tumbleweed:helm-fish-completion-3.18.4-1.1.s390x", "openSUSE Tumbleweed:helm-fish-completion-3.18.4-1.1.x86_64", "openSUSE Tumbleweed:helm-zsh-completion-3.18.4-1.1.aarch64", "openSUSE Tumbleweed:helm-zsh-completion-3.18.4-1.1.ppc64le", "openSUSE Tumbleweed:helm-zsh-completion-3.18.4-1.1.s390x", "openSUSE Tumbleweed:helm-zsh-completion-3.18.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-09T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53547" } ] }
opensuse-su-2025:15338-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "k9s-0.50.7-2.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the k9s-0.50.7-2.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15338", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15338-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53547 page", "url": "https://www.suse.com/security/cve/CVE-2025-53547/" } ], "title": "k9s-0.50.7-2.1 on GA media", "tracking": { "current_release_date": "2025-07-11T00:00:00Z", "generator": { "date": "2025-07-11T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15338-1", "initial_release_date": "2025-07-11T00:00:00Z", "revision_history": [ { "date": "2025-07-11T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "k9s-0.50.7-2.1.aarch64", "product": { "name": "k9s-0.50.7-2.1.aarch64", "product_id": "k9s-0.50.7-2.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "k9s-0.50.7-2.1.ppc64le", "product": { "name": "k9s-0.50.7-2.1.ppc64le", "product_id": "k9s-0.50.7-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "k9s-0.50.7-2.1.s390x", "product": { "name": "k9s-0.50.7-2.1.s390x", "product_id": "k9s-0.50.7-2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "k9s-0.50.7-2.1.x86_64", "product": { "name": "k9s-0.50.7-2.1.x86_64", "product_id": "k9s-0.50.7-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "k9s-0.50.7-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:k9s-0.50.7-2.1.aarch64" }, "product_reference": "k9s-0.50.7-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "k9s-0.50.7-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:k9s-0.50.7-2.1.ppc64le" }, "product_reference": "k9s-0.50.7-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "k9s-0.50.7-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:k9s-0.50.7-2.1.s390x" }, "product_reference": "k9s-0.50.7-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "k9s-0.50.7-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:k9s-0.50.7-2.1.x86_64" }, "product_reference": "k9s-0.50.7-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-53547", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53547" } ], "notes": [ { "category": "general", "text": "Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, a specially crafted Chart.yaml file along with a specially linked Chart.lock file can lead to local code execution when dependencies are updated. Fields in a Chart.yaml file, that are carried over to a Chart.lock file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., a bash.rc file or shell script). If the Chart.lock file is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking. This issue has been resolved in Helm v3.18.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:k9s-0.50.7-2.1.aarch64", "openSUSE Tumbleweed:k9s-0.50.7-2.1.ppc64le", "openSUSE Tumbleweed:k9s-0.50.7-2.1.s390x", "openSUSE Tumbleweed:k9s-0.50.7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53547", "url": "https://www.suse.com/security/cve/CVE-2025-53547" }, { "category": "external", "summary": "SUSE Bug 1246150 for CVE-2025-53547", "url": "https://bugzilla.suse.com/1246150" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:k9s-0.50.7-2.1.aarch64", "openSUSE Tumbleweed:k9s-0.50.7-2.1.ppc64le", "openSUSE Tumbleweed:k9s-0.50.7-2.1.s390x", "openSUSE Tumbleweed:k9s-0.50.7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:k9s-0.50.7-2.1.aarch64", "openSUSE Tumbleweed:k9s-0.50.7-2.1.ppc64le", "openSUSE Tumbleweed:k9s-0.50.7-2.1.s390x", "openSUSE Tumbleweed:k9s-0.50.7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-11T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53547" } ] }
opensuse-su-2025:15336-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "cmctl-2.3.0-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the cmctl-2.3.0-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15336", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15336-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53547 page", "url": "https://www.suse.com/security/cve/CVE-2025-53547/" } ], "title": "cmctl-2.3.0-1.1 on GA media", "tracking": { "current_release_date": "2025-07-11T00:00:00Z", "generator": { "date": "2025-07-11T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15336-1", "initial_release_date": "2025-07-11T00:00:00Z", "revision_history": [ { "date": "2025-07-11T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cmctl-2.3.0-1.1.aarch64", "product": { "name": "cmctl-2.3.0-1.1.aarch64", "product_id": "cmctl-2.3.0-1.1.aarch64" } }, { "category": "product_version", "name": "cmctl-bash-completion-2.3.0-1.1.aarch64", "product": { "name": "cmctl-bash-completion-2.3.0-1.1.aarch64", "product_id": "cmctl-bash-completion-2.3.0-1.1.aarch64" } }, { "category": "product_version", "name": "cmctl-fish-completion-2.3.0-1.1.aarch64", "product": { "name": "cmctl-fish-completion-2.3.0-1.1.aarch64", "product_id": "cmctl-fish-completion-2.3.0-1.1.aarch64" } }, { "category": "product_version", "name": "cmctl-zsh-completion-2.3.0-1.1.aarch64", "product": { "name": "cmctl-zsh-completion-2.3.0-1.1.aarch64", "product_id": "cmctl-zsh-completion-2.3.0-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "cmctl-2.3.0-1.1.ppc64le", "product": { "name": "cmctl-2.3.0-1.1.ppc64le", "product_id": "cmctl-2.3.0-1.1.ppc64le" } }, { "category": "product_version", "name": "cmctl-bash-completion-2.3.0-1.1.ppc64le", "product": { "name": "cmctl-bash-completion-2.3.0-1.1.ppc64le", "product_id": "cmctl-bash-completion-2.3.0-1.1.ppc64le" } }, { "category": "product_version", "name": "cmctl-fish-completion-2.3.0-1.1.ppc64le", "product": { "name": "cmctl-fish-completion-2.3.0-1.1.ppc64le", "product_id": "cmctl-fish-completion-2.3.0-1.1.ppc64le" } }, { "category": "product_version", "name": "cmctl-zsh-completion-2.3.0-1.1.ppc64le", "product": { "name": "cmctl-zsh-completion-2.3.0-1.1.ppc64le", "product_id": "cmctl-zsh-completion-2.3.0-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cmctl-2.3.0-1.1.s390x", "product": { "name": "cmctl-2.3.0-1.1.s390x", "product_id": "cmctl-2.3.0-1.1.s390x" } }, { "category": "product_version", "name": "cmctl-bash-completion-2.3.0-1.1.s390x", "product": { "name": "cmctl-bash-completion-2.3.0-1.1.s390x", "product_id": "cmctl-bash-completion-2.3.0-1.1.s390x" } }, { "category": "product_version", "name": "cmctl-fish-completion-2.3.0-1.1.s390x", "product": { "name": "cmctl-fish-completion-2.3.0-1.1.s390x", "product_id": "cmctl-fish-completion-2.3.0-1.1.s390x" } }, { "category": "product_version", "name": "cmctl-zsh-completion-2.3.0-1.1.s390x", "product": { "name": "cmctl-zsh-completion-2.3.0-1.1.s390x", "product_id": "cmctl-zsh-completion-2.3.0-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cmctl-2.3.0-1.1.x86_64", "product": { "name": "cmctl-2.3.0-1.1.x86_64", "product_id": "cmctl-2.3.0-1.1.x86_64" } }, { "category": "product_version", "name": "cmctl-bash-completion-2.3.0-1.1.x86_64", "product": { "name": "cmctl-bash-completion-2.3.0-1.1.x86_64", "product_id": "cmctl-bash-completion-2.3.0-1.1.x86_64" } }, { "category": "product_version", "name": "cmctl-fish-completion-2.3.0-1.1.x86_64", "product": { "name": "cmctl-fish-completion-2.3.0-1.1.x86_64", "product_id": "cmctl-fish-completion-2.3.0-1.1.x86_64" } }, { "category": "product_version", "name": "cmctl-zsh-completion-2.3.0-1.1.x86_64", "product": { "name": "cmctl-zsh-completion-2.3.0-1.1.x86_64", "product_id": "cmctl-zsh-completion-2.3.0-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cmctl-2.3.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cmctl-2.3.0-1.1.aarch64" }, "product_reference": "cmctl-2.3.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cmctl-2.3.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cmctl-2.3.0-1.1.ppc64le" }, "product_reference": "cmctl-2.3.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cmctl-2.3.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cmctl-2.3.0-1.1.s390x" }, "product_reference": "cmctl-2.3.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cmctl-2.3.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cmctl-2.3.0-1.1.x86_64" }, "product_reference": "cmctl-2.3.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cmctl-bash-completion-2.3.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cmctl-bash-completion-2.3.0-1.1.aarch64" }, "product_reference": "cmctl-bash-completion-2.3.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cmctl-bash-completion-2.3.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cmctl-bash-completion-2.3.0-1.1.ppc64le" }, "product_reference": "cmctl-bash-completion-2.3.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cmctl-bash-completion-2.3.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cmctl-bash-completion-2.3.0-1.1.s390x" }, "product_reference": "cmctl-bash-completion-2.3.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cmctl-bash-completion-2.3.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cmctl-bash-completion-2.3.0-1.1.x86_64" }, "product_reference": "cmctl-bash-completion-2.3.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cmctl-fish-completion-2.3.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cmctl-fish-completion-2.3.0-1.1.aarch64" }, "product_reference": "cmctl-fish-completion-2.3.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cmctl-fish-completion-2.3.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cmctl-fish-completion-2.3.0-1.1.ppc64le" }, "product_reference": "cmctl-fish-completion-2.3.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cmctl-fish-completion-2.3.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cmctl-fish-completion-2.3.0-1.1.s390x" }, "product_reference": "cmctl-fish-completion-2.3.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cmctl-fish-completion-2.3.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cmctl-fish-completion-2.3.0-1.1.x86_64" }, "product_reference": "cmctl-fish-completion-2.3.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cmctl-zsh-completion-2.3.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cmctl-zsh-completion-2.3.0-1.1.aarch64" }, "product_reference": "cmctl-zsh-completion-2.3.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cmctl-zsh-completion-2.3.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cmctl-zsh-completion-2.3.0-1.1.ppc64le" }, "product_reference": "cmctl-zsh-completion-2.3.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cmctl-zsh-completion-2.3.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cmctl-zsh-completion-2.3.0-1.1.s390x" }, "product_reference": "cmctl-zsh-completion-2.3.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cmctl-zsh-completion-2.3.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cmctl-zsh-completion-2.3.0-1.1.x86_64" }, "product_reference": "cmctl-zsh-completion-2.3.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-53547", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53547" } ], "notes": [ { "category": "general", "text": "Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, a specially crafted Chart.yaml file along with a specially linked Chart.lock file can lead to local code execution when dependencies are updated. Fields in a Chart.yaml file, that are carried over to a Chart.lock file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., a bash.rc file or shell script). If the Chart.lock file is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking. This issue has been resolved in Helm v3.18.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:cmctl-2.3.0-1.1.aarch64", "openSUSE Tumbleweed:cmctl-2.3.0-1.1.ppc64le", "openSUSE Tumbleweed:cmctl-2.3.0-1.1.s390x", "openSUSE Tumbleweed:cmctl-2.3.0-1.1.x86_64", "openSUSE Tumbleweed:cmctl-bash-completion-2.3.0-1.1.aarch64", "openSUSE Tumbleweed:cmctl-bash-completion-2.3.0-1.1.ppc64le", "openSUSE Tumbleweed:cmctl-bash-completion-2.3.0-1.1.s390x", "openSUSE Tumbleweed:cmctl-bash-completion-2.3.0-1.1.x86_64", "openSUSE Tumbleweed:cmctl-fish-completion-2.3.0-1.1.aarch64", "openSUSE Tumbleweed:cmctl-fish-completion-2.3.0-1.1.ppc64le", "openSUSE Tumbleweed:cmctl-fish-completion-2.3.0-1.1.s390x", "openSUSE Tumbleweed:cmctl-fish-completion-2.3.0-1.1.x86_64", "openSUSE Tumbleweed:cmctl-zsh-completion-2.3.0-1.1.aarch64", "openSUSE Tumbleweed:cmctl-zsh-completion-2.3.0-1.1.ppc64le", "openSUSE Tumbleweed:cmctl-zsh-completion-2.3.0-1.1.s390x", "openSUSE Tumbleweed:cmctl-zsh-completion-2.3.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53547", "url": "https://www.suse.com/security/cve/CVE-2025-53547" }, { "category": "external", "summary": "SUSE Bug 1246150 for CVE-2025-53547", "url": "https://bugzilla.suse.com/1246150" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:cmctl-2.3.0-1.1.aarch64", "openSUSE Tumbleweed:cmctl-2.3.0-1.1.ppc64le", "openSUSE Tumbleweed:cmctl-2.3.0-1.1.s390x", "openSUSE Tumbleweed:cmctl-2.3.0-1.1.x86_64", "openSUSE Tumbleweed:cmctl-bash-completion-2.3.0-1.1.aarch64", "openSUSE Tumbleweed:cmctl-bash-completion-2.3.0-1.1.ppc64le", "openSUSE Tumbleweed:cmctl-bash-completion-2.3.0-1.1.s390x", "openSUSE Tumbleweed:cmctl-bash-completion-2.3.0-1.1.x86_64", "openSUSE Tumbleweed:cmctl-fish-completion-2.3.0-1.1.aarch64", "openSUSE Tumbleweed:cmctl-fish-completion-2.3.0-1.1.ppc64le", "openSUSE Tumbleweed:cmctl-fish-completion-2.3.0-1.1.s390x", "openSUSE Tumbleweed:cmctl-fish-completion-2.3.0-1.1.x86_64", "openSUSE Tumbleweed:cmctl-zsh-completion-2.3.0-1.1.aarch64", "openSUSE Tumbleweed:cmctl-zsh-completion-2.3.0-1.1.ppc64le", "openSUSE Tumbleweed:cmctl-zsh-completion-2.3.0-1.1.s390x", "openSUSE Tumbleweed:cmctl-zsh-completion-2.3.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:cmctl-2.3.0-1.1.aarch64", "openSUSE Tumbleweed:cmctl-2.3.0-1.1.ppc64le", "openSUSE Tumbleweed:cmctl-2.3.0-1.1.s390x", "openSUSE Tumbleweed:cmctl-2.3.0-1.1.x86_64", "openSUSE Tumbleweed:cmctl-bash-completion-2.3.0-1.1.aarch64", "openSUSE Tumbleweed:cmctl-bash-completion-2.3.0-1.1.ppc64le", "openSUSE Tumbleweed:cmctl-bash-completion-2.3.0-1.1.s390x", "openSUSE Tumbleweed:cmctl-bash-completion-2.3.0-1.1.x86_64", "openSUSE Tumbleweed:cmctl-fish-completion-2.3.0-1.1.aarch64", "openSUSE Tumbleweed:cmctl-fish-completion-2.3.0-1.1.ppc64le", "openSUSE Tumbleweed:cmctl-fish-completion-2.3.0-1.1.s390x", "openSUSE Tumbleweed:cmctl-fish-completion-2.3.0-1.1.x86_64", "openSUSE Tumbleweed:cmctl-zsh-completion-2.3.0-1.1.aarch64", "openSUSE Tumbleweed:cmctl-zsh-completion-2.3.0-1.1.ppc64le", "openSUSE Tumbleweed:cmctl-zsh-completion-2.3.0-1.1.s390x", "openSUSE Tumbleweed:cmctl-zsh-completion-2.3.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-11T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53547" } ] }
opensuse-su-2025:15341-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "trivy-0.64.1-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the trivy-0.64.1-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15341", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15341-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2025-53547 page", "url": "https://www.suse.com/security/cve/CVE-2025-53547/" } ], "title": "trivy-0.64.1-1.1 on GA media", "tracking": { "current_release_date": "2025-07-11T00:00:00Z", "generator": { "date": "2025-07-11T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15341-1", "initial_release_date": "2025-07-11T00:00:00Z", "revision_history": [ { "date": "2025-07-11T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "trivy-0.64.1-1.1.aarch64", "product": { "name": "trivy-0.64.1-1.1.aarch64", "product_id": "trivy-0.64.1-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "trivy-0.64.1-1.1.ppc64le", "product": { "name": "trivy-0.64.1-1.1.ppc64le", "product_id": "trivy-0.64.1-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "trivy-0.64.1-1.1.s390x", "product": { "name": "trivy-0.64.1-1.1.s390x", "product_id": "trivy-0.64.1-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "trivy-0.64.1-1.1.x86_64", "product": { "name": "trivy-0.64.1-1.1.x86_64", "product_id": "trivy-0.64.1-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "trivy-0.64.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:trivy-0.64.1-1.1.aarch64" }, "product_reference": "trivy-0.64.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "trivy-0.64.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:trivy-0.64.1-1.1.ppc64le" }, "product_reference": "trivy-0.64.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "trivy-0.64.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:trivy-0.64.1-1.1.s390x" }, "product_reference": "trivy-0.64.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "trivy-0.64.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:trivy-0.64.1-1.1.x86_64" }, "product_reference": "trivy-0.64.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-53547", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-53547" } ], "notes": [ { "category": "general", "text": "Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, a specially crafted Chart.yaml file along with a specially linked Chart.lock file can lead to local code execution when dependencies are updated. Fields in a Chart.yaml file, that are carried over to a Chart.lock file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., a bash.rc file or shell script). If the Chart.lock file is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking. This issue has been resolved in Helm v3.18.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:trivy-0.64.1-1.1.aarch64", "openSUSE Tumbleweed:trivy-0.64.1-1.1.ppc64le", "openSUSE Tumbleweed:trivy-0.64.1-1.1.s390x", "openSUSE Tumbleweed:trivy-0.64.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-53547", "url": "https://www.suse.com/security/cve/CVE-2025-53547" }, { "category": "external", "summary": "SUSE Bug 1246150 for CVE-2025-53547", "url": "https://bugzilla.suse.com/1246150" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:trivy-0.64.1-1.1.aarch64", "openSUSE Tumbleweed:trivy-0.64.1-1.1.ppc64le", "openSUSE Tumbleweed:trivy-0.64.1-1.1.s390x", "openSUSE Tumbleweed:trivy-0.64.1-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:trivy-0.64.1-1.1.aarch64", "openSUSE Tumbleweed:trivy-0.64.1-1.1.ppc64le", "openSUSE Tumbleweed:trivy-0.64.1-1.1.s390x", "openSUSE Tumbleweed:trivy-0.64.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-11T00:00:00Z", "details": "important" } ], "title": "CVE-2025-53547" } ] }
rhsa-2025:16535
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for ztp-site-generate is available for Red Hat OpenShift Container Platform 4.19.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\nThis advisory contains the ztp-site-generate image for Red Hat OpenShift Container Platform 4.19.\nAll OpenShift Container Platform users are advised to upgrade to these updated packages and images.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:16535", "url": "https://access.redhat.com/errata/RHSA-2025:16535" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2025-53547", "url": "https://access.redhat.com/security/cve/CVE-2025-53547" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/", "url": "https://access.redhat.com/security/updates/classification/" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_16535.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.19 ztp-site-generate container", "tracking": { "current_release_date": "2025-09-23T21:11:17+00:00", "generator": { "date": "2025-09-23T21:11:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2025:16535", "initial_release_date": "2025-09-23T21:08:55+00:00", "revision_history": [ { "date": "2025-09-23T21:08:55+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-09-23T21:09:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-23T21:11:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.19", "product": { "name": "Red Hat OpenShift Container Platform 4.19", "product_id": "Red Hat OpenShift Container Platform 4.19", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.19::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Container Platform" }, { "branches": [ { "category": "product_version", "name": "registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:a26870f0981a8f939a0ec7e2cbf794f3f4b7121802474a79570bdb44e61e2a2a_amd64", "product": { "name": "registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:a26870f0981a8f939a0ec7e2cbf794f3f4b7121802474a79570bdb44e61e2a2a_amd64", "product_id": "registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:a26870f0981a8f939a0ec7e2cbf794f3f4b7121802474a79570bdb44e61e2a2a_amd64", "product_identification_helper": { "purl": "pkg:oci/ztp-site-generate-rhel8@sha256%3Aa26870f0981a8f939a0ec7e2cbf794f3f4b7121802474a79570bdb44e61e2a2a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:a26870f0981a8f939a0ec7e2cbf794f3f4b7121802474a79570bdb44e61e2a2a_amd64 as a component of Red Hat OpenShift Container Platform 4.19", "product_id": "Red Hat OpenShift Container Platform 4.19:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:a26870f0981a8f939a0ec7e2cbf794f3f4b7121802474a79570bdb44e61e2a2a_amd64" }, "product_reference": "registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:a26870f0981a8f939a0ec7e2cbf794f3f4b7121802474a79570bdb44e61e2a2a_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.19" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-53547", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2025-07-08T22:01:16.594090+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2378905" } ], "notes": [ { "category": "description", "text": "A command injection vulnerability has been identified in Helm, a package manager for Kubernetes. An attacker can craft a malicious Chart.yaml file with specially linked dependencies in a Chart.lock file. If the Chart.lock file is a symbolic link to an executable file, such as a shell script, and a user attempts to update the dependencies, the crafted content is written to the symlinked file and executed. This can lead to local code execution on the system. This issue has been patched in Helm version 3.18.4, and users should update to this version to mitigate the risk.", "title": "Vulnerability description" }, { "category": "summary", "text": "helm.sh/helm/v3: Helm Chart Code Execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Although GitOps ships Helm, this product is not vulnerable to this vulnerability as ArgoCD doesn\u0027t use helm dependency update. Additionally ArgoCD scans the whole repository searching for symbolic links that eventually points to a out of bounds destination, this later feature ensures ArgoCD is not vulnerable for this issue. Given this information ArgoCD won\u0027t be updated to pull a new version of Helm in other versions than the currently latest upstream one.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat OpenShift Container Platform 4.19:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:a26870f0981a8f939a0ec7e2cbf794f3f4b7121802474a79570bdb44e61e2a2a_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-53547" }, { "category": "external", "summary": "RHBZ#2378905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2378905" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-53547", "url": "https://www.cve.org/CVERecord?id=CVE-2025-53547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-53547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53547" }, { "category": "external", "summary": "https://github.com/helm/helm/commit/4b8e61093d8f579f1165cdc6bd4b43fa5455f571", "url": "https://github.com/helm/helm/commit/4b8e61093d8f579f1165cdc6bd4b43fa5455f571" }, { "category": "external", "summary": "https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm", "url": "https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm" } ], "release_date": "2025-07-08T21:39:59.075000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-09-23T21:08:55+00:00", "details": "For OpenShift Container Platform 4.19, see the following documentation for important instructions about upgrading your cluster and applying this asynchronous errata update:\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/release_notes/index\nInformation about accessing this content is available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html-single/updating_clusters/index#updating-cluster-cli", "product_ids": [ "Red Hat OpenShift Container Platform 4.19:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:a26870f0981a8f939a0ec7e2cbf794f3f4b7121802474a79570bdb44e61e2a2a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:16535" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat OpenShift Container Platform 4.19:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:a26870f0981a8f939a0ec7e2cbf794f3f4b7121802474a79570bdb44e61e2a2a_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.5, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat OpenShift Container Platform 4.19:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:a26870f0981a8f939a0ec7e2cbf794f3f4b7121802474a79570bdb44e61e2a2a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "helm.sh/helm/v3: Helm Chart Code Execution" } ] }
rhsa-2025:16530
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for ztp-site-generate is available for Red Hat OpenShift Container Platform 4.18.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\nThis advisory contains the ztp-site-generate image for Red Hat OpenShift Container Platform 4.18.\nAll OpenShift Container Platform users are advised to upgrade to these updated packages and images.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:16530", "url": "https://access.redhat.com/errata/RHSA-2025:16530" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2024-45339", "url": "https://access.redhat.com/security/cve/CVE-2024-45339" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2025-53547", "url": "https://access.redhat.com/security/cve/CVE-2025-53547" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/", "url": "https://access.redhat.com/security/updates/classification/" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_16530.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.18 ztp-site-generate container", "tracking": { "current_release_date": "2025-09-23T21:11:17+00:00", "generator": { "date": "2025-09-23T21:11:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2025:16530", "initial_release_date": "2025-09-23T21:00:41+00:00", "revision_history": [ { "date": "2025-09-23T21:00:41+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-09-23T21:00:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-23T21:11:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.18", "product": { "name": "Red Hat OpenShift Container Platform 4.18", "product_id": "Red Hat OpenShift Container Platform 4.18", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.18::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Container Platform" }, { "branches": [ { "category": "product_version", "name": "registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:0805f90c4a1bd0de2c2825865e1092c1568b01a97ed4a26a47283293d7fe9108_amd64", "product": { "name": "registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:0805f90c4a1bd0de2c2825865e1092c1568b01a97ed4a26a47283293d7fe9108_amd64", "product_id": "registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:0805f90c4a1bd0de2c2825865e1092c1568b01a97ed4a26a47283293d7fe9108_amd64", "product_identification_helper": { "purl": "pkg:oci/ztp-site-generate-rhel8@sha256%3A0805f90c4a1bd0de2c2825865e1092c1568b01a97ed4a26a47283293d7fe9108?arch=amd64\u0026repository_url=registry.redhat.io/openshift4" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:0805f90c4a1bd0de2c2825865e1092c1568b01a97ed4a26a47283293d7fe9108_amd64 as a component of Red Hat OpenShift Container Platform 4.18", "product_id": "Red Hat OpenShift Container Platform 4.18:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:0805f90c4a1bd0de2c2825865e1092c1568b01a97ed4a26a47283293d7fe9108_amd64" }, "product_reference": "registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:0805f90c4a1bd0de2c2825865e1092c1568b01a97ed4a26a47283293d7fe9108_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.18" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45339", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "discovery_date": "2025-01-28T02:00:48.029971+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2342463" } ], "notes": [ { "category": "description", "text": "A flaw was found in glog, a logging library. This vulnerability allows an unprivileged attacker to overwrite sensitive files via a symbolic link planted in a widely writable directory, exploiting the log file path predictability.", "title": "Vulnerability description" }, { "category": "summary", "text": "github.com/golang/glog: Vulnerability when creating log files in github.com/golang/glog", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat OpenShift Container Platform 4.18:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:0805f90c4a1bd0de2c2825865e1092c1568b01a97ed4a26a47283293d7fe9108_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-45339" }, { "category": "external", "summary": "RHBZ#2342463", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2342463" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-45339", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45339" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45339", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45339" }, { "category": "external", "summary": "https://github.com/golang/glog/pull/74", "url": "https://github.com/golang/glog/pull/74" }, { "category": "external", "summary": "https://github.com/golang/glog/pull/74/commits/b8741656e406e66d6992bc2c9575e460ecaa0ec2", "url": "https://github.com/golang/glog/pull/74/commits/b8741656e406e66d6992bc2c9575e460ecaa0ec2" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/H-Q4ouHWyKs", "url": "https://groups.google.com/g/golang-announce/c/H-Q4ouHWyKs" }, { "category": "external", "summary": "https://owasp.org/www-community/vulnerabilities/Insecure_Temporary_File", "url": "https://owasp.org/www-community/vulnerabilities/Insecure_Temporary_File" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2025-3372", "url": "https://pkg.go.dev/vuln/GO-2025-3372" } ], "release_date": "2025-01-28T01:03:24.105000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-09-23T21:00:41+00:00", "details": "For OpenShift Container Platform 4.18, see the following documentation for important instructions about upgrading your cluster and applying this asynchronous errata update:\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html/release_notes/index\nInformation about accessing this content is available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html-single/updating_clusters/index#updating-cluster-cli", "product_ids": [ "Red Hat OpenShift Container Platform 4.18:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:0805f90c4a1bd0de2c2825865e1092c1568b01a97ed4a26a47283293d7fe9108_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:16530" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat OpenShift Container Platform 4.18:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:0805f90c4a1bd0de2c2825865e1092c1568b01a97ed4a26a47283293d7fe9108_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat OpenShift Container Platform 4.18:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:0805f90c4a1bd0de2c2825865e1092c1568b01a97ed4a26a47283293d7fe9108_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "github.com/golang/glog: Vulnerability when creating log files in github.com/golang/glog" }, { "cve": "CVE-2025-53547", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2025-07-08T22:01:16.594090+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2378905" } ], "notes": [ { "category": "description", "text": "A command injection vulnerability has been identified in Helm, a package manager for Kubernetes. An attacker can craft a malicious Chart.yaml file with specially linked dependencies in a Chart.lock file. If the Chart.lock file is a symbolic link to an executable file, such as a shell script, and a user attempts to update the dependencies, the crafted content is written to the symlinked file and executed. This can lead to local code execution on the system. This issue has been patched in Helm version 3.18.4, and users should update to this version to mitigate the risk.", "title": "Vulnerability description" }, { "category": "summary", "text": "helm.sh/helm/v3: Helm Chart Code Execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Although GitOps ships Helm, this product is not vulnerable to this vulnerability as ArgoCD doesn\u0027t use helm dependency update. Additionally ArgoCD scans the whole repository searching for symbolic links that eventually points to a out of bounds destination, this later feature ensures ArgoCD is not vulnerable for this issue. Given this information ArgoCD won\u0027t be updated to pull a new version of Helm in other versions than the currently latest upstream one.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat OpenShift Container Platform 4.18:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:0805f90c4a1bd0de2c2825865e1092c1568b01a97ed4a26a47283293d7fe9108_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-53547" }, { "category": "external", "summary": "RHBZ#2378905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2378905" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-53547", "url": "https://www.cve.org/CVERecord?id=CVE-2025-53547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-53547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53547" }, { "category": "external", "summary": "https://github.com/helm/helm/commit/4b8e61093d8f579f1165cdc6bd4b43fa5455f571", "url": "https://github.com/helm/helm/commit/4b8e61093d8f579f1165cdc6bd4b43fa5455f571" }, { "category": "external", "summary": "https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm", "url": "https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm" } ], "release_date": "2025-07-08T21:39:59.075000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-09-23T21:00:41+00:00", "details": "For OpenShift Container Platform 4.18, see the following documentation for important instructions about upgrading your cluster and applying this asynchronous errata update:\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html/release_notes/index\nInformation about accessing this content is available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html-single/updating_clusters/index#updating-cluster-cli", "product_ids": [ "Red Hat OpenShift Container Platform 4.18:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:0805f90c4a1bd0de2c2825865e1092c1568b01a97ed4a26a47283293d7fe9108_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:16530" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat OpenShift Container Platform 4.18:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:0805f90c4a1bd0de2c2825865e1092c1568b01a97ed4a26a47283293d7fe9108_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.5, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat OpenShift Container Platform 4.18:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:0805f90c4a1bd0de2c2825865e1092c1568b01a97ed4a26a47283293d7fe9108_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "helm.sh/helm/v3: Helm Chart Code Execution" } ] }
rhsa-2025:16527
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for ztp-site-generate is available for Red Hat OpenShift Container Platform 4.16.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\nThis advisory contains the ztp-site-generate image for Red Hat OpenShift Container Platform 4.16.\nAll OpenShift Container Platform users are advised to upgrade to these updated packages and images.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:16527", "url": "https://access.redhat.com/errata/RHSA-2025:16527" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2024-45339", "url": "https://access.redhat.com/security/cve/CVE-2024-45339" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2025-53547", "url": "https://access.redhat.com/security/cve/CVE-2025-53547" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/", "url": "https://access.redhat.com/security/updates/classification/" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_16527.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.16 ztp-site-generate container", "tracking": { "current_release_date": "2025-09-23T21:11:15+00:00", "generator": { "date": "2025-09-23T21:11:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2025:16527", "initial_release_date": "2025-09-23T20:37:14+00:00", "revision_history": [ { "date": "2025-09-23T20:37:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-09-23T20:37:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-23T21:11:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.16", "product": { "name": "Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.16::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Container Platform" }, { "branches": [ { "category": "product_version", "name": "registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:380bf78c3effa9d716ded177f82246e456613ccfb27c7a75ddcdfa6426459fe8_amd64", "product": { "name": "registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:380bf78c3effa9d716ded177f82246e456613ccfb27c7a75ddcdfa6426459fe8_amd64", "product_id": "registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:380bf78c3effa9d716ded177f82246e456613ccfb27c7a75ddcdfa6426459fe8_amd64", "product_identification_helper": { "purl": "pkg:oci/ztp-site-generate-rhel8@sha256%3A380bf78c3effa9d716ded177f82246e456613ccfb27c7a75ddcdfa6426459fe8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:380bf78c3effa9d716ded177f82246e456613ccfb27c7a75ddcdfa6426459fe8_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:380bf78c3effa9d716ded177f82246e456613ccfb27c7a75ddcdfa6426459fe8_amd64" }, "product_reference": "registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:380bf78c3effa9d716ded177f82246e456613ccfb27c7a75ddcdfa6426459fe8_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45339", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "discovery_date": "2025-01-28T02:00:48.029971+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2342463" } ], "notes": [ { "category": "description", "text": "A flaw was found in glog, a logging library. This vulnerability allows an unprivileged attacker to overwrite sensitive files via a symbolic link planted in a widely writable directory, exploiting the log file path predictability.", "title": "Vulnerability description" }, { "category": "summary", "text": "github.com/golang/glog: Vulnerability when creating log files in github.com/golang/glog", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:380bf78c3effa9d716ded177f82246e456613ccfb27c7a75ddcdfa6426459fe8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-45339" }, { "category": "external", "summary": "RHBZ#2342463", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2342463" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-45339", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45339" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45339", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45339" }, { "category": "external", "summary": "https://github.com/golang/glog/pull/74", "url": "https://github.com/golang/glog/pull/74" }, { "category": "external", "summary": "https://github.com/golang/glog/pull/74/commits/b8741656e406e66d6992bc2c9575e460ecaa0ec2", "url": "https://github.com/golang/glog/pull/74/commits/b8741656e406e66d6992bc2c9575e460ecaa0ec2" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/H-Q4ouHWyKs", "url": "https://groups.google.com/g/golang-announce/c/H-Q4ouHWyKs" }, { "category": "external", "summary": "https://owasp.org/www-community/vulnerabilities/Insecure_Temporary_File", "url": "https://owasp.org/www-community/vulnerabilities/Insecure_Temporary_File" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2025-3372", "url": "https://pkg.go.dev/vuln/GO-2025-3372" } ], "release_date": "2025-01-28T01:03:24.105000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-09-23T20:37:14+00:00", "details": "For OpenShift Container Platform 4.16, see the following documentation for important instructions about upgrading your cluster and applying this asynchronous errata update:\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.16/html/release_notes/index\nInformation about accessing this content is available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.16/html-single/updating_clusters/index#updating-cluster-cli", "product_ids": [ "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:380bf78c3effa9d716ded177f82246e456613ccfb27c7a75ddcdfa6426459fe8_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:16527" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:380bf78c3effa9d716ded177f82246e456613ccfb27c7a75ddcdfa6426459fe8_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:380bf78c3effa9d716ded177f82246e456613ccfb27c7a75ddcdfa6426459fe8_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "github.com/golang/glog: Vulnerability when creating log files in github.com/golang/glog" }, { "cve": "CVE-2025-53547", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2025-07-08T22:01:16.594090+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2378905" } ], "notes": [ { "category": "description", "text": "A command injection vulnerability has been identified in Helm, a package manager for Kubernetes. An attacker can craft a malicious Chart.yaml file with specially linked dependencies in a Chart.lock file. If the Chart.lock file is a symbolic link to an executable file, such as a shell script, and a user attempts to update the dependencies, the crafted content is written to the symlinked file and executed. This can lead to local code execution on the system. This issue has been patched in Helm version 3.18.4, and users should update to this version to mitigate the risk.", "title": "Vulnerability description" }, { "category": "summary", "text": "helm.sh/helm/v3: Helm Chart Code Execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Although GitOps ships Helm, this product is not vulnerable to this vulnerability as ArgoCD doesn\u0027t use helm dependency update. Additionally ArgoCD scans the whole repository searching for symbolic links that eventually points to a out of bounds destination, this later feature ensures ArgoCD is not vulnerable for this issue. Given this information ArgoCD won\u0027t be updated to pull a new version of Helm in other versions than the currently latest upstream one.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:380bf78c3effa9d716ded177f82246e456613ccfb27c7a75ddcdfa6426459fe8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-53547" }, { "category": "external", "summary": "RHBZ#2378905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2378905" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-53547", "url": "https://www.cve.org/CVERecord?id=CVE-2025-53547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-53547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53547" }, { "category": "external", "summary": "https://github.com/helm/helm/commit/4b8e61093d8f579f1165cdc6bd4b43fa5455f571", "url": "https://github.com/helm/helm/commit/4b8e61093d8f579f1165cdc6bd4b43fa5455f571" }, { "category": "external", "summary": "https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm", "url": "https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm" } ], "release_date": "2025-07-08T21:39:59.075000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-09-23T20:37:14+00:00", "details": "For OpenShift Container Platform 4.16, see the following documentation for important instructions about upgrading your cluster and applying this asynchronous errata update:\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.16/html/release_notes/index\nInformation about accessing this content is available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.16/html-single/updating_clusters/index#updating-cluster-cli", "product_ids": [ "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:380bf78c3effa9d716ded177f82246e456613ccfb27c7a75ddcdfa6426459fe8_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:16527" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:380bf78c3effa9d716ded177f82246e456613ccfb27c7a75ddcdfa6426459fe8_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.5, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:380bf78c3effa9d716ded177f82246e456613ccfb27c7a75ddcdfa6426459fe8_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "helm.sh/helm/v3: Helm Chart Code Execution" } ] }
rhsa-2025:16529
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for ztp-site-generate is available for Red Hat OpenShift Container Platform 4.17.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\nThis advisory contains the ztp-site-generate image for Red Hat OpenShift Container Platform 4.17.\nAll OpenShift Container Platform users are advised to upgrade to these updated packages and images.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:16529", "url": "https://access.redhat.com/errata/RHSA-2025:16529" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2024-45339", "url": "https://access.redhat.com/security/cve/CVE-2024-45339" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2025-53547", "url": "https://access.redhat.com/security/cve/CVE-2025-53547" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/", "url": "https://access.redhat.com/security/updates/classification/" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_16529.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.17 ztp-site-generate container", "tracking": { "current_release_date": "2025-09-23T21:11:15+00:00", "generator": { "date": "2025-09-23T21:11:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2025:16529", "initial_release_date": "2025-09-23T20:50:52+00:00", "revision_history": [ { "date": "2025-09-23T20:50:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-09-23T20:51:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-23T21:11:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.17", "product": { "name": "Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.17::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Container Platform" }, { "branches": [ { "category": "product_version", "name": "registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:d81f6e3975f5cf326cbaf3fff41774f2f4e70dedb7aada0c73053a638251c16a_amd64", "product": { "name": "registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:d81f6e3975f5cf326cbaf3fff41774f2f4e70dedb7aada0c73053a638251c16a_amd64", "product_id": "registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:d81f6e3975f5cf326cbaf3fff41774f2f4e70dedb7aada0c73053a638251c16a_amd64", "product_identification_helper": { "purl": "pkg:oci/ztp-site-generate-rhel8@sha256%3Ad81f6e3975f5cf326cbaf3fff41774f2f4e70dedb7aada0c73053a638251c16a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:d81f6e3975f5cf326cbaf3fff41774f2f4e70dedb7aada0c73053a638251c16a_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:d81f6e3975f5cf326cbaf3fff41774f2f4e70dedb7aada0c73053a638251c16a_amd64" }, "product_reference": "registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:d81f6e3975f5cf326cbaf3fff41774f2f4e70dedb7aada0c73053a638251c16a_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45339", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "discovery_date": "2025-01-28T02:00:48.029971+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2342463" } ], "notes": [ { "category": "description", "text": "A flaw was found in glog, a logging library. This vulnerability allows an unprivileged attacker to overwrite sensitive files via a symbolic link planted in a widely writable directory, exploiting the log file path predictability.", "title": "Vulnerability description" }, { "category": "summary", "text": "github.com/golang/glog: Vulnerability when creating log files in github.com/golang/glog", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:d81f6e3975f5cf326cbaf3fff41774f2f4e70dedb7aada0c73053a638251c16a_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-45339" }, { "category": "external", "summary": "RHBZ#2342463", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2342463" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-45339", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45339" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45339", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45339" }, { "category": "external", "summary": "https://github.com/golang/glog/pull/74", "url": "https://github.com/golang/glog/pull/74" }, { "category": "external", "summary": "https://github.com/golang/glog/pull/74/commits/b8741656e406e66d6992bc2c9575e460ecaa0ec2", "url": "https://github.com/golang/glog/pull/74/commits/b8741656e406e66d6992bc2c9575e460ecaa0ec2" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/H-Q4ouHWyKs", "url": "https://groups.google.com/g/golang-announce/c/H-Q4ouHWyKs" }, { "category": "external", "summary": "https://owasp.org/www-community/vulnerabilities/Insecure_Temporary_File", "url": "https://owasp.org/www-community/vulnerabilities/Insecure_Temporary_File" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2025-3372", "url": "https://pkg.go.dev/vuln/GO-2025-3372" } ], "release_date": "2025-01-28T01:03:24.105000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-09-23T20:50:52+00:00", "details": "For OpenShift Container Platform 4.17, see the following documentation for important instructions about upgrading your cluster and applying this asynchronous errata update:\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.17/html/release_notes/index\nInformation about accessing this content is available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.17/html-single/updating_clusters/index#updating-cluster-cli", "product_ids": [ "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:d81f6e3975f5cf326cbaf3fff41774f2f4e70dedb7aada0c73053a638251c16a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:16529" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:d81f6e3975f5cf326cbaf3fff41774f2f4e70dedb7aada0c73053a638251c16a_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:d81f6e3975f5cf326cbaf3fff41774f2f4e70dedb7aada0c73053a638251c16a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "github.com/golang/glog: Vulnerability when creating log files in github.com/golang/glog" }, { "cve": "CVE-2025-53547", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2025-07-08T22:01:16.594090+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2378905" } ], "notes": [ { "category": "description", "text": "A command injection vulnerability has been identified in Helm, a package manager for Kubernetes. An attacker can craft a malicious Chart.yaml file with specially linked dependencies in a Chart.lock file. If the Chart.lock file is a symbolic link to an executable file, such as a shell script, and a user attempts to update the dependencies, the crafted content is written to the symlinked file and executed. This can lead to local code execution on the system. This issue has been patched in Helm version 3.18.4, and users should update to this version to mitigate the risk.", "title": "Vulnerability description" }, { "category": "summary", "text": "helm.sh/helm/v3: Helm Chart Code Execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Although GitOps ships Helm, this product is not vulnerable to this vulnerability as ArgoCD doesn\u0027t use helm dependency update. Additionally ArgoCD scans the whole repository searching for symbolic links that eventually points to a out of bounds destination, this later feature ensures ArgoCD is not vulnerable for this issue. Given this information ArgoCD won\u0027t be updated to pull a new version of Helm in other versions than the currently latest upstream one.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:d81f6e3975f5cf326cbaf3fff41774f2f4e70dedb7aada0c73053a638251c16a_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-53547" }, { "category": "external", "summary": "RHBZ#2378905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2378905" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-53547", "url": "https://www.cve.org/CVERecord?id=CVE-2025-53547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-53547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53547" }, { "category": "external", "summary": "https://github.com/helm/helm/commit/4b8e61093d8f579f1165cdc6bd4b43fa5455f571", "url": "https://github.com/helm/helm/commit/4b8e61093d8f579f1165cdc6bd4b43fa5455f571" }, { "category": "external", "summary": "https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm", "url": "https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm" } ], "release_date": "2025-07-08T21:39:59.075000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-09-23T20:50:52+00:00", "details": "For OpenShift Container Platform 4.17, see the following documentation for important instructions about upgrading your cluster and applying this asynchronous errata update:\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.17/html/release_notes/index\nInformation about accessing this content is available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.17/html-single/updating_clusters/index#updating-cluster-cli", "product_ids": [ "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:d81f6e3975f5cf326cbaf3fff41774f2f4e70dedb7aada0c73053a638251c16a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:16529" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:d81f6e3975f5cf326cbaf3fff41774f2f4e70dedb7aada0c73053a638251c16a_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.5, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:d81f6e3975f5cf326cbaf3fff41774f2f4e70dedb7aada0c73053a638251c16a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "helm.sh/helm/v3: Helm Chart Code Execution" } ] }
rhsa-2025:16526
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for ztp-site-generate is available for Red Hat OpenShift Container Platform 4.14.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\nThis advisory contains the ztp-site-generate image for Red Hat OpenShift Container Platform 4.14.\nAll OpenShift Container Platform users are advised to upgrade to these updated packages and images.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:16526", "url": "https://access.redhat.com/errata/RHSA-2025:16526" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2024-45339", "url": "https://access.redhat.com/security/cve/CVE-2024-45339" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2025-53547", "url": "https://access.redhat.com/security/cve/CVE-2025-53547" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/", "url": "https://access.redhat.com/security/updates/classification/" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_16526.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.14 ztp-site-generate container", "tracking": { "current_release_date": "2025-09-23T21:11:15+00:00", "generator": { "date": "2025-09-23T21:11:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2025:16526", "initial_release_date": "2025-09-23T19:55:07+00:00", "revision_history": [ { "date": "2025-09-23T19:55:07+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-09-23T19:55:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-23T21:11:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.14", "product": { "name": "Red Hat OpenShift Container Platform 4.14", "product_id": "Red Hat OpenShift Container Platform 4.14", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.14::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Container Platform" }, { "branches": [ { "category": "product_version", "name": "registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:6f2a3800843763cf34d412bfcdba4a8e4cdc6d48b5444b7bdf85a0d4fe412c19_amd64", "product": { "name": "registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:6f2a3800843763cf34d412bfcdba4a8e4cdc6d48b5444b7bdf85a0d4fe412c19_amd64", "product_id": "registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:6f2a3800843763cf34d412bfcdba4a8e4cdc6d48b5444b7bdf85a0d4fe412c19_amd64", "product_identification_helper": { "purl": "pkg:oci/ztp-site-generate-rhel8@sha256%3A6f2a3800843763cf34d412bfcdba4a8e4cdc6d48b5444b7bdf85a0d4fe412c19?arch=amd64\u0026repository_url=registry.redhat.io/openshift4" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:6f2a3800843763cf34d412bfcdba4a8e4cdc6d48b5444b7bdf85a0d4fe412c19_amd64 as a component of Red Hat OpenShift Container Platform 4.14", "product_id": "Red Hat OpenShift Container Platform 4.14:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:6f2a3800843763cf34d412bfcdba4a8e4cdc6d48b5444b7bdf85a0d4fe412c19_amd64" }, "product_reference": "registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:6f2a3800843763cf34d412bfcdba4a8e4cdc6d48b5444b7bdf85a0d4fe412c19_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.14" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45339", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "discovery_date": "2025-01-28T02:00:48.029971+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2342463" } ], "notes": [ { "category": "description", "text": "A flaw was found in glog, a logging library. This vulnerability allows an unprivileged attacker to overwrite sensitive files via a symbolic link planted in a widely writable directory, exploiting the log file path predictability.", "title": "Vulnerability description" }, { "category": "summary", "text": "github.com/golang/glog: Vulnerability when creating log files in github.com/golang/glog", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat OpenShift Container Platform 4.14:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:6f2a3800843763cf34d412bfcdba4a8e4cdc6d48b5444b7bdf85a0d4fe412c19_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-45339" }, { "category": "external", "summary": "RHBZ#2342463", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2342463" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-45339", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45339" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45339", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45339" }, { "category": "external", "summary": "https://github.com/golang/glog/pull/74", "url": "https://github.com/golang/glog/pull/74" }, { "category": "external", "summary": "https://github.com/golang/glog/pull/74/commits/b8741656e406e66d6992bc2c9575e460ecaa0ec2", "url": "https://github.com/golang/glog/pull/74/commits/b8741656e406e66d6992bc2c9575e460ecaa0ec2" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/H-Q4ouHWyKs", "url": "https://groups.google.com/g/golang-announce/c/H-Q4ouHWyKs" }, { "category": "external", "summary": "https://owasp.org/www-community/vulnerabilities/Insecure_Temporary_File", "url": "https://owasp.org/www-community/vulnerabilities/Insecure_Temporary_File" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2025-3372", "url": "https://pkg.go.dev/vuln/GO-2025-3372" } ], "release_date": "2025-01-28T01:03:24.105000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-09-23T19:55:07+00:00", "details": "For OpenShift Container Platform 4.14, see the following documentation for important instructions about upgrading your cluster and applying this asynchronous errata update:\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.14/html/release_notes/index\nInformation about accessing this content is available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.14/html-single/updating_clusters/index#updating-cluster-cli", "product_ids": [ "Red Hat OpenShift Container Platform 4.14:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:6f2a3800843763cf34d412bfcdba4a8e4cdc6d48b5444b7bdf85a0d4fe412c19_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:16526" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat OpenShift Container Platform 4.14:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:6f2a3800843763cf34d412bfcdba4a8e4cdc6d48b5444b7bdf85a0d4fe412c19_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat OpenShift Container Platform 4.14:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:6f2a3800843763cf34d412bfcdba4a8e4cdc6d48b5444b7bdf85a0d4fe412c19_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "github.com/golang/glog: Vulnerability when creating log files in github.com/golang/glog" }, { "cve": "CVE-2025-53547", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2025-07-08T22:01:16.594090+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2378905" } ], "notes": [ { "category": "description", "text": "A command injection vulnerability has been identified in Helm, a package manager for Kubernetes. An attacker can craft a malicious Chart.yaml file with specially linked dependencies in a Chart.lock file. If the Chart.lock file is a symbolic link to an executable file, such as a shell script, and a user attempts to update the dependencies, the crafted content is written to the symlinked file and executed. This can lead to local code execution on the system. This issue has been patched in Helm version 3.18.4, and users should update to this version to mitigate the risk.", "title": "Vulnerability description" }, { "category": "summary", "text": "helm.sh/helm/v3: Helm Chart Code Execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Although GitOps ships Helm, this product is not vulnerable to this vulnerability as ArgoCD doesn\u0027t use helm dependency update. Additionally ArgoCD scans the whole repository searching for symbolic links that eventually points to a out of bounds destination, this later feature ensures ArgoCD is not vulnerable for this issue. Given this information ArgoCD won\u0027t be updated to pull a new version of Helm in other versions than the currently latest upstream one.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat OpenShift Container Platform 4.14:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:6f2a3800843763cf34d412bfcdba4a8e4cdc6d48b5444b7bdf85a0d4fe412c19_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-53547" }, { "category": "external", "summary": "RHBZ#2378905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2378905" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-53547", "url": "https://www.cve.org/CVERecord?id=CVE-2025-53547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-53547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53547" }, { "category": "external", "summary": "https://github.com/helm/helm/commit/4b8e61093d8f579f1165cdc6bd4b43fa5455f571", "url": "https://github.com/helm/helm/commit/4b8e61093d8f579f1165cdc6bd4b43fa5455f571" }, { "category": "external", "summary": "https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm", "url": "https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm" } ], "release_date": "2025-07-08T21:39:59.075000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-09-23T19:55:07+00:00", "details": "For OpenShift Container Platform 4.14, see the following documentation for important instructions about upgrading your cluster and applying this asynchronous errata update:\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.14/html/release_notes/index\nInformation about accessing this content is available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.14/html-single/updating_clusters/index#updating-cluster-cli", "product_ids": [ "Red Hat OpenShift Container Platform 4.14:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:6f2a3800843763cf34d412bfcdba4a8e4cdc6d48b5444b7bdf85a0d4fe412c19_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:16526" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat OpenShift Container Platform 4.14:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:6f2a3800843763cf34d412bfcdba4a8e4cdc6d48b5444b7bdf85a0d4fe412c19_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.5, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat OpenShift Container Platform 4.14:registry.redhat.io/openshift4/ztp-site-generate-rhel8@sha256:6f2a3800843763cf34d412bfcdba4a8e4cdc6d48b5444b7bdf85a0d4fe412c19_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "helm.sh/helm/v3: Helm Chart Code Execution" } ] }
rhsa-2025:15681
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.16.48 is now available with updates to packages and images that fix several bugs.\nThis release includes a security update for Red Hat OpenShift Container Platform 4.16.\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\nThis advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.16.48. See the following advisory for the container images for this release:\nhttps://access.redhat.com/errata/RHSA-2025:15680\nSecurity Fix(es):\n* helm.sh/helm/v3: Helm Chart Code Execution (CVE-2025-53547)\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\nAll OpenShift Container Platform 4.16 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.16/html-single/updating_clusters/index#updating-cluster-cli.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:15681", "url": "https://access.redhat.com/errata/RHSA-2025:15681" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2025-53547", "url": "https://access.redhat.com/security/cve/CVE-2025-53547" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/", "url": "https://access.redhat.com/security/updates/classification/" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_15681.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.16.48 security and extras update", "tracking": { "current_release_date": "2025-09-23T21:11:15+00:00", "generator": { "date": "2025-09-23T21:11:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2025:15681", "initial_release_date": "2025-09-17T10:36:08+00:00", "revision_history": [ { "date": "2025-09-17T10:36:08+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-09-17T10:36:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-23T21:11:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.16", "product": { "name": "Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.16::el9" } } } ], "category": "product_family", "name": "Red Hat OpenShift Container Platform" }, { "branches": [ { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel9@sha256:cac8993111e08298dd1ca1b89849bf2f3f9b949bcced3e0825609090b696c802_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel9@sha256:cac8993111e08298dd1ca1b89849bf2f3f9b949bcced3e0825609090b696c802_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel9@sha256:cac8993111e08298dd1ca1b89849bf2f3f9b949bcced3e0825609090b696c802_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cloud-event-proxy-rhel9@sha256%3Acac8993111e08298dd1ca1b89849bf2f3f9b949bcced3e0825609090b696c802?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=cloud-event-proxy-container-v4.16.0-202509091828.p2.gf9eec98.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:d1ff2edac26d849780c0f6e99921532adc1fc4b44fabff26582af614501bc8e1_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:d1ff2edac26d849780c0f6e99921532adc1fc4b44fabff26582af614501bc8e1_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:d1ff2edac26d849780c0f6e99921532adc1fc4b44fabff26582af614501bc8e1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel9@sha256%3Ad1ff2edac26d849780c0f6e99921532adc1fc4b44fabff26582af614501bc8e1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-clusterresourceoverride-container-v4.16.0-202509091828.p2.g8c0f21c.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:59ca3dca3ca786655f35fd0557ac7f175cfcdfc852547ac0e206d6be8663a0d9_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:59ca3dca3ca786655f35fd0557ac7f175cfcdfc852547ac0e206d6be8663a0d9_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:59ca3dca3ca786655f35fd0557ac7f175cfcdfc852547ac0e206d6be8663a0d9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel9-operator@sha256%3A59ca3dca3ca786655f35fd0557ac7f175cfcdfc852547ac0e206d6be8663a0d9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-clusterresourceoverride-operator-container-v4.16.0-202509091828.p2.gd73e630.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:9d978eecceda23a2130c64350fe9f99089fba921860b94254b0a344a7c9c4b5d_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:9d978eecceda23a2130c64350fe9f99089fba921860b94254b0a344a7c9c4b5d_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:9d978eecceda23a2130c64350fe9f99089fba921860b94254b0a344a7c9c4b5d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-dpu-cni-rhel9@sha256%3A9d978eecceda23a2130c64350fe9f99089fba921860b94254b0a344a7c9c4b5d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=dpu-cni-container-v4.16.0-202509091828.p2.g62b1a32.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:fd71deec1b26f2ac3d3f8776fb2a8a206d086afb41f95ac4471041c7e152f273_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:fd71deec1b26f2ac3d3f8776fb2a8a206d086afb41f95ac4471041c7e152f273_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:fd71deec1b26f2ac3d3f8776fb2a8a206d086afb41f95ac4471041c7e152f273_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-dpu-daemon-rhel9@sha256%3Afd71deec1b26f2ac3d3f8776fb2a8a206d086afb41f95ac4471041c7e152f273?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=dpu-daemon-container-v4.16.0-202509091828.p2.g62b1a32.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:0a73e7209bf930eb33a57bd93eb08769ea3c74c2214d9c4875ed4167b84c86e9_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:0a73e7209bf930eb33a57bd93eb08769ea3c74c2214d9c4875ed4167b84c86e9_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:0a73e7209bf930eb33a57bd93eb08769ea3c74c2214d9c4875ed4167b84c86e9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-dpu-rhel9-operator@sha256%3A0a73e7209bf930eb33a57bd93eb08769ea3c74c2214d9c4875ed4167b84c86e9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=dpu-operator-container-v4.16.0-202509091828.p2.g62b1a32.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-sriov-infiniband-cni-rhel9@sha256:f80b9428b0a79280590cc1b7406cdde67d8fea55b249c6700cbbd9bb226b0095_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-sriov-infiniband-cni-rhel9@sha256:f80b9428b0a79280590cc1b7406cdde67d8fea55b249c6700cbbd9bb226b0095_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-sriov-infiniband-cni-rhel9@sha256:f80b9428b0a79280590cc1b7406cdde67d8fea55b249c6700cbbd9bb226b0095_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-infiniband-cni-rhel9@sha256%3Af80b9428b0a79280590cc1b7406cdde67d8fea55b249c6700cbbd9bb226b0095?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ib-sriov-cni-container-v4.16.0-202509091828.p2.gd44f069.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:4a0808cb4bcdc71c56524b8df2ea1bca7fd79ce07885fbc501a0e866a48f0c1f_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:4a0808cb4bcdc71c56524b8df2ea1bca7fd79ce07885fbc501a0e866a48f0c1f_ppc64le", "product_id": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:4a0808cb4bcdc71c56524b8df2ea1bca7fd79ce07885fbc501a0e866a48f0c1f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall-rhel9@sha256%3A4a0808cb4bcdc71c56524b8df2ea1bca7fd79ce07885fbc501a0e866a48f0c1f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ingress-node-firewall-daemon-container-v4.16.0-202509091828.p2.gd214d48.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:4db405877680fc217556538e6eb50ced781b1b03fc5cdc1ca8ff675d02e2b759_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:4db405877680fc217556538e6eb50ced781b1b03fc5cdc1ca8ff675d02e2b759_ppc64le", "product_id": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:4db405877680fc217556538e6eb50ced781b1b03fc5cdc1ca8ff675d02e2b759_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall-rhel9-operator@sha256%3A4db405877680fc217556538e6eb50ced781b1b03fc5cdc1ca8ff675d02e2b759?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ingress-node-firewall-operator-container-v4.16.0-202509091828.p2.gd214d48.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:25743b3b058ae4d006ed74eddd84fcdc75ed7f18d6cf8d60399c65ad4aff377a_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:25743b3b058ae4d006ed74eddd84fcdc75ed7f18d6cf8d60399c65ad4aff377a_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:25743b3b058ae4d006ed74eddd84fcdc75ed7f18d6cf8d60399c65ad4aff377a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ptp-rhel9@sha256%3A25743b3b058ae4d006ed74eddd84fcdc75ed7f18d6cf8d60399c65ad4aff377a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-linuxptp-daemon-container-v4.16.0-202509091828.p2.gb2a719c.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:6f9835d2178c06fc53f11824b57c399a8888496bcc1b529da222716ec07241b6_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:6f9835d2178c06fc53f11824b57c399a8888496bcc1b529da222716ec07241b6_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:6f9835d2178c06fc53f11824b57c399a8888496bcc1b529da222716ec07241b6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-diskmaker-rhel9@sha256%3A6f9835d2178c06fc53f11824b57c399a8888496bcc1b529da222716ec07241b6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=local-storage-diskmaker-container-v4.16.0-202509091828.p2.gb0273c5.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:b6f6f3a769b97d1b17cc8e329d13ba41c4abf4ba33f313b3f265640438689e66_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:b6f6f3a769b97d1b17cc8e329d13ba41c4abf4ba33f313b3f265640438689e66_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:b6f6f3a769b97d1b17cc8e329d13ba41c4abf4ba33f313b3f265640438689e66_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-mustgather-rhel9@sha256%3Ab6f6f3a769b97d1b17cc8e329d13ba41c4abf4ba33f313b3f265640438689e66?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-local-storage-mustgather-container-v4.16.0-202509091828.p2.gb0273c5.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:d6ead7d1536e82d6d1f8d1cf9073a634975dcb4310ad37e9d9a4d5ece31c1437_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:d6ead7d1536e82d6d1f8d1cf9073a634975dcb4310ad37e9d9a4d5ece31c1437_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:d6ead7d1536e82d6d1f8d1cf9073a634975dcb4310ad37e9d9a4d5ece31c1437_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-rhel9-operator@sha256%3Ad6ead7d1536e82d6d1f8d1cf9073a634975dcb4310ad37e9d9a4d5ece31c1437?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=local-storage-operator-container-v4.16.0-202509091828.p2.gb0273c5.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:c01786e1970d1e03ab2a0bd529e336cfa8934d6bd138932bb72ed75850ced097_ppc64le", "product": { "name": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:c01786e1970d1e03ab2a0bd529e336cfa8934d6bd138932bb72ed75850ced097_ppc64le", "product_id": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:c01786e1970d1e03ab2a0bd529e336cfa8934d6bd138932bb72ed75850ced097_ppc64le", "product_identification_helper": { "purl": "pkg:oci/nmstate-console-plugin-rhel9@sha256%3Ac01786e1970d1e03ab2a0bd529e336cfa8934d6bd138932bb72ed75850ced097?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=nmstate-console-plugin-container-v4.16.0-202509101329.p2.gc538911.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:044d243c04c5bc65cba10b807cc8ea5e01e535dddaeb9d704e653ece61f18466_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:044d243c04c5bc65cba10b807cc8ea5e01e535dddaeb9d704e653ece61f18466_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:044d243c04c5bc65cba10b807cc8ea5e01e535dddaeb9d704e653ece61f18466_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-node-feature-discovery-rhel9@sha256%3A044d243c04c5bc65cba10b807cc8ea5e01e535dddaeb9d704e653ece61f18466?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=node-feature-discovery-container-v4.16.0-202509091828.p2.gcb614ca.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:58f3b0d48ae9195c00580db9350a7cae0de13cc2349ba5f922238cadb996b283_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:58f3b0d48ae9195c00580db9350a7cae0de13cc2349ba5f922238cadb996b283_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:58f3b0d48ae9195c00580db9350a7cae0de13cc2349ba5f922238cadb996b283_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ansible-rhel9-operator@sha256%3A58f3b0d48ae9195c00580db9350a7cae0de13cc2349ba5f922238cadb996b283?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=v4.16.0-202509091828.p2.g0719399.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:eedb97e05dca4b61827fd415391529911c7228c2f07ee9ccefc65a947bdd0f26_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:eedb97e05dca4b61827fd415391529911c7228c2f07ee9ccefc65a947bdd0f26_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:eedb97e05dca4b61827fd415391529911c7228c2f07ee9ccefc65a947bdd0f26_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-capacity-rhel9@sha256%3Aeedb97e05dca4b61827fd415391529911c7228c2f07ee9ccefc65a947bdd0f26?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=v4.16.0-202509091828.p2.g39f5da5.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:9de9e0b088e2187bdcf5372b8fb9acdb57fa400986f30a52c8d78df6b3828555_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:9de9e0b088e2187bdcf5372b8fb9acdb57fa400986f30a52c8d78df6b3828555_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:9de9e0b088e2187bdcf5372b8fb9acdb57fa400986f30a52c8d78df6b3828555_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-egress-dns-proxy-rhel9@sha256%3A9de9e0b088e2187bdcf5372b8fb9acdb57fa400986f30a52c8d78df6b3828555?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=v4.16.0-202509091828.p2.gb58673a.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:f6fae6a57ee7abce3fde2e56b0102acc6a410a0ddd981032412db501e198a4b5_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:f6fae6a57ee7abce3fde2e56b0102acc6a410a0ddd981032412db501e198a4b5_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:f6fae6a57ee7abce3fde2e56b0102acc6a410a0ddd981032412db501e198a4b5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-egress-router-rhel9@sha256%3Af6fae6a57ee7abce3fde2e56b0102acc6a410a0ddd981032412db501e198a4b5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=openshift-enterprise-egress-router-container-v4.16.0-202509091828.p2.gb58673a.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:b7bd2f78700dfd37bab208a1588cc9d6725b2ebf9d87551f3ea7a11328e37b0c_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:b7bd2f78700dfd37bab208a1588cc9d6725b2ebf9d87551f3ea7a11328e37b0c_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:b7bd2f78700dfd37bab208a1588cc9d6725b2ebf9d87551f3ea7a11328e37b0c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-helm-rhel9-operator@sha256%3Ab7bd2f78700dfd37bab208a1588cc9d6725b2ebf9d87551f3ea7a11328e37b0c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=openshift-enterprise-helm-operator-container-v4.16.0-202509091828.p2.g0fa5db2.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:f8f083d40f24ddedf816a85dc0a6a231e3a081f813bcc5d17fa5c4ae70ded745_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:f8f083d40f24ddedf816a85dc0a6a231e3a081f813bcc5d17fa5c4ae70ded745_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:f8f083d40f24ddedf816a85dc0a6a231e3a081f813bcc5d17fa5c4ae70ded745_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-operator-sdk-rhel9@sha256%3Af8f083d40f24ddedf816a85dc0a6a231e3a081f813bcc5d17fa5c4ae70ded745?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=openshift-enterprise-operator-sdk-container-v4.16.0-202509091828.p2.g0fa5db2.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:6dbac042319562ff38e7a3315c53ed134fa9ea7fe92fec0498f0544156bd620f_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:6dbac042319562ff38e7a3315c53ed134fa9ea7fe92fec0498f0544156bd620f_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:6dbac042319562ff38e7a3315c53ed134fa9ea7fe92fec0498f0544156bd620f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-kubernetes-nmstate-handler-rhel9@sha256%3A6dbac042319562ff38e7a3315c53ed134fa9ea7fe92fec0498f0544156bd620f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=v4.16.0-202509091828.p2.gd9974be.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:de7aff1d3e5327e055b8d379ec11d7c08b3bb9cef905da3ccbdee3a3dd442439_ppc64le", "product": { "name": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:de7aff1d3e5327e055b8d379ec11d7c08b3bb9cef905da3ccbdee3a3dd442439_ppc64le", "product_id": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:de7aff1d3e5327e055b8d379ec11d7c08b3bb9cef905da3ccbdee3a3dd442439_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-rhel9-operator@sha256%3Ade7aff1d3e5327e055b8d379ec11d7c08b3bb9cef905da3ccbdee3a3dd442439?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-kubernetes-nmstate-operator-container-v4.16.0-202509101329.p2.gd9974be.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:b04628c8163c7e47ac69ae619269f7a3aaf557e17e980f6c158febd7447fcb47_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:b04628c8163c7e47ac69ae619269f7a3aaf557e17e980f6c158febd7447fcb47_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:b04628c8163c7e47ac69ae619269f7a3aaf557e17e980f6c158febd7447fcb47_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-cluster-api-controllers-rhel9@sha256%3Ab04628c8163c7e47ac69ae619269f7a3aaf557e17e980f6c158febd7447fcb47?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=v4.16.0-202509091828.p2.gc56dbc5.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:5518b562372985e877ffd10ba0786c16d4d55b418f6d1ccebfa5375239b2c96b_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:5518b562372985e877ffd10ba0786c16d4d55b418f6d1ccebfa5375239b2c96b_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:5518b562372985e877ffd10ba0786c16d4d55b418f6d1ccebfa5375239b2c96b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-shared-resource-mustgather-rhel9@sha256%3A5518b562372985e877ffd10ba0786c16d4d55b418f6d1ccebfa5375239b2c96b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=v4.16.0-202509091828.p2.gbc125de.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:9c43f23a946df22e89ec811ae10c01d3ff1b23ec54351a92ab62778b0590f16a_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:9c43f23a946df22e89ec811ae10c01d3ff1b23ec54351a92ab62778b0590f16a_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:9c43f23a946df22e89ec811ae10c01d3ff1b23ec54351a92ab62778b0590f16a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-egress-http-proxy-rhel9@sha256%3A9c43f23a946df22e89ec811ae10c01d3ff1b23ec54351a92ab62778b0590f16a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-egress-http-proxy-container-v4.16.0-202509091828.p2.gb58673a.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/frr-rhel9@sha256:ca1037a6de7a5e971eb4156c09405b1e2429d80d06ec556ad7e8a8e870cb5e4e_ppc64le", "product": { "name": "registry.redhat.io/openshift4/frr-rhel9@sha256:ca1037a6de7a5e971eb4156c09405b1e2429d80d06ec556ad7e8a8e870cb5e4e_ppc64le", "product_id": "registry.redhat.io/openshift4/frr-rhel9@sha256:ca1037a6de7a5e971eb4156c09405b1e2429d80d06ec556ad7e8a8e870cb5e4e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/frr-rhel9@sha256%3Aca1037a6de7a5e971eb4156c09405b1e2429d80d06ec556ad7e8a8e870cb5e4e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-frr-container-v4.16.0-202509091828.p2.gc1b7d24.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:c39fab693ec65243b4010551932b1e290d6abdb5e8728a7170c129523389512c_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:c39fab693ec65243b4010551932b1e290d6abdb5e8728a7170c129523389512c_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:c39fab693ec65243b4010551932b1e290d6abdb5e8728a7170c129523389512c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-filestore-csi-driver-rhel9@sha256%3Ac39fab693ec65243b4010551932b1e290d6abdb5e8728a7170c129523389512c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-gcp-filestore-csi-driver-container-v4.16.0-202509091828.p2.gced2a64.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:9f029e2dca2420f507f4e013d42fcd491de16818be1e873db5b1ee7cf0813dca_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:9f029e2dca2420f507f4e013d42fcd491de16818be1e873db5b1ee7cf0813dca_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:9f029e2dca2420f507f4e013d42fcd491de16818be1e873db5b1ee7cf0813dca_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-filestore-csi-driver-rhel9-operator@sha256%3A9f029e2dca2420f507f4e013d42fcd491de16818be1e873db5b1ee7cf0813dca?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=v4.16.0-202509091828.p2.g82dec86.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/metallb-rhel9@sha256:9110d91175a0e8264d827eb63e9aafaac22649734b29bba38a935284e8a6f0ba_ppc64le", "product": { "name": "registry.redhat.io/openshift4/metallb-rhel9@sha256:9110d91175a0e8264d827eb63e9aafaac22649734b29bba38a935284e8a6f0ba_ppc64le", "product_id": "registry.redhat.io/openshift4/metallb-rhel9@sha256:9110d91175a0e8264d827eb63e9aafaac22649734b29bba38a935284e8a6f0ba_ppc64le", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel9@sha256%3A9110d91175a0e8264d827eb63e9aafaac22649734b29bba38a935284e8a6f0ba?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-metallb-container-v4.16.0-202509091828.p2.gcac6af8.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:c606fccb24249bc06665010dca6589a1abd9b170a3d5994a9d758ad9bf90c87d_ppc64le", "product": { "name": "registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:c606fccb24249bc06665010dca6589a1abd9b170a3d5994a9d758ad9bf90c87d_ppc64le", "product_id": "registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:c606fccb24249bc06665010dca6589a1abd9b170a3d5994a9d758ad9bf90c87d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel9-operator@sha256%3Ac606fccb24249bc06665010dca6589a1abd9b170a3d5994a9d758ad9bf90c87d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-metallb-operator-container-v4.16.0-202509091828.p2.gf3eacb4.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:49df2cc13c5944d8e15f5e948ad7a02fdf275136b3f3e8665d263d7f11e96957_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:49df2cc13c5944d8e15f5e948ad7a02fdf275136b3f3e8665d263d7f11e96957_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:49df2cc13c5944d8e15f5e948ad7a02fdf275136b3f3e8665d263d7f11e96957_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-secrets-store-csi-driver-rhel9@sha256%3A49df2cc13c5944d8e15f5e948ad7a02fdf275136b3f3e8665d263d7f11e96957?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-secrets-store-csi-driver-container-v4.16.0-202509091828.p2.gb3a96ae.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:887e1c09568afddd90beb04ca1f9372621addd80c7e0127a07253415bc1a5cc0_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:887e1c09568afddd90beb04ca1f9372621addd80c7e0127a07253415bc1a5cc0_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:887e1c09568afddd90beb04ca1f9372621addd80c7e0127a07253415bc1a5cc0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-secrets-store-csi-driver-rhel9-operator@sha256%3A887e1c09568afddd90beb04ca1f9372621addd80c7e0127a07253415bc1a5cc0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=v4.16.0-202509091828.p2.g28b8053.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:a5feb8fb93929543b9a641e921ea83c36bd3db18923e9f42fc958aa9c1d81090_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:a5feb8fb93929543b9a641e921ea83c36bd3db18923e9f42fc958aa9c1d81090_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:a5feb8fb93929543b9a641e921ea83c36bd3db18923e9f42fc958aa9c1d81090_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-secrets-store-csi-mustgather-rhel9@sha256%3Aa5feb8fb93929543b9a641e921ea83c36bd3db18923e9f42fc958aa9c1d81090?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-secrets-store-csi-mustgather-container-v4.16.0-202509091828.p2.g28b8053.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:72a2d2f94f8098ead32c9fb2f7995d9a4ca1ab69c5179dccc1664b0d1a9585ab_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:72a2d2f94f8098ead32c9fb2f7995d9a4ca1ab69c5179dccc1664b0d1a9585ab_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:72a2d2f94f8098ead32c9fb2f7995d9a4ca1ab69c5179dccc1664b0d1a9585ab_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-smb-csi-driver-rhel9@sha256%3A72a2d2f94f8098ead32c9fb2f7995d9a4ca1ab69c5179dccc1664b0d1a9585ab?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-smb-csi-driver-container-v4.16.0-202509091828.p2.gff97707.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:2940b15eeae68ce34afd10515076effc859ea7d64f92d9059b632e7939ae1391_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:2940b15eeae68ce34afd10515076effc859ea7d64f92d9059b632e7939ae1391_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:2940b15eeae68ce34afd10515076effc859ea7d64f92d9059b632e7939ae1391_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-smb-csi-driver-rhel9-operator@sha256%3A2940b15eeae68ce34afd10515076effc859ea7d64f92d9059b632e7939ae1391?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-smb-csi-driver-operator-container-v4.16.0-202509091828.p2.g27609c0.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:33e1b152221b08d0767cc9c36db82a5b50fb5c935f36a2a5e21a3cdf8862f25c_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:33e1b152221b08d0767cc9c36db82a5b50fb5c935f36a2a5e21a3cdf8862f25c_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:33e1b152221b08d0767cc9c36db82a5b50fb5c935f36a2a5e21a3cdf8862f25c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-metrics-exporter-rhel9@sha256%3A33e1b152221b08d0767cc9c36db82a5b50fb5c935f36a2a5e21a3cdf8862f25c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-sriov-network-metrics-exporter-container-v4.16.0-202509091828.p2.gf2a3040.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/sriov-network-metrics-exporter-rhel9@sha256:33e1b152221b08d0767cc9c36db82a5b50fb5c935f36a2a5e21a3cdf8862f25c_ppc64le", "product": { "name": "registry.redhat.io/openshift4/sriov-network-metrics-exporter-rhel9@sha256:33e1b152221b08d0767cc9c36db82a5b50fb5c935f36a2a5e21a3cdf8862f25c_ppc64le", "product_id": "registry.redhat.io/openshift4/sriov-network-metrics-exporter-rhel9@sha256:33e1b152221b08d0767cc9c36db82a5b50fb5c935f36a2a5e21a3cdf8862f25c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/sriov-network-metrics-exporter-rhel9@sha256%3A33e1b152221b08d0767cc9c36db82a5b50fb5c935f36a2a5e21a3cdf8862f25c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-sriov-network-metrics-exporter-container-v4.16.0-202509091828.p2.gf2a3040.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:a60fb4521ebf5eecabefc973d1f0fbb64c47b0716cae09a4574ebb752f172820_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:a60fb4521ebf5eecabefc973d1f0fbb64c47b0716cae09a4574ebb752f172820_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:a60fb4521ebf5eecabefc973d1f0fbb64c47b0716cae09a4574ebb752f172820_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ptp-rhel9-operator@sha256%3Aa60fb4521ebf5eecabefc973d1f0fbb64c47b0716cae09a4574ebb752f172820?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-ptp-operator-container-v4.16.0-202509091828.p2.g0b912e8.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ptp-must-gather-rhel9@sha256:fc3b122b700ba1e43c713d5ea4fd7da8862d21be81536d718bf328183a93e76b_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ptp-must-gather-rhel9@sha256:fc3b122b700ba1e43c713d5ea4fd7da8862d21be81536d718bf328183a93e76b_ppc64le", "product_id": "registry.redhat.io/openshift4/ptp-must-gather-rhel9@sha256:fc3b122b700ba1e43c713d5ea4fd7da8862d21be81536d718bf328183a93e76b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ptp-must-gather-rhel9@sha256%3Afc3b122b700ba1e43c713d5ea4fd7da8862d21be81536d718bf328183a93e76b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ptp-operator-must-gather-container-v4.16.0-202509091828.p2.g0b912e8.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/sriov-cni-rhel9@sha256:75c7ee59e78ae712b40816950305500b1b0df7fffafdad1fdf00120284b6ac10_ppc64le", "product": { "name": "registry.redhat.io/openshift4/sriov-cni-rhel9@sha256:75c7ee59e78ae712b40816950305500b1b0df7fffafdad1fdf00120284b6ac10_ppc64le", "product_id": "registry.redhat.io/openshift4/sriov-cni-rhel9@sha256:75c7ee59e78ae712b40816950305500b1b0df7fffafdad1fdf00120284b6ac10_ppc64le", "product_identification_helper": { "purl": "pkg:oci/sriov-cni-rhel9@sha256%3A75c7ee59e78ae712b40816950305500b1b0df7fffafdad1fdf00120284b6ac10?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=sriov-cni-container-v4.16.0-202509091828.p2.g33d9a71.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:b79fd249734c576fce3eeb4950d9257d128803fc31a2c7e17bd235b1701cee8d_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:b79fd249734c576fce3eeb4950d9257d128803fc31a2c7e17bd235b1701cee8d_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:b79fd249734c576fce3eeb4950d9257d128803fc31a2c7e17bd235b1701cee8d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-dp-admission-controller-rhel9@sha256%3Ab79fd249734c576fce3eeb4950d9257d128803fc31a2c7e17bd235b1701cee8d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=sriov-dp-admission-controller-container-v4.16.0-202509091828.p2.g5695aa5.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-sriov-network-config-daemon-rhel9@sha256:9648de36a35478d6cb60f97091a6717d066f25bf15c66be7823dee4756e53e20_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-sriov-network-config-daemon-rhel9@sha256:9648de36a35478d6cb60f97091a6717d066f25bf15c66be7823dee4756e53e20_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-sriov-network-config-daemon-rhel9@sha256:9648de36a35478d6cb60f97091a6717d066f25bf15c66be7823dee4756e53e20_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-config-daemon-rhel9@sha256%3A9648de36a35478d6cb60f97091a6717d066f25bf15c66be7823dee4756e53e20?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=sriov-network-config-daemon-container-v4.16.0-202509091828.p2.gb4e3540.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-sriov-network-device-plugin-rhel9@sha256:112b3ff1ac44ac9f8c56ef5d56797bcf631a4e8383697327ddde07b8d6a886dd_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-sriov-network-device-plugin-rhel9@sha256:112b3ff1ac44ac9f8c56ef5d56797bcf631a4e8383697327ddde07b8d6a886dd_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-sriov-network-device-plugin-rhel9@sha256:112b3ff1ac44ac9f8c56ef5d56797bcf631a4e8383697327ddde07b8d6a886dd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-device-plugin-rhel9@sha256%3A112b3ff1ac44ac9f8c56ef5d56797bcf631a4e8383697327ddde07b8d6a886dd?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=sriov-network-device-plugin-container-v4.16.0-202509091828.p2.gad3519e.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-sriov-network-rhel9-operator@sha256:ff48a7469e12cd08de049e79630a7e8eb729e6ed49045270129e2415ccad51cd_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-sriov-network-rhel9-operator@sha256:ff48a7469e12cd08de049e79630a7e8eb729e6ed49045270129e2415ccad51cd_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-sriov-network-rhel9-operator@sha256:ff48a7469e12cd08de049e79630a7e8eb729e6ed49045270129e2415ccad51cd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-rhel9-operator@sha256%3Aff48a7469e12cd08de049e79630a7e8eb729e6ed49045270129e2415ccad51cd?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=sriov-network-operator-container-v4.16.0-202509091828.p2.gb4e3540.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-sriov-network-webhook-rhel9@sha256:087793fdcd1427757c9560226004745c5d4f4ab45402e4b6dd2b3ea4a7cb3869_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-sriov-network-webhook-rhel9@sha256:087793fdcd1427757c9560226004745c5d4f4ab45402e4b6dd2b3ea4a7cb3869_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-sriov-network-webhook-rhel9@sha256:087793fdcd1427757c9560226004745c5d4f4ab45402e4b6dd2b3ea4a7cb3869_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-webhook-rhel9@sha256%3A087793fdcd1427757c9560226004745c5d4f4ab45402e4b6dd2b3ea4a7cb3869?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=sriov-network-webhook-container-v4.16.0-202509091828.p2.gb4e3540.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:2631ae991c4a888149952025f280dca4c9d4270649ff01018a139bc2bfd436ef_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:2631ae991c4a888149952025f280dca4c9d4270649ff01018a139bc2bfd436ef_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:2631ae991c4a888149952025f280dca4c9d4270649ff01018a139bc2bfd436ef_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel9@sha256%3A2631ae991c4a888149952025f280dca4c9d4270649ff01018a139bc2bfd436ef?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-vertical-pod-autoscaler-container-v4.16.0-202509091828.p2.gd363dcf.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:d1b7df836d1718ad5b60d9ce0d2779e8864be88d5c701ab1b4f1037e8c47fab8_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:d1b7df836d1718ad5b60d9ce0d2779e8864be88d5c701ab1b4f1037e8c47fab8_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:d1b7df836d1718ad5b60d9ce0d2779e8864be88d5c701ab1b4f1037e8c47fab8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel9-operator@sha256%3Ad1b7df836d1718ad5b60d9ce0d2779e8864be88d5c701ab1b4f1037e8c47fab8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-vertical-pod-autoscaler-operator-container-v4.16.0-202509091828.p2.gb9b63cc.assembly.stream.el9" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel9@sha256:aa16f897b8af025ff31cf057929e58500ea90c0297061edeed86a2431c2e05d8_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel9@sha256:aa16f897b8af025ff31cf057929e58500ea90c0297061edeed86a2431c2e05d8_arm64", "product_id": "registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel9@sha256:aa16f897b8af025ff31cf057929e58500ea90c0297061edeed86a2431c2e05d8_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cloud-event-proxy-rhel9@sha256%3Aaa16f897b8af025ff31cf057929e58500ea90c0297061edeed86a2431c2e05d8?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=cloud-event-proxy-container-v4.16.0-202509091828.p2.gf9eec98.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:54d6fe6d9305e65557248b6d118da8296cb79b8df9185287477de3e735ab7370_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:54d6fe6d9305e65557248b6d118da8296cb79b8df9185287477de3e735ab7370_arm64", "product_id": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:54d6fe6d9305e65557248b6d118da8296cb79b8df9185287477de3e735ab7370_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel9@sha256%3A54d6fe6d9305e65557248b6d118da8296cb79b8df9185287477de3e735ab7370?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-clusterresourceoverride-container-v4.16.0-202509091828.p2.g8c0f21c.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-sriov-infiniband-cni-rhel9@sha256:d2d2ca29c9bd844983652892882e0592f4ccf0fe7d7a55f1006d5780c9d27f90_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-sriov-infiniband-cni-rhel9@sha256:d2d2ca29c9bd844983652892882e0592f4ccf0fe7d7a55f1006d5780c9d27f90_arm64", "product_id": "registry.redhat.io/openshift4/ose-sriov-infiniband-cni-rhel9@sha256:d2d2ca29c9bd844983652892882e0592f4ccf0fe7d7a55f1006d5780c9d27f90_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-infiniband-cni-rhel9@sha256%3Ad2d2ca29c9bd844983652892882e0592f4ccf0fe7d7a55f1006d5780c9d27f90?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ib-sriov-cni-container-v4.16.0-202509091828.p2.gd44f069.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:721f8ba3a2bd66f78b53bb9a41cf7d59824ee8542488e6e967ceafc7ee4f059a_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:721f8ba3a2bd66f78b53bb9a41cf7d59824ee8542488e6e967ceafc7ee4f059a_arm64", "product_id": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:721f8ba3a2bd66f78b53bb9a41cf7d59824ee8542488e6e967ceafc7ee4f059a_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel9-operator@sha256%3A721f8ba3a2bd66f78b53bb9a41cf7d59824ee8542488e6e967ceafc7ee4f059a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-clusterresourceoverride-operator-container-v4.16.0-202509091828.p2.gd73e630.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:09bef866682d2daac0daed6898102ef78b770495c2e197a64f2deec43e55bbd6_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:09bef866682d2daac0daed6898102ef78b770495c2e197a64f2deec43e55bbd6_arm64", "product_id": "registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:09bef866682d2daac0daed6898102ef78b770495c2e197a64f2deec43e55bbd6_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-dpu-cni-rhel9@sha256%3A09bef866682d2daac0daed6898102ef78b770495c2e197a64f2deec43e55bbd6?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=dpu-cni-container-v4.16.0-202509091828.p2.g62b1a32.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:1518cd5936de074e4ab19a409ece10db9e2dce89333d7e542ef87bed3b4ca5cf_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:1518cd5936de074e4ab19a409ece10db9e2dce89333d7e542ef87bed3b4ca5cf_arm64", "product_id": "registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:1518cd5936de074e4ab19a409ece10db9e2dce89333d7e542ef87bed3b4ca5cf_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-dpu-daemon-rhel9@sha256%3A1518cd5936de074e4ab19a409ece10db9e2dce89333d7e542ef87bed3b4ca5cf?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=dpu-daemon-container-v4.16.0-202509091828.p2.g62b1a32.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:45681454c5a5d75b1a906ff3e361f622c2262bd89f37d65e39ed01441104e9ba_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:45681454c5a5d75b1a906ff3e361f622c2262bd89f37d65e39ed01441104e9ba_arm64", "product_id": "registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:45681454c5a5d75b1a906ff3e361f622c2262bd89f37d65e39ed01441104e9ba_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-dpu-rhel9-operator@sha256%3A45681454c5a5d75b1a906ff3e361f622c2262bd89f37d65e39ed01441104e9ba?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=dpu-operator-container-v4.16.0-202509091828.p2.g62b1a32.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:bf45ca42e403aa90ed0c879310afce06cf2324e238a2a77914039f6986fb7f30_arm64", "product": { "name": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:bf45ca42e403aa90ed0c879310afce06cf2324e238a2a77914039f6986fb7f30_arm64", "product_id": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:bf45ca42e403aa90ed0c879310afce06cf2324e238a2a77914039f6986fb7f30_arm64", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall-rhel9@sha256%3Abf45ca42e403aa90ed0c879310afce06cf2324e238a2a77914039f6986fb7f30?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ingress-node-firewall-daemon-container-v4.16.0-202509091828.p2.gd214d48.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:340b37f7f6b6480b6363a32c9224f950ad4b5cc8cce80a7587a196bf469c37c0_arm64", "product": { "name": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:340b37f7f6b6480b6363a32c9224f950ad4b5cc8cce80a7587a196bf469c37c0_arm64", "product_id": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:340b37f7f6b6480b6363a32c9224f950ad4b5cc8cce80a7587a196bf469c37c0_arm64", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall-rhel9-operator@sha256%3A340b37f7f6b6480b6363a32c9224f950ad4b5cc8cce80a7587a196bf469c37c0?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ingress-node-firewall-operator-container-v4.16.0-202509091828.p2.gd214d48.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:93f722f4a4d5906ab41d5d30af2ffd9656d780fb57219f6f0ad405da5d42f209_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:93f722f4a4d5906ab41d5d30af2ffd9656d780fb57219f6f0ad405da5d42f209_arm64", "product_id": "registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:93f722f4a4d5906ab41d5d30af2ffd9656d780fb57219f6f0ad405da5d42f209_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-ptp-rhel9@sha256%3A93f722f4a4d5906ab41d5d30af2ffd9656d780fb57219f6f0ad405da5d42f209?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-linuxptp-daemon-container-v4.16.0-202509091828.p2.gb2a719c.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:5a2bc1e235370ff4320c6a3b24eab88b33d146fd306fc18cdbe29fe370272d31_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:5a2bc1e235370ff4320c6a3b24eab88b33d146fd306fc18cdbe29fe370272d31_arm64", "product_id": "registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:5a2bc1e235370ff4320c6a3b24eab88b33d146fd306fc18cdbe29fe370272d31_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-diskmaker-rhel9@sha256%3A5a2bc1e235370ff4320c6a3b24eab88b33d146fd306fc18cdbe29fe370272d31?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=local-storage-diskmaker-container-v4.16.0-202509091828.p2.gb0273c5.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:627ac2cf750afe6e2f7d2db32dbe601f78491e483c1044b8f3149bd7b52570b5_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:627ac2cf750afe6e2f7d2db32dbe601f78491e483c1044b8f3149bd7b52570b5_arm64", "product_id": "registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:627ac2cf750afe6e2f7d2db32dbe601f78491e483c1044b8f3149bd7b52570b5_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-mustgather-rhel9@sha256%3A627ac2cf750afe6e2f7d2db32dbe601f78491e483c1044b8f3149bd7b52570b5?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-local-storage-mustgather-container-v4.16.0-202509091828.p2.gb0273c5.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:0d6520092ada419664ee28aa05b6913944585db10dea0c32515a3a6b5bbdde65_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:0d6520092ada419664ee28aa05b6913944585db10dea0c32515a3a6b5bbdde65_arm64", "product_id": "registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:0d6520092ada419664ee28aa05b6913944585db10dea0c32515a3a6b5bbdde65_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-rhel9-operator@sha256%3A0d6520092ada419664ee28aa05b6913944585db10dea0c32515a3a6b5bbdde65?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=local-storage-operator-container-v4.16.0-202509091828.p2.gb0273c5.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:61179875ba13abad11ca059ba54c935282bb3f72429304e4257c947810a7cab0_arm64", "product": { "name": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:61179875ba13abad11ca059ba54c935282bb3f72429304e4257c947810a7cab0_arm64", "product_id": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:61179875ba13abad11ca059ba54c935282bb3f72429304e4257c947810a7cab0_arm64", "product_identification_helper": { "purl": "pkg:oci/nmstate-console-plugin-rhel9@sha256%3A61179875ba13abad11ca059ba54c935282bb3f72429304e4257c947810a7cab0?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=nmstate-console-plugin-container-v4.16.0-202509101329.p2.gc538911.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:0d514934acfcbed0fccf17b0715a0a4c2aae78b6e25cee578042af01944265a7_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:0d514934acfcbed0fccf17b0715a0a4c2aae78b6e25cee578042af01944265a7_arm64", "product_id": "registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:0d514934acfcbed0fccf17b0715a0a4c2aae78b6e25cee578042af01944265a7_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-node-feature-discovery-rhel9@sha256%3A0d514934acfcbed0fccf17b0715a0a4c2aae78b6e25cee578042af01944265a7?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=node-feature-discovery-container-v4.16.0-202509091828.p2.gcb614ca.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:d14c44eef789614b98551388f573f79127413d6b752489d40a88b9089a4bd201_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:d14c44eef789614b98551388f573f79127413d6b752489d40a88b9089a4bd201_arm64", "product_id": "registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:d14c44eef789614b98551388f573f79127413d6b752489d40a88b9089a4bd201_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-ansible-rhel9-operator@sha256%3Ad14c44eef789614b98551388f573f79127413d6b752489d40a88b9089a4bd201?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=v4.16.0-202509091828.p2.g0719399.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:a617fae4516a79fa12e7b8ea700fe28f8736923f9680f016794472dbc4e7f880_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:a617fae4516a79fa12e7b8ea700fe28f8736923f9680f016794472dbc4e7f880_arm64", "product_id": "registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:a617fae4516a79fa12e7b8ea700fe28f8736923f9680f016794472dbc4e7f880_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-capacity-rhel9@sha256%3Aa617fae4516a79fa12e7b8ea700fe28f8736923f9680f016794472dbc4e7f880?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=v4.16.0-202509091828.p2.g39f5da5.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:abfaeb18ed5a4fc395266dec2d0ea5949e90193e985fb44e4d34b8f422da9a4b_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:abfaeb18ed5a4fc395266dec2d0ea5949e90193e985fb44e4d34b8f422da9a4b_arm64", "product_id": "registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:abfaeb18ed5a4fc395266dec2d0ea5949e90193e985fb44e4d34b8f422da9a4b_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-dns-proxy-rhel9@sha256%3Aabfaeb18ed5a4fc395266dec2d0ea5949e90193e985fb44e4d34b8f422da9a4b?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=v4.16.0-202509091828.p2.gb58673a.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:a6aee889a8eaf2d3aca3a312752622f00da62dc144afd0bc591e2f52c9463d36_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:a6aee889a8eaf2d3aca3a312752622f00da62dc144afd0bc591e2f52c9463d36_arm64", "product_id": "registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:a6aee889a8eaf2d3aca3a312752622f00da62dc144afd0bc591e2f52c9463d36_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-router-rhel9@sha256%3Aa6aee889a8eaf2d3aca3a312752622f00da62dc144afd0bc591e2f52c9463d36?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=openshift-enterprise-egress-router-container-v4.16.0-202509091828.p2.gb58673a.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:9fc0afa34b3986b00edbce26530b920413fb0a8d11451daed365aafd6dbbc3dd_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:9fc0afa34b3986b00edbce26530b920413fb0a8d11451daed365aafd6dbbc3dd_arm64", "product_id": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:9fc0afa34b3986b00edbce26530b920413fb0a8d11451daed365aafd6dbbc3dd_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-helm-rhel9-operator@sha256%3A9fc0afa34b3986b00edbce26530b920413fb0a8d11451daed365aafd6dbbc3dd?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=openshift-enterprise-helm-operator-container-v4.16.0-202509091828.p2.g0fa5db2.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:b45ae3c137da296284dfb7adc101fca0a89c31482224c14b34ba7d65def32bb3_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:b45ae3c137da296284dfb7adc101fca0a89c31482224c14b34ba7d65def32bb3_arm64", "product_id": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:b45ae3c137da296284dfb7adc101fca0a89c31482224c14b34ba7d65def32bb3_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-sdk-rhel9@sha256%3Ab45ae3c137da296284dfb7adc101fca0a89c31482224c14b34ba7d65def32bb3?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=openshift-enterprise-operator-sdk-container-v4.16.0-202509091828.p2.g0fa5db2.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:a4c6aafbbecc7a35bb7519a4cdb85d3de47ad790cea4a68de55b0380808f9719_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:a4c6aafbbecc7a35bb7519a4cdb85d3de47ad790cea4a68de55b0380808f9719_arm64", "product_id": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:a4c6aafbbecc7a35bb7519a4cdb85d3de47ad790cea4a68de55b0380808f9719_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-kubernetes-nmstate-handler-rhel9@sha256%3Aa4c6aafbbecc7a35bb7519a4cdb85d3de47ad790cea4a68de55b0380808f9719?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=v4.16.0-202509091828.p2.gd9974be.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:be067d91545cd38b053d72ce2f8eb96281c9bab022faf592d4a5771e364ac14b_arm64", "product": { "name": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:be067d91545cd38b053d72ce2f8eb96281c9bab022faf592d4a5771e364ac14b_arm64", "product_id": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:be067d91545cd38b053d72ce2f8eb96281c9bab022faf592d4a5771e364ac14b_arm64", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-rhel9-operator@sha256%3Abe067d91545cd38b053d72ce2f8eb96281c9bab022faf592d4a5771e364ac14b?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-kubernetes-nmstate-operator-container-v4.16.0-202509101329.p2.gd9974be.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:42528dd7ac879c3e5318372d6ef55072d171f5465cc782822f1ff9e9d89419b2_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:42528dd7ac879c3e5318372d6ef55072d171f5465cc782822f1ff9e9d89419b2_arm64", "product_id": "registry.redhat.io/openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:42528dd7ac879c3e5318372d6ef55072d171f5465cc782822f1ff9e9d89419b2_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-efs-csi-driver-container-rhel9@sha256%3A42528dd7ac879c3e5318372d6ef55072d171f5465cc782822f1ff9e9d89419b2?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-aws-efs-csi-driver-container-v4.16.0-202509091828.p2.ge793023.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:a64582fcb1815012a2943cb204e9412a2248c51e2f101fe8c90b65010cafe858_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:a64582fcb1815012a2943cb204e9412a2248c51e2f101fe8c90b65010cafe858_arm64", "product_id": "registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:a64582fcb1815012a2943cb204e9412a2248c51e2f101fe8c90b65010cafe858_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-efs-csi-driver-rhel9-operator@sha256%3Aa64582fcb1815012a2943cb204e9412a2248c51e2f101fe8c90b65010cafe858?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-aws-efs-csi-driver-operator-container-v4.16.0-202509091828.p2.gdb01344.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:3ca2c38901472326083fd433d0cef6c5d566dacb2e6ed0891de361e20ae2409a_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:3ca2c38901472326083fd433d0cef6c5d566dacb2e6ed0891de361e20ae2409a_arm64", "product_id": "registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:3ca2c38901472326083fd433d0cef6c5d566dacb2e6ed0891de361e20ae2409a_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-cluster-api-controllers-rhel9@sha256%3A3ca2c38901472326083fd433d0cef6c5d566dacb2e6ed0891de361e20ae2409a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=v4.16.0-202509091828.p2.gc56dbc5.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:ce8aa5a2f099d9b22063fdd29e9cc3ba3d1e6eff4d67a20a07a1b748e6dc605e_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:ce8aa5a2f099d9b22063fdd29e9cc3ba3d1e6eff4d67a20a07a1b748e6dc605e_arm64", "product_id": "registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:ce8aa5a2f099d9b22063fdd29e9cc3ba3d1e6eff4d67a20a07a1b748e6dc605e_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-shared-resource-mustgather-rhel9@sha256%3Ace8aa5a2f099d9b22063fdd29e9cc3ba3d1e6eff4d67a20a07a1b748e6dc605e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=v4.16.0-202509091828.p2.gbc125de.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:e4a2008f3e46dd8ecb6dd7f9e33be118510b6ae4f9d49a844e96f15b3b2ea830_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:e4a2008f3e46dd8ecb6dd7f9e33be118510b6ae4f9d49a844e96f15b3b2ea830_arm64", "product_id": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:e4a2008f3e46dd8ecb6dd7f9e33be118510b6ae4f9d49a844e96f15b3b2ea830_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-http-proxy-rhel9@sha256%3Ae4a2008f3e46dd8ecb6dd7f9e33be118510b6ae4f9d49a844e96f15b3b2ea830?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-egress-http-proxy-container-v4.16.0-202509091828.p2.gb58673a.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/frr-rhel9@sha256:56fe6b95ab3e5828a678e358e62c448450b23076deff4fc27f2c2f55138de942_arm64", "product": { "name": "registry.redhat.io/openshift4/frr-rhel9@sha256:56fe6b95ab3e5828a678e358e62c448450b23076deff4fc27f2c2f55138de942_arm64", "product_id": "registry.redhat.io/openshift4/frr-rhel9@sha256:56fe6b95ab3e5828a678e358e62c448450b23076deff4fc27f2c2f55138de942_arm64", "product_identification_helper": { "purl": "pkg:oci/frr-rhel9@sha256%3A56fe6b95ab3e5828a678e358e62c448450b23076deff4fc27f2c2f55138de942?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-frr-container-v4.16.0-202509091828.p2.gc1b7d24.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:c0b85e3bf6c0fda5eb3c74ff89af6ca1d3139a02c0c78ae05e0fb3390d36367c_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:c0b85e3bf6c0fda5eb3c74ff89af6ca1d3139a02c0c78ae05e0fb3390d36367c_arm64", "product_id": "registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:c0b85e3bf6c0fda5eb3c74ff89af6ca1d3139a02c0c78ae05e0fb3390d36367c_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-filestore-csi-driver-rhel9@sha256%3Ac0b85e3bf6c0fda5eb3c74ff89af6ca1d3139a02c0c78ae05e0fb3390d36367c?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-gcp-filestore-csi-driver-container-v4.16.0-202509091828.p2.gced2a64.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:3de4c9da19b4492db52d961d6435646c2de49c138b8c62ea0a5966f2d39d5758_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:3de4c9da19b4492db52d961d6435646c2de49c138b8c62ea0a5966f2d39d5758_arm64", "product_id": "registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:3de4c9da19b4492db52d961d6435646c2de49c138b8c62ea0a5966f2d39d5758_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-filestore-csi-driver-rhel9-operator@sha256%3A3de4c9da19b4492db52d961d6435646c2de49c138b8c62ea0a5966f2d39d5758?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=v4.16.0-202509091828.p2.g82dec86.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/metallb-rhel9@sha256:516f3ba6444df3ad872c46fbe660fe1de51370c93f8633472353cd50f142b8c5_arm64", "product": { "name": "registry.redhat.io/openshift4/metallb-rhel9@sha256:516f3ba6444df3ad872c46fbe660fe1de51370c93f8633472353cd50f142b8c5_arm64", "product_id": "registry.redhat.io/openshift4/metallb-rhel9@sha256:516f3ba6444df3ad872c46fbe660fe1de51370c93f8633472353cd50f142b8c5_arm64", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel9@sha256%3A516f3ba6444df3ad872c46fbe660fe1de51370c93f8633472353cd50f142b8c5?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-metallb-container-v4.16.0-202509091828.p2.gcac6af8.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:41fa1a5080af655693353865be2c4da1f380217475e9c8cc8be1eeee9f6f8693_arm64", "product": { "name": "registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:41fa1a5080af655693353865be2c4da1f380217475e9c8cc8be1eeee9f6f8693_arm64", "product_id": "registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:41fa1a5080af655693353865be2c4da1f380217475e9c8cc8be1eeee9f6f8693_arm64", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel9-operator@sha256%3A41fa1a5080af655693353865be2c4da1f380217475e9c8cc8be1eeee9f6f8693?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-metallb-operator-container-v4.16.0-202509091828.p2.gf3eacb4.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:59a9303ead116c78187cc3e6293baf39b0c090cd47cf9944ed61c70eacb20a58_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:59a9303ead116c78187cc3e6293baf39b0c090cd47cf9944ed61c70eacb20a58_arm64", "product_id": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:59a9303ead116c78187cc3e6293baf39b0c090cd47cf9944ed61c70eacb20a58_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-secrets-store-csi-driver-rhel9@sha256%3A59a9303ead116c78187cc3e6293baf39b0c090cd47cf9944ed61c70eacb20a58?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-secrets-store-csi-driver-container-v4.16.0-202509091828.p2.gb3a96ae.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:bb0a4bdbd2ac40c516a6316844d0a74744438b7dd2bb5d2fa91e1f9a8a625c96_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:bb0a4bdbd2ac40c516a6316844d0a74744438b7dd2bb5d2fa91e1f9a8a625c96_arm64", "product_id": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:bb0a4bdbd2ac40c516a6316844d0a74744438b7dd2bb5d2fa91e1f9a8a625c96_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-secrets-store-csi-driver-rhel9-operator@sha256%3Abb0a4bdbd2ac40c516a6316844d0a74744438b7dd2bb5d2fa91e1f9a8a625c96?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=v4.16.0-202509091828.p2.g28b8053.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:e327b2deb2e2abda7b23df5bdca4c6bbbdfbfdeafb8bd454db63ffac360f2b6f_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:e327b2deb2e2abda7b23df5bdca4c6bbbdfbfdeafb8bd454db63ffac360f2b6f_arm64", "product_id": "registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:e327b2deb2e2abda7b23df5bdca4c6bbbdfbfdeafb8bd454db63ffac360f2b6f_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-secrets-store-csi-mustgather-rhel9@sha256%3Ae327b2deb2e2abda7b23df5bdca4c6bbbdfbfdeafb8bd454db63ffac360f2b6f?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-secrets-store-csi-mustgather-container-v4.16.0-202509091828.p2.g28b8053.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:48d2a7e4678933037391ea1a74702d0e2d97514d43619db333b1cb6d9845d9bb_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:48d2a7e4678933037391ea1a74702d0e2d97514d43619db333b1cb6d9845d9bb_arm64", "product_id": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:48d2a7e4678933037391ea1a74702d0e2d97514d43619db333b1cb6d9845d9bb_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-smb-csi-driver-rhel9@sha256%3A48d2a7e4678933037391ea1a74702d0e2d97514d43619db333b1cb6d9845d9bb?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-smb-csi-driver-container-v4.16.0-202509091828.p2.gff97707.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:e28ce04dfa6a9e44288b4be2c2141e3dc3f89df3f0cfe6016325db2f3029942f_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:e28ce04dfa6a9e44288b4be2c2141e3dc3f89df3f0cfe6016325db2f3029942f_arm64", "product_id": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:e28ce04dfa6a9e44288b4be2c2141e3dc3f89df3f0cfe6016325db2f3029942f_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-smb-csi-driver-rhel9-operator@sha256%3Ae28ce04dfa6a9e44288b4be2c2141e3dc3f89df3f0cfe6016325db2f3029942f?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-smb-csi-driver-operator-container-v4.16.0-202509091828.p2.g27609c0.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:fadb335a1e41fae79a2675687540f1d73c5ad8f2708a7d1c41871baa0002f762_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:fadb335a1e41fae79a2675687540f1d73c5ad8f2708a7d1c41871baa0002f762_arm64", "product_id": "registry.redhat.io/openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:fadb335a1e41fae79a2675687540f1d73c5ad8f2708a7d1c41871baa0002f762_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-metrics-exporter-rhel9@sha256%3Afadb335a1e41fae79a2675687540f1d73c5ad8f2708a7d1c41871baa0002f762?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-sriov-network-metrics-exporter-container-v4.16.0-202509091828.p2.gf2a3040.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/sriov-network-metrics-exporter-rhel9@sha256:fadb335a1e41fae79a2675687540f1d73c5ad8f2708a7d1c41871baa0002f762_arm64", "product": { "name": "registry.redhat.io/openshift4/sriov-network-metrics-exporter-rhel9@sha256:fadb335a1e41fae79a2675687540f1d73c5ad8f2708a7d1c41871baa0002f762_arm64", "product_id": "registry.redhat.io/openshift4/sriov-network-metrics-exporter-rhel9@sha256:fadb335a1e41fae79a2675687540f1d73c5ad8f2708a7d1c41871baa0002f762_arm64", "product_identification_helper": { "purl": "pkg:oci/sriov-network-metrics-exporter-rhel9@sha256%3Afadb335a1e41fae79a2675687540f1d73c5ad8f2708a7d1c41871baa0002f762?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-sriov-network-metrics-exporter-container-v4.16.0-202509091828.p2.gf2a3040.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:a4548af492265f01dd1987403bdf3536882adde1c97c526337ce5068b33f80a8_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:a4548af492265f01dd1987403bdf3536882adde1c97c526337ce5068b33f80a8_arm64", "product_id": "registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:a4548af492265f01dd1987403bdf3536882adde1c97c526337ce5068b33f80a8_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-ptp-rhel9-operator@sha256%3Aa4548af492265f01dd1987403bdf3536882adde1c97c526337ce5068b33f80a8?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-ptp-operator-container-v4.16.0-202509091828.p2.g0b912e8.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ptp-must-gather-rhel9@sha256:80892d9724da67281eae207177839622fc3fa6a6e0708aed5779489687825667_arm64", "product": { "name": "registry.redhat.io/openshift4/ptp-must-gather-rhel9@sha256:80892d9724da67281eae207177839622fc3fa6a6e0708aed5779489687825667_arm64", "product_id": "registry.redhat.io/openshift4/ptp-must-gather-rhel9@sha256:80892d9724da67281eae207177839622fc3fa6a6e0708aed5779489687825667_arm64", "product_identification_helper": { "purl": "pkg:oci/ptp-must-gather-rhel9@sha256%3A80892d9724da67281eae207177839622fc3fa6a6e0708aed5779489687825667?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ptp-operator-must-gather-container-v4.16.0-202509091828.p2.g0b912e8.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/sriov-cni-rhel9@sha256:0d6c49f6952053c780290440d4eb73b1b429cecff55b92e9fb32661a8105d9f6_arm64", "product": { "name": "registry.redhat.io/openshift4/sriov-cni-rhel9@sha256:0d6c49f6952053c780290440d4eb73b1b429cecff55b92e9fb32661a8105d9f6_arm64", "product_id": "registry.redhat.io/openshift4/sriov-cni-rhel9@sha256:0d6c49f6952053c780290440d4eb73b1b429cecff55b92e9fb32661a8105d9f6_arm64", "product_identification_helper": { "purl": "pkg:oci/sriov-cni-rhel9@sha256%3A0d6c49f6952053c780290440d4eb73b1b429cecff55b92e9fb32661a8105d9f6?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=sriov-cni-container-v4.16.0-202509091828.p2.g33d9a71.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:f80ca336c30cd9eb216c8d1ceebec7f2274797dd58927fdc4555bea07385a063_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:f80ca336c30cd9eb216c8d1ceebec7f2274797dd58927fdc4555bea07385a063_arm64", "product_id": "registry.redhat.io/openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:f80ca336c30cd9eb216c8d1ceebec7f2274797dd58927fdc4555bea07385a063_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-dp-admission-controller-rhel9@sha256%3Af80ca336c30cd9eb216c8d1ceebec7f2274797dd58927fdc4555bea07385a063?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=sriov-dp-admission-controller-container-v4.16.0-202509091828.p2.g5695aa5.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-sriov-network-config-daemon-rhel9@sha256:dab58539af0978a72de25d025dba952396fe5a4a1503415a89a288f9cc57c32e_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-sriov-network-config-daemon-rhel9@sha256:dab58539af0978a72de25d025dba952396fe5a4a1503415a89a288f9cc57c32e_arm64", "product_id": "registry.redhat.io/openshift4/ose-sriov-network-config-daemon-rhel9@sha256:dab58539af0978a72de25d025dba952396fe5a4a1503415a89a288f9cc57c32e_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-config-daemon-rhel9@sha256%3Adab58539af0978a72de25d025dba952396fe5a4a1503415a89a288f9cc57c32e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=sriov-network-config-daemon-container-v4.16.0-202509091828.p2.gb4e3540.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-sriov-network-device-plugin-rhel9@sha256:e2e74e408786c0e2d297549adee326f80064dbecec31758e433940faf62ac19f_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-sriov-network-device-plugin-rhel9@sha256:e2e74e408786c0e2d297549adee326f80064dbecec31758e433940faf62ac19f_arm64", "product_id": "registry.redhat.io/openshift4/ose-sriov-network-device-plugin-rhel9@sha256:e2e74e408786c0e2d297549adee326f80064dbecec31758e433940faf62ac19f_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-device-plugin-rhel9@sha256%3Ae2e74e408786c0e2d297549adee326f80064dbecec31758e433940faf62ac19f?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=sriov-network-device-plugin-container-v4.16.0-202509091828.p2.gad3519e.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-sriov-network-rhel9-operator@sha256:8531f4266ddea002a2f98ae754ce8807de2c4f2ed05d49012dca5bc75fa5c77b_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-sriov-network-rhel9-operator@sha256:8531f4266ddea002a2f98ae754ce8807de2c4f2ed05d49012dca5bc75fa5c77b_arm64", "product_id": "registry.redhat.io/openshift4/ose-sriov-network-rhel9-operator@sha256:8531f4266ddea002a2f98ae754ce8807de2c4f2ed05d49012dca5bc75fa5c77b_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-rhel9-operator@sha256%3A8531f4266ddea002a2f98ae754ce8807de2c4f2ed05d49012dca5bc75fa5c77b?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=sriov-network-operator-container-v4.16.0-202509091828.p2.gb4e3540.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-sriov-network-webhook-rhel9@sha256:41d54adb9a58d171d323a95c419bbdabaf74c96f5eca2c7da95b2dc28defd1da_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-sriov-network-webhook-rhel9@sha256:41d54adb9a58d171d323a95c419bbdabaf74c96f5eca2c7da95b2dc28defd1da_arm64", "product_id": "registry.redhat.io/openshift4/ose-sriov-network-webhook-rhel9@sha256:41d54adb9a58d171d323a95c419bbdabaf74c96f5eca2c7da95b2dc28defd1da_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-webhook-rhel9@sha256%3A41d54adb9a58d171d323a95c419bbdabaf74c96f5eca2c7da95b2dc28defd1da?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=sriov-network-webhook-container-v4.16.0-202509091828.p2.gb4e3540.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:3476b48ea410d1e3788b2f0118600a03dda9d0e19643a4f4789c41f81d4dd6bc_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:3476b48ea410d1e3788b2f0118600a03dda9d0e19643a4f4789c41f81d4dd6bc_arm64", "product_id": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:3476b48ea410d1e3788b2f0118600a03dda9d0e19643a4f4789c41f81d4dd6bc_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel9@sha256%3A3476b48ea410d1e3788b2f0118600a03dda9d0e19643a4f4789c41f81d4dd6bc?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-vertical-pod-autoscaler-container-v4.16.0-202509091828.p2.gd363dcf.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:ff3b350fc6737438e19cd74cbbeb865a7abe213c0c7bd67799448211ec672c1b_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:ff3b350fc6737438e19cd74cbbeb865a7abe213c0c7bd67799448211ec672c1b_arm64", "product_id": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:ff3b350fc6737438e19cd74cbbeb865a7abe213c0c7bd67799448211ec672c1b_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel9-operator@sha256%3Aff3b350fc6737438e19cd74cbbeb865a7abe213c0c7bd67799448211ec672c1b?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-vertical-pod-autoscaler-operator-container-v4.16.0-202509091828.p2.gb9b63cc.assembly.stream.el9" } } } ], "category": "architecture", "name": "arm64" }, { "branches": [ { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel9@sha256:4d36bc24d733039c5b5f6f5ffd7e75d7d6478926e1a8871d0f17d233d3b76428_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel9@sha256:4d36bc24d733039c5b5f6f5ffd7e75d7d6478926e1a8871d0f17d233d3b76428_amd64", "product_id": "registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel9@sha256:4d36bc24d733039c5b5f6f5ffd7e75d7d6478926e1a8871d0f17d233d3b76428_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cloud-event-proxy-rhel9@sha256%3A4d36bc24d733039c5b5f6f5ffd7e75d7d6478926e1a8871d0f17d233d3b76428?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=cloud-event-proxy-container-v4.16.0-202509091828.p2.gf9eec98.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:58f93ab660a7f5316bb77d177dc5b276224d0670e7a7a2c8e4eee6dadba3e816_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:58f93ab660a7f5316bb77d177dc5b276224d0670e7a7a2c8e4eee6dadba3e816_amd64", "product_id": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:58f93ab660a7f5316bb77d177dc5b276224d0670e7a7a2c8e4eee6dadba3e816_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel9@sha256%3A58f93ab660a7f5316bb77d177dc5b276224d0670e7a7a2c8e4eee6dadba3e816?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-clusterresourceoverride-container-v4.16.0-202509091828.p2.g8c0f21c.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:afef9a0e246ced0759f0b07cd7c3e025b473eb1fd80af368dd0cbd84443e3bf9_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:afef9a0e246ced0759f0b07cd7c3e025b473eb1fd80af368dd0cbd84443e3bf9_amd64", "product_id": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:afef9a0e246ced0759f0b07cd7c3e025b473eb1fd80af368dd0cbd84443e3bf9_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel9-operator@sha256%3Aafef9a0e246ced0759f0b07cd7c3e025b473eb1fd80af368dd0cbd84443e3bf9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-clusterresourceoverride-operator-container-v4.16.0-202509091828.p2.gd73e630.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:dd7f099566be7d2256830ba520f5b65d93fd6f42b9a2da0cb3cc219fee2c759a_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:dd7f099566be7d2256830ba520f5b65d93fd6f42b9a2da0cb3cc219fee2c759a_amd64", "product_id": "registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:dd7f099566be7d2256830ba520f5b65d93fd6f42b9a2da0cb3cc219fee2c759a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-dpu-cni-rhel9@sha256%3Add7f099566be7d2256830ba520f5b65d93fd6f42b9a2da0cb3cc219fee2c759a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=dpu-cni-container-v4.16.0-202509091828.p2.g62b1a32.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:72a9c1c2719682397d373a297092cf8eaf34a7f3c622d428348cf4e95da6d99f_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:72a9c1c2719682397d373a297092cf8eaf34a7f3c622d428348cf4e95da6d99f_amd64", "product_id": "registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:72a9c1c2719682397d373a297092cf8eaf34a7f3c622d428348cf4e95da6d99f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-dpu-daemon-rhel9@sha256%3A72a9c1c2719682397d373a297092cf8eaf34a7f3c622d428348cf4e95da6d99f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=dpu-daemon-container-v4.16.0-202509091828.p2.g62b1a32.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:fb4ceb48536fbd7cf37d686c99f3b1d73b20c3a48878e72bbd07f40009a515f4_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:fb4ceb48536fbd7cf37d686c99f3b1d73b20c3a48878e72bbd07f40009a515f4_amd64", "product_id": "registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:fb4ceb48536fbd7cf37d686c99f3b1d73b20c3a48878e72bbd07f40009a515f4_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-dpu-rhel9-operator@sha256%3Afb4ceb48536fbd7cf37d686c99f3b1d73b20c3a48878e72bbd07f40009a515f4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=dpu-operator-container-v4.16.0-202509091828.p2.g62b1a32.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-sriov-infiniband-cni-rhel9@sha256:99264636bdc9aca0af6a0a5d1f3f401cbce7a27c6136b7e992403ce1d1093d4a_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-sriov-infiniband-cni-rhel9@sha256:99264636bdc9aca0af6a0a5d1f3f401cbce7a27c6136b7e992403ce1d1093d4a_amd64", "product_id": "registry.redhat.io/openshift4/ose-sriov-infiniband-cni-rhel9@sha256:99264636bdc9aca0af6a0a5d1f3f401cbce7a27c6136b7e992403ce1d1093d4a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-infiniband-cni-rhel9@sha256%3A99264636bdc9aca0af6a0a5d1f3f401cbce7a27c6136b7e992403ce1d1093d4a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ib-sriov-cni-container-v4.16.0-202509091828.p2.gd44f069.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:c7b880c48b0b854e8306cf20e2a712d95f935c9a5af7dd344f9dddae4f25c964_amd64", "product": { "name": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:c7b880c48b0b854e8306cf20e2a712d95f935c9a5af7dd344f9dddae4f25c964_amd64", "product_id": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:c7b880c48b0b854e8306cf20e2a712d95f935c9a5af7dd344f9dddae4f25c964_amd64", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall-rhel9@sha256%3Ac7b880c48b0b854e8306cf20e2a712d95f935c9a5af7dd344f9dddae4f25c964?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ingress-node-firewall-daemon-container-v4.16.0-202509091828.p2.gd214d48.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:59f746cde3367f20906a4d159a695870f59f7b014eb65873fc03a3a4aec4eccc_amd64", "product": { "name": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:59f746cde3367f20906a4d159a695870f59f7b014eb65873fc03a3a4aec4eccc_amd64", "product_id": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:59f746cde3367f20906a4d159a695870f59f7b014eb65873fc03a3a4aec4eccc_amd64", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall-rhel9-operator@sha256%3A59f746cde3367f20906a4d159a695870f59f7b014eb65873fc03a3a4aec4eccc?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ingress-node-firewall-operator-container-v4.16.0-202509091828.p2.gd214d48.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:4330a7baf77033718ede8c77ae2be9379fad97a6bdc93ae170222c5e5e2c140a_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:4330a7baf77033718ede8c77ae2be9379fad97a6bdc93ae170222c5e5e2c140a_amd64", "product_id": "registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:4330a7baf77033718ede8c77ae2be9379fad97a6bdc93ae170222c5e5e2c140a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ptp-rhel9@sha256%3A4330a7baf77033718ede8c77ae2be9379fad97a6bdc93ae170222c5e5e2c140a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-linuxptp-daemon-container-v4.16.0-202509091828.p2.gb2a719c.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:5027f9808b4c3d5dc527fa7423be77c9e31f06edaf1174b86bc80f93c078e20e_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:5027f9808b4c3d5dc527fa7423be77c9e31f06edaf1174b86bc80f93c078e20e_amd64", "product_id": "registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:5027f9808b4c3d5dc527fa7423be77c9e31f06edaf1174b86bc80f93c078e20e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-diskmaker-rhel9@sha256%3A5027f9808b4c3d5dc527fa7423be77c9e31f06edaf1174b86bc80f93c078e20e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=local-storage-diskmaker-container-v4.16.0-202509091828.p2.gb0273c5.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:d122a2f0b564c6ca57b6d13e5a5414c47b4ab63b32d55e2fc7ac181a1113382c_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:d122a2f0b564c6ca57b6d13e5a5414c47b4ab63b32d55e2fc7ac181a1113382c_amd64", "product_id": "registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:d122a2f0b564c6ca57b6d13e5a5414c47b4ab63b32d55e2fc7ac181a1113382c_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-mustgather-rhel9@sha256%3Ad122a2f0b564c6ca57b6d13e5a5414c47b4ab63b32d55e2fc7ac181a1113382c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-local-storage-mustgather-container-v4.16.0-202509091828.p2.gb0273c5.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:2eb313521a707bb69b9cd479d56dbaddf8b48cdeb215f5cccccd98fa2b29edca_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:2eb313521a707bb69b9cd479d56dbaddf8b48cdeb215f5cccccd98fa2b29edca_amd64", "product_id": "registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:2eb313521a707bb69b9cd479d56dbaddf8b48cdeb215f5cccccd98fa2b29edca_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-rhel9-operator@sha256%3A2eb313521a707bb69b9cd479d56dbaddf8b48cdeb215f5cccccd98fa2b29edca?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=local-storage-operator-container-v4.16.0-202509091828.p2.gb0273c5.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:7caca879750e5100a7268bfb328536585245e38a8472d97d3fc696fe63a0d07d_amd64", "product": { "name": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:7caca879750e5100a7268bfb328536585245e38a8472d97d3fc696fe63a0d07d_amd64", "product_id": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:7caca879750e5100a7268bfb328536585245e38a8472d97d3fc696fe63a0d07d_amd64", "product_identification_helper": { "purl": "pkg:oci/nmstate-console-plugin-rhel9@sha256%3A7caca879750e5100a7268bfb328536585245e38a8472d97d3fc696fe63a0d07d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=nmstate-console-plugin-container-v4.16.0-202509101329.p2.gc538911.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:7779d8bb4992a5164c85cc967d68afd71dc99874ba01c671c8aec57d957e382a_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:7779d8bb4992a5164c85cc967d68afd71dc99874ba01c671c8aec57d957e382a_amd64", "product_id": "registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:7779d8bb4992a5164c85cc967d68afd71dc99874ba01c671c8aec57d957e382a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-node-feature-discovery-rhel9@sha256%3A7779d8bb4992a5164c85cc967d68afd71dc99874ba01c671c8aec57d957e382a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=node-feature-discovery-container-v4.16.0-202509091828.p2.gcb614ca.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:7d348b1a3587607ead56192ddea878f5d06948f1313526aa3acc167554c1eccf_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:7d348b1a3587607ead56192ddea878f5d06948f1313526aa3acc167554c1eccf_amd64", "product_id": "registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:7d348b1a3587607ead56192ddea878f5d06948f1313526aa3acc167554c1eccf_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ansible-rhel9-operator@sha256%3A7d348b1a3587607ead56192ddea878f5d06948f1313526aa3acc167554c1eccf?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=v4.16.0-202509091828.p2.g0719399.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:ebc447918f3815bec8f2b44bc6f8bf73148bb8a8baeed97a0ae5e5482f62cd03_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:ebc447918f3815bec8f2b44bc6f8bf73148bb8a8baeed97a0ae5e5482f62cd03_amd64", "product_id": "registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:ebc447918f3815bec8f2b44bc6f8bf73148bb8a8baeed97a0ae5e5482f62cd03_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-capacity-rhel9@sha256%3Aebc447918f3815bec8f2b44bc6f8bf73148bb8a8baeed97a0ae5e5482f62cd03?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=v4.16.0-202509091828.p2.g39f5da5.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:718b72ef4555035fcbae835ba3d997956a1cc6cc6bdfa5c0e39606438817e6f3_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:718b72ef4555035fcbae835ba3d997956a1cc6cc6bdfa5c0e39606438817e6f3_amd64", "product_id": "registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:718b72ef4555035fcbae835ba3d997956a1cc6cc6bdfa5c0e39606438817e6f3_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-dns-proxy-rhel9@sha256%3A718b72ef4555035fcbae835ba3d997956a1cc6cc6bdfa5c0e39606438817e6f3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=v4.16.0-202509091828.p2.gb58673a.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:ed78d42046a54227415e02b45ad0d821ee3743fb1c0ac73cdd8e5cdf09bf9f7a_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:ed78d42046a54227415e02b45ad0d821ee3743fb1c0ac73cdd8e5cdf09bf9f7a_amd64", "product_id": "registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:ed78d42046a54227415e02b45ad0d821ee3743fb1c0ac73cdd8e5cdf09bf9f7a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-router-rhel9@sha256%3Aed78d42046a54227415e02b45ad0d821ee3743fb1c0ac73cdd8e5cdf09bf9f7a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=openshift-enterprise-egress-router-container-v4.16.0-202509091828.p2.gb58673a.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:c09300d5e9549b7b99998a259eb8c89d8f6227f63b2ec5fd36a8e82474d9bd0e_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:c09300d5e9549b7b99998a259eb8c89d8f6227f63b2ec5fd36a8e82474d9bd0e_amd64", "product_id": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:c09300d5e9549b7b99998a259eb8c89d8f6227f63b2ec5fd36a8e82474d9bd0e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-helm-rhel9-operator@sha256%3Ac09300d5e9549b7b99998a259eb8c89d8f6227f63b2ec5fd36a8e82474d9bd0e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=openshift-enterprise-helm-operator-container-v4.16.0-202509091828.p2.g0fa5db2.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:0db4c40580bab21ab06da9f657eeba182cfa215c0134a738630ab7b88ec29717_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:0db4c40580bab21ab06da9f657eeba182cfa215c0134a738630ab7b88ec29717_amd64", "product_id": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:0db4c40580bab21ab06da9f657eeba182cfa215c0134a738630ab7b88ec29717_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-sdk-rhel9@sha256%3A0db4c40580bab21ab06da9f657eeba182cfa215c0134a738630ab7b88ec29717?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=openshift-enterprise-operator-sdk-container-v4.16.0-202509091828.p2.g0fa5db2.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:8b86d6b7c6183d02f021481330ef9731f2322add429d4c41674de6d10a8b3ce5_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:8b86d6b7c6183d02f021481330ef9731f2322add429d4c41674de6d10a8b3ce5_amd64", "product_id": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:8b86d6b7c6183d02f021481330ef9731f2322add429d4c41674de6d10a8b3ce5_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-kubernetes-nmstate-handler-rhel9@sha256%3A8b86d6b7c6183d02f021481330ef9731f2322add429d4c41674de6d10a8b3ce5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=v4.16.0-202509091828.p2.gd9974be.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:b0f2fb27e76df1174d35187cad91bb182b708666a8fc475edf3eb27f879fe654_amd64", "product": { "name": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:b0f2fb27e76df1174d35187cad91bb182b708666a8fc475edf3eb27f879fe654_amd64", "product_id": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:b0f2fb27e76df1174d35187cad91bb182b708666a8fc475edf3eb27f879fe654_amd64", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-rhel9-operator@sha256%3Ab0f2fb27e76df1174d35187cad91bb182b708666a8fc475edf3eb27f879fe654?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-kubernetes-nmstate-operator-container-v4.16.0-202509101329.p2.gd9974be.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:09273daaad62591c5a3b4a7364ccfa5a760951a16d1a2457c5574ca662bfd042_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:09273daaad62591c5a3b4a7364ccfa5a760951a16d1a2457c5574ca662bfd042_amd64", "product_id": "registry.redhat.io/openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:09273daaad62591c5a3b4a7364ccfa5a760951a16d1a2457c5574ca662bfd042_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-efs-csi-driver-container-rhel9@sha256%3A09273daaad62591c5a3b4a7364ccfa5a760951a16d1a2457c5574ca662bfd042?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-aws-efs-csi-driver-container-v4.16.0-202509091828.p2.ge793023.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:3e90674782ef913f76b186f3545027380f57a0c0a761ee06e78a59d791b0bd10_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:3e90674782ef913f76b186f3545027380f57a0c0a761ee06e78a59d791b0bd10_amd64", "product_id": "registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:3e90674782ef913f76b186f3545027380f57a0c0a761ee06e78a59d791b0bd10_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-efs-csi-driver-rhel9-operator@sha256%3A3e90674782ef913f76b186f3545027380f57a0c0a761ee06e78a59d791b0bd10?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-aws-efs-csi-driver-operator-container-v4.16.0-202509091828.p2.gdb01344.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:3a690c454749f4ab893e2f20c2ecee94aa0b47fdf3f96e9d91ef6b31b5dfae77_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:3a690c454749f4ab893e2f20c2ecee94aa0b47fdf3f96e9d91ef6b31b5dfae77_amd64", "product_id": "registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:3a690c454749f4ab893e2f20c2ecee94aa0b47fdf3f96e9d91ef6b31b5dfae77_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-cluster-api-controllers-rhel9@sha256%3A3a690c454749f4ab893e2f20c2ecee94aa0b47fdf3f96e9d91ef6b31b5dfae77?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=v4.16.0-202509091828.p2.gc56dbc5.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:d5f9187ce1641e451de858079755768572238276040b3f363a3aa8e867189779_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:d5f9187ce1641e451de858079755768572238276040b3f363a3aa8e867189779_amd64", "product_id": "registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:d5f9187ce1641e451de858079755768572238276040b3f363a3aa8e867189779_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-shared-resource-mustgather-rhel9@sha256%3Ad5f9187ce1641e451de858079755768572238276040b3f363a3aa8e867189779?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=v4.16.0-202509091828.p2.gbc125de.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:8aba42c9fa23266cf90497c9394706977d56da15790f1c9a5ff34ce159f47229_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:8aba42c9fa23266cf90497c9394706977d56da15790f1c9a5ff34ce159f47229_amd64", "product_id": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:8aba42c9fa23266cf90497c9394706977d56da15790f1c9a5ff34ce159f47229_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-http-proxy-rhel9@sha256%3A8aba42c9fa23266cf90497c9394706977d56da15790f1c9a5ff34ce159f47229?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-egress-http-proxy-container-v4.16.0-202509091828.p2.gb58673a.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/frr-rhel9@sha256:436e231123e2ed85c356581d4a360829b66378fd77f7c7721af6c1566ac9f4c8_amd64", "product": { "name": "registry.redhat.io/openshift4/frr-rhel9@sha256:436e231123e2ed85c356581d4a360829b66378fd77f7c7721af6c1566ac9f4c8_amd64", "product_id": "registry.redhat.io/openshift4/frr-rhel9@sha256:436e231123e2ed85c356581d4a360829b66378fd77f7c7721af6c1566ac9f4c8_amd64", "product_identification_helper": { "purl": "pkg:oci/frr-rhel9@sha256%3A436e231123e2ed85c356581d4a360829b66378fd77f7c7721af6c1566ac9f4c8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-frr-container-v4.16.0-202509091828.p2.gc1b7d24.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:a023c147a057f59f24ff8c829a2bcd212db03051533f1610f5cd5965f99dc872_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:a023c147a057f59f24ff8c829a2bcd212db03051533f1610f5cd5965f99dc872_amd64", "product_id": "registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:a023c147a057f59f24ff8c829a2bcd212db03051533f1610f5cd5965f99dc872_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-filestore-csi-driver-rhel9@sha256%3Aa023c147a057f59f24ff8c829a2bcd212db03051533f1610f5cd5965f99dc872?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-gcp-filestore-csi-driver-container-v4.16.0-202509091828.p2.gced2a64.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:2f00fbbe5187619d8a1ae6a304ba22044a6f66ee7b3f2d122d7d71cae85af96b_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:2f00fbbe5187619d8a1ae6a304ba22044a6f66ee7b3f2d122d7d71cae85af96b_amd64", "product_id": "registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:2f00fbbe5187619d8a1ae6a304ba22044a6f66ee7b3f2d122d7d71cae85af96b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-filestore-csi-driver-rhel9-operator@sha256%3A2f00fbbe5187619d8a1ae6a304ba22044a6f66ee7b3f2d122d7d71cae85af96b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=v4.16.0-202509091828.p2.g82dec86.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/metallb-rhel9@sha256:35d706ab0602758ea6cc74676aeaa96a94de8810733be90dd32c98cc2a044ff8_amd64", "product": { "name": "registry.redhat.io/openshift4/metallb-rhel9@sha256:35d706ab0602758ea6cc74676aeaa96a94de8810733be90dd32c98cc2a044ff8_amd64", "product_id": "registry.redhat.io/openshift4/metallb-rhel9@sha256:35d706ab0602758ea6cc74676aeaa96a94de8810733be90dd32c98cc2a044ff8_amd64", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel9@sha256%3A35d706ab0602758ea6cc74676aeaa96a94de8810733be90dd32c98cc2a044ff8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-metallb-container-v4.16.0-202509091828.p2.gcac6af8.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:80b3155ba9471c907038708b74c01fbff6dce5e03d03493341192734be7f2341_amd64", "product": { "name": "registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:80b3155ba9471c907038708b74c01fbff6dce5e03d03493341192734be7f2341_amd64", "product_id": "registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:80b3155ba9471c907038708b74c01fbff6dce5e03d03493341192734be7f2341_amd64", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel9-operator@sha256%3A80b3155ba9471c907038708b74c01fbff6dce5e03d03493341192734be7f2341?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-metallb-operator-container-v4.16.0-202509091828.p2.gf3eacb4.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:ed3f48d644d28bd5c99b42e80b06628caf002b214a161e858501c5efa724a3da_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:ed3f48d644d28bd5c99b42e80b06628caf002b214a161e858501c5efa724a3da_amd64", "product_id": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:ed3f48d644d28bd5c99b42e80b06628caf002b214a161e858501c5efa724a3da_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-secrets-store-csi-driver-rhel9@sha256%3Aed3f48d644d28bd5c99b42e80b06628caf002b214a161e858501c5efa724a3da?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-secrets-store-csi-driver-container-v4.16.0-202509091828.p2.gb3a96ae.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:2824caf68d2de41479d9e0cb00d5b3f216f62d49588a6d98f09a8a1f255d4e4b_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:2824caf68d2de41479d9e0cb00d5b3f216f62d49588a6d98f09a8a1f255d4e4b_amd64", "product_id": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:2824caf68d2de41479d9e0cb00d5b3f216f62d49588a6d98f09a8a1f255d4e4b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-secrets-store-csi-driver-rhel9-operator@sha256%3A2824caf68d2de41479d9e0cb00d5b3f216f62d49588a6d98f09a8a1f255d4e4b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=v4.16.0-202509091828.p2.g28b8053.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:22c0044c4364fc454440ec5cbd20144f19bffba5ef880f510fccd737282f3736_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:22c0044c4364fc454440ec5cbd20144f19bffba5ef880f510fccd737282f3736_amd64", "product_id": "registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:22c0044c4364fc454440ec5cbd20144f19bffba5ef880f510fccd737282f3736_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-secrets-store-csi-mustgather-rhel9@sha256%3A22c0044c4364fc454440ec5cbd20144f19bffba5ef880f510fccd737282f3736?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-secrets-store-csi-mustgather-container-v4.16.0-202509091828.p2.g28b8053.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:7ae8b74b8e0a471669a1aec95825e859d42772bea7817eb433820f0282c3bdb0_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:7ae8b74b8e0a471669a1aec95825e859d42772bea7817eb433820f0282c3bdb0_amd64", "product_id": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:7ae8b74b8e0a471669a1aec95825e859d42772bea7817eb433820f0282c3bdb0_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-smb-csi-driver-rhel9@sha256%3A7ae8b74b8e0a471669a1aec95825e859d42772bea7817eb433820f0282c3bdb0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-smb-csi-driver-container-v4.16.0-202509091828.p2.gff97707.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:85de0fc6f45173774214cade3a569d018fa2054ee7f4dedba710ebf7c48bf10f_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:85de0fc6f45173774214cade3a569d018fa2054ee7f4dedba710ebf7c48bf10f_amd64", "product_id": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:85de0fc6f45173774214cade3a569d018fa2054ee7f4dedba710ebf7c48bf10f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-smb-csi-driver-rhel9-operator@sha256%3A85de0fc6f45173774214cade3a569d018fa2054ee7f4dedba710ebf7c48bf10f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-smb-csi-driver-operator-container-v4.16.0-202509091828.p2.g27609c0.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:31814e21cf5ade0c2e3b02c307905c0924bb1c11da95e018741dd50ff0ec8faa_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:31814e21cf5ade0c2e3b02c307905c0924bb1c11da95e018741dd50ff0ec8faa_amd64", "product_id": "registry.redhat.io/openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:31814e21cf5ade0c2e3b02c307905c0924bb1c11da95e018741dd50ff0ec8faa_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-metrics-exporter-rhel9@sha256%3A31814e21cf5ade0c2e3b02c307905c0924bb1c11da95e018741dd50ff0ec8faa?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-sriov-network-metrics-exporter-container-v4.16.0-202509091828.p2.gf2a3040.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/sriov-network-metrics-exporter-rhel9@sha256:31814e21cf5ade0c2e3b02c307905c0924bb1c11da95e018741dd50ff0ec8faa_amd64", "product": { "name": "registry.redhat.io/openshift4/sriov-network-metrics-exporter-rhel9@sha256:31814e21cf5ade0c2e3b02c307905c0924bb1c11da95e018741dd50ff0ec8faa_amd64", "product_id": "registry.redhat.io/openshift4/sriov-network-metrics-exporter-rhel9@sha256:31814e21cf5ade0c2e3b02c307905c0924bb1c11da95e018741dd50ff0ec8faa_amd64", "product_identification_helper": { "purl": "pkg:oci/sriov-network-metrics-exporter-rhel9@sha256%3A31814e21cf5ade0c2e3b02c307905c0924bb1c11da95e018741dd50ff0ec8faa?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-sriov-network-metrics-exporter-container-v4.16.0-202509091828.p2.gf2a3040.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:154e825dd2faf97427eb739772a346d3ff03048bede4521e91d3600e8a650aaf_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:154e825dd2faf97427eb739772a346d3ff03048bede4521e91d3600e8a650aaf_amd64", "product_id": "registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:154e825dd2faf97427eb739772a346d3ff03048bede4521e91d3600e8a650aaf_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ptp-rhel9-operator@sha256%3A154e825dd2faf97427eb739772a346d3ff03048bede4521e91d3600e8a650aaf?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-ptp-operator-container-v4.16.0-202509091828.p2.g0b912e8.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ptp-must-gather-rhel9@sha256:3c7acd5660f3641965ec8f1b2cca7d7eecc272fa1125212d2cda00697597269b_amd64", "product": { "name": "registry.redhat.io/openshift4/ptp-must-gather-rhel9@sha256:3c7acd5660f3641965ec8f1b2cca7d7eecc272fa1125212d2cda00697597269b_amd64", "product_id": "registry.redhat.io/openshift4/ptp-must-gather-rhel9@sha256:3c7acd5660f3641965ec8f1b2cca7d7eecc272fa1125212d2cda00697597269b_amd64", "product_identification_helper": { "purl": "pkg:oci/ptp-must-gather-rhel9@sha256%3A3c7acd5660f3641965ec8f1b2cca7d7eecc272fa1125212d2cda00697597269b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ptp-operator-must-gather-container-v4.16.0-202509091828.p2.g0b912e8.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/sriov-cni-rhel9@sha256:6d074f59be4b492beb98c57420aa072ba0821f01e82dd3dd44cbccbb5facd307_amd64", "product": { "name": "registry.redhat.io/openshift4/sriov-cni-rhel9@sha256:6d074f59be4b492beb98c57420aa072ba0821f01e82dd3dd44cbccbb5facd307_amd64", "product_id": "registry.redhat.io/openshift4/sriov-cni-rhel9@sha256:6d074f59be4b492beb98c57420aa072ba0821f01e82dd3dd44cbccbb5facd307_amd64", "product_identification_helper": { "purl": "pkg:oci/sriov-cni-rhel9@sha256%3A6d074f59be4b492beb98c57420aa072ba0821f01e82dd3dd44cbccbb5facd307?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=sriov-cni-container-v4.16.0-202509091828.p2.g33d9a71.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:d9b8908987a42797a81f3ccad890d764d1fabf1a7873a400974e6e7b0c4db46d_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:d9b8908987a42797a81f3ccad890d764d1fabf1a7873a400974e6e7b0c4db46d_amd64", "product_id": "registry.redhat.io/openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:d9b8908987a42797a81f3ccad890d764d1fabf1a7873a400974e6e7b0c4db46d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-dp-admission-controller-rhel9@sha256%3Ad9b8908987a42797a81f3ccad890d764d1fabf1a7873a400974e6e7b0c4db46d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=sriov-dp-admission-controller-container-v4.16.0-202509091828.p2.g5695aa5.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-sriov-network-config-daemon-rhel9@sha256:2a07fe5a54caad8cc1cb288a150a4c6edf23399a6269a0e4dba1c596d5ee822b_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-sriov-network-config-daemon-rhel9@sha256:2a07fe5a54caad8cc1cb288a150a4c6edf23399a6269a0e4dba1c596d5ee822b_amd64", "product_id": "registry.redhat.io/openshift4/ose-sriov-network-config-daemon-rhel9@sha256:2a07fe5a54caad8cc1cb288a150a4c6edf23399a6269a0e4dba1c596d5ee822b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-config-daemon-rhel9@sha256%3A2a07fe5a54caad8cc1cb288a150a4c6edf23399a6269a0e4dba1c596d5ee822b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=sriov-network-config-daemon-container-v4.16.0-202509091828.p2.gb4e3540.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-sriov-network-device-plugin-rhel9@sha256:fa929c7ae3a2f8bdd04cefabc4eda3b2c2d52c4d2a255b2df07c3216849ef5a9_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-sriov-network-device-plugin-rhel9@sha256:fa929c7ae3a2f8bdd04cefabc4eda3b2c2d52c4d2a255b2df07c3216849ef5a9_amd64", "product_id": "registry.redhat.io/openshift4/ose-sriov-network-device-plugin-rhel9@sha256:fa929c7ae3a2f8bdd04cefabc4eda3b2c2d52c4d2a255b2df07c3216849ef5a9_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-device-plugin-rhel9@sha256%3Afa929c7ae3a2f8bdd04cefabc4eda3b2c2d52c4d2a255b2df07c3216849ef5a9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=sriov-network-device-plugin-container-v4.16.0-202509091828.p2.gad3519e.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-sriov-network-rhel9-operator@sha256:765b728aae77f302d934ab5cae15fadd4653a07171ebbef7376445d53a3f8c64_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-sriov-network-rhel9-operator@sha256:765b728aae77f302d934ab5cae15fadd4653a07171ebbef7376445d53a3f8c64_amd64", "product_id": "registry.redhat.io/openshift4/ose-sriov-network-rhel9-operator@sha256:765b728aae77f302d934ab5cae15fadd4653a07171ebbef7376445d53a3f8c64_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-rhel9-operator@sha256%3A765b728aae77f302d934ab5cae15fadd4653a07171ebbef7376445d53a3f8c64?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=sriov-network-operator-container-v4.16.0-202509091828.p2.gb4e3540.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-sriov-network-webhook-rhel9@sha256:2c088002b99503ca37f61ac45bd5ac725e75581927780d17a6868cb730887792_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-sriov-network-webhook-rhel9@sha256:2c088002b99503ca37f61ac45bd5ac725e75581927780d17a6868cb730887792_amd64", "product_id": "registry.redhat.io/openshift4/ose-sriov-network-webhook-rhel9@sha256:2c088002b99503ca37f61ac45bd5ac725e75581927780d17a6868cb730887792_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-webhook-rhel9@sha256%3A2c088002b99503ca37f61ac45bd5ac725e75581927780d17a6868cb730887792?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=sriov-network-webhook-container-v4.16.0-202509091828.p2.gb4e3540.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:d200c4afef7a55d953c475e82701931411958fd030a0c6cf098435db4c4dabd6_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:d200c4afef7a55d953c475e82701931411958fd030a0c6cf098435db4c4dabd6_amd64", "product_id": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:d200c4afef7a55d953c475e82701931411958fd030a0c6cf098435db4c4dabd6_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel9@sha256%3Ad200c4afef7a55d953c475e82701931411958fd030a0c6cf098435db4c4dabd6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-vertical-pod-autoscaler-container-v4.16.0-202509091828.p2.gd363dcf.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:dbb8d3a6933dd33dd7705670320cb73e9dfa06d873491fdbf7a6e6a2067ff99f_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:dbb8d3a6933dd33dd7705670320cb73e9dfa06d873491fdbf7a6e6a2067ff99f_amd64", "product_id": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:dbb8d3a6933dd33dd7705670320cb73e9dfa06d873491fdbf7a6e6a2067ff99f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel9-operator@sha256%3Adbb8d3a6933dd33dd7705670320cb73e9dfa06d873491fdbf7a6e6a2067ff99f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-vertical-pod-autoscaler-operator-container-v4.16.0-202509091828.p2.gb9b63cc.assembly.stream.el9" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:e756c4a4e1003a2406ff188119fc5a3081d7c182a0a47d28dfec382480438bf2_s390x", "product": { "name": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:e756c4a4e1003a2406ff188119fc5a3081d7c182a0a47d28dfec382480438bf2_s390x", "product_id": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:e756c4a4e1003a2406ff188119fc5a3081d7c182a0a47d28dfec382480438bf2_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel9@sha256%3Ae756c4a4e1003a2406ff188119fc5a3081d7c182a0a47d28dfec382480438bf2?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-clusterresourceoverride-container-v4.16.0-202509091828.p2.g8c0f21c.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:c5eae1dc9c80a737a18d49571100fcaf08c569cfa906f2d3e53e07d983a13313_s390x", "product": { "name": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:c5eae1dc9c80a737a18d49571100fcaf08c569cfa906f2d3e53e07d983a13313_s390x", "product_id": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:c5eae1dc9c80a737a18d49571100fcaf08c569cfa906f2d3e53e07d983a13313_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel9-operator@sha256%3Ac5eae1dc9c80a737a18d49571100fcaf08c569cfa906f2d3e53e07d983a13313?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-clusterresourceoverride-operator-container-v4.16.0-202509091828.p2.gd73e630.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:d4cf3132fad01719081987d528b682b9776b55e98c2b03fe29bea287465d44ec_s390x", "product": { "name": "registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:d4cf3132fad01719081987d528b682b9776b55e98c2b03fe29bea287465d44ec_s390x", "product_id": "registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:d4cf3132fad01719081987d528b682b9776b55e98c2b03fe29bea287465d44ec_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-dpu-cni-rhel9@sha256%3Ad4cf3132fad01719081987d528b682b9776b55e98c2b03fe29bea287465d44ec?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=dpu-cni-container-v4.16.0-202509091828.p2.g62b1a32.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:45c855f9e7d6e5a637130b5520263aac400c99aae22364f10abfc3e8a477b015_s390x", "product": { "name": "registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:45c855f9e7d6e5a637130b5520263aac400c99aae22364f10abfc3e8a477b015_s390x", "product_id": "registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:45c855f9e7d6e5a637130b5520263aac400c99aae22364f10abfc3e8a477b015_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-dpu-daemon-rhel9@sha256%3A45c855f9e7d6e5a637130b5520263aac400c99aae22364f10abfc3e8a477b015?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=dpu-daemon-container-v4.16.0-202509091828.p2.g62b1a32.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:56c3afb05ead06e385800fbdaa57949df7b5f4683a2f36e3e7648acd4ae88c87_s390x", "product": { "name": "registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:56c3afb05ead06e385800fbdaa57949df7b5f4683a2f36e3e7648acd4ae88c87_s390x", "product_id": "registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:56c3afb05ead06e385800fbdaa57949df7b5f4683a2f36e3e7648acd4ae88c87_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-dpu-rhel9-operator@sha256%3A56c3afb05ead06e385800fbdaa57949df7b5f4683a2f36e3e7648acd4ae88c87?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=dpu-operator-container-v4.16.0-202509091828.p2.g62b1a32.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:e2013455866530bd75352b33a6fa531fa2eeda3f7bd451175c34cb5d102730db_s390x", "product": { "name": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:e2013455866530bd75352b33a6fa531fa2eeda3f7bd451175c34cb5d102730db_s390x", "product_id": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:e2013455866530bd75352b33a6fa531fa2eeda3f7bd451175c34cb5d102730db_s390x", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall-rhel9@sha256%3Ae2013455866530bd75352b33a6fa531fa2eeda3f7bd451175c34cb5d102730db?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ingress-node-firewall-daemon-container-v4.16.0-202509091828.p2.gd214d48.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:1bb6e95f2a318f23084fcbd52c72ab10dabdcdfb108ba01a59c20726e7825d66_s390x", "product": { "name": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:1bb6e95f2a318f23084fcbd52c72ab10dabdcdfb108ba01a59c20726e7825d66_s390x", "product_id": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:1bb6e95f2a318f23084fcbd52c72ab10dabdcdfb108ba01a59c20726e7825d66_s390x", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall-rhel9-operator@sha256%3A1bb6e95f2a318f23084fcbd52c72ab10dabdcdfb108ba01a59c20726e7825d66?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ingress-node-firewall-operator-container-v4.16.0-202509091828.p2.gd214d48.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:dea29b962ff2296e0e72339971d002e3a064b335b85cc62a2b5efae29ca28213_s390x", "product": { "name": "registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:dea29b962ff2296e0e72339971d002e3a064b335b85cc62a2b5efae29ca28213_s390x", "product_id": "registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:dea29b962ff2296e0e72339971d002e3a064b335b85cc62a2b5efae29ca28213_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-diskmaker-rhel9@sha256%3Adea29b962ff2296e0e72339971d002e3a064b335b85cc62a2b5efae29ca28213?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=local-storage-diskmaker-container-v4.16.0-202509091828.p2.gb0273c5.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:23e1c25495877ed9bbb1cef819e5f0b673cec5dabb1dcd30a35134d83fd8d1e9_s390x", "product": { "name": "registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:23e1c25495877ed9bbb1cef819e5f0b673cec5dabb1dcd30a35134d83fd8d1e9_s390x", "product_id": "registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:23e1c25495877ed9bbb1cef819e5f0b673cec5dabb1dcd30a35134d83fd8d1e9_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-mustgather-rhel9@sha256%3A23e1c25495877ed9bbb1cef819e5f0b673cec5dabb1dcd30a35134d83fd8d1e9?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-local-storage-mustgather-container-v4.16.0-202509091828.p2.gb0273c5.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:ef035463220f476f057112e9e30329cd5efa9e9bf746e527dc91fd8b57f0d57d_s390x", "product": { "name": "registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:ef035463220f476f057112e9e30329cd5efa9e9bf746e527dc91fd8b57f0d57d_s390x", "product_id": "registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:ef035463220f476f057112e9e30329cd5efa9e9bf746e527dc91fd8b57f0d57d_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-rhel9-operator@sha256%3Aef035463220f476f057112e9e30329cd5efa9e9bf746e527dc91fd8b57f0d57d?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=local-storage-operator-container-v4.16.0-202509091828.p2.gb0273c5.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:9ab9381e965aaff607825b019380d287e3eb3949de5aa154cf14defa10085d86_s390x", "product": { "name": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:9ab9381e965aaff607825b019380d287e3eb3949de5aa154cf14defa10085d86_s390x", "product_id": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:9ab9381e965aaff607825b019380d287e3eb3949de5aa154cf14defa10085d86_s390x", "product_identification_helper": { "purl": "pkg:oci/nmstate-console-plugin-rhel9@sha256%3A9ab9381e965aaff607825b019380d287e3eb3949de5aa154cf14defa10085d86?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=nmstate-console-plugin-container-v4.16.0-202509101329.p2.gc538911.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:0c202ac95999e87b8d73f56c99508e823cbf1784c5589604f06a32009ea711e6_s390x", "product": { "name": "registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:0c202ac95999e87b8d73f56c99508e823cbf1784c5589604f06a32009ea711e6_s390x", "product_id": "registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:0c202ac95999e87b8d73f56c99508e823cbf1784c5589604f06a32009ea711e6_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-node-feature-discovery-rhel9@sha256%3A0c202ac95999e87b8d73f56c99508e823cbf1784c5589604f06a32009ea711e6?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=node-feature-discovery-container-v4.16.0-202509091828.p2.gcb614ca.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:3442fa3ef8aee7aaac6991543a841da8c8c9fe9c7010cd01af5b3f8a5bf20bad_s390x", "product": { "name": "registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:3442fa3ef8aee7aaac6991543a841da8c8c9fe9c7010cd01af5b3f8a5bf20bad_s390x", "product_id": "registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:3442fa3ef8aee7aaac6991543a841da8c8c9fe9c7010cd01af5b3f8a5bf20bad_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-ansible-rhel9-operator@sha256%3A3442fa3ef8aee7aaac6991543a841da8c8c9fe9c7010cd01af5b3f8a5bf20bad?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=v4.16.0-202509091828.p2.g0719399.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:7acb542353c9b1e44419ae8259a6845aa95efbabf32671450117d0bfec1ec47d_s390x", "product": { "name": "registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:7acb542353c9b1e44419ae8259a6845aa95efbabf32671450117d0bfec1ec47d_s390x", "product_id": "registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:7acb542353c9b1e44419ae8259a6845aa95efbabf32671450117d0bfec1ec47d_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-capacity-rhel9@sha256%3A7acb542353c9b1e44419ae8259a6845aa95efbabf32671450117d0bfec1ec47d?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=v4.16.0-202509091828.p2.g39f5da5.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:5dfdf2de62e5ebf9f455ea9806ff967a45a661ae465252ba2ed605af2f995354_s390x", "product": { "name": "registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:5dfdf2de62e5ebf9f455ea9806ff967a45a661ae465252ba2ed605af2f995354_s390x", "product_id": "registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:5dfdf2de62e5ebf9f455ea9806ff967a45a661ae465252ba2ed605af2f995354_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-egress-dns-proxy-rhel9@sha256%3A5dfdf2de62e5ebf9f455ea9806ff967a45a661ae465252ba2ed605af2f995354?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=v4.16.0-202509091828.p2.gb58673a.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:375fef1ce7a9646a586f021f649d0c09c2681eded3c35c47af0d5d0c4c91ad83_s390x", "product": { "name": "registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:375fef1ce7a9646a586f021f649d0c09c2681eded3c35c47af0d5d0c4c91ad83_s390x", "product_id": "registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:375fef1ce7a9646a586f021f649d0c09c2681eded3c35c47af0d5d0c4c91ad83_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-egress-router-rhel9@sha256%3A375fef1ce7a9646a586f021f649d0c09c2681eded3c35c47af0d5d0c4c91ad83?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=openshift-enterprise-egress-router-container-v4.16.0-202509091828.p2.gb58673a.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:f9cd7090a8b5ff3268501496c100e51c6d03b7767a6fcf2a34d66392f39f141d_s390x", "product": { "name": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:f9cd7090a8b5ff3268501496c100e51c6d03b7767a6fcf2a34d66392f39f141d_s390x", "product_id": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:f9cd7090a8b5ff3268501496c100e51c6d03b7767a6fcf2a34d66392f39f141d_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-helm-rhel9-operator@sha256%3Af9cd7090a8b5ff3268501496c100e51c6d03b7767a6fcf2a34d66392f39f141d?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=openshift-enterprise-helm-operator-container-v4.16.0-202509091828.p2.g0fa5db2.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:265ac97f0a4e57ca86108b399b26d734f4d8f0a1ca7418ebfece1c4988ea61d2_s390x", "product": { "name": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:265ac97f0a4e57ca86108b399b26d734f4d8f0a1ca7418ebfece1c4988ea61d2_s390x", "product_id": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:265ac97f0a4e57ca86108b399b26d734f4d8f0a1ca7418ebfece1c4988ea61d2_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-operator-sdk-rhel9@sha256%3A265ac97f0a4e57ca86108b399b26d734f4d8f0a1ca7418ebfece1c4988ea61d2?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=openshift-enterprise-operator-sdk-container-v4.16.0-202509091828.p2.g0fa5db2.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:f63de8d96f3ff6a6f4d613f8f0126a77ef4799fae6ff251fbfba02146b168862_s390x", "product": { "name": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:f63de8d96f3ff6a6f4d613f8f0126a77ef4799fae6ff251fbfba02146b168862_s390x", "product_id": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:f63de8d96f3ff6a6f4d613f8f0126a77ef4799fae6ff251fbfba02146b168862_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-kubernetes-nmstate-handler-rhel9@sha256%3Af63de8d96f3ff6a6f4d613f8f0126a77ef4799fae6ff251fbfba02146b168862?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=v4.16.0-202509091828.p2.gd9974be.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:dd0bab658b526f964ccfae100bcf78e92527264afd7b4dcdbd418cecc45f20ee_s390x", "product": { "name": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:dd0bab658b526f964ccfae100bcf78e92527264afd7b4dcdbd418cecc45f20ee_s390x", "product_id": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:dd0bab658b526f964ccfae100bcf78e92527264afd7b4dcdbd418cecc45f20ee_s390x", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-rhel9-operator@sha256%3Add0bab658b526f964ccfae100bcf78e92527264afd7b4dcdbd418cecc45f20ee?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-kubernetes-nmstate-operator-container-v4.16.0-202509101329.p2.gd9974be.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:fc4029313c457900f20d1015a3508cdb1f4b2ebc945a5005c429427a443b1377_s390x", "product": { "name": "registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:fc4029313c457900f20d1015a3508cdb1f4b2ebc945a5005c429427a443b1377_s390x", "product_id": "registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:fc4029313c457900f20d1015a3508cdb1f4b2ebc945a5005c429427a443b1377_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-cluster-api-controllers-rhel9@sha256%3Afc4029313c457900f20d1015a3508cdb1f4b2ebc945a5005c429427a443b1377?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=v4.16.0-202509091828.p2.gc56dbc5.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:51d61b59545b4821aa43c64281227e42393f8279529f7b0c8d5e8d43398327d4_s390x", "product": { "name": "registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:51d61b59545b4821aa43c64281227e42393f8279529f7b0c8d5e8d43398327d4_s390x", "product_id": "registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:51d61b59545b4821aa43c64281227e42393f8279529f7b0c8d5e8d43398327d4_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-shared-resource-mustgather-rhel9@sha256%3A51d61b59545b4821aa43c64281227e42393f8279529f7b0c8d5e8d43398327d4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=v4.16.0-202509091828.p2.gbc125de.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:ed10fdbbcb33d8ba8c85f2ed1638c80593044aaf9391cbd7ba51d53fd36435dc_s390x", "product": { "name": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:ed10fdbbcb33d8ba8c85f2ed1638c80593044aaf9391cbd7ba51d53fd36435dc_s390x", "product_id": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:ed10fdbbcb33d8ba8c85f2ed1638c80593044aaf9391cbd7ba51d53fd36435dc_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-egress-http-proxy-rhel9@sha256%3Aed10fdbbcb33d8ba8c85f2ed1638c80593044aaf9391cbd7ba51d53fd36435dc?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-egress-http-proxy-container-v4.16.0-202509091828.p2.gb58673a.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/frr-rhel9@sha256:7ce6da2a5472c6e9e4c16121dab5383cdab199132d8a32b979c85c32f5cf22c8_s390x", "product": { "name": "registry.redhat.io/openshift4/frr-rhel9@sha256:7ce6da2a5472c6e9e4c16121dab5383cdab199132d8a32b979c85c32f5cf22c8_s390x", "product_id": "registry.redhat.io/openshift4/frr-rhel9@sha256:7ce6da2a5472c6e9e4c16121dab5383cdab199132d8a32b979c85c32f5cf22c8_s390x", "product_identification_helper": { "purl": "pkg:oci/frr-rhel9@sha256%3A7ce6da2a5472c6e9e4c16121dab5383cdab199132d8a32b979c85c32f5cf22c8?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-frr-container-v4.16.0-202509091828.p2.gc1b7d24.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/metallb-rhel9@sha256:ffc64f071866f5bc52520c50c653b8213a420739f1628d16715b4748eb8b5cb9_s390x", "product": { "name": "registry.redhat.io/openshift4/metallb-rhel9@sha256:ffc64f071866f5bc52520c50c653b8213a420739f1628d16715b4748eb8b5cb9_s390x", "product_id": "registry.redhat.io/openshift4/metallb-rhel9@sha256:ffc64f071866f5bc52520c50c653b8213a420739f1628d16715b4748eb8b5cb9_s390x", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel9@sha256%3Affc64f071866f5bc52520c50c653b8213a420739f1628d16715b4748eb8b5cb9?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-metallb-container-v4.16.0-202509091828.p2.gcac6af8.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:b3b1e0c43e63acbafb35e5d2b263b36b76c7c05848984af367c2d710fcc24b64_s390x", "product": { "name": "registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:b3b1e0c43e63acbafb35e5d2b263b36b76c7c05848984af367c2d710fcc24b64_s390x", "product_id": "registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:b3b1e0c43e63acbafb35e5d2b263b36b76c7c05848984af367c2d710fcc24b64_s390x", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel9-operator@sha256%3Ab3b1e0c43e63acbafb35e5d2b263b36b76c7c05848984af367c2d710fcc24b64?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-metallb-operator-container-v4.16.0-202509091828.p2.gf3eacb4.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:9f606371e70ad2c63ace564df1325ba7805e1f5708cca5bc579103859dda235f_s390x", "product": { "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:9f606371e70ad2c63ace564df1325ba7805e1f5708cca5bc579103859dda235f_s390x", "product_id": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:9f606371e70ad2c63ace564df1325ba7805e1f5708cca5bc579103859dda235f_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-secrets-store-csi-driver-rhel9@sha256%3A9f606371e70ad2c63ace564df1325ba7805e1f5708cca5bc579103859dda235f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-secrets-store-csi-driver-container-v4.16.0-202509091828.p2.gb3a96ae.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:cec9a6972888bd61f2c5532f23f00c6d21d749d68d1120a464117cf4e86b1b46_s390x", "product": { "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:cec9a6972888bd61f2c5532f23f00c6d21d749d68d1120a464117cf4e86b1b46_s390x", "product_id": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:cec9a6972888bd61f2c5532f23f00c6d21d749d68d1120a464117cf4e86b1b46_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-secrets-store-csi-driver-rhel9-operator@sha256%3Acec9a6972888bd61f2c5532f23f00c6d21d749d68d1120a464117cf4e86b1b46?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=v4.16.0-202509091828.p2.g28b8053.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:56a7dfb0c821116ef0391ebc3e1c26f6891b23e6b8a14b679f91f3861d3b72aa_s390x", "product": { "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:56a7dfb0c821116ef0391ebc3e1c26f6891b23e6b8a14b679f91f3861d3b72aa_s390x", "product_id": "registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:56a7dfb0c821116ef0391ebc3e1c26f6891b23e6b8a14b679f91f3861d3b72aa_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-secrets-store-csi-mustgather-rhel9@sha256%3A56a7dfb0c821116ef0391ebc3e1c26f6891b23e6b8a14b679f91f3861d3b72aa?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-secrets-store-csi-mustgather-container-v4.16.0-202509091828.p2.g28b8053.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:402f6b25541a399d7df262110c60bfccad9f6d35592b834185c78ed8cc89a2d9_s390x", "product": { "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:402f6b25541a399d7df262110c60bfccad9f6d35592b834185c78ed8cc89a2d9_s390x", "product_id": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:402f6b25541a399d7df262110c60bfccad9f6d35592b834185c78ed8cc89a2d9_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-smb-csi-driver-rhel9@sha256%3A402f6b25541a399d7df262110c60bfccad9f6d35592b834185c78ed8cc89a2d9?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-smb-csi-driver-container-v4.16.0-202509091828.p2.gff97707.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:499089cf1485b822227581cf65b787360c3eec497c8946b8e2fc2cdeb0124c1b_s390x", "product": { "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:499089cf1485b822227581cf65b787360c3eec497c8946b8e2fc2cdeb0124c1b_s390x", "product_id": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:499089cf1485b822227581cf65b787360c3eec497c8946b8e2fc2cdeb0124c1b_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-smb-csi-driver-rhel9-operator@sha256%3A499089cf1485b822227581cf65b787360c3eec497c8946b8e2fc2cdeb0124c1b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-smb-csi-driver-operator-container-v4.16.0-202509091828.p2.g27609c0.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:43e07cfc6c04f82dbd449b3f99787c8a999a492dc8d01870ff91a81a1232ceab_s390x", "product": { "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:43e07cfc6c04f82dbd449b3f99787c8a999a492dc8d01870ff91a81a1232ceab_s390x", "product_id": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:43e07cfc6c04f82dbd449b3f99787c8a999a492dc8d01870ff91a81a1232ceab_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel9@sha256%3A43e07cfc6c04f82dbd449b3f99787c8a999a492dc8d01870ff91a81a1232ceab?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-vertical-pod-autoscaler-container-v4.16.0-202509091828.p2.gd363dcf.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:b1f7bab87724e17a1e8ffe9adf910403420d1c94a1a722d78f92b6497374c35a_s390x", "product": { "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:b1f7bab87724e17a1e8ffe9adf910403420d1c94a1a722d78f92b6497374c35a_s390x", "product_id": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:b1f7bab87724e17a1e8ffe9adf910403420d1c94a1a722d78f92b6497374c35a_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel9-operator@sha256%3Ab1f7bab87724e17a1e8ffe9adf910403420d1c94a1a722d78f92b6497374c35a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-vertical-pod-autoscaler-operator-container-v4.16.0-202509091828.p2.gb9b63cc.assembly.stream.el9" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/frr-rhel9@sha256:436e231123e2ed85c356581d4a360829b66378fd77f7c7721af6c1566ac9f4c8_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/frr-rhel9@sha256:436e231123e2ed85c356581d4a360829b66378fd77f7c7721af6c1566ac9f4c8_amd64" }, "product_reference": "registry.redhat.io/openshift4/frr-rhel9@sha256:436e231123e2ed85c356581d4a360829b66378fd77f7c7721af6c1566ac9f4c8_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/frr-rhel9@sha256:56fe6b95ab3e5828a678e358e62c448450b23076deff4fc27f2c2f55138de942_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/frr-rhel9@sha256:56fe6b95ab3e5828a678e358e62c448450b23076deff4fc27f2c2f55138de942_arm64" }, "product_reference": "registry.redhat.io/openshift4/frr-rhel9@sha256:56fe6b95ab3e5828a678e358e62c448450b23076deff4fc27f2c2f55138de942_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/frr-rhel9@sha256:7ce6da2a5472c6e9e4c16121dab5383cdab199132d8a32b979c85c32f5cf22c8_s390x as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/frr-rhel9@sha256:7ce6da2a5472c6e9e4c16121dab5383cdab199132d8a32b979c85c32f5cf22c8_s390x" }, "product_reference": "registry.redhat.io/openshift4/frr-rhel9@sha256:7ce6da2a5472c6e9e4c16121dab5383cdab199132d8a32b979c85c32f5cf22c8_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/frr-rhel9@sha256:ca1037a6de7a5e971eb4156c09405b1e2429d80d06ec556ad7e8a8e870cb5e4e_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/frr-rhel9@sha256:ca1037a6de7a5e971eb4156c09405b1e2429d80d06ec556ad7e8a8e870cb5e4e_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/frr-rhel9@sha256:ca1037a6de7a5e971eb4156c09405b1e2429d80d06ec556ad7e8a8e870cb5e4e_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:1bb6e95f2a318f23084fcbd52c72ab10dabdcdfb108ba01a59c20726e7825d66_s390x as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:1bb6e95f2a318f23084fcbd52c72ab10dabdcdfb108ba01a59c20726e7825d66_s390x" }, "product_reference": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:1bb6e95f2a318f23084fcbd52c72ab10dabdcdfb108ba01a59c20726e7825d66_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:340b37f7f6b6480b6363a32c9224f950ad4b5cc8cce80a7587a196bf469c37c0_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:340b37f7f6b6480b6363a32c9224f950ad4b5cc8cce80a7587a196bf469c37c0_arm64" }, "product_reference": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:340b37f7f6b6480b6363a32c9224f950ad4b5cc8cce80a7587a196bf469c37c0_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:4db405877680fc217556538e6eb50ced781b1b03fc5cdc1ca8ff675d02e2b759_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:4db405877680fc217556538e6eb50ced781b1b03fc5cdc1ca8ff675d02e2b759_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:4db405877680fc217556538e6eb50ced781b1b03fc5cdc1ca8ff675d02e2b759_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:59f746cde3367f20906a4d159a695870f59f7b014eb65873fc03a3a4aec4eccc_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:59f746cde3367f20906a4d159a695870f59f7b014eb65873fc03a3a4aec4eccc_amd64" }, "product_reference": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:59f746cde3367f20906a4d159a695870f59f7b014eb65873fc03a3a4aec4eccc_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:4a0808cb4bcdc71c56524b8df2ea1bca7fd79ce07885fbc501a0e866a48f0c1f_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:4a0808cb4bcdc71c56524b8df2ea1bca7fd79ce07885fbc501a0e866a48f0c1f_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:4a0808cb4bcdc71c56524b8df2ea1bca7fd79ce07885fbc501a0e866a48f0c1f_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:bf45ca42e403aa90ed0c879310afce06cf2324e238a2a77914039f6986fb7f30_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:bf45ca42e403aa90ed0c879310afce06cf2324e238a2a77914039f6986fb7f30_arm64" }, "product_reference": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:bf45ca42e403aa90ed0c879310afce06cf2324e238a2a77914039f6986fb7f30_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:c7b880c48b0b854e8306cf20e2a712d95f935c9a5af7dd344f9dddae4f25c964_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:c7b880c48b0b854e8306cf20e2a712d95f935c9a5af7dd344f9dddae4f25c964_amd64" }, "product_reference": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:c7b880c48b0b854e8306cf20e2a712d95f935c9a5af7dd344f9dddae4f25c964_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:e2013455866530bd75352b33a6fa531fa2eeda3f7bd451175c34cb5d102730db_s390x as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:e2013455866530bd75352b33a6fa531fa2eeda3f7bd451175c34cb5d102730db_s390x" }, "product_reference": "registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:e2013455866530bd75352b33a6fa531fa2eeda3f7bd451175c34cb5d102730db_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:b0f2fb27e76df1174d35187cad91bb182b708666a8fc475edf3eb27f879fe654_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:b0f2fb27e76df1174d35187cad91bb182b708666a8fc475edf3eb27f879fe654_amd64" }, "product_reference": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:b0f2fb27e76df1174d35187cad91bb182b708666a8fc475edf3eb27f879fe654_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:be067d91545cd38b053d72ce2f8eb96281c9bab022faf592d4a5771e364ac14b_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:be067d91545cd38b053d72ce2f8eb96281c9bab022faf592d4a5771e364ac14b_arm64" }, "product_reference": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:be067d91545cd38b053d72ce2f8eb96281c9bab022faf592d4a5771e364ac14b_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:dd0bab658b526f964ccfae100bcf78e92527264afd7b4dcdbd418cecc45f20ee_s390x as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:dd0bab658b526f964ccfae100bcf78e92527264afd7b4dcdbd418cecc45f20ee_s390x" }, "product_reference": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:dd0bab658b526f964ccfae100bcf78e92527264afd7b4dcdbd418cecc45f20ee_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:de7aff1d3e5327e055b8d379ec11d7c08b3bb9cef905da3ccbdee3a3dd442439_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:de7aff1d3e5327e055b8d379ec11d7c08b3bb9cef905da3ccbdee3a3dd442439_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:de7aff1d3e5327e055b8d379ec11d7c08b3bb9cef905da3ccbdee3a3dd442439_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:41fa1a5080af655693353865be2c4da1f380217475e9c8cc8be1eeee9f6f8693_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:41fa1a5080af655693353865be2c4da1f380217475e9c8cc8be1eeee9f6f8693_arm64" }, "product_reference": "registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:41fa1a5080af655693353865be2c4da1f380217475e9c8cc8be1eeee9f6f8693_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:80b3155ba9471c907038708b74c01fbff6dce5e03d03493341192734be7f2341_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:80b3155ba9471c907038708b74c01fbff6dce5e03d03493341192734be7f2341_amd64" }, "product_reference": "registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:80b3155ba9471c907038708b74c01fbff6dce5e03d03493341192734be7f2341_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:b3b1e0c43e63acbafb35e5d2b263b36b76c7c05848984af367c2d710fcc24b64_s390x as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:b3b1e0c43e63acbafb35e5d2b263b36b76c7c05848984af367c2d710fcc24b64_s390x" }, "product_reference": "registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:b3b1e0c43e63acbafb35e5d2b263b36b76c7c05848984af367c2d710fcc24b64_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:c606fccb24249bc06665010dca6589a1abd9b170a3d5994a9d758ad9bf90c87d_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:c606fccb24249bc06665010dca6589a1abd9b170a3d5994a9d758ad9bf90c87d_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:c606fccb24249bc06665010dca6589a1abd9b170a3d5994a9d758ad9bf90c87d_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/metallb-rhel9@sha256:35d706ab0602758ea6cc74676aeaa96a94de8810733be90dd32c98cc2a044ff8_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9@sha256:35d706ab0602758ea6cc74676aeaa96a94de8810733be90dd32c98cc2a044ff8_amd64" }, "product_reference": "registry.redhat.io/openshift4/metallb-rhel9@sha256:35d706ab0602758ea6cc74676aeaa96a94de8810733be90dd32c98cc2a044ff8_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/metallb-rhel9@sha256:516f3ba6444df3ad872c46fbe660fe1de51370c93f8633472353cd50f142b8c5_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9@sha256:516f3ba6444df3ad872c46fbe660fe1de51370c93f8633472353cd50f142b8c5_arm64" }, "product_reference": "registry.redhat.io/openshift4/metallb-rhel9@sha256:516f3ba6444df3ad872c46fbe660fe1de51370c93f8633472353cd50f142b8c5_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/metallb-rhel9@sha256:9110d91175a0e8264d827eb63e9aafaac22649734b29bba38a935284e8a6f0ba_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9@sha256:9110d91175a0e8264d827eb63e9aafaac22649734b29bba38a935284e8a6f0ba_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/metallb-rhel9@sha256:9110d91175a0e8264d827eb63e9aafaac22649734b29bba38a935284e8a6f0ba_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/metallb-rhel9@sha256:ffc64f071866f5bc52520c50c653b8213a420739f1628d16715b4748eb8b5cb9_s390x as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9@sha256:ffc64f071866f5bc52520c50c653b8213a420739f1628d16715b4748eb8b5cb9_s390x" }, "product_reference": "registry.redhat.io/openshift4/metallb-rhel9@sha256:ffc64f071866f5bc52520c50c653b8213a420739f1628d16715b4748eb8b5cb9_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:61179875ba13abad11ca059ba54c935282bb3f72429304e4257c947810a7cab0_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:61179875ba13abad11ca059ba54c935282bb3f72429304e4257c947810a7cab0_arm64" }, "product_reference": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:61179875ba13abad11ca059ba54c935282bb3f72429304e4257c947810a7cab0_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:7caca879750e5100a7268bfb328536585245e38a8472d97d3fc696fe63a0d07d_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:7caca879750e5100a7268bfb328536585245e38a8472d97d3fc696fe63a0d07d_amd64" }, "product_reference": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:7caca879750e5100a7268bfb328536585245e38a8472d97d3fc696fe63a0d07d_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:9ab9381e965aaff607825b019380d287e3eb3949de5aa154cf14defa10085d86_s390x as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:9ab9381e965aaff607825b019380d287e3eb3949de5aa154cf14defa10085d86_s390x" }, "product_reference": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:9ab9381e965aaff607825b019380d287e3eb3949de5aa154cf14defa10085d86_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:c01786e1970d1e03ab2a0bd529e336cfa8934d6bd138932bb72ed75850ced097_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:c01786e1970d1e03ab2a0bd529e336cfa8934d6bd138932bb72ed75850ced097_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:c01786e1970d1e03ab2a0bd529e336cfa8934d6bd138932bb72ed75850ced097_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:3442fa3ef8aee7aaac6991543a841da8c8c9fe9c7010cd01af5b3f8a5bf20bad_s390x as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:3442fa3ef8aee7aaac6991543a841da8c8c9fe9c7010cd01af5b3f8a5bf20bad_s390x" }, "product_reference": "registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:3442fa3ef8aee7aaac6991543a841da8c8c9fe9c7010cd01af5b3f8a5bf20bad_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:58f3b0d48ae9195c00580db9350a7cae0de13cc2349ba5f922238cadb996b283_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:58f3b0d48ae9195c00580db9350a7cae0de13cc2349ba5f922238cadb996b283_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:58f3b0d48ae9195c00580db9350a7cae0de13cc2349ba5f922238cadb996b283_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:7d348b1a3587607ead56192ddea878f5d06948f1313526aa3acc167554c1eccf_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:7d348b1a3587607ead56192ddea878f5d06948f1313526aa3acc167554c1eccf_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:7d348b1a3587607ead56192ddea878f5d06948f1313526aa3acc167554c1eccf_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:d14c44eef789614b98551388f573f79127413d6b752489d40a88b9089a4bd201_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:d14c44eef789614b98551388f573f79127413d6b752489d40a88b9089a4bd201_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:d14c44eef789614b98551388f573f79127413d6b752489d40a88b9089a4bd201_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:09273daaad62591c5a3b4a7364ccfa5a760951a16d1a2457c5574ca662bfd042_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:09273daaad62591c5a3b4a7364ccfa5a760951a16d1a2457c5574ca662bfd042_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:09273daaad62591c5a3b4a7364ccfa5a760951a16d1a2457c5574ca662bfd042_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:42528dd7ac879c3e5318372d6ef55072d171f5465cc782822f1ff9e9d89419b2_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:42528dd7ac879c3e5318372d6ef55072d171f5465cc782822f1ff9e9d89419b2_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:42528dd7ac879c3e5318372d6ef55072d171f5465cc782822f1ff9e9d89419b2_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:3e90674782ef913f76b186f3545027380f57a0c0a761ee06e78a59d791b0bd10_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:3e90674782ef913f76b186f3545027380f57a0c0a761ee06e78a59d791b0bd10_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:3e90674782ef913f76b186f3545027380f57a0c0a761ee06e78a59d791b0bd10_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:a64582fcb1815012a2943cb204e9412a2248c51e2f101fe8c90b65010cafe858_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:a64582fcb1815012a2943cb204e9412a2248c51e2f101fe8c90b65010cafe858_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:a64582fcb1815012a2943cb204e9412a2248c51e2f101fe8c90b65010cafe858_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:3a690c454749f4ab893e2f20c2ecee94aa0b47fdf3f96e9d91ef6b31b5dfae77_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:3a690c454749f4ab893e2f20c2ecee94aa0b47fdf3f96e9d91ef6b31b5dfae77_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:3a690c454749f4ab893e2f20c2ecee94aa0b47fdf3f96e9d91ef6b31b5dfae77_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:3ca2c38901472326083fd433d0cef6c5d566dacb2e6ed0891de361e20ae2409a_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:3ca2c38901472326083fd433d0cef6c5d566dacb2e6ed0891de361e20ae2409a_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:3ca2c38901472326083fd433d0cef6c5d566dacb2e6ed0891de361e20ae2409a_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:b04628c8163c7e47ac69ae619269f7a3aaf557e17e980f6c158febd7447fcb47_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:b04628c8163c7e47ac69ae619269f7a3aaf557e17e980f6c158febd7447fcb47_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:b04628c8163c7e47ac69ae619269f7a3aaf557e17e980f6c158febd7447fcb47_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:fc4029313c457900f20d1015a3508cdb1f4b2ebc945a5005c429427a443b1377_s390x as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:fc4029313c457900f20d1015a3508cdb1f4b2ebc945a5005c429427a443b1377_s390x" }, "product_reference": "registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:fc4029313c457900f20d1015a3508cdb1f4b2ebc945a5005c429427a443b1377_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel9@sha256:4d36bc24d733039c5b5f6f5ffd7e75d7d6478926e1a8871d0f17d233d3b76428_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel9@sha256:4d36bc24d733039c5b5f6f5ffd7e75d7d6478926e1a8871d0f17d233d3b76428_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel9@sha256:4d36bc24d733039c5b5f6f5ffd7e75d7d6478926e1a8871d0f17d233d3b76428_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel9@sha256:aa16f897b8af025ff31cf057929e58500ea90c0297061edeed86a2431c2e05d8_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel9@sha256:aa16f897b8af025ff31cf057929e58500ea90c0297061edeed86a2431c2e05d8_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel9@sha256:aa16f897b8af025ff31cf057929e58500ea90c0297061edeed86a2431c2e05d8_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel9@sha256:cac8993111e08298dd1ca1b89849bf2f3f9b949bcced3e0825609090b696c802_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel9@sha256:cac8993111e08298dd1ca1b89849bf2f3f9b949bcced3e0825609090b696c802_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel9@sha256:cac8993111e08298dd1ca1b89849bf2f3f9b949bcced3e0825609090b696c802_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:7acb542353c9b1e44419ae8259a6845aa95efbabf32671450117d0bfec1ec47d_s390x as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:7acb542353c9b1e44419ae8259a6845aa95efbabf32671450117d0bfec1ec47d_s390x" }, "product_reference": "registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:7acb542353c9b1e44419ae8259a6845aa95efbabf32671450117d0bfec1ec47d_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:a617fae4516a79fa12e7b8ea700fe28f8736923f9680f016794472dbc4e7f880_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:a617fae4516a79fa12e7b8ea700fe28f8736923f9680f016794472dbc4e7f880_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:a617fae4516a79fa12e7b8ea700fe28f8736923f9680f016794472dbc4e7f880_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:ebc447918f3815bec8f2b44bc6f8bf73148bb8a8baeed97a0ae5e5482f62cd03_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:ebc447918f3815bec8f2b44bc6f8bf73148bb8a8baeed97a0ae5e5482f62cd03_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:ebc447918f3815bec8f2b44bc6f8bf73148bb8a8baeed97a0ae5e5482f62cd03_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:eedb97e05dca4b61827fd415391529911c7228c2f07ee9ccefc65a947bdd0f26_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:eedb97e05dca4b61827fd415391529911c7228c2f07ee9ccefc65a947bdd0f26_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:eedb97e05dca4b61827fd415391529911c7228c2f07ee9ccefc65a947bdd0f26_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:59ca3dca3ca786655f35fd0557ac7f175cfcdfc852547ac0e206d6be8663a0d9_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:59ca3dca3ca786655f35fd0557ac7f175cfcdfc852547ac0e206d6be8663a0d9_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:59ca3dca3ca786655f35fd0557ac7f175cfcdfc852547ac0e206d6be8663a0d9_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:721f8ba3a2bd66f78b53bb9a41cf7d59824ee8542488e6e967ceafc7ee4f059a_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:721f8ba3a2bd66f78b53bb9a41cf7d59824ee8542488e6e967ceafc7ee4f059a_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:721f8ba3a2bd66f78b53bb9a41cf7d59824ee8542488e6e967ceafc7ee4f059a_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:afef9a0e246ced0759f0b07cd7c3e025b473eb1fd80af368dd0cbd84443e3bf9_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:afef9a0e246ced0759f0b07cd7c3e025b473eb1fd80af368dd0cbd84443e3bf9_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:afef9a0e246ced0759f0b07cd7c3e025b473eb1fd80af368dd0cbd84443e3bf9_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:c5eae1dc9c80a737a18d49571100fcaf08c569cfa906f2d3e53e07d983a13313_s390x as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:c5eae1dc9c80a737a18d49571100fcaf08c569cfa906f2d3e53e07d983a13313_s390x" }, "product_reference": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:c5eae1dc9c80a737a18d49571100fcaf08c569cfa906f2d3e53e07d983a13313_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:54d6fe6d9305e65557248b6d118da8296cb79b8df9185287477de3e735ab7370_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:54d6fe6d9305e65557248b6d118da8296cb79b8df9185287477de3e735ab7370_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:54d6fe6d9305e65557248b6d118da8296cb79b8df9185287477de3e735ab7370_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:58f93ab660a7f5316bb77d177dc5b276224d0670e7a7a2c8e4eee6dadba3e816_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:58f93ab660a7f5316bb77d177dc5b276224d0670e7a7a2c8e4eee6dadba3e816_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:58f93ab660a7f5316bb77d177dc5b276224d0670e7a7a2c8e4eee6dadba3e816_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:d1ff2edac26d849780c0f6e99921532adc1fc4b44fabff26582af614501bc8e1_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:d1ff2edac26d849780c0f6e99921532adc1fc4b44fabff26582af614501bc8e1_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:d1ff2edac26d849780c0f6e99921532adc1fc4b44fabff26582af614501bc8e1_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:e756c4a4e1003a2406ff188119fc5a3081d7c182a0a47d28dfec382480438bf2_s390x as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:e756c4a4e1003a2406ff188119fc5a3081d7c182a0a47d28dfec382480438bf2_s390x" }, "product_reference": "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:e756c4a4e1003a2406ff188119fc5a3081d7c182a0a47d28dfec382480438bf2_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:51d61b59545b4821aa43c64281227e42393f8279529f7b0c8d5e8d43398327d4_s390x as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:51d61b59545b4821aa43c64281227e42393f8279529f7b0c8d5e8d43398327d4_s390x" }, "product_reference": "registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:51d61b59545b4821aa43c64281227e42393f8279529f7b0c8d5e8d43398327d4_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:5518b562372985e877ffd10ba0786c16d4d55b418f6d1ccebfa5375239b2c96b_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:5518b562372985e877ffd10ba0786c16d4d55b418f6d1ccebfa5375239b2c96b_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:5518b562372985e877ffd10ba0786c16d4d55b418f6d1ccebfa5375239b2c96b_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:ce8aa5a2f099d9b22063fdd29e9cc3ba3d1e6eff4d67a20a07a1b748e6dc605e_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:ce8aa5a2f099d9b22063fdd29e9cc3ba3d1e6eff4d67a20a07a1b748e6dc605e_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:ce8aa5a2f099d9b22063fdd29e9cc3ba3d1e6eff4d67a20a07a1b748e6dc605e_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:d5f9187ce1641e451de858079755768572238276040b3f363a3aa8e867189779_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:d5f9187ce1641e451de858079755768572238276040b3f363a3aa8e867189779_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:d5f9187ce1641e451de858079755768572238276040b3f363a3aa8e867189779_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:09bef866682d2daac0daed6898102ef78b770495c2e197a64f2deec43e55bbd6_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:09bef866682d2daac0daed6898102ef78b770495c2e197a64f2deec43e55bbd6_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:09bef866682d2daac0daed6898102ef78b770495c2e197a64f2deec43e55bbd6_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:9d978eecceda23a2130c64350fe9f99089fba921860b94254b0a344a7c9c4b5d_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:9d978eecceda23a2130c64350fe9f99089fba921860b94254b0a344a7c9c4b5d_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:9d978eecceda23a2130c64350fe9f99089fba921860b94254b0a344a7c9c4b5d_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:d4cf3132fad01719081987d528b682b9776b55e98c2b03fe29bea287465d44ec_s390x as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:d4cf3132fad01719081987d528b682b9776b55e98c2b03fe29bea287465d44ec_s390x" }, "product_reference": "registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:d4cf3132fad01719081987d528b682b9776b55e98c2b03fe29bea287465d44ec_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:dd7f099566be7d2256830ba520f5b65d93fd6f42b9a2da0cb3cc219fee2c759a_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:dd7f099566be7d2256830ba520f5b65d93fd6f42b9a2da0cb3cc219fee2c759a_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:dd7f099566be7d2256830ba520f5b65d93fd6f42b9a2da0cb3cc219fee2c759a_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:1518cd5936de074e4ab19a409ece10db9e2dce89333d7e542ef87bed3b4ca5cf_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:1518cd5936de074e4ab19a409ece10db9e2dce89333d7e542ef87bed3b4ca5cf_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:1518cd5936de074e4ab19a409ece10db9e2dce89333d7e542ef87bed3b4ca5cf_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:45c855f9e7d6e5a637130b5520263aac400c99aae22364f10abfc3e8a477b015_s390x as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:45c855f9e7d6e5a637130b5520263aac400c99aae22364f10abfc3e8a477b015_s390x" }, "product_reference": "registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:45c855f9e7d6e5a637130b5520263aac400c99aae22364f10abfc3e8a477b015_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:72a9c1c2719682397d373a297092cf8eaf34a7f3c622d428348cf4e95da6d99f_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:72a9c1c2719682397d373a297092cf8eaf34a7f3c622d428348cf4e95da6d99f_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:72a9c1c2719682397d373a297092cf8eaf34a7f3c622d428348cf4e95da6d99f_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:fd71deec1b26f2ac3d3f8776fb2a8a206d086afb41f95ac4471041c7e152f273_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:fd71deec1b26f2ac3d3f8776fb2a8a206d086afb41f95ac4471041c7e152f273_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:fd71deec1b26f2ac3d3f8776fb2a8a206d086afb41f95ac4471041c7e152f273_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:0a73e7209bf930eb33a57bd93eb08769ea3c74c2214d9c4875ed4167b84c86e9_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:0a73e7209bf930eb33a57bd93eb08769ea3c74c2214d9c4875ed4167b84c86e9_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:0a73e7209bf930eb33a57bd93eb08769ea3c74c2214d9c4875ed4167b84c86e9_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:45681454c5a5d75b1a906ff3e361f622c2262bd89f37d65e39ed01441104e9ba_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:45681454c5a5d75b1a906ff3e361f622c2262bd89f37d65e39ed01441104e9ba_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:45681454c5a5d75b1a906ff3e361f622c2262bd89f37d65e39ed01441104e9ba_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:56c3afb05ead06e385800fbdaa57949df7b5f4683a2f36e3e7648acd4ae88c87_s390x as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:56c3afb05ead06e385800fbdaa57949df7b5f4683a2f36e3e7648acd4ae88c87_s390x" }, "product_reference": "registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:56c3afb05ead06e385800fbdaa57949df7b5f4683a2f36e3e7648acd4ae88c87_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:fb4ceb48536fbd7cf37d686c99f3b1d73b20c3a48878e72bbd07f40009a515f4_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:fb4ceb48536fbd7cf37d686c99f3b1d73b20c3a48878e72bbd07f40009a515f4_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:fb4ceb48536fbd7cf37d686c99f3b1d73b20c3a48878e72bbd07f40009a515f4_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:5dfdf2de62e5ebf9f455ea9806ff967a45a661ae465252ba2ed605af2f995354_s390x as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:5dfdf2de62e5ebf9f455ea9806ff967a45a661ae465252ba2ed605af2f995354_s390x" }, "product_reference": "registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:5dfdf2de62e5ebf9f455ea9806ff967a45a661ae465252ba2ed605af2f995354_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:718b72ef4555035fcbae835ba3d997956a1cc6cc6bdfa5c0e39606438817e6f3_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:718b72ef4555035fcbae835ba3d997956a1cc6cc6bdfa5c0e39606438817e6f3_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:718b72ef4555035fcbae835ba3d997956a1cc6cc6bdfa5c0e39606438817e6f3_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:9de9e0b088e2187bdcf5372b8fb9acdb57fa400986f30a52c8d78df6b3828555_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:9de9e0b088e2187bdcf5372b8fb9acdb57fa400986f30a52c8d78df6b3828555_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:9de9e0b088e2187bdcf5372b8fb9acdb57fa400986f30a52c8d78df6b3828555_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:abfaeb18ed5a4fc395266dec2d0ea5949e90193e985fb44e4d34b8f422da9a4b_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:abfaeb18ed5a4fc395266dec2d0ea5949e90193e985fb44e4d34b8f422da9a4b_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:abfaeb18ed5a4fc395266dec2d0ea5949e90193e985fb44e4d34b8f422da9a4b_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:8aba42c9fa23266cf90497c9394706977d56da15790f1c9a5ff34ce159f47229_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:8aba42c9fa23266cf90497c9394706977d56da15790f1c9a5ff34ce159f47229_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:8aba42c9fa23266cf90497c9394706977d56da15790f1c9a5ff34ce159f47229_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:9c43f23a946df22e89ec811ae10c01d3ff1b23ec54351a92ab62778b0590f16a_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:9c43f23a946df22e89ec811ae10c01d3ff1b23ec54351a92ab62778b0590f16a_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:9c43f23a946df22e89ec811ae10c01d3ff1b23ec54351a92ab62778b0590f16a_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:e4a2008f3e46dd8ecb6dd7f9e33be118510b6ae4f9d49a844e96f15b3b2ea830_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:e4a2008f3e46dd8ecb6dd7f9e33be118510b6ae4f9d49a844e96f15b3b2ea830_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:e4a2008f3e46dd8ecb6dd7f9e33be118510b6ae4f9d49a844e96f15b3b2ea830_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:ed10fdbbcb33d8ba8c85f2ed1638c80593044aaf9391cbd7ba51d53fd36435dc_s390x as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:ed10fdbbcb33d8ba8c85f2ed1638c80593044aaf9391cbd7ba51d53fd36435dc_s390x" }, "product_reference": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:ed10fdbbcb33d8ba8c85f2ed1638c80593044aaf9391cbd7ba51d53fd36435dc_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:375fef1ce7a9646a586f021f649d0c09c2681eded3c35c47af0d5d0c4c91ad83_s390x as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:375fef1ce7a9646a586f021f649d0c09c2681eded3c35c47af0d5d0c4c91ad83_s390x" }, "product_reference": "registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:375fef1ce7a9646a586f021f649d0c09c2681eded3c35c47af0d5d0c4c91ad83_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:a6aee889a8eaf2d3aca3a312752622f00da62dc144afd0bc591e2f52c9463d36_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:a6aee889a8eaf2d3aca3a312752622f00da62dc144afd0bc591e2f52c9463d36_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:a6aee889a8eaf2d3aca3a312752622f00da62dc144afd0bc591e2f52c9463d36_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:ed78d42046a54227415e02b45ad0d821ee3743fb1c0ac73cdd8e5cdf09bf9f7a_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:ed78d42046a54227415e02b45ad0d821ee3743fb1c0ac73cdd8e5cdf09bf9f7a_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:ed78d42046a54227415e02b45ad0d821ee3743fb1c0ac73cdd8e5cdf09bf9f7a_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:f6fae6a57ee7abce3fde2e56b0102acc6a410a0ddd981032412db501e198a4b5_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:f6fae6a57ee7abce3fde2e56b0102acc6a410a0ddd981032412db501e198a4b5_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:f6fae6a57ee7abce3fde2e56b0102acc6a410a0ddd981032412db501e198a4b5_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:2f00fbbe5187619d8a1ae6a304ba22044a6f66ee7b3f2d122d7d71cae85af96b_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:2f00fbbe5187619d8a1ae6a304ba22044a6f66ee7b3f2d122d7d71cae85af96b_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:2f00fbbe5187619d8a1ae6a304ba22044a6f66ee7b3f2d122d7d71cae85af96b_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:3de4c9da19b4492db52d961d6435646c2de49c138b8c62ea0a5966f2d39d5758_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:3de4c9da19b4492db52d961d6435646c2de49c138b8c62ea0a5966f2d39d5758_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:3de4c9da19b4492db52d961d6435646c2de49c138b8c62ea0a5966f2d39d5758_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:9f029e2dca2420f507f4e013d42fcd491de16818be1e873db5b1ee7cf0813dca_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:9f029e2dca2420f507f4e013d42fcd491de16818be1e873db5b1ee7cf0813dca_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:9f029e2dca2420f507f4e013d42fcd491de16818be1e873db5b1ee7cf0813dca_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:a023c147a057f59f24ff8c829a2bcd212db03051533f1610f5cd5965f99dc872_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:a023c147a057f59f24ff8c829a2bcd212db03051533f1610f5cd5965f99dc872_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:a023c147a057f59f24ff8c829a2bcd212db03051533f1610f5cd5965f99dc872_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:c0b85e3bf6c0fda5eb3c74ff89af6ca1d3139a02c0c78ae05e0fb3390d36367c_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:c0b85e3bf6c0fda5eb3c74ff89af6ca1d3139a02c0c78ae05e0fb3390d36367c_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:c0b85e3bf6c0fda5eb3c74ff89af6ca1d3139a02c0c78ae05e0fb3390d36367c_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:c39fab693ec65243b4010551932b1e290d6abdb5e8728a7170c129523389512c_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:c39fab693ec65243b4010551932b1e290d6abdb5e8728a7170c129523389512c_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:c39fab693ec65243b4010551932b1e290d6abdb5e8728a7170c129523389512c_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:9fc0afa34b3986b00edbce26530b920413fb0a8d11451daed365aafd6dbbc3dd_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:9fc0afa34b3986b00edbce26530b920413fb0a8d11451daed365aafd6dbbc3dd_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:9fc0afa34b3986b00edbce26530b920413fb0a8d11451daed365aafd6dbbc3dd_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:b7bd2f78700dfd37bab208a1588cc9d6725b2ebf9d87551f3ea7a11328e37b0c_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:b7bd2f78700dfd37bab208a1588cc9d6725b2ebf9d87551f3ea7a11328e37b0c_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:b7bd2f78700dfd37bab208a1588cc9d6725b2ebf9d87551f3ea7a11328e37b0c_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:c09300d5e9549b7b99998a259eb8c89d8f6227f63b2ec5fd36a8e82474d9bd0e_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:c09300d5e9549b7b99998a259eb8c89d8f6227f63b2ec5fd36a8e82474d9bd0e_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:c09300d5e9549b7b99998a259eb8c89d8f6227f63b2ec5fd36a8e82474d9bd0e_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:f9cd7090a8b5ff3268501496c100e51c6d03b7767a6fcf2a34d66392f39f141d_s390x as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:f9cd7090a8b5ff3268501496c100e51c6d03b7767a6fcf2a34d66392f39f141d_s390x" }, "product_reference": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:f9cd7090a8b5ff3268501496c100e51c6d03b7767a6fcf2a34d66392f39f141d_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:6dbac042319562ff38e7a3315c53ed134fa9ea7fe92fec0498f0544156bd620f_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:6dbac042319562ff38e7a3315c53ed134fa9ea7fe92fec0498f0544156bd620f_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:6dbac042319562ff38e7a3315c53ed134fa9ea7fe92fec0498f0544156bd620f_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:8b86d6b7c6183d02f021481330ef9731f2322add429d4c41674de6d10a8b3ce5_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:8b86d6b7c6183d02f021481330ef9731f2322add429d4c41674de6d10a8b3ce5_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:8b86d6b7c6183d02f021481330ef9731f2322add429d4c41674de6d10a8b3ce5_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:a4c6aafbbecc7a35bb7519a4cdb85d3de47ad790cea4a68de55b0380808f9719_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:a4c6aafbbecc7a35bb7519a4cdb85d3de47ad790cea4a68de55b0380808f9719_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:a4c6aafbbecc7a35bb7519a4cdb85d3de47ad790cea4a68de55b0380808f9719_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:f63de8d96f3ff6a6f4d613f8f0126a77ef4799fae6ff251fbfba02146b168862_s390x as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:f63de8d96f3ff6a6f4d613f8f0126a77ef4799fae6ff251fbfba02146b168862_s390x" }, "product_reference": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:f63de8d96f3ff6a6f4d613f8f0126a77ef4799fae6ff251fbfba02146b168862_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:5027f9808b4c3d5dc527fa7423be77c9e31f06edaf1174b86bc80f93c078e20e_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:5027f9808b4c3d5dc527fa7423be77c9e31f06edaf1174b86bc80f93c078e20e_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:5027f9808b4c3d5dc527fa7423be77c9e31f06edaf1174b86bc80f93c078e20e_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:5a2bc1e235370ff4320c6a3b24eab88b33d146fd306fc18cdbe29fe370272d31_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:5a2bc1e235370ff4320c6a3b24eab88b33d146fd306fc18cdbe29fe370272d31_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:5a2bc1e235370ff4320c6a3b24eab88b33d146fd306fc18cdbe29fe370272d31_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:6f9835d2178c06fc53f11824b57c399a8888496bcc1b529da222716ec07241b6_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:6f9835d2178c06fc53f11824b57c399a8888496bcc1b529da222716ec07241b6_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:6f9835d2178c06fc53f11824b57c399a8888496bcc1b529da222716ec07241b6_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:dea29b962ff2296e0e72339971d002e3a064b335b85cc62a2b5efae29ca28213_s390x as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:dea29b962ff2296e0e72339971d002e3a064b335b85cc62a2b5efae29ca28213_s390x" }, "product_reference": "registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:dea29b962ff2296e0e72339971d002e3a064b335b85cc62a2b5efae29ca28213_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:23e1c25495877ed9bbb1cef819e5f0b673cec5dabb1dcd30a35134d83fd8d1e9_s390x as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:23e1c25495877ed9bbb1cef819e5f0b673cec5dabb1dcd30a35134d83fd8d1e9_s390x" }, "product_reference": "registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:23e1c25495877ed9bbb1cef819e5f0b673cec5dabb1dcd30a35134d83fd8d1e9_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:627ac2cf750afe6e2f7d2db32dbe601f78491e483c1044b8f3149bd7b52570b5_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:627ac2cf750afe6e2f7d2db32dbe601f78491e483c1044b8f3149bd7b52570b5_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:627ac2cf750afe6e2f7d2db32dbe601f78491e483c1044b8f3149bd7b52570b5_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:b6f6f3a769b97d1b17cc8e329d13ba41c4abf4ba33f313b3f265640438689e66_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:b6f6f3a769b97d1b17cc8e329d13ba41c4abf4ba33f313b3f265640438689e66_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:b6f6f3a769b97d1b17cc8e329d13ba41c4abf4ba33f313b3f265640438689e66_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:d122a2f0b564c6ca57b6d13e5a5414c47b4ab63b32d55e2fc7ac181a1113382c_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:d122a2f0b564c6ca57b6d13e5a5414c47b4ab63b32d55e2fc7ac181a1113382c_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:d122a2f0b564c6ca57b6d13e5a5414c47b4ab63b32d55e2fc7ac181a1113382c_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:0d6520092ada419664ee28aa05b6913944585db10dea0c32515a3a6b5bbdde65_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:0d6520092ada419664ee28aa05b6913944585db10dea0c32515a3a6b5bbdde65_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:0d6520092ada419664ee28aa05b6913944585db10dea0c32515a3a6b5bbdde65_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:2eb313521a707bb69b9cd479d56dbaddf8b48cdeb215f5cccccd98fa2b29edca_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:2eb313521a707bb69b9cd479d56dbaddf8b48cdeb215f5cccccd98fa2b29edca_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:2eb313521a707bb69b9cd479d56dbaddf8b48cdeb215f5cccccd98fa2b29edca_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:d6ead7d1536e82d6d1f8d1cf9073a634975dcb4310ad37e9d9a4d5ece31c1437_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:d6ead7d1536e82d6d1f8d1cf9073a634975dcb4310ad37e9d9a4d5ece31c1437_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:d6ead7d1536e82d6d1f8d1cf9073a634975dcb4310ad37e9d9a4d5ece31c1437_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:ef035463220f476f057112e9e30329cd5efa9e9bf746e527dc91fd8b57f0d57d_s390x as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:ef035463220f476f057112e9e30329cd5efa9e9bf746e527dc91fd8b57f0d57d_s390x" }, "product_reference": "registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:ef035463220f476f057112e9e30329cd5efa9e9bf746e527dc91fd8b57f0d57d_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:044d243c04c5bc65cba10b807cc8ea5e01e535dddaeb9d704e653ece61f18466_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:044d243c04c5bc65cba10b807cc8ea5e01e535dddaeb9d704e653ece61f18466_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:044d243c04c5bc65cba10b807cc8ea5e01e535dddaeb9d704e653ece61f18466_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:0c202ac95999e87b8d73f56c99508e823cbf1784c5589604f06a32009ea711e6_s390x as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:0c202ac95999e87b8d73f56c99508e823cbf1784c5589604f06a32009ea711e6_s390x" }, "product_reference": "registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:0c202ac95999e87b8d73f56c99508e823cbf1784c5589604f06a32009ea711e6_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:0d514934acfcbed0fccf17b0715a0a4c2aae78b6e25cee578042af01944265a7_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:0d514934acfcbed0fccf17b0715a0a4c2aae78b6e25cee578042af01944265a7_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:0d514934acfcbed0fccf17b0715a0a4c2aae78b6e25cee578042af01944265a7_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:7779d8bb4992a5164c85cc967d68afd71dc99874ba01c671c8aec57d957e382a_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:7779d8bb4992a5164c85cc967d68afd71dc99874ba01c671c8aec57d957e382a_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:7779d8bb4992a5164c85cc967d68afd71dc99874ba01c671c8aec57d957e382a_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:0db4c40580bab21ab06da9f657eeba182cfa215c0134a738630ab7b88ec29717_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:0db4c40580bab21ab06da9f657eeba182cfa215c0134a738630ab7b88ec29717_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:0db4c40580bab21ab06da9f657eeba182cfa215c0134a738630ab7b88ec29717_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:265ac97f0a4e57ca86108b399b26d734f4d8f0a1ca7418ebfece1c4988ea61d2_s390x as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:265ac97f0a4e57ca86108b399b26d734f4d8f0a1ca7418ebfece1c4988ea61d2_s390x" }, "product_reference": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:265ac97f0a4e57ca86108b399b26d734f4d8f0a1ca7418ebfece1c4988ea61d2_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:b45ae3c137da296284dfb7adc101fca0a89c31482224c14b34ba7d65def32bb3_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:b45ae3c137da296284dfb7adc101fca0a89c31482224c14b34ba7d65def32bb3_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:b45ae3c137da296284dfb7adc101fca0a89c31482224c14b34ba7d65def32bb3_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:f8f083d40f24ddedf816a85dc0a6a231e3a081f813bcc5d17fa5c4ae70ded745_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:f8f083d40f24ddedf816a85dc0a6a231e3a081f813bcc5d17fa5c4ae70ded745_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:f8f083d40f24ddedf816a85dc0a6a231e3a081f813bcc5d17fa5c4ae70ded745_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:154e825dd2faf97427eb739772a346d3ff03048bede4521e91d3600e8a650aaf_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:154e825dd2faf97427eb739772a346d3ff03048bede4521e91d3600e8a650aaf_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:154e825dd2faf97427eb739772a346d3ff03048bede4521e91d3600e8a650aaf_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:a4548af492265f01dd1987403bdf3536882adde1c97c526337ce5068b33f80a8_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:a4548af492265f01dd1987403bdf3536882adde1c97c526337ce5068b33f80a8_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:a4548af492265f01dd1987403bdf3536882adde1c97c526337ce5068b33f80a8_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:a60fb4521ebf5eecabefc973d1f0fbb64c47b0716cae09a4574ebb752f172820_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:a60fb4521ebf5eecabefc973d1f0fbb64c47b0716cae09a4574ebb752f172820_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:a60fb4521ebf5eecabefc973d1f0fbb64c47b0716cae09a4574ebb752f172820_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:25743b3b058ae4d006ed74eddd84fcdc75ed7f18d6cf8d60399c65ad4aff377a_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:25743b3b058ae4d006ed74eddd84fcdc75ed7f18d6cf8d60399c65ad4aff377a_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:25743b3b058ae4d006ed74eddd84fcdc75ed7f18d6cf8d60399c65ad4aff377a_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:4330a7baf77033718ede8c77ae2be9379fad97a6bdc93ae170222c5e5e2c140a_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:4330a7baf77033718ede8c77ae2be9379fad97a6bdc93ae170222c5e5e2c140a_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:4330a7baf77033718ede8c77ae2be9379fad97a6bdc93ae170222c5e5e2c140a_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:93f722f4a4d5906ab41d5d30af2ffd9656d780fb57219f6f0ad405da5d42f209_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:93f722f4a4d5906ab41d5d30af2ffd9656d780fb57219f6f0ad405da5d42f209_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:93f722f4a4d5906ab41d5d30af2ffd9656d780fb57219f6f0ad405da5d42f209_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:2824caf68d2de41479d9e0cb00d5b3f216f62d49588a6d98f09a8a1f255d4e4b_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:2824caf68d2de41479d9e0cb00d5b3f216f62d49588a6d98f09a8a1f255d4e4b_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:2824caf68d2de41479d9e0cb00d5b3f216f62d49588a6d98f09a8a1f255d4e4b_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:887e1c09568afddd90beb04ca1f9372621addd80c7e0127a07253415bc1a5cc0_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:887e1c09568afddd90beb04ca1f9372621addd80c7e0127a07253415bc1a5cc0_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:887e1c09568afddd90beb04ca1f9372621addd80c7e0127a07253415bc1a5cc0_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:bb0a4bdbd2ac40c516a6316844d0a74744438b7dd2bb5d2fa91e1f9a8a625c96_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:bb0a4bdbd2ac40c516a6316844d0a74744438b7dd2bb5d2fa91e1f9a8a625c96_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:bb0a4bdbd2ac40c516a6316844d0a74744438b7dd2bb5d2fa91e1f9a8a625c96_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:cec9a6972888bd61f2c5532f23f00c6d21d749d68d1120a464117cf4e86b1b46_s390x as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:cec9a6972888bd61f2c5532f23f00c6d21d749d68d1120a464117cf4e86b1b46_s390x" }, "product_reference": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:cec9a6972888bd61f2c5532f23f00c6d21d749d68d1120a464117cf4e86b1b46_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:49df2cc13c5944d8e15f5e948ad7a02fdf275136b3f3e8665d263d7f11e96957_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:49df2cc13c5944d8e15f5e948ad7a02fdf275136b3f3e8665d263d7f11e96957_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:49df2cc13c5944d8e15f5e948ad7a02fdf275136b3f3e8665d263d7f11e96957_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:59a9303ead116c78187cc3e6293baf39b0c090cd47cf9944ed61c70eacb20a58_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:59a9303ead116c78187cc3e6293baf39b0c090cd47cf9944ed61c70eacb20a58_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:59a9303ead116c78187cc3e6293baf39b0c090cd47cf9944ed61c70eacb20a58_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:9f606371e70ad2c63ace564df1325ba7805e1f5708cca5bc579103859dda235f_s390x as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:9f606371e70ad2c63ace564df1325ba7805e1f5708cca5bc579103859dda235f_s390x" }, "product_reference": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:9f606371e70ad2c63ace564df1325ba7805e1f5708cca5bc579103859dda235f_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:ed3f48d644d28bd5c99b42e80b06628caf002b214a161e858501c5efa724a3da_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:ed3f48d644d28bd5c99b42e80b06628caf002b214a161e858501c5efa724a3da_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:ed3f48d644d28bd5c99b42e80b06628caf002b214a161e858501c5efa724a3da_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:22c0044c4364fc454440ec5cbd20144f19bffba5ef880f510fccd737282f3736_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:22c0044c4364fc454440ec5cbd20144f19bffba5ef880f510fccd737282f3736_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:22c0044c4364fc454440ec5cbd20144f19bffba5ef880f510fccd737282f3736_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:56a7dfb0c821116ef0391ebc3e1c26f6891b23e6b8a14b679f91f3861d3b72aa_s390x as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:56a7dfb0c821116ef0391ebc3e1c26f6891b23e6b8a14b679f91f3861d3b72aa_s390x" }, "product_reference": "registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:56a7dfb0c821116ef0391ebc3e1c26f6891b23e6b8a14b679f91f3861d3b72aa_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:a5feb8fb93929543b9a641e921ea83c36bd3db18923e9f42fc958aa9c1d81090_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:a5feb8fb93929543b9a641e921ea83c36bd3db18923e9f42fc958aa9c1d81090_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:a5feb8fb93929543b9a641e921ea83c36bd3db18923e9f42fc958aa9c1d81090_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:e327b2deb2e2abda7b23df5bdca4c6bbbdfbfdeafb8bd454db63ffac360f2b6f_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:e327b2deb2e2abda7b23df5bdca4c6bbbdfbfdeafb8bd454db63ffac360f2b6f_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:e327b2deb2e2abda7b23df5bdca4c6bbbdfbfdeafb8bd454db63ffac360f2b6f_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:2940b15eeae68ce34afd10515076effc859ea7d64f92d9059b632e7939ae1391_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:2940b15eeae68ce34afd10515076effc859ea7d64f92d9059b632e7939ae1391_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:2940b15eeae68ce34afd10515076effc859ea7d64f92d9059b632e7939ae1391_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:499089cf1485b822227581cf65b787360c3eec497c8946b8e2fc2cdeb0124c1b_s390x as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:499089cf1485b822227581cf65b787360c3eec497c8946b8e2fc2cdeb0124c1b_s390x" }, "product_reference": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:499089cf1485b822227581cf65b787360c3eec497c8946b8e2fc2cdeb0124c1b_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:85de0fc6f45173774214cade3a569d018fa2054ee7f4dedba710ebf7c48bf10f_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:85de0fc6f45173774214cade3a569d018fa2054ee7f4dedba710ebf7c48bf10f_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:85de0fc6f45173774214cade3a569d018fa2054ee7f4dedba710ebf7c48bf10f_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:e28ce04dfa6a9e44288b4be2c2141e3dc3f89df3f0cfe6016325db2f3029942f_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:e28ce04dfa6a9e44288b4be2c2141e3dc3f89df3f0cfe6016325db2f3029942f_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:e28ce04dfa6a9e44288b4be2c2141e3dc3f89df3f0cfe6016325db2f3029942f_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:402f6b25541a399d7df262110c60bfccad9f6d35592b834185c78ed8cc89a2d9_s390x as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:402f6b25541a399d7df262110c60bfccad9f6d35592b834185c78ed8cc89a2d9_s390x" }, "product_reference": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:402f6b25541a399d7df262110c60bfccad9f6d35592b834185c78ed8cc89a2d9_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:48d2a7e4678933037391ea1a74702d0e2d97514d43619db333b1cb6d9845d9bb_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:48d2a7e4678933037391ea1a74702d0e2d97514d43619db333b1cb6d9845d9bb_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:48d2a7e4678933037391ea1a74702d0e2d97514d43619db333b1cb6d9845d9bb_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:72a2d2f94f8098ead32c9fb2f7995d9a4ca1ab69c5179dccc1664b0d1a9585ab_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:72a2d2f94f8098ead32c9fb2f7995d9a4ca1ab69c5179dccc1664b0d1a9585ab_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:72a2d2f94f8098ead32c9fb2f7995d9a4ca1ab69c5179dccc1664b0d1a9585ab_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:7ae8b74b8e0a471669a1aec95825e859d42772bea7817eb433820f0282c3bdb0_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:7ae8b74b8e0a471669a1aec95825e859d42772bea7817eb433820f0282c3bdb0_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:7ae8b74b8e0a471669a1aec95825e859d42772bea7817eb433820f0282c3bdb0_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:b79fd249734c576fce3eeb4950d9257d128803fc31a2c7e17bd235b1701cee8d_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:b79fd249734c576fce3eeb4950d9257d128803fc31a2c7e17bd235b1701cee8d_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:b79fd249734c576fce3eeb4950d9257d128803fc31a2c7e17bd235b1701cee8d_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:d9b8908987a42797a81f3ccad890d764d1fabf1a7873a400974e6e7b0c4db46d_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:d9b8908987a42797a81f3ccad890d764d1fabf1a7873a400974e6e7b0c4db46d_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:d9b8908987a42797a81f3ccad890d764d1fabf1a7873a400974e6e7b0c4db46d_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:f80ca336c30cd9eb216c8d1ceebec7f2274797dd58927fdc4555bea07385a063_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:f80ca336c30cd9eb216c8d1ceebec7f2274797dd58927fdc4555bea07385a063_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:f80ca336c30cd9eb216c8d1ceebec7f2274797dd58927fdc4555bea07385a063_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-sriov-infiniband-cni-rhel9@sha256:99264636bdc9aca0af6a0a5d1f3f401cbce7a27c6136b7e992403ce1d1093d4a_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-infiniband-cni-rhel9@sha256:99264636bdc9aca0af6a0a5d1f3f401cbce7a27c6136b7e992403ce1d1093d4a_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-sriov-infiniband-cni-rhel9@sha256:99264636bdc9aca0af6a0a5d1f3f401cbce7a27c6136b7e992403ce1d1093d4a_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-sriov-infiniband-cni-rhel9@sha256:d2d2ca29c9bd844983652892882e0592f4ccf0fe7d7a55f1006d5780c9d27f90_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-infiniband-cni-rhel9@sha256:d2d2ca29c9bd844983652892882e0592f4ccf0fe7d7a55f1006d5780c9d27f90_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-sriov-infiniband-cni-rhel9@sha256:d2d2ca29c9bd844983652892882e0592f4ccf0fe7d7a55f1006d5780c9d27f90_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-sriov-infiniband-cni-rhel9@sha256:f80b9428b0a79280590cc1b7406cdde67d8fea55b249c6700cbbd9bb226b0095_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-infiniband-cni-rhel9@sha256:f80b9428b0a79280590cc1b7406cdde67d8fea55b249c6700cbbd9bb226b0095_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-sriov-infiniband-cni-rhel9@sha256:f80b9428b0a79280590cc1b7406cdde67d8fea55b249c6700cbbd9bb226b0095_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-sriov-network-config-daemon-rhel9@sha256:2a07fe5a54caad8cc1cb288a150a4c6edf23399a6269a0e4dba1c596d5ee822b_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-config-daemon-rhel9@sha256:2a07fe5a54caad8cc1cb288a150a4c6edf23399a6269a0e4dba1c596d5ee822b_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-sriov-network-config-daemon-rhel9@sha256:2a07fe5a54caad8cc1cb288a150a4c6edf23399a6269a0e4dba1c596d5ee822b_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-sriov-network-config-daemon-rhel9@sha256:9648de36a35478d6cb60f97091a6717d066f25bf15c66be7823dee4756e53e20_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-config-daemon-rhel9@sha256:9648de36a35478d6cb60f97091a6717d066f25bf15c66be7823dee4756e53e20_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-sriov-network-config-daemon-rhel9@sha256:9648de36a35478d6cb60f97091a6717d066f25bf15c66be7823dee4756e53e20_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-sriov-network-config-daemon-rhel9@sha256:dab58539af0978a72de25d025dba952396fe5a4a1503415a89a288f9cc57c32e_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-config-daemon-rhel9@sha256:dab58539af0978a72de25d025dba952396fe5a4a1503415a89a288f9cc57c32e_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-sriov-network-config-daemon-rhel9@sha256:dab58539af0978a72de25d025dba952396fe5a4a1503415a89a288f9cc57c32e_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-sriov-network-device-plugin-rhel9@sha256:112b3ff1ac44ac9f8c56ef5d56797bcf631a4e8383697327ddde07b8d6a886dd_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-device-plugin-rhel9@sha256:112b3ff1ac44ac9f8c56ef5d56797bcf631a4e8383697327ddde07b8d6a886dd_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-sriov-network-device-plugin-rhel9@sha256:112b3ff1ac44ac9f8c56ef5d56797bcf631a4e8383697327ddde07b8d6a886dd_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-sriov-network-device-plugin-rhel9@sha256:e2e74e408786c0e2d297549adee326f80064dbecec31758e433940faf62ac19f_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-device-plugin-rhel9@sha256:e2e74e408786c0e2d297549adee326f80064dbecec31758e433940faf62ac19f_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-sriov-network-device-plugin-rhel9@sha256:e2e74e408786c0e2d297549adee326f80064dbecec31758e433940faf62ac19f_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-sriov-network-device-plugin-rhel9@sha256:fa929c7ae3a2f8bdd04cefabc4eda3b2c2d52c4d2a255b2df07c3216849ef5a9_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-device-plugin-rhel9@sha256:fa929c7ae3a2f8bdd04cefabc4eda3b2c2d52c4d2a255b2df07c3216849ef5a9_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-sriov-network-device-plugin-rhel9@sha256:fa929c7ae3a2f8bdd04cefabc4eda3b2c2d52c4d2a255b2df07c3216849ef5a9_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:31814e21cf5ade0c2e3b02c307905c0924bb1c11da95e018741dd50ff0ec8faa_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:31814e21cf5ade0c2e3b02c307905c0924bb1c11da95e018741dd50ff0ec8faa_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:31814e21cf5ade0c2e3b02c307905c0924bb1c11da95e018741dd50ff0ec8faa_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:33e1b152221b08d0767cc9c36db82a5b50fb5c935f36a2a5e21a3cdf8862f25c_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:33e1b152221b08d0767cc9c36db82a5b50fb5c935f36a2a5e21a3cdf8862f25c_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:33e1b152221b08d0767cc9c36db82a5b50fb5c935f36a2a5e21a3cdf8862f25c_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:fadb335a1e41fae79a2675687540f1d73c5ad8f2708a7d1c41871baa0002f762_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:fadb335a1e41fae79a2675687540f1d73c5ad8f2708a7d1c41871baa0002f762_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:fadb335a1e41fae79a2675687540f1d73c5ad8f2708a7d1c41871baa0002f762_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-sriov-network-rhel9-operator@sha256:765b728aae77f302d934ab5cae15fadd4653a07171ebbef7376445d53a3f8c64_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-rhel9-operator@sha256:765b728aae77f302d934ab5cae15fadd4653a07171ebbef7376445d53a3f8c64_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-sriov-network-rhel9-operator@sha256:765b728aae77f302d934ab5cae15fadd4653a07171ebbef7376445d53a3f8c64_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-sriov-network-rhel9-operator@sha256:8531f4266ddea002a2f98ae754ce8807de2c4f2ed05d49012dca5bc75fa5c77b_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-rhel9-operator@sha256:8531f4266ddea002a2f98ae754ce8807de2c4f2ed05d49012dca5bc75fa5c77b_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-sriov-network-rhel9-operator@sha256:8531f4266ddea002a2f98ae754ce8807de2c4f2ed05d49012dca5bc75fa5c77b_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-sriov-network-rhel9-operator@sha256:ff48a7469e12cd08de049e79630a7e8eb729e6ed49045270129e2415ccad51cd_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-rhel9-operator@sha256:ff48a7469e12cd08de049e79630a7e8eb729e6ed49045270129e2415ccad51cd_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-sriov-network-rhel9-operator@sha256:ff48a7469e12cd08de049e79630a7e8eb729e6ed49045270129e2415ccad51cd_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-sriov-network-webhook-rhel9@sha256:087793fdcd1427757c9560226004745c5d4f4ab45402e4b6dd2b3ea4a7cb3869_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-webhook-rhel9@sha256:087793fdcd1427757c9560226004745c5d4f4ab45402e4b6dd2b3ea4a7cb3869_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-sriov-network-webhook-rhel9@sha256:087793fdcd1427757c9560226004745c5d4f4ab45402e4b6dd2b3ea4a7cb3869_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-sriov-network-webhook-rhel9@sha256:2c088002b99503ca37f61ac45bd5ac725e75581927780d17a6868cb730887792_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-webhook-rhel9@sha256:2c088002b99503ca37f61ac45bd5ac725e75581927780d17a6868cb730887792_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-sriov-network-webhook-rhel9@sha256:2c088002b99503ca37f61ac45bd5ac725e75581927780d17a6868cb730887792_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-sriov-network-webhook-rhel9@sha256:41d54adb9a58d171d323a95c419bbdabaf74c96f5eca2c7da95b2dc28defd1da_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-webhook-rhel9@sha256:41d54adb9a58d171d323a95c419bbdabaf74c96f5eca2c7da95b2dc28defd1da_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-sriov-network-webhook-rhel9@sha256:41d54adb9a58d171d323a95c419bbdabaf74c96f5eca2c7da95b2dc28defd1da_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:b1f7bab87724e17a1e8ffe9adf910403420d1c94a1a722d78f92b6497374c35a_s390x as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:b1f7bab87724e17a1e8ffe9adf910403420d1c94a1a722d78f92b6497374c35a_s390x" }, "product_reference": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:b1f7bab87724e17a1e8ffe9adf910403420d1c94a1a722d78f92b6497374c35a_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:d1b7df836d1718ad5b60d9ce0d2779e8864be88d5c701ab1b4f1037e8c47fab8_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:d1b7df836d1718ad5b60d9ce0d2779e8864be88d5c701ab1b4f1037e8c47fab8_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:d1b7df836d1718ad5b60d9ce0d2779e8864be88d5c701ab1b4f1037e8c47fab8_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:dbb8d3a6933dd33dd7705670320cb73e9dfa06d873491fdbf7a6e6a2067ff99f_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:dbb8d3a6933dd33dd7705670320cb73e9dfa06d873491fdbf7a6e6a2067ff99f_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:dbb8d3a6933dd33dd7705670320cb73e9dfa06d873491fdbf7a6e6a2067ff99f_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:ff3b350fc6737438e19cd74cbbeb865a7abe213c0c7bd67799448211ec672c1b_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:ff3b350fc6737438e19cd74cbbeb865a7abe213c0c7bd67799448211ec672c1b_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:ff3b350fc6737438e19cd74cbbeb865a7abe213c0c7bd67799448211ec672c1b_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:2631ae991c4a888149952025f280dca4c9d4270649ff01018a139bc2bfd436ef_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:2631ae991c4a888149952025f280dca4c9d4270649ff01018a139bc2bfd436ef_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:2631ae991c4a888149952025f280dca4c9d4270649ff01018a139bc2bfd436ef_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:3476b48ea410d1e3788b2f0118600a03dda9d0e19643a4f4789c41f81d4dd6bc_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:3476b48ea410d1e3788b2f0118600a03dda9d0e19643a4f4789c41f81d4dd6bc_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:3476b48ea410d1e3788b2f0118600a03dda9d0e19643a4f4789c41f81d4dd6bc_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:43e07cfc6c04f82dbd449b3f99787c8a999a492dc8d01870ff91a81a1232ceab_s390x as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:43e07cfc6c04f82dbd449b3f99787c8a999a492dc8d01870ff91a81a1232ceab_s390x" }, "product_reference": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:43e07cfc6c04f82dbd449b3f99787c8a999a492dc8d01870ff91a81a1232ceab_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:d200c4afef7a55d953c475e82701931411958fd030a0c6cf098435db4c4dabd6_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:d200c4afef7a55d953c475e82701931411958fd030a0c6cf098435db4c4dabd6_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:d200c4afef7a55d953c475e82701931411958fd030a0c6cf098435db4c4dabd6_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ptp-must-gather-rhel9@sha256:3c7acd5660f3641965ec8f1b2cca7d7eecc272fa1125212d2cda00697597269b_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ptp-must-gather-rhel9@sha256:3c7acd5660f3641965ec8f1b2cca7d7eecc272fa1125212d2cda00697597269b_amd64" }, "product_reference": "registry.redhat.io/openshift4/ptp-must-gather-rhel9@sha256:3c7acd5660f3641965ec8f1b2cca7d7eecc272fa1125212d2cda00697597269b_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ptp-must-gather-rhel9@sha256:80892d9724da67281eae207177839622fc3fa6a6e0708aed5779489687825667_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ptp-must-gather-rhel9@sha256:80892d9724da67281eae207177839622fc3fa6a6e0708aed5779489687825667_arm64" }, "product_reference": "registry.redhat.io/openshift4/ptp-must-gather-rhel9@sha256:80892d9724da67281eae207177839622fc3fa6a6e0708aed5779489687825667_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ptp-must-gather-rhel9@sha256:fc3b122b700ba1e43c713d5ea4fd7da8862d21be81536d718bf328183a93e76b_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ptp-must-gather-rhel9@sha256:fc3b122b700ba1e43c713d5ea4fd7da8862d21be81536d718bf328183a93e76b_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ptp-must-gather-rhel9@sha256:fc3b122b700ba1e43c713d5ea4fd7da8862d21be81536d718bf328183a93e76b_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/sriov-cni-rhel9@sha256:0d6c49f6952053c780290440d4eb73b1b429cecff55b92e9fb32661a8105d9f6_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/sriov-cni-rhel9@sha256:0d6c49f6952053c780290440d4eb73b1b429cecff55b92e9fb32661a8105d9f6_arm64" }, "product_reference": "registry.redhat.io/openshift4/sriov-cni-rhel9@sha256:0d6c49f6952053c780290440d4eb73b1b429cecff55b92e9fb32661a8105d9f6_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/sriov-cni-rhel9@sha256:6d074f59be4b492beb98c57420aa072ba0821f01e82dd3dd44cbccbb5facd307_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/sriov-cni-rhel9@sha256:6d074f59be4b492beb98c57420aa072ba0821f01e82dd3dd44cbccbb5facd307_amd64" }, "product_reference": "registry.redhat.io/openshift4/sriov-cni-rhel9@sha256:6d074f59be4b492beb98c57420aa072ba0821f01e82dd3dd44cbccbb5facd307_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/sriov-cni-rhel9@sha256:75c7ee59e78ae712b40816950305500b1b0df7fffafdad1fdf00120284b6ac10_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/sriov-cni-rhel9@sha256:75c7ee59e78ae712b40816950305500b1b0df7fffafdad1fdf00120284b6ac10_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/sriov-cni-rhel9@sha256:75c7ee59e78ae712b40816950305500b1b0df7fffafdad1fdf00120284b6ac10_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/sriov-network-metrics-exporter-rhel9@sha256:31814e21cf5ade0c2e3b02c307905c0924bb1c11da95e018741dd50ff0ec8faa_amd64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/sriov-network-metrics-exporter-rhel9@sha256:31814e21cf5ade0c2e3b02c307905c0924bb1c11da95e018741dd50ff0ec8faa_amd64" }, "product_reference": "registry.redhat.io/openshift4/sriov-network-metrics-exporter-rhel9@sha256:31814e21cf5ade0c2e3b02c307905c0924bb1c11da95e018741dd50ff0ec8faa_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/sriov-network-metrics-exporter-rhel9@sha256:33e1b152221b08d0767cc9c36db82a5b50fb5c935f36a2a5e21a3cdf8862f25c_ppc64le as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/sriov-network-metrics-exporter-rhel9@sha256:33e1b152221b08d0767cc9c36db82a5b50fb5c935f36a2a5e21a3cdf8862f25c_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/sriov-network-metrics-exporter-rhel9@sha256:33e1b152221b08d0767cc9c36db82a5b50fb5c935f36a2a5e21a3cdf8862f25c_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/sriov-network-metrics-exporter-rhel9@sha256:fadb335a1e41fae79a2675687540f1d73c5ad8f2708a7d1c41871baa0002f762_arm64 as a component of Red Hat OpenShift Container Platform 4.16", "product_id": "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/sriov-network-metrics-exporter-rhel9@sha256:fadb335a1e41fae79a2675687540f1d73c5ad8f2708a7d1c41871baa0002f762_arm64" }, "product_reference": "registry.redhat.io/openshift4/sriov-network-metrics-exporter-rhel9@sha256:fadb335a1e41fae79a2675687540f1d73c5ad8f2708a7d1c41871baa0002f762_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.16" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-53547", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2025-07-08T22:01:16.594090+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/frr-rhel9@sha256:436e231123e2ed85c356581d4a360829b66378fd77f7c7721af6c1566ac9f4c8_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/frr-rhel9@sha256:56fe6b95ab3e5828a678e358e62c448450b23076deff4fc27f2c2f55138de942_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/frr-rhel9@sha256:7ce6da2a5472c6e9e4c16121dab5383cdab199132d8a32b979c85c32f5cf22c8_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/frr-rhel9@sha256:ca1037a6de7a5e971eb4156c09405b1e2429d80d06ec556ad7e8a8e870cb5e4e_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:1bb6e95f2a318f23084fcbd52c72ab10dabdcdfb108ba01a59c20726e7825d66_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:340b37f7f6b6480b6363a32c9224f950ad4b5cc8cce80a7587a196bf469c37c0_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:4db405877680fc217556538e6eb50ced781b1b03fc5cdc1ca8ff675d02e2b759_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:59f746cde3367f20906a4d159a695870f59f7b014eb65873fc03a3a4aec4eccc_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:4a0808cb4bcdc71c56524b8df2ea1bca7fd79ce07885fbc501a0e866a48f0c1f_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:bf45ca42e403aa90ed0c879310afce06cf2324e238a2a77914039f6986fb7f30_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:c7b880c48b0b854e8306cf20e2a712d95f935c9a5af7dd344f9dddae4f25c964_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:e2013455866530bd75352b33a6fa531fa2eeda3f7bd451175c34cb5d102730db_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:b0f2fb27e76df1174d35187cad91bb182b708666a8fc475edf3eb27f879fe654_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:be067d91545cd38b053d72ce2f8eb96281c9bab022faf592d4a5771e364ac14b_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:dd0bab658b526f964ccfae100bcf78e92527264afd7b4dcdbd418cecc45f20ee_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:de7aff1d3e5327e055b8d379ec11d7c08b3bb9cef905da3ccbdee3a3dd442439_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:41fa1a5080af655693353865be2c4da1f380217475e9c8cc8be1eeee9f6f8693_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:80b3155ba9471c907038708b74c01fbff6dce5e03d03493341192734be7f2341_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:b3b1e0c43e63acbafb35e5d2b263b36b76c7c05848984af367c2d710fcc24b64_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:c606fccb24249bc06665010dca6589a1abd9b170a3d5994a9d758ad9bf90c87d_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9@sha256:35d706ab0602758ea6cc74676aeaa96a94de8810733be90dd32c98cc2a044ff8_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9@sha256:516f3ba6444df3ad872c46fbe660fe1de51370c93f8633472353cd50f142b8c5_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9@sha256:9110d91175a0e8264d827eb63e9aafaac22649734b29bba38a935284e8a6f0ba_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9@sha256:ffc64f071866f5bc52520c50c653b8213a420739f1628d16715b4748eb8b5cb9_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:61179875ba13abad11ca059ba54c935282bb3f72429304e4257c947810a7cab0_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:7caca879750e5100a7268bfb328536585245e38a8472d97d3fc696fe63a0d07d_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:9ab9381e965aaff607825b019380d287e3eb3949de5aa154cf14defa10085d86_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:c01786e1970d1e03ab2a0bd529e336cfa8934d6bd138932bb72ed75850ced097_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:3442fa3ef8aee7aaac6991543a841da8c8c9fe9c7010cd01af5b3f8a5bf20bad_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:58f3b0d48ae9195c00580db9350a7cae0de13cc2349ba5f922238cadb996b283_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:7d348b1a3587607ead56192ddea878f5d06948f1313526aa3acc167554c1eccf_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:d14c44eef789614b98551388f573f79127413d6b752489d40a88b9089a4bd201_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:09273daaad62591c5a3b4a7364ccfa5a760951a16d1a2457c5574ca662bfd042_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:42528dd7ac879c3e5318372d6ef55072d171f5465cc782822f1ff9e9d89419b2_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:3e90674782ef913f76b186f3545027380f57a0c0a761ee06e78a59d791b0bd10_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:a64582fcb1815012a2943cb204e9412a2248c51e2f101fe8c90b65010cafe858_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:3a690c454749f4ab893e2f20c2ecee94aa0b47fdf3f96e9d91ef6b31b5dfae77_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:3ca2c38901472326083fd433d0cef6c5d566dacb2e6ed0891de361e20ae2409a_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:b04628c8163c7e47ac69ae619269f7a3aaf557e17e980f6c158febd7447fcb47_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:fc4029313c457900f20d1015a3508cdb1f4b2ebc945a5005c429427a443b1377_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel9@sha256:4d36bc24d733039c5b5f6f5ffd7e75d7d6478926e1a8871d0f17d233d3b76428_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel9@sha256:aa16f897b8af025ff31cf057929e58500ea90c0297061edeed86a2431c2e05d8_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel9@sha256:cac8993111e08298dd1ca1b89849bf2f3f9b949bcced3e0825609090b696c802_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:7acb542353c9b1e44419ae8259a6845aa95efbabf32671450117d0bfec1ec47d_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:a617fae4516a79fa12e7b8ea700fe28f8736923f9680f016794472dbc4e7f880_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:ebc447918f3815bec8f2b44bc6f8bf73148bb8a8baeed97a0ae5e5482f62cd03_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:eedb97e05dca4b61827fd415391529911c7228c2f07ee9ccefc65a947bdd0f26_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:59ca3dca3ca786655f35fd0557ac7f175cfcdfc852547ac0e206d6be8663a0d9_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:721f8ba3a2bd66f78b53bb9a41cf7d59824ee8542488e6e967ceafc7ee4f059a_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:afef9a0e246ced0759f0b07cd7c3e025b473eb1fd80af368dd0cbd84443e3bf9_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:c5eae1dc9c80a737a18d49571100fcaf08c569cfa906f2d3e53e07d983a13313_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:54d6fe6d9305e65557248b6d118da8296cb79b8df9185287477de3e735ab7370_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:58f93ab660a7f5316bb77d177dc5b276224d0670e7a7a2c8e4eee6dadba3e816_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:d1ff2edac26d849780c0f6e99921532adc1fc4b44fabff26582af614501bc8e1_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:e756c4a4e1003a2406ff188119fc5a3081d7c182a0a47d28dfec382480438bf2_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:51d61b59545b4821aa43c64281227e42393f8279529f7b0c8d5e8d43398327d4_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:5518b562372985e877ffd10ba0786c16d4d55b418f6d1ccebfa5375239b2c96b_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:ce8aa5a2f099d9b22063fdd29e9cc3ba3d1e6eff4d67a20a07a1b748e6dc605e_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:d5f9187ce1641e451de858079755768572238276040b3f363a3aa8e867189779_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:09bef866682d2daac0daed6898102ef78b770495c2e197a64f2deec43e55bbd6_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:9d978eecceda23a2130c64350fe9f99089fba921860b94254b0a344a7c9c4b5d_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:d4cf3132fad01719081987d528b682b9776b55e98c2b03fe29bea287465d44ec_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:dd7f099566be7d2256830ba520f5b65d93fd6f42b9a2da0cb3cc219fee2c759a_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:1518cd5936de074e4ab19a409ece10db9e2dce89333d7e542ef87bed3b4ca5cf_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:45c855f9e7d6e5a637130b5520263aac400c99aae22364f10abfc3e8a477b015_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:72a9c1c2719682397d373a297092cf8eaf34a7f3c622d428348cf4e95da6d99f_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:fd71deec1b26f2ac3d3f8776fb2a8a206d086afb41f95ac4471041c7e152f273_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:0a73e7209bf930eb33a57bd93eb08769ea3c74c2214d9c4875ed4167b84c86e9_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:45681454c5a5d75b1a906ff3e361f622c2262bd89f37d65e39ed01441104e9ba_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:56c3afb05ead06e385800fbdaa57949df7b5f4683a2f36e3e7648acd4ae88c87_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:fb4ceb48536fbd7cf37d686c99f3b1d73b20c3a48878e72bbd07f40009a515f4_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:5dfdf2de62e5ebf9f455ea9806ff967a45a661ae465252ba2ed605af2f995354_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:718b72ef4555035fcbae835ba3d997956a1cc6cc6bdfa5c0e39606438817e6f3_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:9de9e0b088e2187bdcf5372b8fb9acdb57fa400986f30a52c8d78df6b3828555_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:abfaeb18ed5a4fc395266dec2d0ea5949e90193e985fb44e4d34b8f422da9a4b_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:8aba42c9fa23266cf90497c9394706977d56da15790f1c9a5ff34ce159f47229_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:9c43f23a946df22e89ec811ae10c01d3ff1b23ec54351a92ab62778b0590f16a_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:e4a2008f3e46dd8ecb6dd7f9e33be118510b6ae4f9d49a844e96f15b3b2ea830_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:ed10fdbbcb33d8ba8c85f2ed1638c80593044aaf9391cbd7ba51d53fd36435dc_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:375fef1ce7a9646a586f021f649d0c09c2681eded3c35c47af0d5d0c4c91ad83_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:a6aee889a8eaf2d3aca3a312752622f00da62dc144afd0bc591e2f52c9463d36_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:ed78d42046a54227415e02b45ad0d821ee3743fb1c0ac73cdd8e5cdf09bf9f7a_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:f6fae6a57ee7abce3fde2e56b0102acc6a410a0ddd981032412db501e198a4b5_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:2f00fbbe5187619d8a1ae6a304ba22044a6f66ee7b3f2d122d7d71cae85af96b_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:3de4c9da19b4492db52d961d6435646c2de49c138b8c62ea0a5966f2d39d5758_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:9f029e2dca2420f507f4e013d42fcd491de16818be1e873db5b1ee7cf0813dca_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:a023c147a057f59f24ff8c829a2bcd212db03051533f1610f5cd5965f99dc872_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:c0b85e3bf6c0fda5eb3c74ff89af6ca1d3139a02c0c78ae05e0fb3390d36367c_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:c39fab693ec65243b4010551932b1e290d6abdb5e8728a7170c129523389512c_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:9fc0afa34b3986b00edbce26530b920413fb0a8d11451daed365aafd6dbbc3dd_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:b7bd2f78700dfd37bab208a1588cc9d6725b2ebf9d87551f3ea7a11328e37b0c_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:c09300d5e9549b7b99998a259eb8c89d8f6227f63b2ec5fd36a8e82474d9bd0e_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:f9cd7090a8b5ff3268501496c100e51c6d03b7767a6fcf2a34d66392f39f141d_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:6dbac042319562ff38e7a3315c53ed134fa9ea7fe92fec0498f0544156bd620f_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:8b86d6b7c6183d02f021481330ef9731f2322add429d4c41674de6d10a8b3ce5_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:a4c6aafbbecc7a35bb7519a4cdb85d3de47ad790cea4a68de55b0380808f9719_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:f63de8d96f3ff6a6f4d613f8f0126a77ef4799fae6ff251fbfba02146b168862_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:5027f9808b4c3d5dc527fa7423be77c9e31f06edaf1174b86bc80f93c078e20e_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:5a2bc1e235370ff4320c6a3b24eab88b33d146fd306fc18cdbe29fe370272d31_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:6f9835d2178c06fc53f11824b57c399a8888496bcc1b529da222716ec07241b6_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:dea29b962ff2296e0e72339971d002e3a064b335b85cc62a2b5efae29ca28213_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:23e1c25495877ed9bbb1cef819e5f0b673cec5dabb1dcd30a35134d83fd8d1e9_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:627ac2cf750afe6e2f7d2db32dbe601f78491e483c1044b8f3149bd7b52570b5_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:b6f6f3a769b97d1b17cc8e329d13ba41c4abf4ba33f313b3f265640438689e66_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:d122a2f0b564c6ca57b6d13e5a5414c47b4ab63b32d55e2fc7ac181a1113382c_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:0d6520092ada419664ee28aa05b6913944585db10dea0c32515a3a6b5bbdde65_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:2eb313521a707bb69b9cd479d56dbaddf8b48cdeb215f5cccccd98fa2b29edca_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:d6ead7d1536e82d6d1f8d1cf9073a634975dcb4310ad37e9d9a4d5ece31c1437_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:ef035463220f476f057112e9e30329cd5efa9e9bf746e527dc91fd8b57f0d57d_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:044d243c04c5bc65cba10b807cc8ea5e01e535dddaeb9d704e653ece61f18466_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:0c202ac95999e87b8d73f56c99508e823cbf1784c5589604f06a32009ea711e6_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:0d514934acfcbed0fccf17b0715a0a4c2aae78b6e25cee578042af01944265a7_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:7779d8bb4992a5164c85cc967d68afd71dc99874ba01c671c8aec57d957e382a_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:154e825dd2faf97427eb739772a346d3ff03048bede4521e91d3600e8a650aaf_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:a4548af492265f01dd1987403bdf3536882adde1c97c526337ce5068b33f80a8_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:a60fb4521ebf5eecabefc973d1f0fbb64c47b0716cae09a4574ebb752f172820_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:25743b3b058ae4d006ed74eddd84fcdc75ed7f18d6cf8d60399c65ad4aff377a_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:4330a7baf77033718ede8c77ae2be9379fad97a6bdc93ae170222c5e5e2c140a_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:93f722f4a4d5906ab41d5d30af2ffd9656d780fb57219f6f0ad405da5d42f209_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:2824caf68d2de41479d9e0cb00d5b3f216f62d49588a6d98f09a8a1f255d4e4b_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:887e1c09568afddd90beb04ca1f9372621addd80c7e0127a07253415bc1a5cc0_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:bb0a4bdbd2ac40c516a6316844d0a74744438b7dd2bb5d2fa91e1f9a8a625c96_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:cec9a6972888bd61f2c5532f23f00c6d21d749d68d1120a464117cf4e86b1b46_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:49df2cc13c5944d8e15f5e948ad7a02fdf275136b3f3e8665d263d7f11e96957_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:59a9303ead116c78187cc3e6293baf39b0c090cd47cf9944ed61c70eacb20a58_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:9f606371e70ad2c63ace564df1325ba7805e1f5708cca5bc579103859dda235f_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:ed3f48d644d28bd5c99b42e80b06628caf002b214a161e858501c5efa724a3da_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:22c0044c4364fc454440ec5cbd20144f19bffba5ef880f510fccd737282f3736_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:56a7dfb0c821116ef0391ebc3e1c26f6891b23e6b8a14b679f91f3861d3b72aa_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:a5feb8fb93929543b9a641e921ea83c36bd3db18923e9f42fc958aa9c1d81090_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:e327b2deb2e2abda7b23df5bdca4c6bbbdfbfdeafb8bd454db63ffac360f2b6f_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:2940b15eeae68ce34afd10515076effc859ea7d64f92d9059b632e7939ae1391_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:499089cf1485b822227581cf65b787360c3eec497c8946b8e2fc2cdeb0124c1b_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:85de0fc6f45173774214cade3a569d018fa2054ee7f4dedba710ebf7c48bf10f_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:e28ce04dfa6a9e44288b4be2c2141e3dc3f89df3f0cfe6016325db2f3029942f_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:402f6b25541a399d7df262110c60bfccad9f6d35592b834185c78ed8cc89a2d9_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:48d2a7e4678933037391ea1a74702d0e2d97514d43619db333b1cb6d9845d9bb_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:72a2d2f94f8098ead32c9fb2f7995d9a4ca1ab69c5179dccc1664b0d1a9585ab_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:7ae8b74b8e0a471669a1aec95825e859d42772bea7817eb433820f0282c3bdb0_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:b79fd249734c576fce3eeb4950d9257d128803fc31a2c7e17bd235b1701cee8d_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:d9b8908987a42797a81f3ccad890d764d1fabf1a7873a400974e6e7b0c4db46d_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:f80ca336c30cd9eb216c8d1ceebec7f2274797dd58927fdc4555bea07385a063_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-infiniband-cni-rhel9@sha256:99264636bdc9aca0af6a0a5d1f3f401cbce7a27c6136b7e992403ce1d1093d4a_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-infiniband-cni-rhel9@sha256:d2d2ca29c9bd844983652892882e0592f4ccf0fe7d7a55f1006d5780c9d27f90_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-infiniband-cni-rhel9@sha256:f80b9428b0a79280590cc1b7406cdde67d8fea55b249c6700cbbd9bb226b0095_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-config-daemon-rhel9@sha256:2a07fe5a54caad8cc1cb288a150a4c6edf23399a6269a0e4dba1c596d5ee822b_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-config-daemon-rhel9@sha256:9648de36a35478d6cb60f97091a6717d066f25bf15c66be7823dee4756e53e20_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-config-daemon-rhel9@sha256:dab58539af0978a72de25d025dba952396fe5a4a1503415a89a288f9cc57c32e_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-device-plugin-rhel9@sha256:112b3ff1ac44ac9f8c56ef5d56797bcf631a4e8383697327ddde07b8d6a886dd_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-device-plugin-rhel9@sha256:e2e74e408786c0e2d297549adee326f80064dbecec31758e433940faf62ac19f_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-device-plugin-rhel9@sha256:fa929c7ae3a2f8bdd04cefabc4eda3b2c2d52c4d2a255b2df07c3216849ef5a9_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:31814e21cf5ade0c2e3b02c307905c0924bb1c11da95e018741dd50ff0ec8faa_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:33e1b152221b08d0767cc9c36db82a5b50fb5c935f36a2a5e21a3cdf8862f25c_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:fadb335a1e41fae79a2675687540f1d73c5ad8f2708a7d1c41871baa0002f762_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-rhel9-operator@sha256:765b728aae77f302d934ab5cae15fadd4653a07171ebbef7376445d53a3f8c64_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-rhel9-operator@sha256:8531f4266ddea002a2f98ae754ce8807de2c4f2ed05d49012dca5bc75fa5c77b_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-rhel9-operator@sha256:ff48a7469e12cd08de049e79630a7e8eb729e6ed49045270129e2415ccad51cd_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-webhook-rhel9@sha256:087793fdcd1427757c9560226004745c5d4f4ab45402e4b6dd2b3ea4a7cb3869_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-webhook-rhel9@sha256:2c088002b99503ca37f61ac45bd5ac725e75581927780d17a6868cb730887792_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-webhook-rhel9@sha256:41d54adb9a58d171d323a95c419bbdabaf74c96f5eca2c7da95b2dc28defd1da_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:b1f7bab87724e17a1e8ffe9adf910403420d1c94a1a722d78f92b6497374c35a_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:d1b7df836d1718ad5b60d9ce0d2779e8864be88d5c701ab1b4f1037e8c47fab8_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:dbb8d3a6933dd33dd7705670320cb73e9dfa06d873491fdbf7a6e6a2067ff99f_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:ff3b350fc6737438e19cd74cbbeb865a7abe213c0c7bd67799448211ec672c1b_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:2631ae991c4a888149952025f280dca4c9d4270649ff01018a139bc2bfd436ef_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:3476b48ea410d1e3788b2f0118600a03dda9d0e19643a4f4789c41f81d4dd6bc_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:43e07cfc6c04f82dbd449b3f99787c8a999a492dc8d01870ff91a81a1232ceab_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:d200c4afef7a55d953c475e82701931411958fd030a0c6cf098435db4c4dabd6_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ptp-must-gather-rhel9@sha256:3c7acd5660f3641965ec8f1b2cca7d7eecc272fa1125212d2cda00697597269b_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ptp-must-gather-rhel9@sha256:80892d9724da67281eae207177839622fc3fa6a6e0708aed5779489687825667_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ptp-must-gather-rhel9@sha256:fc3b122b700ba1e43c713d5ea4fd7da8862d21be81536d718bf328183a93e76b_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/sriov-cni-rhel9@sha256:0d6c49f6952053c780290440d4eb73b1b429cecff55b92e9fb32661a8105d9f6_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/sriov-cni-rhel9@sha256:6d074f59be4b492beb98c57420aa072ba0821f01e82dd3dd44cbccbb5facd307_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/sriov-cni-rhel9@sha256:75c7ee59e78ae712b40816950305500b1b0df7fffafdad1fdf00120284b6ac10_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/sriov-network-metrics-exporter-rhel9@sha256:31814e21cf5ade0c2e3b02c307905c0924bb1c11da95e018741dd50ff0ec8faa_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/sriov-network-metrics-exporter-rhel9@sha256:33e1b152221b08d0767cc9c36db82a5b50fb5c935f36a2a5e21a3cdf8862f25c_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/sriov-network-metrics-exporter-rhel9@sha256:fadb335a1e41fae79a2675687540f1d73c5ad8f2708a7d1c41871baa0002f762_arm64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2378905" } ], "notes": [ { "category": "description", "text": "A command injection vulnerability has been identified in Helm, a package manager for Kubernetes. An attacker can craft a malicious Chart.yaml file with specially linked dependencies in a Chart.lock file. If the Chart.lock file is a symbolic link to an executable file, such as a shell script, and a user attempts to update the dependencies, the crafted content is written to the symlinked file and executed. This can lead to local code execution on the system. This issue has been patched in Helm version 3.18.4, and users should update to this version to mitigate the risk.", "title": "Vulnerability description" }, { "category": "summary", "text": "helm.sh/helm/v3: Helm Chart Code Execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Although GitOps ships Helm, this product is not vulnerable to this vulnerability as ArgoCD doesn\u0027t use helm dependency update. Additionally ArgoCD scans the whole repository searching for symbolic links that eventually points to a out of bounds destination, this later feature ensures ArgoCD is not vulnerable for this issue. Given this information ArgoCD won\u0027t be updated to pull a new version of Helm in other versions than the currently latest upstream one.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:0db4c40580bab21ab06da9f657eeba182cfa215c0134a738630ab7b88ec29717_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:265ac97f0a4e57ca86108b399b26d734f4d8f0a1ca7418ebfece1c4988ea61d2_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:b45ae3c137da296284dfb7adc101fca0a89c31482224c14b34ba7d65def32bb3_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:f8f083d40f24ddedf816a85dc0a6a231e3a081f813bcc5d17fa5c4ae70ded745_ppc64le" ], "known_not_affected": [ "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/frr-rhel9@sha256:436e231123e2ed85c356581d4a360829b66378fd77f7c7721af6c1566ac9f4c8_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/frr-rhel9@sha256:56fe6b95ab3e5828a678e358e62c448450b23076deff4fc27f2c2f55138de942_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/frr-rhel9@sha256:7ce6da2a5472c6e9e4c16121dab5383cdab199132d8a32b979c85c32f5cf22c8_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/frr-rhel9@sha256:ca1037a6de7a5e971eb4156c09405b1e2429d80d06ec556ad7e8a8e870cb5e4e_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:1bb6e95f2a318f23084fcbd52c72ab10dabdcdfb108ba01a59c20726e7825d66_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:340b37f7f6b6480b6363a32c9224f950ad4b5cc8cce80a7587a196bf469c37c0_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:4db405877680fc217556538e6eb50ced781b1b03fc5cdc1ca8ff675d02e2b759_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:59f746cde3367f20906a4d159a695870f59f7b014eb65873fc03a3a4aec4eccc_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:4a0808cb4bcdc71c56524b8df2ea1bca7fd79ce07885fbc501a0e866a48f0c1f_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:bf45ca42e403aa90ed0c879310afce06cf2324e238a2a77914039f6986fb7f30_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:c7b880c48b0b854e8306cf20e2a712d95f935c9a5af7dd344f9dddae4f25c964_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:e2013455866530bd75352b33a6fa531fa2eeda3f7bd451175c34cb5d102730db_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:b0f2fb27e76df1174d35187cad91bb182b708666a8fc475edf3eb27f879fe654_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:be067d91545cd38b053d72ce2f8eb96281c9bab022faf592d4a5771e364ac14b_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:dd0bab658b526f964ccfae100bcf78e92527264afd7b4dcdbd418cecc45f20ee_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:de7aff1d3e5327e055b8d379ec11d7c08b3bb9cef905da3ccbdee3a3dd442439_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:41fa1a5080af655693353865be2c4da1f380217475e9c8cc8be1eeee9f6f8693_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:80b3155ba9471c907038708b74c01fbff6dce5e03d03493341192734be7f2341_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:b3b1e0c43e63acbafb35e5d2b263b36b76c7c05848984af367c2d710fcc24b64_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:c606fccb24249bc06665010dca6589a1abd9b170a3d5994a9d758ad9bf90c87d_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9@sha256:35d706ab0602758ea6cc74676aeaa96a94de8810733be90dd32c98cc2a044ff8_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9@sha256:516f3ba6444df3ad872c46fbe660fe1de51370c93f8633472353cd50f142b8c5_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9@sha256:9110d91175a0e8264d827eb63e9aafaac22649734b29bba38a935284e8a6f0ba_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9@sha256:ffc64f071866f5bc52520c50c653b8213a420739f1628d16715b4748eb8b5cb9_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:61179875ba13abad11ca059ba54c935282bb3f72429304e4257c947810a7cab0_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:7caca879750e5100a7268bfb328536585245e38a8472d97d3fc696fe63a0d07d_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:9ab9381e965aaff607825b019380d287e3eb3949de5aa154cf14defa10085d86_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:c01786e1970d1e03ab2a0bd529e336cfa8934d6bd138932bb72ed75850ced097_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:3442fa3ef8aee7aaac6991543a841da8c8c9fe9c7010cd01af5b3f8a5bf20bad_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:58f3b0d48ae9195c00580db9350a7cae0de13cc2349ba5f922238cadb996b283_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:7d348b1a3587607ead56192ddea878f5d06948f1313526aa3acc167554c1eccf_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:d14c44eef789614b98551388f573f79127413d6b752489d40a88b9089a4bd201_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:09273daaad62591c5a3b4a7364ccfa5a760951a16d1a2457c5574ca662bfd042_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:42528dd7ac879c3e5318372d6ef55072d171f5465cc782822f1ff9e9d89419b2_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:3e90674782ef913f76b186f3545027380f57a0c0a761ee06e78a59d791b0bd10_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:a64582fcb1815012a2943cb204e9412a2248c51e2f101fe8c90b65010cafe858_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:3a690c454749f4ab893e2f20c2ecee94aa0b47fdf3f96e9d91ef6b31b5dfae77_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:3ca2c38901472326083fd433d0cef6c5d566dacb2e6ed0891de361e20ae2409a_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:b04628c8163c7e47ac69ae619269f7a3aaf557e17e980f6c158febd7447fcb47_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:fc4029313c457900f20d1015a3508cdb1f4b2ebc945a5005c429427a443b1377_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel9@sha256:4d36bc24d733039c5b5f6f5ffd7e75d7d6478926e1a8871d0f17d233d3b76428_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel9@sha256:aa16f897b8af025ff31cf057929e58500ea90c0297061edeed86a2431c2e05d8_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel9@sha256:cac8993111e08298dd1ca1b89849bf2f3f9b949bcced3e0825609090b696c802_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:7acb542353c9b1e44419ae8259a6845aa95efbabf32671450117d0bfec1ec47d_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:a617fae4516a79fa12e7b8ea700fe28f8736923f9680f016794472dbc4e7f880_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:ebc447918f3815bec8f2b44bc6f8bf73148bb8a8baeed97a0ae5e5482f62cd03_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:eedb97e05dca4b61827fd415391529911c7228c2f07ee9ccefc65a947bdd0f26_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:59ca3dca3ca786655f35fd0557ac7f175cfcdfc852547ac0e206d6be8663a0d9_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:721f8ba3a2bd66f78b53bb9a41cf7d59824ee8542488e6e967ceafc7ee4f059a_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:afef9a0e246ced0759f0b07cd7c3e025b473eb1fd80af368dd0cbd84443e3bf9_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:c5eae1dc9c80a737a18d49571100fcaf08c569cfa906f2d3e53e07d983a13313_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:54d6fe6d9305e65557248b6d118da8296cb79b8df9185287477de3e735ab7370_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:58f93ab660a7f5316bb77d177dc5b276224d0670e7a7a2c8e4eee6dadba3e816_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:d1ff2edac26d849780c0f6e99921532adc1fc4b44fabff26582af614501bc8e1_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:e756c4a4e1003a2406ff188119fc5a3081d7c182a0a47d28dfec382480438bf2_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:51d61b59545b4821aa43c64281227e42393f8279529f7b0c8d5e8d43398327d4_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:5518b562372985e877ffd10ba0786c16d4d55b418f6d1ccebfa5375239b2c96b_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:ce8aa5a2f099d9b22063fdd29e9cc3ba3d1e6eff4d67a20a07a1b748e6dc605e_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:d5f9187ce1641e451de858079755768572238276040b3f363a3aa8e867189779_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:09bef866682d2daac0daed6898102ef78b770495c2e197a64f2deec43e55bbd6_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:9d978eecceda23a2130c64350fe9f99089fba921860b94254b0a344a7c9c4b5d_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:d4cf3132fad01719081987d528b682b9776b55e98c2b03fe29bea287465d44ec_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:dd7f099566be7d2256830ba520f5b65d93fd6f42b9a2da0cb3cc219fee2c759a_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:1518cd5936de074e4ab19a409ece10db9e2dce89333d7e542ef87bed3b4ca5cf_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:45c855f9e7d6e5a637130b5520263aac400c99aae22364f10abfc3e8a477b015_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:72a9c1c2719682397d373a297092cf8eaf34a7f3c622d428348cf4e95da6d99f_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:fd71deec1b26f2ac3d3f8776fb2a8a206d086afb41f95ac4471041c7e152f273_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:0a73e7209bf930eb33a57bd93eb08769ea3c74c2214d9c4875ed4167b84c86e9_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:45681454c5a5d75b1a906ff3e361f622c2262bd89f37d65e39ed01441104e9ba_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:56c3afb05ead06e385800fbdaa57949df7b5f4683a2f36e3e7648acd4ae88c87_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:fb4ceb48536fbd7cf37d686c99f3b1d73b20c3a48878e72bbd07f40009a515f4_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:5dfdf2de62e5ebf9f455ea9806ff967a45a661ae465252ba2ed605af2f995354_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:718b72ef4555035fcbae835ba3d997956a1cc6cc6bdfa5c0e39606438817e6f3_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:9de9e0b088e2187bdcf5372b8fb9acdb57fa400986f30a52c8d78df6b3828555_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:abfaeb18ed5a4fc395266dec2d0ea5949e90193e985fb44e4d34b8f422da9a4b_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:8aba42c9fa23266cf90497c9394706977d56da15790f1c9a5ff34ce159f47229_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:9c43f23a946df22e89ec811ae10c01d3ff1b23ec54351a92ab62778b0590f16a_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:e4a2008f3e46dd8ecb6dd7f9e33be118510b6ae4f9d49a844e96f15b3b2ea830_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:ed10fdbbcb33d8ba8c85f2ed1638c80593044aaf9391cbd7ba51d53fd36435dc_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:375fef1ce7a9646a586f021f649d0c09c2681eded3c35c47af0d5d0c4c91ad83_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:a6aee889a8eaf2d3aca3a312752622f00da62dc144afd0bc591e2f52c9463d36_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:ed78d42046a54227415e02b45ad0d821ee3743fb1c0ac73cdd8e5cdf09bf9f7a_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:f6fae6a57ee7abce3fde2e56b0102acc6a410a0ddd981032412db501e198a4b5_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:2f00fbbe5187619d8a1ae6a304ba22044a6f66ee7b3f2d122d7d71cae85af96b_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:3de4c9da19b4492db52d961d6435646c2de49c138b8c62ea0a5966f2d39d5758_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:9f029e2dca2420f507f4e013d42fcd491de16818be1e873db5b1ee7cf0813dca_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:a023c147a057f59f24ff8c829a2bcd212db03051533f1610f5cd5965f99dc872_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:c0b85e3bf6c0fda5eb3c74ff89af6ca1d3139a02c0c78ae05e0fb3390d36367c_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:c39fab693ec65243b4010551932b1e290d6abdb5e8728a7170c129523389512c_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:9fc0afa34b3986b00edbce26530b920413fb0a8d11451daed365aafd6dbbc3dd_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:b7bd2f78700dfd37bab208a1588cc9d6725b2ebf9d87551f3ea7a11328e37b0c_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:c09300d5e9549b7b99998a259eb8c89d8f6227f63b2ec5fd36a8e82474d9bd0e_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:f9cd7090a8b5ff3268501496c100e51c6d03b7767a6fcf2a34d66392f39f141d_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:6dbac042319562ff38e7a3315c53ed134fa9ea7fe92fec0498f0544156bd620f_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:8b86d6b7c6183d02f021481330ef9731f2322add429d4c41674de6d10a8b3ce5_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:a4c6aafbbecc7a35bb7519a4cdb85d3de47ad790cea4a68de55b0380808f9719_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:f63de8d96f3ff6a6f4d613f8f0126a77ef4799fae6ff251fbfba02146b168862_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:5027f9808b4c3d5dc527fa7423be77c9e31f06edaf1174b86bc80f93c078e20e_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:5a2bc1e235370ff4320c6a3b24eab88b33d146fd306fc18cdbe29fe370272d31_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:6f9835d2178c06fc53f11824b57c399a8888496bcc1b529da222716ec07241b6_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:dea29b962ff2296e0e72339971d002e3a064b335b85cc62a2b5efae29ca28213_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:23e1c25495877ed9bbb1cef819e5f0b673cec5dabb1dcd30a35134d83fd8d1e9_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:627ac2cf750afe6e2f7d2db32dbe601f78491e483c1044b8f3149bd7b52570b5_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:b6f6f3a769b97d1b17cc8e329d13ba41c4abf4ba33f313b3f265640438689e66_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:d122a2f0b564c6ca57b6d13e5a5414c47b4ab63b32d55e2fc7ac181a1113382c_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:0d6520092ada419664ee28aa05b6913944585db10dea0c32515a3a6b5bbdde65_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:2eb313521a707bb69b9cd479d56dbaddf8b48cdeb215f5cccccd98fa2b29edca_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:d6ead7d1536e82d6d1f8d1cf9073a634975dcb4310ad37e9d9a4d5ece31c1437_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:ef035463220f476f057112e9e30329cd5efa9e9bf746e527dc91fd8b57f0d57d_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:044d243c04c5bc65cba10b807cc8ea5e01e535dddaeb9d704e653ece61f18466_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:0c202ac95999e87b8d73f56c99508e823cbf1784c5589604f06a32009ea711e6_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:0d514934acfcbed0fccf17b0715a0a4c2aae78b6e25cee578042af01944265a7_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:7779d8bb4992a5164c85cc967d68afd71dc99874ba01c671c8aec57d957e382a_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:154e825dd2faf97427eb739772a346d3ff03048bede4521e91d3600e8a650aaf_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:a4548af492265f01dd1987403bdf3536882adde1c97c526337ce5068b33f80a8_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:a60fb4521ebf5eecabefc973d1f0fbb64c47b0716cae09a4574ebb752f172820_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:25743b3b058ae4d006ed74eddd84fcdc75ed7f18d6cf8d60399c65ad4aff377a_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:4330a7baf77033718ede8c77ae2be9379fad97a6bdc93ae170222c5e5e2c140a_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:93f722f4a4d5906ab41d5d30af2ffd9656d780fb57219f6f0ad405da5d42f209_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:2824caf68d2de41479d9e0cb00d5b3f216f62d49588a6d98f09a8a1f255d4e4b_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:887e1c09568afddd90beb04ca1f9372621addd80c7e0127a07253415bc1a5cc0_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:bb0a4bdbd2ac40c516a6316844d0a74744438b7dd2bb5d2fa91e1f9a8a625c96_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:cec9a6972888bd61f2c5532f23f00c6d21d749d68d1120a464117cf4e86b1b46_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:49df2cc13c5944d8e15f5e948ad7a02fdf275136b3f3e8665d263d7f11e96957_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:59a9303ead116c78187cc3e6293baf39b0c090cd47cf9944ed61c70eacb20a58_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:9f606371e70ad2c63ace564df1325ba7805e1f5708cca5bc579103859dda235f_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:ed3f48d644d28bd5c99b42e80b06628caf002b214a161e858501c5efa724a3da_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:22c0044c4364fc454440ec5cbd20144f19bffba5ef880f510fccd737282f3736_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:56a7dfb0c821116ef0391ebc3e1c26f6891b23e6b8a14b679f91f3861d3b72aa_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:a5feb8fb93929543b9a641e921ea83c36bd3db18923e9f42fc958aa9c1d81090_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:e327b2deb2e2abda7b23df5bdca4c6bbbdfbfdeafb8bd454db63ffac360f2b6f_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:2940b15eeae68ce34afd10515076effc859ea7d64f92d9059b632e7939ae1391_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:499089cf1485b822227581cf65b787360c3eec497c8946b8e2fc2cdeb0124c1b_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:85de0fc6f45173774214cade3a569d018fa2054ee7f4dedba710ebf7c48bf10f_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:e28ce04dfa6a9e44288b4be2c2141e3dc3f89df3f0cfe6016325db2f3029942f_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:402f6b25541a399d7df262110c60bfccad9f6d35592b834185c78ed8cc89a2d9_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:48d2a7e4678933037391ea1a74702d0e2d97514d43619db333b1cb6d9845d9bb_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:72a2d2f94f8098ead32c9fb2f7995d9a4ca1ab69c5179dccc1664b0d1a9585ab_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:7ae8b74b8e0a471669a1aec95825e859d42772bea7817eb433820f0282c3bdb0_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:b79fd249734c576fce3eeb4950d9257d128803fc31a2c7e17bd235b1701cee8d_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:d9b8908987a42797a81f3ccad890d764d1fabf1a7873a400974e6e7b0c4db46d_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:f80ca336c30cd9eb216c8d1ceebec7f2274797dd58927fdc4555bea07385a063_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-infiniband-cni-rhel9@sha256:99264636bdc9aca0af6a0a5d1f3f401cbce7a27c6136b7e992403ce1d1093d4a_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-infiniband-cni-rhel9@sha256:d2d2ca29c9bd844983652892882e0592f4ccf0fe7d7a55f1006d5780c9d27f90_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-infiniband-cni-rhel9@sha256:f80b9428b0a79280590cc1b7406cdde67d8fea55b249c6700cbbd9bb226b0095_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-config-daemon-rhel9@sha256:2a07fe5a54caad8cc1cb288a150a4c6edf23399a6269a0e4dba1c596d5ee822b_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-config-daemon-rhel9@sha256:9648de36a35478d6cb60f97091a6717d066f25bf15c66be7823dee4756e53e20_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-config-daemon-rhel9@sha256:dab58539af0978a72de25d025dba952396fe5a4a1503415a89a288f9cc57c32e_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-device-plugin-rhel9@sha256:112b3ff1ac44ac9f8c56ef5d56797bcf631a4e8383697327ddde07b8d6a886dd_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-device-plugin-rhel9@sha256:e2e74e408786c0e2d297549adee326f80064dbecec31758e433940faf62ac19f_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-device-plugin-rhel9@sha256:fa929c7ae3a2f8bdd04cefabc4eda3b2c2d52c4d2a255b2df07c3216849ef5a9_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:31814e21cf5ade0c2e3b02c307905c0924bb1c11da95e018741dd50ff0ec8faa_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:33e1b152221b08d0767cc9c36db82a5b50fb5c935f36a2a5e21a3cdf8862f25c_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:fadb335a1e41fae79a2675687540f1d73c5ad8f2708a7d1c41871baa0002f762_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-rhel9-operator@sha256:765b728aae77f302d934ab5cae15fadd4653a07171ebbef7376445d53a3f8c64_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-rhel9-operator@sha256:8531f4266ddea002a2f98ae754ce8807de2c4f2ed05d49012dca5bc75fa5c77b_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-rhel9-operator@sha256:ff48a7469e12cd08de049e79630a7e8eb729e6ed49045270129e2415ccad51cd_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-webhook-rhel9@sha256:087793fdcd1427757c9560226004745c5d4f4ab45402e4b6dd2b3ea4a7cb3869_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-webhook-rhel9@sha256:2c088002b99503ca37f61ac45bd5ac725e75581927780d17a6868cb730887792_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-webhook-rhel9@sha256:41d54adb9a58d171d323a95c419bbdabaf74c96f5eca2c7da95b2dc28defd1da_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:b1f7bab87724e17a1e8ffe9adf910403420d1c94a1a722d78f92b6497374c35a_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:d1b7df836d1718ad5b60d9ce0d2779e8864be88d5c701ab1b4f1037e8c47fab8_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:dbb8d3a6933dd33dd7705670320cb73e9dfa06d873491fdbf7a6e6a2067ff99f_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:ff3b350fc6737438e19cd74cbbeb865a7abe213c0c7bd67799448211ec672c1b_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:2631ae991c4a888149952025f280dca4c9d4270649ff01018a139bc2bfd436ef_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:3476b48ea410d1e3788b2f0118600a03dda9d0e19643a4f4789c41f81d4dd6bc_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:43e07cfc6c04f82dbd449b3f99787c8a999a492dc8d01870ff91a81a1232ceab_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:d200c4afef7a55d953c475e82701931411958fd030a0c6cf098435db4c4dabd6_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ptp-must-gather-rhel9@sha256:3c7acd5660f3641965ec8f1b2cca7d7eecc272fa1125212d2cda00697597269b_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ptp-must-gather-rhel9@sha256:80892d9724da67281eae207177839622fc3fa6a6e0708aed5779489687825667_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ptp-must-gather-rhel9@sha256:fc3b122b700ba1e43c713d5ea4fd7da8862d21be81536d718bf328183a93e76b_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/sriov-cni-rhel9@sha256:0d6c49f6952053c780290440d4eb73b1b429cecff55b92e9fb32661a8105d9f6_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/sriov-cni-rhel9@sha256:6d074f59be4b492beb98c57420aa072ba0821f01e82dd3dd44cbccbb5facd307_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/sriov-cni-rhel9@sha256:75c7ee59e78ae712b40816950305500b1b0df7fffafdad1fdf00120284b6ac10_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/sriov-network-metrics-exporter-rhel9@sha256:31814e21cf5ade0c2e3b02c307905c0924bb1c11da95e018741dd50ff0ec8faa_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/sriov-network-metrics-exporter-rhel9@sha256:33e1b152221b08d0767cc9c36db82a5b50fb5c935f36a2a5e21a3cdf8862f25c_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/sriov-network-metrics-exporter-rhel9@sha256:fadb335a1e41fae79a2675687540f1d73c5ad8f2708a7d1c41871baa0002f762_arm64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-53547" }, { "category": "external", "summary": "RHBZ#2378905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2378905" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-53547", "url": "https://www.cve.org/CVERecord?id=CVE-2025-53547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-53547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53547" }, { "category": "external", "summary": "https://github.com/helm/helm/commit/4b8e61093d8f579f1165cdc6bd4b43fa5455f571", "url": "https://github.com/helm/helm/commit/4b8e61093d8f579f1165cdc6bd4b43fa5455f571" }, { "category": "external", "summary": "https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm", "url": "https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm" } ], "release_date": "2025-07-08T21:39:59.075000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-09-17T10:36:08+00:00", "details": "For OpenShift Container Platform 4.16 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.16/html/release_notes/", "product_ids": [ "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:0db4c40580bab21ab06da9f657eeba182cfa215c0134a738630ab7b88ec29717_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:265ac97f0a4e57ca86108b399b26d734f4d8f0a1ca7418ebfece1c4988ea61d2_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:b45ae3c137da296284dfb7adc101fca0a89c31482224c14b34ba7d65def32bb3_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:f8f083d40f24ddedf816a85dc0a6a231e3a081f813bcc5d17fa5c4ae70ded745_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:15681" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/frr-rhel9@sha256:436e231123e2ed85c356581d4a360829b66378fd77f7c7721af6c1566ac9f4c8_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/frr-rhel9@sha256:56fe6b95ab3e5828a678e358e62c448450b23076deff4fc27f2c2f55138de942_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/frr-rhel9@sha256:7ce6da2a5472c6e9e4c16121dab5383cdab199132d8a32b979c85c32f5cf22c8_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/frr-rhel9@sha256:ca1037a6de7a5e971eb4156c09405b1e2429d80d06ec556ad7e8a8e870cb5e4e_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:1bb6e95f2a318f23084fcbd52c72ab10dabdcdfb108ba01a59c20726e7825d66_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:340b37f7f6b6480b6363a32c9224f950ad4b5cc8cce80a7587a196bf469c37c0_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:4db405877680fc217556538e6eb50ced781b1b03fc5cdc1ca8ff675d02e2b759_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:59f746cde3367f20906a4d159a695870f59f7b014eb65873fc03a3a4aec4eccc_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:4a0808cb4bcdc71c56524b8df2ea1bca7fd79ce07885fbc501a0e866a48f0c1f_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:bf45ca42e403aa90ed0c879310afce06cf2324e238a2a77914039f6986fb7f30_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:c7b880c48b0b854e8306cf20e2a712d95f935c9a5af7dd344f9dddae4f25c964_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:e2013455866530bd75352b33a6fa531fa2eeda3f7bd451175c34cb5d102730db_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:b0f2fb27e76df1174d35187cad91bb182b708666a8fc475edf3eb27f879fe654_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:be067d91545cd38b053d72ce2f8eb96281c9bab022faf592d4a5771e364ac14b_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:dd0bab658b526f964ccfae100bcf78e92527264afd7b4dcdbd418cecc45f20ee_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:de7aff1d3e5327e055b8d379ec11d7c08b3bb9cef905da3ccbdee3a3dd442439_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:41fa1a5080af655693353865be2c4da1f380217475e9c8cc8be1eeee9f6f8693_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:80b3155ba9471c907038708b74c01fbff6dce5e03d03493341192734be7f2341_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:b3b1e0c43e63acbafb35e5d2b263b36b76c7c05848984af367c2d710fcc24b64_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:c606fccb24249bc06665010dca6589a1abd9b170a3d5994a9d758ad9bf90c87d_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9@sha256:35d706ab0602758ea6cc74676aeaa96a94de8810733be90dd32c98cc2a044ff8_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9@sha256:516f3ba6444df3ad872c46fbe660fe1de51370c93f8633472353cd50f142b8c5_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9@sha256:9110d91175a0e8264d827eb63e9aafaac22649734b29bba38a935284e8a6f0ba_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9@sha256:ffc64f071866f5bc52520c50c653b8213a420739f1628d16715b4748eb8b5cb9_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:61179875ba13abad11ca059ba54c935282bb3f72429304e4257c947810a7cab0_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:7caca879750e5100a7268bfb328536585245e38a8472d97d3fc696fe63a0d07d_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:9ab9381e965aaff607825b019380d287e3eb3949de5aa154cf14defa10085d86_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:c01786e1970d1e03ab2a0bd529e336cfa8934d6bd138932bb72ed75850ced097_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:3442fa3ef8aee7aaac6991543a841da8c8c9fe9c7010cd01af5b3f8a5bf20bad_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:58f3b0d48ae9195c00580db9350a7cae0de13cc2349ba5f922238cadb996b283_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:7d348b1a3587607ead56192ddea878f5d06948f1313526aa3acc167554c1eccf_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:d14c44eef789614b98551388f573f79127413d6b752489d40a88b9089a4bd201_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:09273daaad62591c5a3b4a7364ccfa5a760951a16d1a2457c5574ca662bfd042_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:42528dd7ac879c3e5318372d6ef55072d171f5465cc782822f1ff9e9d89419b2_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:3e90674782ef913f76b186f3545027380f57a0c0a761ee06e78a59d791b0bd10_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:a64582fcb1815012a2943cb204e9412a2248c51e2f101fe8c90b65010cafe858_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:3a690c454749f4ab893e2f20c2ecee94aa0b47fdf3f96e9d91ef6b31b5dfae77_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:3ca2c38901472326083fd433d0cef6c5d566dacb2e6ed0891de361e20ae2409a_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:b04628c8163c7e47ac69ae619269f7a3aaf557e17e980f6c158febd7447fcb47_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:fc4029313c457900f20d1015a3508cdb1f4b2ebc945a5005c429427a443b1377_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel9@sha256:4d36bc24d733039c5b5f6f5ffd7e75d7d6478926e1a8871d0f17d233d3b76428_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel9@sha256:aa16f897b8af025ff31cf057929e58500ea90c0297061edeed86a2431c2e05d8_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel9@sha256:cac8993111e08298dd1ca1b89849bf2f3f9b949bcced3e0825609090b696c802_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:7acb542353c9b1e44419ae8259a6845aa95efbabf32671450117d0bfec1ec47d_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:a617fae4516a79fa12e7b8ea700fe28f8736923f9680f016794472dbc4e7f880_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:ebc447918f3815bec8f2b44bc6f8bf73148bb8a8baeed97a0ae5e5482f62cd03_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:eedb97e05dca4b61827fd415391529911c7228c2f07ee9ccefc65a947bdd0f26_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:59ca3dca3ca786655f35fd0557ac7f175cfcdfc852547ac0e206d6be8663a0d9_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:721f8ba3a2bd66f78b53bb9a41cf7d59824ee8542488e6e967ceafc7ee4f059a_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:afef9a0e246ced0759f0b07cd7c3e025b473eb1fd80af368dd0cbd84443e3bf9_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:c5eae1dc9c80a737a18d49571100fcaf08c569cfa906f2d3e53e07d983a13313_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:54d6fe6d9305e65557248b6d118da8296cb79b8df9185287477de3e735ab7370_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:58f93ab660a7f5316bb77d177dc5b276224d0670e7a7a2c8e4eee6dadba3e816_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:d1ff2edac26d849780c0f6e99921532adc1fc4b44fabff26582af614501bc8e1_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:e756c4a4e1003a2406ff188119fc5a3081d7c182a0a47d28dfec382480438bf2_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:51d61b59545b4821aa43c64281227e42393f8279529f7b0c8d5e8d43398327d4_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:5518b562372985e877ffd10ba0786c16d4d55b418f6d1ccebfa5375239b2c96b_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:ce8aa5a2f099d9b22063fdd29e9cc3ba3d1e6eff4d67a20a07a1b748e6dc605e_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:d5f9187ce1641e451de858079755768572238276040b3f363a3aa8e867189779_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:09bef866682d2daac0daed6898102ef78b770495c2e197a64f2deec43e55bbd6_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:9d978eecceda23a2130c64350fe9f99089fba921860b94254b0a344a7c9c4b5d_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:d4cf3132fad01719081987d528b682b9776b55e98c2b03fe29bea287465d44ec_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:dd7f099566be7d2256830ba520f5b65d93fd6f42b9a2da0cb3cc219fee2c759a_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:1518cd5936de074e4ab19a409ece10db9e2dce89333d7e542ef87bed3b4ca5cf_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:45c855f9e7d6e5a637130b5520263aac400c99aae22364f10abfc3e8a477b015_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:72a9c1c2719682397d373a297092cf8eaf34a7f3c622d428348cf4e95da6d99f_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:fd71deec1b26f2ac3d3f8776fb2a8a206d086afb41f95ac4471041c7e152f273_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:0a73e7209bf930eb33a57bd93eb08769ea3c74c2214d9c4875ed4167b84c86e9_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:45681454c5a5d75b1a906ff3e361f622c2262bd89f37d65e39ed01441104e9ba_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:56c3afb05ead06e385800fbdaa57949df7b5f4683a2f36e3e7648acd4ae88c87_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:fb4ceb48536fbd7cf37d686c99f3b1d73b20c3a48878e72bbd07f40009a515f4_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:5dfdf2de62e5ebf9f455ea9806ff967a45a661ae465252ba2ed605af2f995354_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:718b72ef4555035fcbae835ba3d997956a1cc6cc6bdfa5c0e39606438817e6f3_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:9de9e0b088e2187bdcf5372b8fb9acdb57fa400986f30a52c8d78df6b3828555_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:abfaeb18ed5a4fc395266dec2d0ea5949e90193e985fb44e4d34b8f422da9a4b_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:8aba42c9fa23266cf90497c9394706977d56da15790f1c9a5ff34ce159f47229_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:9c43f23a946df22e89ec811ae10c01d3ff1b23ec54351a92ab62778b0590f16a_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:e4a2008f3e46dd8ecb6dd7f9e33be118510b6ae4f9d49a844e96f15b3b2ea830_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:ed10fdbbcb33d8ba8c85f2ed1638c80593044aaf9391cbd7ba51d53fd36435dc_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:375fef1ce7a9646a586f021f649d0c09c2681eded3c35c47af0d5d0c4c91ad83_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:a6aee889a8eaf2d3aca3a312752622f00da62dc144afd0bc591e2f52c9463d36_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:ed78d42046a54227415e02b45ad0d821ee3743fb1c0ac73cdd8e5cdf09bf9f7a_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:f6fae6a57ee7abce3fde2e56b0102acc6a410a0ddd981032412db501e198a4b5_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:2f00fbbe5187619d8a1ae6a304ba22044a6f66ee7b3f2d122d7d71cae85af96b_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:3de4c9da19b4492db52d961d6435646c2de49c138b8c62ea0a5966f2d39d5758_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:9f029e2dca2420f507f4e013d42fcd491de16818be1e873db5b1ee7cf0813dca_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:a023c147a057f59f24ff8c829a2bcd212db03051533f1610f5cd5965f99dc872_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:c0b85e3bf6c0fda5eb3c74ff89af6ca1d3139a02c0c78ae05e0fb3390d36367c_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:c39fab693ec65243b4010551932b1e290d6abdb5e8728a7170c129523389512c_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:9fc0afa34b3986b00edbce26530b920413fb0a8d11451daed365aafd6dbbc3dd_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:b7bd2f78700dfd37bab208a1588cc9d6725b2ebf9d87551f3ea7a11328e37b0c_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:c09300d5e9549b7b99998a259eb8c89d8f6227f63b2ec5fd36a8e82474d9bd0e_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:f9cd7090a8b5ff3268501496c100e51c6d03b7767a6fcf2a34d66392f39f141d_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:6dbac042319562ff38e7a3315c53ed134fa9ea7fe92fec0498f0544156bd620f_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:8b86d6b7c6183d02f021481330ef9731f2322add429d4c41674de6d10a8b3ce5_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:a4c6aafbbecc7a35bb7519a4cdb85d3de47ad790cea4a68de55b0380808f9719_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:f63de8d96f3ff6a6f4d613f8f0126a77ef4799fae6ff251fbfba02146b168862_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:5027f9808b4c3d5dc527fa7423be77c9e31f06edaf1174b86bc80f93c078e20e_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:5a2bc1e235370ff4320c6a3b24eab88b33d146fd306fc18cdbe29fe370272d31_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:6f9835d2178c06fc53f11824b57c399a8888496bcc1b529da222716ec07241b6_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:dea29b962ff2296e0e72339971d002e3a064b335b85cc62a2b5efae29ca28213_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:23e1c25495877ed9bbb1cef819e5f0b673cec5dabb1dcd30a35134d83fd8d1e9_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:627ac2cf750afe6e2f7d2db32dbe601f78491e483c1044b8f3149bd7b52570b5_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:b6f6f3a769b97d1b17cc8e329d13ba41c4abf4ba33f313b3f265640438689e66_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:d122a2f0b564c6ca57b6d13e5a5414c47b4ab63b32d55e2fc7ac181a1113382c_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:0d6520092ada419664ee28aa05b6913944585db10dea0c32515a3a6b5bbdde65_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:2eb313521a707bb69b9cd479d56dbaddf8b48cdeb215f5cccccd98fa2b29edca_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:d6ead7d1536e82d6d1f8d1cf9073a634975dcb4310ad37e9d9a4d5ece31c1437_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:ef035463220f476f057112e9e30329cd5efa9e9bf746e527dc91fd8b57f0d57d_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:044d243c04c5bc65cba10b807cc8ea5e01e535dddaeb9d704e653ece61f18466_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:0c202ac95999e87b8d73f56c99508e823cbf1784c5589604f06a32009ea711e6_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:0d514934acfcbed0fccf17b0715a0a4c2aae78b6e25cee578042af01944265a7_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:7779d8bb4992a5164c85cc967d68afd71dc99874ba01c671c8aec57d957e382a_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:0db4c40580bab21ab06da9f657eeba182cfa215c0134a738630ab7b88ec29717_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:265ac97f0a4e57ca86108b399b26d734f4d8f0a1ca7418ebfece1c4988ea61d2_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:b45ae3c137da296284dfb7adc101fca0a89c31482224c14b34ba7d65def32bb3_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:f8f083d40f24ddedf816a85dc0a6a231e3a081f813bcc5d17fa5c4ae70ded745_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:154e825dd2faf97427eb739772a346d3ff03048bede4521e91d3600e8a650aaf_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:a4548af492265f01dd1987403bdf3536882adde1c97c526337ce5068b33f80a8_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:a60fb4521ebf5eecabefc973d1f0fbb64c47b0716cae09a4574ebb752f172820_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:25743b3b058ae4d006ed74eddd84fcdc75ed7f18d6cf8d60399c65ad4aff377a_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:4330a7baf77033718ede8c77ae2be9379fad97a6bdc93ae170222c5e5e2c140a_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:93f722f4a4d5906ab41d5d30af2ffd9656d780fb57219f6f0ad405da5d42f209_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:2824caf68d2de41479d9e0cb00d5b3f216f62d49588a6d98f09a8a1f255d4e4b_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:887e1c09568afddd90beb04ca1f9372621addd80c7e0127a07253415bc1a5cc0_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:bb0a4bdbd2ac40c516a6316844d0a74744438b7dd2bb5d2fa91e1f9a8a625c96_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:cec9a6972888bd61f2c5532f23f00c6d21d749d68d1120a464117cf4e86b1b46_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:49df2cc13c5944d8e15f5e948ad7a02fdf275136b3f3e8665d263d7f11e96957_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:59a9303ead116c78187cc3e6293baf39b0c090cd47cf9944ed61c70eacb20a58_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:9f606371e70ad2c63ace564df1325ba7805e1f5708cca5bc579103859dda235f_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:ed3f48d644d28bd5c99b42e80b06628caf002b214a161e858501c5efa724a3da_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:22c0044c4364fc454440ec5cbd20144f19bffba5ef880f510fccd737282f3736_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:56a7dfb0c821116ef0391ebc3e1c26f6891b23e6b8a14b679f91f3861d3b72aa_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:a5feb8fb93929543b9a641e921ea83c36bd3db18923e9f42fc958aa9c1d81090_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:e327b2deb2e2abda7b23df5bdca4c6bbbdfbfdeafb8bd454db63ffac360f2b6f_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:2940b15eeae68ce34afd10515076effc859ea7d64f92d9059b632e7939ae1391_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:499089cf1485b822227581cf65b787360c3eec497c8946b8e2fc2cdeb0124c1b_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:85de0fc6f45173774214cade3a569d018fa2054ee7f4dedba710ebf7c48bf10f_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:e28ce04dfa6a9e44288b4be2c2141e3dc3f89df3f0cfe6016325db2f3029942f_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:402f6b25541a399d7df262110c60bfccad9f6d35592b834185c78ed8cc89a2d9_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:48d2a7e4678933037391ea1a74702d0e2d97514d43619db333b1cb6d9845d9bb_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:72a2d2f94f8098ead32c9fb2f7995d9a4ca1ab69c5179dccc1664b0d1a9585ab_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:7ae8b74b8e0a471669a1aec95825e859d42772bea7817eb433820f0282c3bdb0_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:b79fd249734c576fce3eeb4950d9257d128803fc31a2c7e17bd235b1701cee8d_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:d9b8908987a42797a81f3ccad890d764d1fabf1a7873a400974e6e7b0c4db46d_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:f80ca336c30cd9eb216c8d1ceebec7f2274797dd58927fdc4555bea07385a063_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-infiniband-cni-rhel9@sha256:99264636bdc9aca0af6a0a5d1f3f401cbce7a27c6136b7e992403ce1d1093d4a_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-infiniband-cni-rhel9@sha256:d2d2ca29c9bd844983652892882e0592f4ccf0fe7d7a55f1006d5780c9d27f90_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-infiniband-cni-rhel9@sha256:f80b9428b0a79280590cc1b7406cdde67d8fea55b249c6700cbbd9bb226b0095_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-config-daemon-rhel9@sha256:2a07fe5a54caad8cc1cb288a150a4c6edf23399a6269a0e4dba1c596d5ee822b_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-config-daemon-rhel9@sha256:9648de36a35478d6cb60f97091a6717d066f25bf15c66be7823dee4756e53e20_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-config-daemon-rhel9@sha256:dab58539af0978a72de25d025dba952396fe5a4a1503415a89a288f9cc57c32e_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-device-plugin-rhel9@sha256:112b3ff1ac44ac9f8c56ef5d56797bcf631a4e8383697327ddde07b8d6a886dd_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-device-plugin-rhel9@sha256:e2e74e408786c0e2d297549adee326f80064dbecec31758e433940faf62ac19f_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-device-plugin-rhel9@sha256:fa929c7ae3a2f8bdd04cefabc4eda3b2c2d52c4d2a255b2df07c3216849ef5a9_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:31814e21cf5ade0c2e3b02c307905c0924bb1c11da95e018741dd50ff0ec8faa_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:33e1b152221b08d0767cc9c36db82a5b50fb5c935f36a2a5e21a3cdf8862f25c_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:fadb335a1e41fae79a2675687540f1d73c5ad8f2708a7d1c41871baa0002f762_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-rhel9-operator@sha256:765b728aae77f302d934ab5cae15fadd4653a07171ebbef7376445d53a3f8c64_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-rhel9-operator@sha256:8531f4266ddea002a2f98ae754ce8807de2c4f2ed05d49012dca5bc75fa5c77b_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-rhel9-operator@sha256:ff48a7469e12cd08de049e79630a7e8eb729e6ed49045270129e2415ccad51cd_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-webhook-rhel9@sha256:087793fdcd1427757c9560226004745c5d4f4ab45402e4b6dd2b3ea4a7cb3869_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-webhook-rhel9@sha256:2c088002b99503ca37f61ac45bd5ac725e75581927780d17a6868cb730887792_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-webhook-rhel9@sha256:41d54adb9a58d171d323a95c419bbdabaf74c96f5eca2c7da95b2dc28defd1da_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:b1f7bab87724e17a1e8ffe9adf910403420d1c94a1a722d78f92b6497374c35a_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:d1b7df836d1718ad5b60d9ce0d2779e8864be88d5c701ab1b4f1037e8c47fab8_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:dbb8d3a6933dd33dd7705670320cb73e9dfa06d873491fdbf7a6e6a2067ff99f_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:ff3b350fc6737438e19cd74cbbeb865a7abe213c0c7bd67799448211ec672c1b_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:2631ae991c4a888149952025f280dca4c9d4270649ff01018a139bc2bfd436ef_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:3476b48ea410d1e3788b2f0118600a03dda9d0e19643a4f4789c41f81d4dd6bc_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:43e07cfc6c04f82dbd449b3f99787c8a999a492dc8d01870ff91a81a1232ceab_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:d200c4afef7a55d953c475e82701931411958fd030a0c6cf098435db4c4dabd6_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ptp-must-gather-rhel9@sha256:3c7acd5660f3641965ec8f1b2cca7d7eecc272fa1125212d2cda00697597269b_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ptp-must-gather-rhel9@sha256:80892d9724da67281eae207177839622fc3fa6a6e0708aed5779489687825667_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ptp-must-gather-rhel9@sha256:fc3b122b700ba1e43c713d5ea4fd7da8862d21be81536d718bf328183a93e76b_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/sriov-cni-rhel9@sha256:0d6c49f6952053c780290440d4eb73b1b429cecff55b92e9fb32661a8105d9f6_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/sriov-cni-rhel9@sha256:6d074f59be4b492beb98c57420aa072ba0821f01e82dd3dd44cbccbb5facd307_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/sriov-cni-rhel9@sha256:75c7ee59e78ae712b40816950305500b1b0df7fffafdad1fdf00120284b6ac10_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/sriov-network-metrics-exporter-rhel9@sha256:31814e21cf5ade0c2e3b02c307905c0924bb1c11da95e018741dd50ff0ec8faa_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/sriov-network-metrics-exporter-rhel9@sha256:33e1b152221b08d0767cc9c36db82a5b50fb5c935f36a2a5e21a3cdf8862f25c_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/sriov-network-metrics-exporter-rhel9@sha256:fadb335a1e41fae79a2675687540f1d73c5ad8f2708a7d1c41871baa0002f762_arm64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.5, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/frr-rhel9@sha256:436e231123e2ed85c356581d4a360829b66378fd77f7c7721af6c1566ac9f4c8_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/frr-rhel9@sha256:56fe6b95ab3e5828a678e358e62c448450b23076deff4fc27f2c2f55138de942_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/frr-rhel9@sha256:7ce6da2a5472c6e9e4c16121dab5383cdab199132d8a32b979c85c32f5cf22c8_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/frr-rhel9@sha256:ca1037a6de7a5e971eb4156c09405b1e2429d80d06ec556ad7e8a8e870cb5e4e_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:1bb6e95f2a318f23084fcbd52c72ab10dabdcdfb108ba01a59c20726e7825d66_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:340b37f7f6b6480b6363a32c9224f950ad4b5cc8cce80a7587a196bf469c37c0_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:4db405877680fc217556538e6eb50ced781b1b03fc5cdc1ca8ff675d02e2b759_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator@sha256:59f746cde3367f20906a4d159a695870f59f7b014eb65873fc03a3a4aec4eccc_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:4a0808cb4bcdc71c56524b8df2ea1bca7fd79ce07885fbc501a0e866a48f0c1f_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:bf45ca42e403aa90ed0c879310afce06cf2324e238a2a77914039f6986fb7f30_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:c7b880c48b0b854e8306cf20e2a712d95f935c9a5af7dd344f9dddae4f25c964_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ingress-node-firewall-rhel9@sha256:e2013455866530bd75352b33a6fa531fa2eeda3f7bd451175c34cb5d102730db_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:b0f2fb27e76df1174d35187cad91bb182b708666a8fc475edf3eb27f879fe654_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:be067d91545cd38b053d72ce2f8eb96281c9bab022faf592d4a5771e364ac14b_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:dd0bab658b526f964ccfae100bcf78e92527264afd7b4dcdbd418cecc45f20ee_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:de7aff1d3e5327e055b8d379ec11d7c08b3bb9cef905da3ccbdee3a3dd442439_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:41fa1a5080af655693353865be2c4da1f380217475e9c8cc8be1eeee9f6f8693_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:80b3155ba9471c907038708b74c01fbff6dce5e03d03493341192734be7f2341_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:b3b1e0c43e63acbafb35e5d2b263b36b76c7c05848984af367c2d710fcc24b64_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:c606fccb24249bc06665010dca6589a1abd9b170a3d5994a9d758ad9bf90c87d_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9@sha256:35d706ab0602758ea6cc74676aeaa96a94de8810733be90dd32c98cc2a044ff8_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9@sha256:516f3ba6444df3ad872c46fbe660fe1de51370c93f8633472353cd50f142b8c5_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9@sha256:9110d91175a0e8264d827eb63e9aafaac22649734b29bba38a935284e8a6f0ba_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/metallb-rhel9@sha256:ffc64f071866f5bc52520c50c653b8213a420739f1628d16715b4748eb8b5cb9_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:61179875ba13abad11ca059ba54c935282bb3f72429304e4257c947810a7cab0_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:7caca879750e5100a7268bfb328536585245e38a8472d97d3fc696fe63a0d07d_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:9ab9381e965aaff607825b019380d287e3eb3949de5aa154cf14defa10085d86_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:c01786e1970d1e03ab2a0bd529e336cfa8934d6bd138932bb72ed75850ced097_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:3442fa3ef8aee7aaac6991543a841da8c8c9fe9c7010cd01af5b3f8a5bf20bad_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:58f3b0d48ae9195c00580db9350a7cae0de13cc2349ba5f922238cadb996b283_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:7d348b1a3587607ead56192ddea878f5d06948f1313526aa3acc167554c1eccf_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ansible-rhel9-operator@sha256:d14c44eef789614b98551388f573f79127413d6b752489d40a88b9089a4bd201_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:09273daaad62591c5a3b4a7364ccfa5a760951a16d1a2457c5574ca662bfd042_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:42528dd7ac879c3e5318372d6ef55072d171f5465cc782822f1ff9e9d89419b2_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:3e90674782ef913f76b186f3545027380f57a0c0a761ee06e78a59d791b0bd10_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:a64582fcb1815012a2943cb204e9412a2248c51e2f101fe8c90b65010cafe858_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:3a690c454749f4ab893e2f20c2ecee94aa0b47fdf3f96e9d91ef6b31b5dfae77_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:3ca2c38901472326083fd433d0cef6c5d566dacb2e6ed0891de361e20ae2409a_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:b04628c8163c7e47ac69ae619269f7a3aaf557e17e980f6c158febd7447fcb47_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-baremetal-cluster-api-controllers-rhel9@sha256:fc4029313c457900f20d1015a3508cdb1f4b2ebc945a5005c429427a443b1377_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel9@sha256:4d36bc24d733039c5b5f6f5ffd7e75d7d6478926e1a8871d0f17d233d3b76428_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel9@sha256:aa16f897b8af025ff31cf057929e58500ea90c0297061edeed86a2431c2e05d8_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel9@sha256:cac8993111e08298dd1ca1b89849bf2f3f9b949bcced3e0825609090b696c802_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:7acb542353c9b1e44419ae8259a6845aa95efbabf32671450117d0bfec1ec47d_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:a617fae4516a79fa12e7b8ea700fe28f8736923f9680f016794472dbc4e7f880_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:ebc447918f3815bec8f2b44bc6f8bf73148bb8a8baeed97a0ae5e5482f62cd03_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-cluster-capacity-rhel9@sha256:eedb97e05dca4b61827fd415391529911c7228c2f07ee9ccefc65a947bdd0f26_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:59ca3dca3ca786655f35fd0557ac7f175cfcdfc852547ac0e206d6be8663a0d9_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:721f8ba3a2bd66f78b53bb9a41cf7d59824ee8542488e6e967ceafc7ee4f059a_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:afef9a0e246ced0759f0b07cd7c3e025b473eb1fd80af368dd0cbd84443e3bf9_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:c5eae1dc9c80a737a18d49571100fcaf08c569cfa906f2d3e53e07d983a13313_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:54d6fe6d9305e65557248b6d118da8296cb79b8df9185287477de3e735ab7370_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:58f93ab660a7f5316bb77d177dc5b276224d0670e7a7a2c8e4eee6dadba3e816_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:d1ff2edac26d849780c0f6e99921532adc1fc4b44fabff26582af614501bc8e1_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9@sha256:e756c4a4e1003a2406ff188119fc5a3081d7c182a0a47d28dfec382480438bf2_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:51d61b59545b4821aa43c64281227e42393f8279529f7b0c8d5e8d43398327d4_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:5518b562372985e877ffd10ba0786c16d4d55b418f6d1ccebfa5375239b2c96b_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:ce8aa5a2f099d9b22063fdd29e9cc3ba3d1e6eff4d67a20a07a1b748e6dc605e_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:d5f9187ce1641e451de858079755768572238276040b3f363a3aa8e867189779_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:09bef866682d2daac0daed6898102ef78b770495c2e197a64f2deec43e55bbd6_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:9d978eecceda23a2130c64350fe9f99089fba921860b94254b0a344a7c9c4b5d_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:d4cf3132fad01719081987d528b682b9776b55e98c2b03fe29bea287465d44ec_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-cni-rhel9@sha256:dd7f099566be7d2256830ba520f5b65d93fd6f42b9a2da0cb3cc219fee2c759a_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:1518cd5936de074e4ab19a409ece10db9e2dce89333d7e542ef87bed3b4ca5cf_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:45c855f9e7d6e5a637130b5520263aac400c99aae22364f10abfc3e8a477b015_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:72a9c1c2719682397d373a297092cf8eaf34a7f3c622d428348cf4e95da6d99f_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-daemon-rhel9@sha256:fd71deec1b26f2ac3d3f8776fb2a8a206d086afb41f95ac4471041c7e152f273_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:0a73e7209bf930eb33a57bd93eb08769ea3c74c2214d9c4875ed4167b84c86e9_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:45681454c5a5d75b1a906ff3e361f622c2262bd89f37d65e39ed01441104e9ba_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:56c3afb05ead06e385800fbdaa57949df7b5f4683a2f36e3e7648acd4ae88c87_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-dpu-rhel9-operator@sha256:fb4ceb48536fbd7cf37d686c99f3b1d73b20c3a48878e72bbd07f40009a515f4_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:5dfdf2de62e5ebf9f455ea9806ff967a45a661ae465252ba2ed605af2f995354_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:718b72ef4555035fcbae835ba3d997956a1cc6cc6bdfa5c0e39606438817e6f3_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:9de9e0b088e2187bdcf5372b8fb9acdb57fa400986f30a52c8d78df6b3828555_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9@sha256:abfaeb18ed5a4fc395266dec2d0ea5949e90193e985fb44e4d34b8f422da9a4b_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:8aba42c9fa23266cf90497c9394706977d56da15790f1c9a5ff34ce159f47229_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:9c43f23a946df22e89ec811ae10c01d3ff1b23ec54351a92ab62778b0590f16a_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:e4a2008f3e46dd8ecb6dd7f9e33be118510b6ae4f9d49a844e96f15b3b2ea830_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:ed10fdbbcb33d8ba8c85f2ed1638c80593044aaf9391cbd7ba51d53fd36435dc_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:375fef1ce7a9646a586f021f649d0c09c2681eded3c35c47af0d5d0c4c91ad83_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:a6aee889a8eaf2d3aca3a312752622f00da62dc144afd0bc591e2f52c9463d36_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:ed78d42046a54227415e02b45ad0d821ee3743fb1c0ac73cdd8e5cdf09bf9f7a_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-egress-router-rhel9@sha256:f6fae6a57ee7abce3fde2e56b0102acc6a410a0ddd981032412db501e198a4b5_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:2f00fbbe5187619d8a1ae6a304ba22044a6f66ee7b3f2d122d7d71cae85af96b_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:3de4c9da19b4492db52d961d6435646c2de49c138b8c62ea0a5966f2d39d5758_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:9f029e2dca2420f507f4e013d42fcd491de16818be1e873db5b1ee7cf0813dca_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:a023c147a057f59f24ff8c829a2bcd212db03051533f1610f5cd5965f99dc872_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:c0b85e3bf6c0fda5eb3c74ff89af6ca1d3139a02c0c78ae05e0fb3390d36367c_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:c39fab693ec65243b4010551932b1e290d6abdb5e8728a7170c129523389512c_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:9fc0afa34b3986b00edbce26530b920413fb0a8d11451daed365aafd6dbbc3dd_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:b7bd2f78700dfd37bab208a1588cc9d6725b2ebf9d87551f3ea7a11328e37b0c_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:c09300d5e9549b7b99998a259eb8c89d8f6227f63b2ec5fd36a8e82474d9bd0e_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:f9cd7090a8b5ff3268501496c100e51c6d03b7767a6fcf2a34d66392f39f141d_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:6dbac042319562ff38e7a3315c53ed134fa9ea7fe92fec0498f0544156bd620f_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:8b86d6b7c6183d02f021481330ef9731f2322add429d4c41674de6d10a8b3ce5_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:a4c6aafbbecc7a35bb7519a4cdb85d3de47ad790cea4a68de55b0380808f9719_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:f63de8d96f3ff6a6f4d613f8f0126a77ef4799fae6ff251fbfba02146b168862_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:5027f9808b4c3d5dc527fa7423be77c9e31f06edaf1174b86bc80f93c078e20e_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:5a2bc1e235370ff4320c6a3b24eab88b33d146fd306fc18cdbe29fe370272d31_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:6f9835d2178c06fc53f11824b57c399a8888496bcc1b529da222716ec07241b6_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9@sha256:dea29b962ff2296e0e72339971d002e3a064b335b85cc62a2b5efae29ca28213_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:23e1c25495877ed9bbb1cef819e5f0b673cec5dabb1dcd30a35134d83fd8d1e9_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:627ac2cf750afe6e2f7d2db32dbe601f78491e483c1044b8f3149bd7b52570b5_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:b6f6f3a769b97d1b17cc8e329d13ba41c4abf4ba33f313b3f265640438689e66_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9@sha256:d122a2f0b564c6ca57b6d13e5a5414c47b4ab63b32d55e2fc7ac181a1113382c_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:0d6520092ada419664ee28aa05b6913944585db10dea0c32515a3a6b5bbdde65_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:2eb313521a707bb69b9cd479d56dbaddf8b48cdeb215f5cccccd98fa2b29edca_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:d6ead7d1536e82d6d1f8d1cf9073a634975dcb4310ad37e9d9a4d5ece31c1437_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-local-storage-rhel9-operator@sha256:ef035463220f476f057112e9e30329cd5efa9e9bf746e527dc91fd8b57f0d57d_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:044d243c04c5bc65cba10b807cc8ea5e01e535dddaeb9d704e653ece61f18466_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:0c202ac95999e87b8d73f56c99508e823cbf1784c5589604f06a32009ea711e6_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:0d514934acfcbed0fccf17b0715a0a4c2aae78b6e25cee578042af01944265a7_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9@sha256:7779d8bb4992a5164c85cc967d68afd71dc99874ba01c671c8aec57d957e382a_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:0db4c40580bab21ab06da9f657eeba182cfa215c0134a738630ab7b88ec29717_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:265ac97f0a4e57ca86108b399b26d734f4d8f0a1ca7418ebfece1c4988ea61d2_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:b45ae3c137da296284dfb7adc101fca0a89c31482224c14b34ba7d65def32bb3_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:f8f083d40f24ddedf816a85dc0a6a231e3a081f813bcc5d17fa5c4ae70ded745_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:154e825dd2faf97427eb739772a346d3ff03048bede4521e91d3600e8a650aaf_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:a4548af492265f01dd1987403bdf3536882adde1c97c526337ce5068b33f80a8_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:a60fb4521ebf5eecabefc973d1f0fbb64c47b0716cae09a4574ebb752f172820_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:25743b3b058ae4d006ed74eddd84fcdc75ed7f18d6cf8d60399c65ad4aff377a_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:4330a7baf77033718ede8c77ae2be9379fad97a6bdc93ae170222c5e5e2c140a_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:93f722f4a4d5906ab41d5d30af2ffd9656d780fb57219f6f0ad405da5d42f209_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:2824caf68d2de41479d9e0cb00d5b3f216f62d49588a6d98f09a8a1f255d4e4b_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:887e1c09568afddd90beb04ca1f9372621addd80c7e0127a07253415bc1a5cc0_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:bb0a4bdbd2ac40c516a6316844d0a74744438b7dd2bb5d2fa91e1f9a8a625c96_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:cec9a6972888bd61f2c5532f23f00c6d21d749d68d1120a464117cf4e86b1b46_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:49df2cc13c5944d8e15f5e948ad7a02fdf275136b3f3e8665d263d7f11e96957_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:59a9303ead116c78187cc3e6293baf39b0c090cd47cf9944ed61c70eacb20a58_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:9f606371e70ad2c63ace564df1325ba7805e1f5708cca5bc579103859dda235f_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9@sha256:ed3f48d644d28bd5c99b42e80b06628caf002b214a161e858501c5efa724a3da_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:22c0044c4364fc454440ec5cbd20144f19bffba5ef880f510fccd737282f3736_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:56a7dfb0c821116ef0391ebc3e1c26f6891b23e6b8a14b679f91f3861d3b72aa_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:a5feb8fb93929543b9a641e921ea83c36bd3db18923e9f42fc958aa9c1d81090_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:e327b2deb2e2abda7b23df5bdca4c6bbbdfbfdeafb8bd454db63ffac360f2b6f_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:2940b15eeae68ce34afd10515076effc859ea7d64f92d9059b632e7939ae1391_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:499089cf1485b822227581cf65b787360c3eec497c8946b8e2fc2cdeb0124c1b_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:85de0fc6f45173774214cade3a569d018fa2054ee7f4dedba710ebf7c48bf10f_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:e28ce04dfa6a9e44288b4be2c2141e3dc3f89df3f0cfe6016325db2f3029942f_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:402f6b25541a399d7df262110c60bfccad9f6d35592b834185c78ed8cc89a2d9_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:48d2a7e4678933037391ea1a74702d0e2d97514d43619db333b1cb6d9845d9bb_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:72a2d2f94f8098ead32c9fb2f7995d9a4ca1ab69c5179dccc1664b0d1a9585ab_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9@sha256:7ae8b74b8e0a471669a1aec95825e859d42772bea7817eb433820f0282c3bdb0_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:b79fd249734c576fce3eeb4950d9257d128803fc31a2c7e17bd235b1701cee8d_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:d9b8908987a42797a81f3ccad890d764d1fabf1a7873a400974e6e7b0c4db46d_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:f80ca336c30cd9eb216c8d1ceebec7f2274797dd58927fdc4555bea07385a063_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-infiniband-cni-rhel9@sha256:99264636bdc9aca0af6a0a5d1f3f401cbce7a27c6136b7e992403ce1d1093d4a_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-infiniband-cni-rhel9@sha256:d2d2ca29c9bd844983652892882e0592f4ccf0fe7d7a55f1006d5780c9d27f90_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-infiniband-cni-rhel9@sha256:f80b9428b0a79280590cc1b7406cdde67d8fea55b249c6700cbbd9bb226b0095_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-config-daemon-rhel9@sha256:2a07fe5a54caad8cc1cb288a150a4c6edf23399a6269a0e4dba1c596d5ee822b_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-config-daemon-rhel9@sha256:9648de36a35478d6cb60f97091a6717d066f25bf15c66be7823dee4756e53e20_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-config-daemon-rhel9@sha256:dab58539af0978a72de25d025dba952396fe5a4a1503415a89a288f9cc57c32e_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-device-plugin-rhel9@sha256:112b3ff1ac44ac9f8c56ef5d56797bcf631a4e8383697327ddde07b8d6a886dd_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-device-plugin-rhel9@sha256:e2e74e408786c0e2d297549adee326f80064dbecec31758e433940faf62ac19f_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-device-plugin-rhel9@sha256:fa929c7ae3a2f8bdd04cefabc4eda3b2c2d52c4d2a255b2df07c3216849ef5a9_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:31814e21cf5ade0c2e3b02c307905c0924bb1c11da95e018741dd50ff0ec8faa_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:33e1b152221b08d0767cc9c36db82a5b50fb5c935f36a2a5e21a3cdf8862f25c_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:fadb335a1e41fae79a2675687540f1d73c5ad8f2708a7d1c41871baa0002f762_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-rhel9-operator@sha256:765b728aae77f302d934ab5cae15fadd4653a07171ebbef7376445d53a3f8c64_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-rhel9-operator@sha256:8531f4266ddea002a2f98ae754ce8807de2c4f2ed05d49012dca5bc75fa5c77b_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-rhel9-operator@sha256:ff48a7469e12cd08de049e79630a7e8eb729e6ed49045270129e2415ccad51cd_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-webhook-rhel9@sha256:087793fdcd1427757c9560226004745c5d4f4ab45402e4b6dd2b3ea4a7cb3869_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-webhook-rhel9@sha256:2c088002b99503ca37f61ac45bd5ac725e75581927780d17a6868cb730887792_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-sriov-network-webhook-rhel9@sha256:41d54adb9a58d171d323a95c419bbdabaf74c96f5eca2c7da95b2dc28defd1da_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:b1f7bab87724e17a1e8ffe9adf910403420d1c94a1a722d78f92b6497374c35a_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:d1b7df836d1718ad5b60d9ce0d2779e8864be88d5c701ab1b4f1037e8c47fab8_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:dbb8d3a6933dd33dd7705670320cb73e9dfa06d873491fdbf7a6e6a2067ff99f_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:ff3b350fc6737438e19cd74cbbeb865a7abe213c0c7bd67799448211ec672c1b_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:2631ae991c4a888149952025f280dca4c9d4270649ff01018a139bc2bfd436ef_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:3476b48ea410d1e3788b2f0118600a03dda9d0e19643a4f4789c41f81d4dd6bc_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:43e07cfc6c04f82dbd449b3f99787c8a999a492dc8d01870ff91a81a1232ceab_s390x", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:d200c4afef7a55d953c475e82701931411958fd030a0c6cf098435db4c4dabd6_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ptp-must-gather-rhel9@sha256:3c7acd5660f3641965ec8f1b2cca7d7eecc272fa1125212d2cda00697597269b_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ptp-must-gather-rhel9@sha256:80892d9724da67281eae207177839622fc3fa6a6e0708aed5779489687825667_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/ptp-must-gather-rhel9@sha256:fc3b122b700ba1e43c713d5ea4fd7da8862d21be81536d718bf328183a93e76b_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/sriov-cni-rhel9@sha256:0d6c49f6952053c780290440d4eb73b1b429cecff55b92e9fb32661a8105d9f6_arm64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/sriov-cni-rhel9@sha256:6d074f59be4b492beb98c57420aa072ba0821f01e82dd3dd44cbccbb5facd307_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/sriov-cni-rhel9@sha256:75c7ee59e78ae712b40816950305500b1b0df7fffafdad1fdf00120284b6ac10_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/sriov-network-metrics-exporter-rhel9@sha256:31814e21cf5ade0c2e3b02c307905c0924bb1c11da95e018741dd50ff0ec8faa_amd64", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/sriov-network-metrics-exporter-rhel9@sha256:33e1b152221b08d0767cc9c36db82a5b50fb5c935f36a2a5e21a3cdf8862f25c_ppc64le", "Red Hat OpenShift Container Platform 4.16:registry.redhat.io/openshift4/sriov-network-metrics-exporter-rhel9@sha256:fadb335a1e41fae79a2675687540f1d73c5ad8f2708a7d1c41871baa0002f762_arm64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "helm.sh/helm/v3: Helm Chart Code Execution" } ] }
rhsa-2025:15345
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.17.39 is now available with updates to packages and images that fix several bugs.\nThis release includes a security update for Red Hat OpenShift Container Platform 4.17.\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\nThis advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.17.39. See the following advisory for the container images for this release:\nhttps://access.redhat.com/errata/RHBA-2025:15344\nSecurity Fix(es):\n* helm.sh/helm/v3: Helm Chart Code Execution (CVE-2025-53547)\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\nAll OpenShift Container Platform 4.17 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.17/html-single/updating_clusters/index#updating-cluster-cli.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:15345", "url": "https://access.redhat.com/errata/RHSA-2025:15345" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2025-53547", "url": "https://access.redhat.com/security/cve/CVE-2025-53547" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/", "url": "https://access.redhat.com/security/updates/classification/" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_15345.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.17.39 security and extras update", "tracking": { "current_release_date": "2025-09-23T21:11:15+00:00", "generator": { "date": "2025-09-23T21:11:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2025:15345", "initial_release_date": "2025-09-10T10:50:39+00:00", "revision_history": [ { "date": "2025-09-10T10:50:39+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-09-10T10:50:42+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-23T21:11:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.17", "product": { "name": "Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.17::el9" } } } ], "category": "product_family", "name": "Red Hat OpenShift Container Platform" }, { "branches": [ { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:88709ebb025710bfa0f5bda35eba3bfe5dca38a8ba0974a7aab1dc51bd940472_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:88709ebb025710bfa0f5bda35eba3bfe5dca38a8ba0974a7aab1dc51bd940472_amd64", "product_id": "registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:88709ebb025710bfa0f5bda35eba3bfe5dca38a8ba0974a7aab1dc51bd940472_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ptp-rhel9@sha256%3A88709ebb025710bfa0f5bda35eba3bfe5dca38a8ba0974a7aab1dc51bd940472?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-linuxptp-daemon-container-v4.17.0-202509011354.p2.gd2f66e7.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:4771511d2e59b3450ff70f27c341968c8f36a1563fed32bb60b8053a5100f2bc_amd64", "product": { "name": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:4771511d2e59b3450ff70f27c341968c8f36a1563fed32bb60b8053a5100f2bc_amd64", "product_id": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:4771511d2e59b3450ff70f27c341968c8f36a1563fed32bb60b8053a5100f2bc_amd64", "product_identification_helper": { "purl": "pkg:oci/nmstate-console-plugin-rhel9@sha256%3A4771511d2e59b3450ff70f27c341968c8f36a1563fed32bb60b8053a5100f2bc?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=nmstate-console-plugin-container-v4.17.0-202509022322.p2.gcffdc60.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:5857fdc78e54cfdd347e5c35486c79f31128cf302a59afb860a12e30fb9b342f_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:5857fdc78e54cfdd347e5c35486c79f31128cf302a59afb860a12e30fb9b342f_amd64", "product_id": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:5857fdc78e54cfdd347e5c35486c79f31128cf302a59afb860a12e30fb9b342f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-helm-rhel9-operator@sha256%3A5857fdc78e54cfdd347e5c35486c79f31128cf302a59afb860a12e30fb9b342f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=openshift-enterprise-helm-operator-container-v4.17.0-202508300059.p2.g831a25b.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:3dfdc4b77769b2552bf5e223637a88df5bf867b3b55dfd1cd841a493276c1041_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:3dfdc4b77769b2552bf5e223637a88df5bf867b3b55dfd1cd841a493276c1041_amd64", "product_id": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:3dfdc4b77769b2552bf5e223637a88df5bf867b3b55dfd1cd841a493276c1041_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-sdk-rhel9@sha256%3A3dfdc4b77769b2552bf5e223637a88df5bf867b3b55dfd1cd841a493276c1041?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=openshift-enterprise-operator-sdk-container-v4.17.0-202509020554.p2.g831a25b.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:f4ee0940afd358aa97ac019a5b1015d3f2a91f95c260e51cc12a667e17d8b0f4_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:f4ee0940afd358aa97ac019a5b1015d3f2a91f95c260e51cc12a667e17d8b0f4_amd64", "product_id": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:f4ee0940afd358aa97ac019a5b1015d3f2a91f95c260e51cc12a667e17d8b0f4_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-kubernetes-nmstate-handler-rhel9@sha256%3Af4ee0940afd358aa97ac019a5b1015d3f2a91f95c260e51cc12a667e17d8b0f4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=v4.17.0-202509011354.p2.g9cc2f11.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:116236f04a9a81b8a085b913d395ae5b22388b6ed4ef614e86ab4e4b26cb09e3_amd64", "product": { "name": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:116236f04a9a81b8a085b913d395ae5b22388b6ed4ef614e86ab4e4b26cb09e3_amd64", "product_id": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:116236f04a9a81b8a085b913d395ae5b22388b6ed4ef614e86ab4e4b26cb09e3_amd64", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-rhel9-operator@sha256%3A116236f04a9a81b8a085b913d395ae5b22388b6ed4ef614e86ab4e4b26cb09e3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-kubernetes-nmstate-operator-container-v4.17.0-202509022322.p2.g9cc2f11.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:1b3f77c875b5a49a03fd151a9dbcd535710425f80e408a79f4a1e5b52501815a_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:1b3f77c875b5a49a03fd151a9dbcd535710425f80e408a79f4a1e5b52501815a_amd64", "product_id": "registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:1b3f77c875b5a49a03fd151a9dbcd535710425f80e408a79f4a1e5b52501815a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-efs-csi-driver-rhel9-operator@sha256%3A1b3f77c875b5a49a03fd151a9dbcd535710425f80e408a79f4a1e5b52501815a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-aws-efs-csi-driver-operator-container-v4.17.0-202509020554.p2.g578c85b.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:0ae0e46b7682bd82e9a420c71f907e048e068ba4ff9611d72fcf9109e6a7a9d9_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:0ae0e46b7682bd82e9a420c71f907e048e068ba4ff9611d72fcf9109e6a7a9d9_amd64", "product_id": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:0ae0e46b7682bd82e9a420c71f907e048e068ba4ff9611d72fcf9109e6a7a9d9_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-http-proxy-rhel9@sha256%3A0ae0e46b7682bd82e9a420c71f907e048e068ba4ff9611d72fcf9109e6a7a9d9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-egress-http-proxy-container-v4.17.0-202509011354.p2.ge3879e9.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:d904ee0848d68789cca098448e681e86f4cbde19945c1f17ea365fbce39304b9_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:d904ee0848d68789cca098448e681e86f4cbde19945c1f17ea365fbce39304b9_amd64", "product_id": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:d904ee0848d68789cca098448e681e86f4cbde19945c1f17ea365fbce39304b9_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-smb-csi-driver-rhel9-operator@sha256%3Ad904ee0848d68789cca098448e681e86f4cbde19945c1f17ea365fbce39304b9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-smb-csi-driver-operator-container-v4.17.0-202508301225.p2.g578c85b.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:ef4a309bde7ebe47d4d5ec927ad7d0c82d10b493dbbdfee260a6068d3b3bc71c_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:ef4a309bde7ebe47d4d5ec927ad7d0c82d10b493dbbdfee260a6068d3b3bc71c_amd64", "product_id": "registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:ef4a309bde7ebe47d4d5ec927ad7d0c82d10b493dbbdfee260a6068d3b3bc71c_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ptp-rhel9-operator@sha256%3Aef4a309bde7ebe47d4d5ec927ad7d0c82d10b493dbbdfee260a6068d3b3bc71c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-ptp-operator-container-v4.17.0-202509011354.p2.gc836701.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:759ad9b263b4132bb804f7fd1321ecf74e8e11ad9f4ec5275d895daf505bd74a_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:759ad9b263b4132bb804f7fd1321ecf74e8e11ad9f4ec5275d895daf505bd74a_amd64", "product_id": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:759ad9b263b4132bb804f7fd1321ecf74e8e11ad9f4ec5275d895daf505bd74a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel9@sha256%3A759ad9b263b4132bb804f7fd1321ecf74e8e11ad9f4ec5275d895daf505bd74a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-vertical-pod-autoscaler-container-v4.17.0-202508300059.p2.g6b1175c.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:1bff49c88dcedd74d66a6b09e619977c891bbf49de4710331bcd0054891f1d58_amd64", "product": { "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:1bff49c88dcedd74d66a6b09e619977c891bbf49de4710331bcd0054891f1d58_amd64", "product_id": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:1bff49c88dcedd74d66a6b09e619977c891bbf49de4710331bcd0054891f1d58_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel9-operator@sha256%3A1bff49c88dcedd74d66a6b09e619977c891bbf49de4710331bcd0054891f1d58?arch=amd64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-vertical-pod-autoscaler-operator-container-v4.17.0-202508300059.p2.gec3a8a0.assembly.stream.el9" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:89f283a7ecbba8fc0ed60aecf08c0a3c448207afa244d8ad0546c5a08638e01a_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:89f283a7ecbba8fc0ed60aecf08c0a3c448207afa244d8ad0546c5a08638e01a_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:89f283a7ecbba8fc0ed60aecf08c0a3c448207afa244d8ad0546c5a08638e01a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ptp-rhel9@sha256%3A89f283a7ecbba8fc0ed60aecf08c0a3c448207afa244d8ad0546c5a08638e01a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-linuxptp-daemon-container-v4.17.0-202509011354.p2.gd2f66e7.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:692ecf6ed19cbfdae0168af4f6c144d370b58d005a61c448dd0faf31b7c78327_ppc64le", "product": { "name": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:692ecf6ed19cbfdae0168af4f6c144d370b58d005a61c448dd0faf31b7c78327_ppc64le", "product_id": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:692ecf6ed19cbfdae0168af4f6c144d370b58d005a61c448dd0faf31b7c78327_ppc64le", "product_identification_helper": { "purl": "pkg:oci/nmstate-console-plugin-rhel9@sha256%3A692ecf6ed19cbfdae0168af4f6c144d370b58d005a61c448dd0faf31b7c78327?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=nmstate-console-plugin-container-v4.17.0-202509022322.p2.gcffdc60.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:1c9292e33c7a6207012b8fdc22b80744a0c8e7c1efdffc25fa28e4be47ac7aa4_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:1c9292e33c7a6207012b8fdc22b80744a0c8e7c1efdffc25fa28e4be47ac7aa4_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:1c9292e33c7a6207012b8fdc22b80744a0c8e7c1efdffc25fa28e4be47ac7aa4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-helm-rhel9-operator@sha256%3A1c9292e33c7a6207012b8fdc22b80744a0c8e7c1efdffc25fa28e4be47ac7aa4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=openshift-enterprise-helm-operator-container-v4.17.0-202508300059.p2.g831a25b.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:a07743c30dc3938535a582b851fe9250ed0d32e5e41448ca84056b2cf3fb2769_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:a07743c30dc3938535a582b851fe9250ed0d32e5e41448ca84056b2cf3fb2769_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:a07743c30dc3938535a582b851fe9250ed0d32e5e41448ca84056b2cf3fb2769_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-operator-sdk-rhel9@sha256%3Aa07743c30dc3938535a582b851fe9250ed0d32e5e41448ca84056b2cf3fb2769?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=openshift-enterprise-operator-sdk-container-v4.17.0-202509020554.p2.g831a25b.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:070a1e6adf4441769a0ffb112f8d0a96f49ccfbdc8e527b87d6ebd81663003d6_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:070a1e6adf4441769a0ffb112f8d0a96f49ccfbdc8e527b87d6ebd81663003d6_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:070a1e6adf4441769a0ffb112f8d0a96f49ccfbdc8e527b87d6ebd81663003d6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-kubernetes-nmstate-handler-rhel9@sha256%3A070a1e6adf4441769a0ffb112f8d0a96f49ccfbdc8e527b87d6ebd81663003d6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=v4.17.0-202509011354.p2.g9cc2f11.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:8c92d1dcfd9b694bac9b650519e011a1fc2b5d9457f7895246e730754ba4dcf3_ppc64le", "product": { "name": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:8c92d1dcfd9b694bac9b650519e011a1fc2b5d9457f7895246e730754ba4dcf3_ppc64le", "product_id": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:8c92d1dcfd9b694bac9b650519e011a1fc2b5d9457f7895246e730754ba4dcf3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-rhel9-operator@sha256%3A8c92d1dcfd9b694bac9b650519e011a1fc2b5d9457f7895246e730754ba4dcf3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-kubernetes-nmstate-operator-container-v4.17.0-202509022322.p2.g9cc2f11.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:131ecffede5be022e6abeb2a7f7c2e0422e9b85a9f4818ad6c30066e6c23134a_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:131ecffede5be022e6abeb2a7f7c2e0422e9b85a9f4818ad6c30066e6c23134a_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:131ecffede5be022e6abeb2a7f7c2e0422e9b85a9f4818ad6c30066e6c23134a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-egress-http-proxy-rhel9@sha256%3A131ecffede5be022e6abeb2a7f7c2e0422e9b85a9f4818ad6c30066e6c23134a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-egress-http-proxy-container-v4.17.0-202509011354.p2.ge3879e9.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:7046a36568813a22e8cf38ad257045b203b3105ba5c56ca349e3e4f9b0c88b26_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:7046a36568813a22e8cf38ad257045b203b3105ba5c56ca349e3e4f9b0c88b26_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:7046a36568813a22e8cf38ad257045b203b3105ba5c56ca349e3e4f9b0c88b26_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-smb-csi-driver-rhel9-operator@sha256%3A7046a36568813a22e8cf38ad257045b203b3105ba5c56ca349e3e4f9b0c88b26?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-smb-csi-driver-operator-container-v4.17.0-202508301225.p2.g578c85b.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:23381448669360bea0f74c522834e6bfbd4992953ff06db042edfe487a15ba59_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:23381448669360bea0f74c522834e6bfbd4992953ff06db042edfe487a15ba59_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:23381448669360bea0f74c522834e6bfbd4992953ff06db042edfe487a15ba59_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ptp-rhel9-operator@sha256%3A23381448669360bea0f74c522834e6bfbd4992953ff06db042edfe487a15ba59?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-ptp-operator-container-v4.17.0-202509011354.p2.gc836701.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:4a3b2b777d14fe1446fb32b6424bc77da163cd63b4fadd1c412b1e15c5282fd7_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:4a3b2b777d14fe1446fb32b6424bc77da163cd63b4fadd1c412b1e15c5282fd7_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:4a3b2b777d14fe1446fb32b6424bc77da163cd63b4fadd1c412b1e15c5282fd7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel9@sha256%3A4a3b2b777d14fe1446fb32b6424bc77da163cd63b4fadd1c412b1e15c5282fd7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-vertical-pod-autoscaler-container-v4.17.0-202508300059.p2.g6b1175c.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:06fb8e832cfc8ee9e0d16b62a8892ca856768abe5e57710b1d9a2eef7a500428_ppc64le", "product": { "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:06fb8e832cfc8ee9e0d16b62a8892ca856768abe5e57710b1d9a2eef7a500428_ppc64le", "product_id": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:06fb8e832cfc8ee9e0d16b62a8892ca856768abe5e57710b1d9a2eef7a500428_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel9-operator@sha256%3A06fb8e832cfc8ee9e0d16b62a8892ca856768abe5e57710b1d9a2eef7a500428?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-vertical-pod-autoscaler-operator-container-v4.17.0-202508300059.p2.gec3a8a0.assembly.stream.el9" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:cadb1fae4c9ca0d6ca35c7650c870302d50543c26b6096129327fed72c5a126f_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:cadb1fae4c9ca0d6ca35c7650c870302d50543c26b6096129327fed72c5a126f_arm64", "product_id": "registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:cadb1fae4c9ca0d6ca35c7650c870302d50543c26b6096129327fed72c5a126f_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-ptp-rhel9@sha256%3Acadb1fae4c9ca0d6ca35c7650c870302d50543c26b6096129327fed72c5a126f?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-linuxptp-daemon-container-v4.17.0-202509011354.p2.gd2f66e7.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:1b1cae8628c9062fbbe181cabb159f3a2323a127cb8afff080447a8ab6644476_arm64", "product": { "name": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:1b1cae8628c9062fbbe181cabb159f3a2323a127cb8afff080447a8ab6644476_arm64", "product_id": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:1b1cae8628c9062fbbe181cabb159f3a2323a127cb8afff080447a8ab6644476_arm64", "product_identification_helper": { "purl": "pkg:oci/nmstate-console-plugin-rhel9@sha256%3A1b1cae8628c9062fbbe181cabb159f3a2323a127cb8afff080447a8ab6644476?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=nmstate-console-plugin-container-v4.17.0-202509022322.p2.gcffdc60.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:890dace80c387969a9b97bd02776fdf6ec59f67131c9ec3800a84bd21cfd491a_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:890dace80c387969a9b97bd02776fdf6ec59f67131c9ec3800a84bd21cfd491a_arm64", "product_id": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:890dace80c387969a9b97bd02776fdf6ec59f67131c9ec3800a84bd21cfd491a_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-helm-rhel9-operator@sha256%3A890dace80c387969a9b97bd02776fdf6ec59f67131c9ec3800a84bd21cfd491a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=openshift-enterprise-helm-operator-container-v4.17.0-202508300059.p2.g831a25b.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:1b9b8dfe44497a6ea78b58aed0184d79ec5612816f8dcfe1ebf60f21f3e07972_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:1b9b8dfe44497a6ea78b58aed0184d79ec5612816f8dcfe1ebf60f21f3e07972_arm64", "product_id": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:1b9b8dfe44497a6ea78b58aed0184d79ec5612816f8dcfe1ebf60f21f3e07972_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-sdk-rhel9@sha256%3A1b9b8dfe44497a6ea78b58aed0184d79ec5612816f8dcfe1ebf60f21f3e07972?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=openshift-enterprise-operator-sdk-container-v4.17.0-202509020554.p2.g831a25b.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:5484b77cc8dd00373bc27d4ea81de5ffcf825b02657d6bec77db70678ce0bc05_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:5484b77cc8dd00373bc27d4ea81de5ffcf825b02657d6bec77db70678ce0bc05_arm64", "product_id": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:5484b77cc8dd00373bc27d4ea81de5ffcf825b02657d6bec77db70678ce0bc05_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-kubernetes-nmstate-handler-rhel9@sha256%3A5484b77cc8dd00373bc27d4ea81de5ffcf825b02657d6bec77db70678ce0bc05?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=v4.17.0-202509011354.p2.g9cc2f11.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:9e4a78a4cda552a1d67a913b2f3e5b735a3939176e87eb1dc7c9115c6de9122c_arm64", "product": { "name": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:9e4a78a4cda552a1d67a913b2f3e5b735a3939176e87eb1dc7c9115c6de9122c_arm64", "product_id": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:9e4a78a4cda552a1d67a913b2f3e5b735a3939176e87eb1dc7c9115c6de9122c_arm64", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-rhel9-operator@sha256%3A9e4a78a4cda552a1d67a913b2f3e5b735a3939176e87eb1dc7c9115c6de9122c?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-kubernetes-nmstate-operator-container-v4.17.0-202509022322.p2.g9cc2f11.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:ecc69803103a47044d2ea49ed332d909a0521176b8aa3e4156bfa1db902e9ec5_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:ecc69803103a47044d2ea49ed332d909a0521176b8aa3e4156bfa1db902e9ec5_arm64", "product_id": "registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:ecc69803103a47044d2ea49ed332d909a0521176b8aa3e4156bfa1db902e9ec5_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-efs-csi-driver-rhel9-operator@sha256%3Aecc69803103a47044d2ea49ed332d909a0521176b8aa3e4156bfa1db902e9ec5?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-aws-efs-csi-driver-operator-container-v4.17.0-202509020554.p2.g578c85b.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:b0d72b9aa6f876b0f6dd1ca3d01cfecdc607b5b45d7fd4e9e9bd841108a96406_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:b0d72b9aa6f876b0f6dd1ca3d01cfecdc607b5b45d7fd4e9e9bd841108a96406_arm64", "product_id": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:b0d72b9aa6f876b0f6dd1ca3d01cfecdc607b5b45d7fd4e9e9bd841108a96406_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-http-proxy-rhel9@sha256%3Ab0d72b9aa6f876b0f6dd1ca3d01cfecdc607b5b45d7fd4e9e9bd841108a96406?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-egress-http-proxy-container-v4.17.0-202509011354.p2.ge3879e9.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:89e103883c135c2a91a92c037629c0b2235f62288fddf68643a7a85336593de7_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:89e103883c135c2a91a92c037629c0b2235f62288fddf68643a7a85336593de7_arm64", "product_id": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:89e103883c135c2a91a92c037629c0b2235f62288fddf68643a7a85336593de7_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-smb-csi-driver-rhel9-operator@sha256%3A89e103883c135c2a91a92c037629c0b2235f62288fddf68643a7a85336593de7?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-smb-csi-driver-operator-container-v4.17.0-202508301225.p2.g578c85b.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:f580b3707a3d48991951b3b7e2b5f0abd66a2e501cbb35416d688c343a1184f9_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:f580b3707a3d48991951b3b7e2b5f0abd66a2e501cbb35416d688c343a1184f9_arm64", "product_id": "registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:f580b3707a3d48991951b3b7e2b5f0abd66a2e501cbb35416d688c343a1184f9_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-ptp-rhel9-operator@sha256%3Af580b3707a3d48991951b3b7e2b5f0abd66a2e501cbb35416d688c343a1184f9?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-ptp-operator-container-v4.17.0-202509011354.p2.gc836701.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:c597b8fd9b391b7c095264ee141b4f7d1e4be1e70022e5a9b8a90afc026ffc6f_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:c597b8fd9b391b7c095264ee141b4f7d1e4be1e70022e5a9b8a90afc026ffc6f_arm64", "product_id": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:c597b8fd9b391b7c095264ee141b4f7d1e4be1e70022e5a9b8a90afc026ffc6f_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel9@sha256%3Ac597b8fd9b391b7c095264ee141b4f7d1e4be1e70022e5a9b8a90afc026ffc6f?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-vertical-pod-autoscaler-container-v4.17.0-202508300059.p2.g6b1175c.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:489f92d2e0dbfd8a7ae8e1e511ad2252e20724f05f32c002fea25eeadb7f92ee_arm64", "product": { "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:489f92d2e0dbfd8a7ae8e1e511ad2252e20724f05f32c002fea25eeadb7f92ee_arm64", "product_id": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:489f92d2e0dbfd8a7ae8e1e511ad2252e20724f05f32c002fea25eeadb7f92ee_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel9-operator@sha256%3A489f92d2e0dbfd8a7ae8e1e511ad2252e20724f05f32c002fea25eeadb7f92ee?arch=arm64\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-vertical-pod-autoscaler-operator-container-v4.17.0-202508300059.p2.gec3a8a0.assembly.stream.el9" } } } ], "category": "architecture", "name": "arm64" }, { "branches": [ { "category": "product_version", "name": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:4cfb6e75c0b442daafd3da438c2bd7872402e344ca7caaf338025ed5aa6f5367_s390x", "product": { "name": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:4cfb6e75c0b442daafd3da438c2bd7872402e344ca7caaf338025ed5aa6f5367_s390x", "product_id": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:4cfb6e75c0b442daafd3da438c2bd7872402e344ca7caaf338025ed5aa6f5367_s390x", "product_identification_helper": { "purl": "pkg:oci/nmstate-console-plugin-rhel9@sha256%3A4cfb6e75c0b442daafd3da438c2bd7872402e344ca7caaf338025ed5aa6f5367?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=nmstate-console-plugin-container-v4.17.0-202509022322.p2.gcffdc60.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:eceba5eb6145baedafdcd12b2ff4c01a914d5c2800be1cc45cb6ee1da52fd59a_s390x", "product": { "name": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:eceba5eb6145baedafdcd12b2ff4c01a914d5c2800be1cc45cb6ee1da52fd59a_s390x", "product_id": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:eceba5eb6145baedafdcd12b2ff4c01a914d5c2800be1cc45cb6ee1da52fd59a_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-helm-rhel9-operator@sha256%3Aeceba5eb6145baedafdcd12b2ff4c01a914d5c2800be1cc45cb6ee1da52fd59a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=openshift-enterprise-helm-operator-container-v4.17.0-202508300059.p2.g831a25b.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:b4d145dd4c58c63855b4b723e38a67a50eef2520cf8c55e644c38deea07d532e_s390x", "product": { "name": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:b4d145dd4c58c63855b4b723e38a67a50eef2520cf8c55e644c38deea07d532e_s390x", "product_id": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:b4d145dd4c58c63855b4b723e38a67a50eef2520cf8c55e644c38deea07d532e_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-operator-sdk-rhel9@sha256%3Ab4d145dd4c58c63855b4b723e38a67a50eef2520cf8c55e644c38deea07d532e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=openshift-enterprise-operator-sdk-container-v4.17.0-202509020554.p2.g831a25b.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:bb01ae66f79140751ae2919a7783e888fb779cae8cf00371d6f657f57ca3c2d3_s390x", "product": { "name": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:bb01ae66f79140751ae2919a7783e888fb779cae8cf00371d6f657f57ca3c2d3_s390x", "product_id": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:bb01ae66f79140751ae2919a7783e888fb779cae8cf00371d6f657f57ca3c2d3_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-kubernetes-nmstate-handler-rhel9@sha256%3Abb01ae66f79140751ae2919a7783e888fb779cae8cf00371d6f657f57ca3c2d3?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=v4.17.0-202509011354.p2.g9cc2f11.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:d02e3edeb56202cd486451aa75652f20b0efc725136d2683cc5dff2be944ad58_s390x", "product": { "name": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:d02e3edeb56202cd486451aa75652f20b0efc725136d2683cc5dff2be944ad58_s390x", "product_id": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:d02e3edeb56202cd486451aa75652f20b0efc725136d2683cc5dff2be944ad58_s390x", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-rhel9-operator@sha256%3Ad02e3edeb56202cd486451aa75652f20b0efc725136d2683cc5dff2be944ad58?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-kubernetes-nmstate-operator-container-v4.17.0-202509022322.p2.g9cc2f11.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:96a72fc63224557ed71eeecd062998f34b2133872687ebb06ac9e7435e4c69eb_s390x", "product": { "name": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:96a72fc63224557ed71eeecd062998f34b2133872687ebb06ac9e7435e4c69eb_s390x", "product_id": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:96a72fc63224557ed71eeecd062998f34b2133872687ebb06ac9e7435e4c69eb_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-egress-http-proxy-rhel9@sha256%3A96a72fc63224557ed71eeecd062998f34b2133872687ebb06ac9e7435e4c69eb?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-egress-http-proxy-container-v4.17.0-202509011354.p2.ge3879e9.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:b1b72f8932e3605eb265a455cdf1eb10d6d637ec641b57f6cca9fcab254ff434_s390x", "product": { "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:b1b72f8932e3605eb265a455cdf1eb10d6d637ec641b57f6cca9fcab254ff434_s390x", "product_id": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:b1b72f8932e3605eb265a455cdf1eb10d6d637ec641b57f6cca9fcab254ff434_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-smb-csi-driver-rhel9-operator@sha256%3Ab1b72f8932e3605eb265a455cdf1eb10d6d637ec641b57f6cca9fcab254ff434?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-smb-csi-driver-operator-container-v4.17.0-202508301225.p2.g578c85b.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:99d56cc39d461713355d973e73ca50b09573f72ec30323f5952b0cc1addbbf6b_s390x", "product": { "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:99d56cc39d461713355d973e73ca50b09573f72ec30323f5952b0cc1addbbf6b_s390x", "product_id": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:99d56cc39d461713355d973e73ca50b09573f72ec30323f5952b0cc1addbbf6b_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel9@sha256%3A99d56cc39d461713355d973e73ca50b09573f72ec30323f5952b0cc1addbbf6b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-vertical-pod-autoscaler-container-v4.17.0-202508300059.p2.g6b1175c.assembly.stream.el9" } } }, { "category": "product_version", "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:cef6958e07cfebb027f51f114687d9710989149b83287f05377ebff6ac7d185f_s390x", "product": { "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:cef6958e07cfebb027f51f114687d9710989149b83287f05377ebff6ac7d185f_s390x", "product_id": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:cef6958e07cfebb027f51f114687d9710989149b83287f05377ebff6ac7d185f_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel9-operator@sha256%3Acef6958e07cfebb027f51f114687d9710989149b83287f05377ebff6ac7d185f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4\u0026tag=ose-vertical-pod-autoscaler-operator-container-v4.17.0-202508300059.p2.gec3a8a0.assembly.stream.el9" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:116236f04a9a81b8a085b913d395ae5b22388b6ed4ef614e86ab4e4b26cb09e3_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:116236f04a9a81b8a085b913d395ae5b22388b6ed4ef614e86ab4e4b26cb09e3_amd64" }, "product_reference": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:116236f04a9a81b8a085b913d395ae5b22388b6ed4ef614e86ab4e4b26cb09e3_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:8c92d1dcfd9b694bac9b650519e011a1fc2b5d9457f7895246e730754ba4dcf3_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:8c92d1dcfd9b694bac9b650519e011a1fc2b5d9457f7895246e730754ba4dcf3_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:8c92d1dcfd9b694bac9b650519e011a1fc2b5d9457f7895246e730754ba4dcf3_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:9e4a78a4cda552a1d67a913b2f3e5b735a3939176e87eb1dc7c9115c6de9122c_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:9e4a78a4cda552a1d67a913b2f3e5b735a3939176e87eb1dc7c9115c6de9122c_arm64" }, "product_reference": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:9e4a78a4cda552a1d67a913b2f3e5b735a3939176e87eb1dc7c9115c6de9122c_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:d02e3edeb56202cd486451aa75652f20b0efc725136d2683cc5dff2be944ad58_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:d02e3edeb56202cd486451aa75652f20b0efc725136d2683cc5dff2be944ad58_s390x" }, "product_reference": "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:d02e3edeb56202cd486451aa75652f20b0efc725136d2683cc5dff2be944ad58_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:1b1cae8628c9062fbbe181cabb159f3a2323a127cb8afff080447a8ab6644476_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:1b1cae8628c9062fbbe181cabb159f3a2323a127cb8afff080447a8ab6644476_arm64" }, "product_reference": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:1b1cae8628c9062fbbe181cabb159f3a2323a127cb8afff080447a8ab6644476_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:4771511d2e59b3450ff70f27c341968c8f36a1563fed32bb60b8053a5100f2bc_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:4771511d2e59b3450ff70f27c341968c8f36a1563fed32bb60b8053a5100f2bc_amd64" }, "product_reference": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:4771511d2e59b3450ff70f27c341968c8f36a1563fed32bb60b8053a5100f2bc_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:4cfb6e75c0b442daafd3da438c2bd7872402e344ca7caaf338025ed5aa6f5367_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:4cfb6e75c0b442daafd3da438c2bd7872402e344ca7caaf338025ed5aa6f5367_s390x" }, "product_reference": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:4cfb6e75c0b442daafd3da438c2bd7872402e344ca7caaf338025ed5aa6f5367_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:692ecf6ed19cbfdae0168af4f6c144d370b58d005a61c448dd0faf31b7c78327_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:692ecf6ed19cbfdae0168af4f6c144d370b58d005a61c448dd0faf31b7c78327_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:692ecf6ed19cbfdae0168af4f6c144d370b58d005a61c448dd0faf31b7c78327_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:1b3f77c875b5a49a03fd151a9dbcd535710425f80e408a79f4a1e5b52501815a_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:1b3f77c875b5a49a03fd151a9dbcd535710425f80e408a79f4a1e5b52501815a_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:1b3f77c875b5a49a03fd151a9dbcd535710425f80e408a79f4a1e5b52501815a_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:ecc69803103a47044d2ea49ed332d909a0521176b8aa3e4156bfa1db902e9ec5_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:ecc69803103a47044d2ea49ed332d909a0521176b8aa3e4156bfa1db902e9ec5_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:ecc69803103a47044d2ea49ed332d909a0521176b8aa3e4156bfa1db902e9ec5_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:0ae0e46b7682bd82e9a420c71f907e048e068ba4ff9611d72fcf9109e6a7a9d9_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:0ae0e46b7682bd82e9a420c71f907e048e068ba4ff9611d72fcf9109e6a7a9d9_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:0ae0e46b7682bd82e9a420c71f907e048e068ba4ff9611d72fcf9109e6a7a9d9_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:131ecffede5be022e6abeb2a7f7c2e0422e9b85a9f4818ad6c30066e6c23134a_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:131ecffede5be022e6abeb2a7f7c2e0422e9b85a9f4818ad6c30066e6c23134a_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:131ecffede5be022e6abeb2a7f7c2e0422e9b85a9f4818ad6c30066e6c23134a_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:96a72fc63224557ed71eeecd062998f34b2133872687ebb06ac9e7435e4c69eb_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:96a72fc63224557ed71eeecd062998f34b2133872687ebb06ac9e7435e4c69eb_s390x" }, "product_reference": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:96a72fc63224557ed71eeecd062998f34b2133872687ebb06ac9e7435e4c69eb_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:b0d72b9aa6f876b0f6dd1ca3d01cfecdc607b5b45d7fd4e9e9bd841108a96406_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:b0d72b9aa6f876b0f6dd1ca3d01cfecdc607b5b45d7fd4e9e9bd841108a96406_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:b0d72b9aa6f876b0f6dd1ca3d01cfecdc607b5b45d7fd4e9e9bd841108a96406_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:1c9292e33c7a6207012b8fdc22b80744a0c8e7c1efdffc25fa28e4be47ac7aa4_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:1c9292e33c7a6207012b8fdc22b80744a0c8e7c1efdffc25fa28e4be47ac7aa4_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:1c9292e33c7a6207012b8fdc22b80744a0c8e7c1efdffc25fa28e4be47ac7aa4_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:5857fdc78e54cfdd347e5c35486c79f31128cf302a59afb860a12e30fb9b342f_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:5857fdc78e54cfdd347e5c35486c79f31128cf302a59afb860a12e30fb9b342f_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:5857fdc78e54cfdd347e5c35486c79f31128cf302a59afb860a12e30fb9b342f_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:890dace80c387969a9b97bd02776fdf6ec59f67131c9ec3800a84bd21cfd491a_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:890dace80c387969a9b97bd02776fdf6ec59f67131c9ec3800a84bd21cfd491a_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:890dace80c387969a9b97bd02776fdf6ec59f67131c9ec3800a84bd21cfd491a_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:eceba5eb6145baedafdcd12b2ff4c01a914d5c2800be1cc45cb6ee1da52fd59a_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:eceba5eb6145baedafdcd12b2ff4c01a914d5c2800be1cc45cb6ee1da52fd59a_s390x" }, "product_reference": "registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:eceba5eb6145baedafdcd12b2ff4c01a914d5c2800be1cc45cb6ee1da52fd59a_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:070a1e6adf4441769a0ffb112f8d0a96f49ccfbdc8e527b87d6ebd81663003d6_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:070a1e6adf4441769a0ffb112f8d0a96f49ccfbdc8e527b87d6ebd81663003d6_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:070a1e6adf4441769a0ffb112f8d0a96f49ccfbdc8e527b87d6ebd81663003d6_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:5484b77cc8dd00373bc27d4ea81de5ffcf825b02657d6bec77db70678ce0bc05_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:5484b77cc8dd00373bc27d4ea81de5ffcf825b02657d6bec77db70678ce0bc05_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:5484b77cc8dd00373bc27d4ea81de5ffcf825b02657d6bec77db70678ce0bc05_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:bb01ae66f79140751ae2919a7783e888fb779cae8cf00371d6f657f57ca3c2d3_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:bb01ae66f79140751ae2919a7783e888fb779cae8cf00371d6f657f57ca3c2d3_s390x" }, "product_reference": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:bb01ae66f79140751ae2919a7783e888fb779cae8cf00371d6f657f57ca3c2d3_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:f4ee0940afd358aa97ac019a5b1015d3f2a91f95c260e51cc12a667e17d8b0f4_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:f4ee0940afd358aa97ac019a5b1015d3f2a91f95c260e51cc12a667e17d8b0f4_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:f4ee0940afd358aa97ac019a5b1015d3f2a91f95c260e51cc12a667e17d8b0f4_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:1b9b8dfe44497a6ea78b58aed0184d79ec5612816f8dcfe1ebf60f21f3e07972_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:1b9b8dfe44497a6ea78b58aed0184d79ec5612816f8dcfe1ebf60f21f3e07972_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:1b9b8dfe44497a6ea78b58aed0184d79ec5612816f8dcfe1ebf60f21f3e07972_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:3dfdc4b77769b2552bf5e223637a88df5bf867b3b55dfd1cd841a493276c1041_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:3dfdc4b77769b2552bf5e223637a88df5bf867b3b55dfd1cd841a493276c1041_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:3dfdc4b77769b2552bf5e223637a88df5bf867b3b55dfd1cd841a493276c1041_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:a07743c30dc3938535a582b851fe9250ed0d32e5e41448ca84056b2cf3fb2769_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:a07743c30dc3938535a582b851fe9250ed0d32e5e41448ca84056b2cf3fb2769_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:a07743c30dc3938535a582b851fe9250ed0d32e5e41448ca84056b2cf3fb2769_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:b4d145dd4c58c63855b4b723e38a67a50eef2520cf8c55e644c38deea07d532e_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:b4d145dd4c58c63855b4b723e38a67a50eef2520cf8c55e644c38deea07d532e_s390x" }, "product_reference": "registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:b4d145dd4c58c63855b4b723e38a67a50eef2520cf8c55e644c38deea07d532e_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:23381448669360bea0f74c522834e6bfbd4992953ff06db042edfe487a15ba59_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:23381448669360bea0f74c522834e6bfbd4992953ff06db042edfe487a15ba59_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:23381448669360bea0f74c522834e6bfbd4992953ff06db042edfe487a15ba59_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:ef4a309bde7ebe47d4d5ec927ad7d0c82d10b493dbbdfee260a6068d3b3bc71c_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:ef4a309bde7ebe47d4d5ec927ad7d0c82d10b493dbbdfee260a6068d3b3bc71c_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:ef4a309bde7ebe47d4d5ec927ad7d0c82d10b493dbbdfee260a6068d3b3bc71c_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:f580b3707a3d48991951b3b7e2b5f0abd66a2e501cbb35416d688c343a1184f9_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:f580b3707a3d48991951b3b7e2b5f0abd66a2e501cbb35416d688c343a1184f9_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:f580b3707a3d48991951b3b7e2b5f0abd66a2e501cbb35416d688c343a1184f9_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:88709ebb025710bfa0f5bda35eba3bfe5dca38a8ba0974a7aab1dc51bd940472_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:88709ebb025710bfa0f5bda35eba3bfe5dca38a8ba0974a7aab1dc51bd940472_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:88709ebb025710bfa0f5bda35eba3bfe5dca38a8ba0974a7aab1dc51bd940472_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:89f283a7ecbba8fc0ed60aecf08c0a3c448207afa244d8ad0546c5a08638e01a_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:89f283a7ecbba8fc0ed60aecf08c0a3c448207afa244d8ad0546c5a08638e01a_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:89f283a7ecbba8fc0ed60aecf08c0a3c448207afa244d8ad0546c5a08638e01a_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:cadb1fae4c9ca0d6ca35c7650c870302d50543c26b6096129327fed72c5a126f_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:cadb1fae4c9ca0d6ca35c7650c870302d50543c26b6096129327fed72c5a126f_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:cadb1fae4c9ca0d6ca35c7650c870302d50543c26b6096129327fed72c5a126f_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:7046a36568813a22e8cf38ad257045b203b3105ba5c56ca349e3e4f9b0c88b26_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:7046a36568813a22e8cf38ad257045b203b3105ba5c56ca349e3e4f9b0c88b26_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:7046a36568813a22e8cf38ad257045b203b3105ba5c56ca349e3e4f9b0c88b26_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:89e103883c135c2a91a92c037629c0b2235f62288fddf68643a7a85336593de7_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:89e103883c135c2a91a92c037629c0b2235f62288fddf68643a7a85336593de7_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:89e103883c135c2a91a92c037629c0b2235f62288fddf68643a7a85336593de7_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:b1b72f8932e3605eb265a455cdf1eb10d6d637ec641b57f6cca9fcab254ff434_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:b1b72f8932e3605eb265a455cdf1eb10d6d637ec641b57f6cca9fcab254ff434_s390x" }, "product_reference": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:b1b72f8932e3605eb265a455cdf1eb10d6d637ec641b57f6cca9fcab254ff434_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:d904ee0848d68789cca098448e681e86f4cbde19945c1f17ea365fbce39304b9_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:d904ee0848d68789cca098448e681e86f4cbde19945c1f17ea365fbce39304b9_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:d904ee0848d68789cca098448e681e86f4cbde19945c1f17ea365fbce39304b9_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:06fb8e832cfc8ee9e0d16b62a8892ca856768abe5e57710b1d9a2eef7a500428_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:06fb8e832cfc8ee9e0d16b62a8892ca856768abe5e57710b1d9a2eef7a500428_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:06fb8e832cfc8ee9e0d16b62a8892ca856768abe5e57710b1d9a2eef7a500428_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:1bff49c88dcedd74d66a6b09e619977c891bbf49de4710331bcd0054891f1d58_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:1bff49c88dcedd74d66a6b09e619977c891bbf49de4710331bcd0054891f1d58_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:1bff49c88dcedd74d66a6b09e619977c891bbf49de4710331bcd0054891f1d58_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:489f92d2e0dbfd8a7ae8e1e511ad2252e20724f05f32c002fea25eeadb7f92ee_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:489f92d2e0dbfd8a7ae8e1e511ad2252e20724f05f32c002fea25eeadb7f92ee_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:489f92d2e0dbfd8a7ae8e1e511ad2252e20724f05f32c002fea25eeadb7f92ee_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:cef6958e07cfebb027f51f114687d9710989149b83287f05377ebff6ac7d185f_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:cef6958e07cfebb027f51f114687d9710989149b83287f05377ebff6ac7d185f_s390x" }, "product_reference": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:cef6958e07cfebb027f51f114687d9710989149b83287f05377ebff6ac7d185f_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:4a3b2b777d14fe1446fb32b6424bc77da163cd63b4fadd1c412b1e15c5282fd7_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:4a3b2b777d14fe1446fb32b6424bc77da163cd63b4fadd1c412b1e15c5282fd7_ppc64le" }, "product_reference": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:4a3b2b777d14fe1446fb32b6424bc77da163cd63b4fadd1c412b1e15c5282fd7_ppc64le", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:759ad9b263b4132bb804f7fd1321ecf74e8e11ad9f4ec5275d895daf505bd74a_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:759ad9b263b4132bb804f7fd1321ecf74e8e11ad9f4ec5275d895daf505bd74a_amd64" }, "product_reference": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:759ad9b263b4132bb804f7fd1321ecf74e8e11ad9f4ec5275d895daf505bd74a_amd64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:99d56cc39d461713355d973e73ca50b09573f72ec30323f5952b0cc1addbbf6b_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:99d56cc39d461713355d973e73ca50b09573f72ec30323f5952b0cc1addbbf6b_s390x" }, "product_reference": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:99d56cc39d461713355d973e73ca50b09573f72ec30323f5952b0cc1addbbf6b_s390x", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:c597b8fd9b391b7c095264ee141b4f7d1e4be1e70022e5a9b8a90afc026ffc6f_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:c597b8fd9b391b7c095264ee141b4f7d1e4be1e70022e5a9b8a90afc026ffc6f_arm64" }, "product_reference": "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:c597b8fd9b391b7c095264ee141b4f7d1e4be1e70022e5a9b8a90afc026ffc6f_arm64", "relates_to_product_reference": "Red Hat OpenShift Container Platform 4.17" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-53547", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2025-07-08T22:01:16.594090+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:116236f04a9a81b8a085b913d395ae5b22388b6ed4ef614e86ab4e4b26cb09e3_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:8c92d1dcfd9b694bac9b650519e011a1fc2b5d9457f7895246e730754ba4dcf3_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:9e4a78a4cda552a1d67a913b2f3e5b735a3939176e87eb1dc7c9115c6de9122c_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:d02e3edeb56202cd486451aa75652f20b0efc725136d2683cc5dff2be944ad58_s390x", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:1b1cae8628c9062fbbe181cabb159f3a2323a127cb8afff080447a8ab6644476_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:4771511d2e59b3450ff70f27c341968c8f36a1563fed32bb60b8053a5100f2bc_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:4cfb6e75c0b442daafd3da438c2bd7872402e344ca7caaf338025ed5aa6f5367_s390x", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:692ecf6ed19cbfdae0168af4f6c144d370b58d005a61c448dd0faf31b7c78327_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:1b3f77c875b5a49a03fd151a9dbcd535710425f80e408a79f4a1e5b52501815a_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:ecc69803103a47044d2ea49ed332d909a0521176b8aa3e4156bfa1db902e9ec5_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:0ae0e46b7682bd82e9a420c71f907e048e068ba4ff9611d72fcf9109e6a7a9d9_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:131ecffede5be022e6abeb2a7f7c2e0422e9b85a9f4818ad6c30066e6c23134a_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:96a72fc63224557ed71eeecd062998f34b2133872687ebb06ac9e7435e4c69eb_s390x", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:b0d72b9aa6f876b0f6dd1ca3d01cfecdc607b5b45d7fd4e9e9bd841108a96406_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:1c9292e33c7a6207012b8fdc22b80744a0c8e7c1efdffc25fa28e4be47ac7aa4_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:5857fdc78e54cfdd347e5c35486c79f31128cf302a59afb860a12e30fb9b342f_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:890dace80c387969a9b97bd02776fdf6ec59f67131c9ec3800a84bd21cfd491a_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:eceba5eb6145baedafdcd12b2ff4c01a914d5c2800be1cc45cb6ee1da52fd59a_s390x", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:070a1e6adf4441769a0ffb112f8d0a96f49ccfbdc8e527b87d6ebd81663003d6_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:5484b77cc8dd00373bc27d4ea81de5ffcf825b02657d6bec77db70678ce0bc05_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:bb01ae66f79140751ae2919a7783e888fb779cae8cf00371d6f657f57ca3c2d3_s390x", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:f4ee0940afd358aa97ac019a5b1015d3f2a91f95c260e51cc12a667e17d8b0f4_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:23381448669360bea0f74c522834e6bfbd4992953ff06db042edfe487a15ba59_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:ef4a309bde7ebe47d4d5ec927ad7d0c82d10b493dbbdfee260a6068d3b3bc71c_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:f580b3707a3d48991951b3b7e2b5f0abd66a2e501cbb35416d688c343a1184f9_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:88709ebb025710bfa0f5bda35eba3bfe5dca38a8ba0974a7aab1dc51bd940472_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:89f283a7ecbba8fc0ed60aecf08c0a3c448207afa244d8ad0546c5a08638e01a_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:cadb1fae4c9ca0d6ca35c7650c870302d50543c26b6096129327fed72c5a126f_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:7046a36568813a22e8cf38ad257045b203b3105ba5c56ca349e3e4f9b0c88b26_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:89e103883c135c2a91a92c037629c0b2235f62288fddf68643a7a85336593de7_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:b1b72f8932e3605eb265a455cdf1eb10d6d637ec641b57f6cca9fcab254ff434_s390x", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:d904ee0848d68789cca098448e681e86f4cbde19945c1f17ea365fbce39304b9_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:06fb8e832cfc8ee9e0d16b62a8892ca856768abe5e57710b1d9a2eef7a500428_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:1bff49c88dcedd74d66a6b09e619977c891bbf49de4710331bcd0054891f1d58_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:489f92d2e0dbfd8a7ae8e1e511ad2252e20724f05f32c002fea25eeadb7f92ee_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:cef6958e07cfebb027f51f114687d9710989149b83287f05377ebff6ac7d185f_s390x", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:4a3b2b777d14fe1446fb32b6424bc77da163cd63b4fadd1c412b1e15c5282fd7_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:759ad9b263b4132bb804f7fd1321ecf74e8e11ad9f4ec5275d895daf505bd74a_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:99d56cc39d461713355d973e73ca50b09573f72ec30323f5952b0cc1addbbf6b_s390x", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:c597b8fd9b391b7c095264ee141b4f7d1e4be1e70022e5a9b8a90afc026ffc6f_arm64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2378905" } ], "notes": [ { "category": "description", "text": "A command injection vulnerability has been identified in Helm, a package manager for Kubernetes. An attacker can craft a malicious Chart.yaml file with specially linked dependencies in a Chart.lock file. If the Chart.lock file is a symbolic link to an executable file, such as a shell script, and a user attempts to update the dependencies, the crafted content is written to the symlinked file and executed. This can lead to local code execution on the system. This issue has been patched in Helm version 3.18.4, and users should update to this version to mitigate the risk.", "title": "Vulnerability description" }, { "category": "summary", "text": "helm.sh/helm/v3: Helm Chart Code Execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Although GitOps ships Helm, this product is not vulnerable to this vulnerability as ArgoCD doesn\u0027t use helm dependency update. Additionally ArgoCD scans the whole repository searching for symbolic links that eventually points to a out of bounds destination, this later feature ensures ArgoCD is not vulnerable for this issue. Given this information ArgoCD won\u0027t be updated to pull a new version of Helm in other versions than the currently latest upstream one.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:1b9b8dfe44497a6ea78b58aed0184d79ec5612816f8dcfe1ebf60f21f3e07972_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:3dfdc4b77769b2552bf5e223637a88df5bf867b3b55dfd1cd841a493276c1041_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:a07743c30dc3938535a582b851fe9250ed0d32e5e41448ca84056b2cf3fb2769_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:b4d145dd4c58c63855b4b723e38a67a50eef2520cf8c55e644c38deea07d532e_s390x" ], "known_not_affected": [ "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:116236f04a9a81b8a085b913d395ae5b22388b6ed4ef614e86ab4e4b26cb09e3_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:8c92d1dcfd9b694bac9b650519e011a1fc2b5d9457f7895246e730754ba4dcf3_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:9e4a78a4cda552a1d67a913b2f3e5b735a3939176e87eb1dc7c9115c6de9122c_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:d02e3edeb56202cd486451aa75652f20b0efc725136d2683cc5dff2be944ad58_s390x", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:1b1cae8628c9062fbbe181cabb159f3a2323a127cb8afff080447a8ab6644476_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:4771511d2e59b3450ff70f27c341968c8f36a1563fed32bb60b8053a5100f2bc_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:4cfb6e75c0b442daafd3da438c2bd7872402e344ca7caaf338025ed5aa6f5367_s390x", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:692ecf6ed19cbfdae0168af4f6c144d370b58d005a61c448dd0faf31b7c78327_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:1b3f77c875b5a49a03fd151a9dbcd535710425f80e408a79f4a1e5b52501815a_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:ecc69803103a47044d2ea49ed332d909a0521176b8aa3e4156bfa1db902e9ec5_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:0ae0e46b7682bd82e9a420c71f907e048e068ba4ff9611d72fcf9109e6a7a9d9_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:131ecffede5be022e6abeb2a7f7c2e0422e9b85a9f4818ad6c30066e6c23134a_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:96a72fc63224557ed71eeecd062998f34b2133872687ebb06ac9e7435e4c69eb_s390x", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:b0d72b9aa6f876b0f6dd1ca3d01cfecdc607b5b45d7fd4e9e9bd841108a96406_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:1c9292e33c7a6207012b8fdc22b80744a0c8e7c1efdffc25fa28e4be47ac7aa4_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:5857fdc78e54cfdd347e5c35486c79f31128cf302a59afb860a12e30fb9b342f_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:890dace80c387969a9b97bd02776fdf6ec59f67131c9ec3800a84bd21cfd491a_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:eceba5eb6145baedafdcd12b2ff4c01a914d5c2800be1cc45cb6ee1da52fd59a_s390x", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:070a1e6adf4441769a0ffb112f8d0a96f49ccfbdc8e527b87d6ebd81663003d6_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:5484b77cc8dd00373bc27d4ea81de5ffcf825b02657d6bec77db70678ce0bc05_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:bb01ae66f79140751ae2919a7783e888fb779cae8cf00371d6f657f57ca3c2d3_s390x", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:f4ee0940afd358aa97ac019a5b1015d3f2a91f95c260e51cc12a667e17d8b0f4_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:23381448669360bea0f74c522834e6bfbd4992953ff06db042edfe487a15ba59_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:ef4a309bde7ebe47d4d5ec927ad7d0c82d10b493dbbdfee260a6068d3b3bc71c_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:f580b3707a3d48991951b3b7e2b5f0abd66a2e501cbb35416d688c343a1184f9_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:88709ebb025710bfa0f5bda35eba3bfe5dca38a8ba0974a7aab1dc51bd940472_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:89f283a7ecbba8fc0ed60aecf08c0a3c448207afa244d8ad0546c5a08638e01a_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:cadb1fae4c9ca0d6ca35c7650c870302d50543c26b6096129327fed72c5a126f_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:7046a36568813a22e8cf38ad257045b203b3105ba5c56ca349e3e4f9b0c88b26_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:89e103883c135c2a91a92c037629c0b2235f62288fddf68643a7a85336593de7_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:b1b72f8932e3605eb265a455cdf1eb10d6d637ec641b57f6cca9fcab254ff434_s390x", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:d904ee0848d68789cca098448e681e86f4cbde19945c1f17ea365fbce39304b9_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:06fb8e832cfc8ee9e0d16b62a8892ca856768abe5e57710b1d9a2eef7a500428_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:1bff49c88dcedd74d66a6b09e619977c891bbf49de4710331bcd0054891f1d58_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:489f92d2e0dbfd8a7ae8e1e511ad2252e20724f05f32c002fea25eeadb7f92ee_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:cef6958e07cfebb027f51f114687d9710989149b83287f05377ebff6ac7d185f_s390x", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:4a3b2b777d14fe1446fb32b6424bc77da163cd63b4fadd1c412b1e15c5282fd7_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:759ad9b263b4132bb804f7fd1321ecf74e8e11ad9f4ec5275d895daf505bd74a_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:99d56cc39d461713355d973e73ca50b09573f72ec30323f5952b0cc1addbbf6b_s390x", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:c597b8fd9b391b7c095264ee141b4f7d1e4be1e70022e5a9b8a90afc026ffc6f_arm64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-53547" }, { "category": "external", "summary": "RHBZ#2378905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2378905" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-53547", "url": "https://www.cve.org/CVERecord?id=CVE-2025-53547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-53547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53547" }, { "category": "external", "summary": "https://github.com/helm/helm/commit/4b8e61093d8f579f1165cdc6bd4b43fa5455f571", "url": "https://github.com/helm/helm/commit/4b8e61093d8f579f1165cdc6bd4b43fa5455f571" }, { "category": "external", "summary": "https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm", "url": "https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm" } ], "release_date": "2025-07-08T21:39:59.075000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-09-10T10:50:39+00:00", "details": "For OpenShift Container Platform 4.17 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.17/html/release_notes/", "product_ids": [ "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:1b9b8dfe44497a6ea78b58aed0184d79ec5612816f8dcfe1ebf60f21f3e07972_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:3dfdc4b77769b2552bf5e223637a88df5bf867b3b55dfd1cd841a493276c1041_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:a07743c30dc3938535a582b851fe9250ed0d32e5e41448ca84056b2cf3fb2769_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:b4d145dd4c58c63855b4b723e38a67a50eef2520cf8c55e644c38deea07d532e_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:15345" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:116236f04a9a81b8a085b913d395ae5b22388b6ed4ef614e86ab4e4b26cb09e3_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:8c92d1dcfd9b694bac9b650519e011a1fc2b5d9457f7895246e730754ba4dcf3_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:9e4a78a4cda552a1d67a913b2f3e5b735a3939176e87eb1dc7c9115c6de9122c_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:d02e3edeb56202cd486451aa75652f20b0efc725136d2683cc5dff2be944ad58_s390x", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:1b1cae8628c9062fbbe181cabb159f3a2323a127cb8afff080447a8ab6644476_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:4771511d2e59b3450ff70f27c341968c8f36a1563fed32bb60b8053a5100f2bc_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:4cfb6e75c0b442daafd3da438c2bd7872402e344ca7caaf338025ed5aa6f5367_s390x", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:692ecf6ed19cbfdae0168af4f6c144d370b58d005a61c448dd0faf31b7c78327_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:1b3f77c875b5a49a03fd151a9dbcd535710425f80e408a79f4a1e5b52501815a_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:ecc69803103a47044d2ea49ed332d909a0521176b8aa3e4156bfa1db902e9ec5_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:0ae0e46b7682bd82e9a420c71f907e048e068ba4ff9611d72fcf9109e6a7a9d9_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:131ecffede5be022e6abeb2a7f7c2e0422e9b85a9f4818ad6c30066e6c23134a_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:96a72fc63224557ed71eeecd062998f34b2133872687ebb06ac9e7435e4c69eb_s390x", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:b0d72b9aa6f876b0f6dd1ca3d01cfecdc607b5b45d7fd4e9e9bd841108a96406_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:1c9292e33c7a6207012b8fdc22b80744a0c8e7c1efdffc25fa28e4be47ac7aa4_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:5857fdc78e54cfdd347e5c35486c79f31128cf302a59afb860a12e30fb9b342f_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:890dace80c387969a9b97bd02776fdf6ec59f67131c9ec3800a84bd21cfd491a_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:eceba5eb6145baedafdcd12b2ff4c01a914d5c2800be1cc45cb6ee1da52fd59a_s390x", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:070a1e6adf4441769a0ffb112f8d0a96f49ccfbdc8e527b87d6ebd81663003d6_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:5484b77cc8dd00373bc27d4ea81de5ffcf825b02657d6bec77db70678ce0bc05_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:bb01ae66f79140751ae2919a7783e888fb779cae8cf00371d6f657f57ca3c2d3_s390x", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:f4ee0940afd358aa97ac019a5b1015d3f2a91f95c260e51cc12a667e17d8b0f4_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:1b9b8dfe44497a6ea78b58aed0184d79ec5612816f8dcfe1ebf60f21f3e07972_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:3dfdc4b77769b2552bf5e223637a88df5bf867b3b55dfd1cd841a493276c1041_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:a07743c30dc3938535a582b851fe9250ed0d32e5e41448ca84056b2cf3fb2769_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:b4d145dd4c58c63855b4b723e38a67a50eef2520cf8c55e644c38deea07d532e_s390x", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:23381448669360bea0f74c522834e6bfbd4992953ff06db042edfe487a15ba59_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:ef4a309bde7ebe47d4d5ec927ad7d0c82d10b493dbbdfee260a6068d3b3bc71c_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:f580b3707a3d48991951b3b7e2b5f0abd66a2e501cbb35416d688c343a1184f9_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:88709ebb025710bfa0f5bda35eba3bfe5dca38a8ba0974a7aab1dc51bd940472_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:89f283a7ecbba8fc0ed60aecf08c0a3c448207afa244d8ad0546c5a08638e01a_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:cadb1fae4c9ca0d6ca35c7650c870302d50543c26b6096129327fed72c5a126f_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:7046a36568813a22e8cf38ad257045b203b3105ba5c56ca349e3e4f9b0c88b26_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:89e103883c135c2a91a92c037629c0b2235f62288fddf68643a7a85336593de7_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:b1b72f8932e3605eb265a455cdf1eb10d6d637ec641b57f6cca9fcab254ff434_s390x", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:d904ee0848d68789cca098448e681e86f4cbde19945c1f17ea365fbce39304b9_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:06fb8e832cfc8ee9e0d16b62a8892ca856768abe5e57710b1d9a2eef7a500428_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:1bff49c88dcedd74d66a6b09e619977c891bbf49de4710331bcd0054891f1d58_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:489f92d2e0dbfd8a7ae8e1e511ad2252e20724f05f32c002fea25eeadb7f92ee_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:cef6958e07cfebb027f51f114687d9710989149b83287f05377ebff6ac7d185f_s390x", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:4a3b2b777d14fe1446fb32b6424bc77da163cd63b4fadd1c412b1e15c5282fd7_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:759ad9b263b4132bb804f7fd1321ecf74e8e11ad9f4ec5275d895daf505bd74a_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:99d56cc39d461713355d973e73ca50b09573f72ec30323f5952b0cc1addbbf6b_s390x", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:c597b8fd9b391b7c095264ee141b4f7d1e4be1e70022e5a9b8a90afc026ffc6f_arm64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.5, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:116236f04a9a81b8a085b913d395ae5b22388b6ed4ef614e86ab4e4b26cb09e3_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:8c92d1dcfd9b694bac9b650519e011a1fc2b5d9457f7895246e730754ba4dcf3_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:9e4a78a4cda552a1d67a913b2f3e5b735a3939176e87eb1dc7c9115c6de9122c_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator@sha256:d02e3edeb56202cd486451aa75652f20b0efc725136d2683cc5dff2be944ad58_s390x", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:1b1cae8628c9062fbbe181cabb159f3a2323a127cb8afff080447a8ab6644476_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:4771511d2e59b3450ff70f27c341968c8f36a1563fed32bb60b8053a5100f2bc_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:4cfb6e75c0b442daafd3da438c2bd7872402e344ca7caaf338025ed5aa6f5367_s390x", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/nmstate-console-plugin-rhel9@sha256:692ecf6ed19cbfdae0168af4f6c144d370b58d005a61c448dd0faf31b7c78327_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:1b3f77c875b5a49a03fd151a9dbcd535710425f80e408a79f4a1e5b52501815a_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:ecc69803103a47044d2ea49ed332d909a0521176b8aa3e4156bfa1db902e9ec5_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:0ae0e46b7682bd82e9a420c71f907e048e068ba4ff9611d72fcf9109e6a7a9d9_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:131ecffede5be022e6abeb2a7f7c2e0422e9b85a9f4818ad6c30066e6c23134a_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:96a72fc63224557ed71eeecd062998f34b2133872687ebb06ac9e7435e4c69eb_s390x", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9@sha256:b0d72b9aa6f876b0f6dd1ca3d01cfecdc607b5b45d7fd4e9e9bd841108a96406_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:1c9292e33c7a6207012b8fdc22b80744a0c8e7c1efdffc25fa28e4be47ac7aa4_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:5857fdc78e54cfdd347e5c35486c79f31128cf302a59afb860a12e30fb9b342f_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:890dace80c387969a9b97bd02776fdf6ec59f67131c9ec3800a84bd21cfd491a_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-helm-rhel9-operator@sha256:eceba5eb6145baedafdcd12b2ff4c01a914d5c2800be1cc45cb6ee1da52fd59a_s390x", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:070a1e6adf4441769a0ffb112f8d0a96f49ccfbdc8e527b87d6ebd81663003d6_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:5484b77cc8dd00373bc27d4ea81de5ffcf825b02657d6bec77db70678ce0bc05_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:bb01ae66f79140751ae2919a7783e888fb779cae8cf00371d6f657f57ca3c2d3_s390x", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:f4ee0940afd358aa97ac019a5b1015d3f2a91f95c260e51cc12a667e17d8b0f4_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:1b9b8dfe44497a6ea78b58aed0184d79ec5612816f8dcfe1ebf60f21f3e07972_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:3dfdc4b77769b2552bf5e223637a88df5bf867b3b55dfd1cd841a493276c1041_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:a07743c30dc3938535a582b851fe9250ed0d32e5e41448ca84056b2cf3fb2769_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-operator-sdk-rhel9@sha256:b4d145dd4c58c63855b4b723e38a67a50eef2520cf8c55e644c38deea07d532e_s390x", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:23381448669360bea0f74c522834e6bfbd4992953ff06db042edfe487a15ba59_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:ef4a309bde7ebe47d4d5ec927ad7d0c82d10b493dbbdfee260a6068d3b3bc71c_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-ptp-rhel9-operator@sha256:f580b3707a3d48991951b3b7e2b5f0abd66a2e501cbb35416d688c343a1184f9_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:88709ebb025710bfa0f5bda35eba3bfe5dca38a8ba0974a7aab1dc51bd940472_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:89f283a7ecbba8fc0ed60aecf08c0a3c448207afa244d8ad0546c5a08638e01a_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-ptp-rhel9@sha256:cadb1fae4c9ca0d6ca35c7650c870302d50543c26b6096129327fed72c5a126f_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:7046a36568813a22e8cf38ad257045b203b3105ba5c56ca349e3e4f9b0c88b26_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:89e103883c135c2a91a92c037629c0b2235f62288fddf68643a7a85336593de7_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:b1b72f8932e3605eb265a455cdf1eb10d6d637ec641b57f6cca9fcab254ff434_s390x", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator@sha256:d904ee0848d68789cca098448e681e86f4cbde19945c1f17ea365fbce39304b9_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:06fb8e832cfc8ee9e0d16b62a8892ca856768abe5e57710b1d9a2eef7a500428_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:1bff49c88dcedd74d66a6b09e619977c891bbf49de4710331bcd0054891f1d58_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:489f92d2e0dbfd8a7ae8e1e511ad2252e20724f05f32c002fea25eeadb7f92ee_arm64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:cef6958e07cfebb027f51f114687d9710989149b83287f05377ebff6ac7d185f_s390x", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:4a3b2b777d14fe1446fb32b6424bc77da163cd63b4fadd1c412b1e15c5282fd7_ppc64le", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:759ad9b263b4132bb804f7fd1321ecf74e8e11ad9f4ec5275d895daf505bd74a_amd64", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:99d56cc39d461713355d973e73ca50b09573f72ec30323f5952b0cc1addbbf6b_s390x", "Red Hat OpenShift Container Platform 4.17:registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:c597b8fd9b391b7c095264ee141b4f7d1e4be1e70022e5a9b8a90afc026ffc6f_arm64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "helm.sh/helm/v3: Helm Chart Code Execution" } ] }
fkie_cve-2025-53547
Vulnerability from fkie_nvd
8.6 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:helm:helm:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DD30189-318F-4401-AED5-0A45EBDF8763", "versionEndExcluding": "3.17.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:helm:helm:*:*:*:*:*:*:*:*", "matchCriteriaId": "24A3B062-2A69-4083-AE07-83F0FE989512", "versionEndExcluding": "3.18.4", "versionStartIncluding": "3.18.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, a specially crafted Chart.yaml file along with a specially linked Chart.lock file can lead to local code execution when dependencies are updated. Fields in a Chart.yaml file, that are carried over to a Chart.lock file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., a bash.rc file or shell script). If the Chart.lock file is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking. This issue has been resolved in Helm v3.18.4." }, { "lang": "es", "value": "Helm es un gestor de paquetes para Charts para Kubernetes. Antes de la versi\u00f3n 3.18.4, un archivo Chart.yaml especialmente manipulado, junto con un archivo Chart.lock con un enlace espec\u00edfico, pod\u00eda provocar la ejecuci\u00f3n de c\u00f3digo local al actualizar las dependencias. Los campos de un archivo Chart.yaml que se transfieren a un archivo Chart.lock al actualizar las dependencias y escribirse en este archivo, pueden modificarse de forma que provoquen la ejecuci\u00f3n si ese mismo contenido estuviera en un archivo en ejecuci\u00f3n (por ejemplo, un archivo bash.rc o un script de shell). Si el archivo Chart.lock tiene un enlace simb\u00f3lico a uno de estos archivos, al actualizar las dependencias, el contenido del archivo bloqueado se escribir\u00e1 en el archivo enlazado. Esto puede provocar una ejecuci\u00f3n no deseada. Helm advierte del archivo enlazado, pero no detiene la ejecuci\u00f3n debido al enlace simb\u00f3lico. Este problema se ha resuelto en Helm v3.18.4." } ], "id": "CVE-2025-53547", "lastModified": "2025-09-03T16:26:24.770", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.5, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 6.0, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-07-08T22:15:27.897", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/helm/helm/commit/4b8e61093d8f579f1165cdc6bd4b43fa5455f571" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://news.ycombinator.com/item?id=44506696" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "security-advisories@github.com", "type": "Secondary" } ] }
ghsa-557j-xg8c-q2mm
Vulnerability from github
A Helm contributor discovered that a specially crafted Chart.yaml
file along with a specially linked Chart.lock
file can lead to local code execution when dependencies are updated.
Impact
Fields in a Chart.yaml
file, that are carried over to a Chart.lock
file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., a bash.rc
file or shell script). If the Chart.lock
file is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking.
This affects when dependencies are updated. When using the helm
command this happens when helm dependency update
is run. helm dependency build
can write a lock file when one does not exist but this vector requires one to already exist. This affects the Helm SDK when the downloader Manager
performs an update.
Patches
This issue has been resolved in Helm v3.18.4
Workarounds
Ensure the Chart.lock
file in a chart is not a symlink prior to updating dependencies.
For more information
Helm's security policy is spelled out in detail in our SECURITY document.
Credits
Disclosed by Jakub Ciolek at AlphaSense.
{ "affected": [ { "package": { "ecosystem": "Go", "name": "helm.sh/helm/v3" }, "ranges": [ { "events": [ { "introduced": "3.18.0-rc.1" }, { "fixed": "3.18.4" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Go", "name": "helm.sh/helm/v3" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "3.17.4" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2025-53547" ], "database_specific": { "cwe_ids": [ "CWE-94" ], "github_reviewed": true, "github_reviewed_at": "2025-07-08T23:20:54Z", "nvd_published_at": "2025-07-08T22:15:27Z", "severity": "HIGH" }, "details": "A Helm contributor discovered that a specially crafted `Chart.yaml` file along with a specially linked `Chart.lock` file can lead to local code execution when dependencies are updated.\n\n### Impact\n\nFields in a `Chart.yaml` file, that are carried over to a `Chart.lock` file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., a `bash.rc` file or shell script). If the `Chart.lock` file is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking.\n\nThis affects when dependencies are updated. When using the `helm` command this happens when `helm dependency update` is run. `helm dependency build` can write a lock file when one does not exist but this vector requires one to already exist. This affects the Helm SDK when the downloader `Manager` performs an update.\n\n### Patches\n\nThis issue has been resolved in Helm v3.18.4\n\n### Workarounds\n\nEnsure the `Chart.lock` file in a chart is not a symlink prior to updating dependencies.\n\n### For more information\n\nHelm\u0027s security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document.\n\n### Credits\n\nDisclosed by Jakub Ciolek at AlphaSense.", "id": "GHSA-557j-xg8c-q2mm", "modified": "2025-07-16T21:10:13Z", "published": "2025-07-08T23:20:54Z", "references": [ { "type": "WEB", "url": "https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53547" }, { "type": "WEB", "url": "https://github.com/helm/helm/commit/4b8e61093d8f579f1165cdc6bd4b43fa5455f571" }, { "type": "PACKAGE", "url": "https://github.com/helm/helm" }, { "type": "WEB", "url": "https://news.ycombinator.com/item?id=44506696" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H", "type": "CVSS_V3" } ], "summary": "Helm vulnerable to Code Injection through malicious chart.yaml content" }
wid-sec-w-2025-2028
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Red Hat OpenShift Container Platform ausnutzen, um beliebigen Programmcode auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-2028 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2028.json" }, { "category": "self", "summary": "WID-SEC-2025-2028 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2028" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2025-09-10", "url": "https://access.redhat.com/errata/RHSA-2025:15345" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:16113 vom 2025-09-17", "url": "https://access.redhat.com/errata/RHSA-2025:16113" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:15681 vom 2025-09-17", "url": "https://access.redhat.com/errata/RHSA-2025:15681" } ], "source_lang": "en-US", "title": "Red Hat OpenShift Container Platform: Schwachstelle erm\u00f6glicht Codeausf\u00fchrung", "tracking": { "current_release_date": "2025-09-17T22:00:00.000+00:00", "generator": { "date": "2025-09-18T07:01:38.469+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-2028", "initial_release_date": "2025-09-10T22:00:00.000+00:00", "revision_history": [ { "date": "2025-09-10T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-09-17T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "branches": [ { "category": "product_version_range", "name": "Container Platform \u003c4.17.39", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.17.39", "product_id": "T046885" } }, { "category": "product_version", "name": "Container Platform 4.17.39", "product": { "name": "Red Hat OpenShift Container Platform 4.17.39", "product_id": "T046885-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform_4.17.39" } } } ], "category": "product_name", "name": "OpenShift" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-53547", "product_status": { "known_affected": [ "67646", "T046885" ] }, "release_date": "2025-09-10T22:00:00.000+00:00", "title": "CVE-2025-53547" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.