{"type":"TYPE_SECURITY","shortCode":"RL","name":"RLSA-2023:1898","synopsis":"Important: java-17-openjdk security and bug fix update","severity":"SEVERITY_IMPORTANT","topic":"An update is available for java-17-openjdk.\nThis update affects Rocky Linux 8.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list","description":"The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930)\n\n* OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939)\n\n* OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954)\n\n* OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967)\n\n* OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937)\n\n* OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938)\n\n* OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* In FIPS mode, the list of cryptographic services and algorithms available is limited to those that are FIPS compliant. It was found that this filtering was too strict and was also excluding service attributes. These attributes are now made available in FIPS mode, as they are in non-FIPS mode. (RHBZ#2186835)\n\n* Previously, the XML signature provider was unable to operate in FIPS mode. Following recent enhancements to FIPS mode support, the XML signature provider can now be supported. It is now enabled in FIPS mode. (RHBZ#2186827)\n\n* The PKCS#11 provider used by FIPS mode can be supported by different PKCS#11 tokens. It was found that some PKCS#11 tokens may not be initialised fully before use, leading to an exception being thrown by the provider. With this release, this exception is now expected and handled by the FIPS support code. (RHBZ#2186831)","solution":null,"affectedProducts":["Rocky Linux 8"],"fixes":[{"ticket":"2186827","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2186827","description":"* Previously, the XML signature provider was unable to operate in FIPS mode. Following recent enhancements to FIPS mode support, the XML signature provider can now be supported. It is now enabled in FIPS mode. (RHBZ#2186827)"},{"ticket":"2186831","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2186831","description":"* The PKCS#11 provider used by FIPS mode can be supported by different PKCS#11 tokens. It was found that some PKCS#11 tokens may not be initialised fully before use, leading to an exception being thrown by the provider. With this release, this exception is now expected and handled by the FIPS support code. (RHBZ#2186831)"},{"ticket":"2186835","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2186835","description":"* In FIPS mode, the list of cryptographic services and algorithms available is limited to those that are FIPS compliant. It was found that this filtering was too strict and was also excluding service attributes. These attributes are now made available in FIPS mode, as they are in non-FIPS mode. (RHBZ#2186835)"},{"ticket":"2187435","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2187435","description":""},{"ticket":"2187441","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2187441","description":""},{"ticket":"2187704","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2187704","description":""},{"ticket":"2187724","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2187724","description":""},{"ticket":"2187758","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2187758","description":""},{"ticket":"2187790","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2187790","description":""},{"ticket":"2187802","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2187802","description":""}],"cves":[{"name":"CVE-2023-21930","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-21930","cvss3ScoringVector":"UNKNOWN","cvss3BaseScore":"UNKNOWN","cwe":"UNKNOWN"},{"name":"CVE-2023-21937","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-21937","cvss3ScoringVector":"UNKNOWN","cvss3BaseScore":"UNKNOWN","cwe":"UNKNOWN"},{"name":"CVE-2023-21938","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-21938","cvss3ScoringVector":"UNKNOWN","cvss3BaseScore":"UNKNOWN","cwe":"UNKNOWN"},{"name":"CVE-2023-21939","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-21939","cvss3ScoringVector":"UNKNOWN","cvss3BaseScore":"UNKNOWN","cwe":"UNKNOWN"},{"name":"CVE-2023-21954","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-21954","cvss3ScoringVector":"UNKNOWN","cvss3BaseScore":"UNKNOWN","cwe":"UNKNOWN"},{"name":"CVE-2023-21967","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-21967","cvss3ScoringVector":"UNKNOWN","cvss3BaseScore":"UNKNOWN","cwe":"UNKNOWN"},{"name":"CVE-2023-21968","sourceBy":"MITRE","sourceLink":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-21968","cvss3ScoringVector":"UNKNOWN","cvss3BaseScore":"UNKNOWN","cwe":"UNKNOWN"}],"references":[],"publishedAt":"2023-04-26T15:28:13.052501Z","rpms":{"Rocky Linux 8":{"nvras":["java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_7.x86_64.rpm","java-17-openjdk-1:17.0.7.0.7-1.el8_7.aarch64.rpm","java-17-openjdk-1:17.0.7.0.7-1.el8_7.src.rpm","java-17-openjdk-1:17.0.7.0.7-1.el8_7.x86_64.rpm","java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_7.aarch64.rpm","java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_7.aarch64.rpm","java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_7.x86_64.rpm","java-17-openjdk-demo-1:17.0.7.0.7-1.el8_7.aarch64.rpm","java-17-openjdk-demo-1:17.0.7.0.7-1.el8_7.x86_64.rpm","java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_7.aarch64.rpm","java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_7.x86_64.rpm","java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_7.aarch64.rpm","java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_7.x86_64.rpm","java-17-openjdk-devel-1:17.0.7.0.7-1.el8_7.aarch64.rpm","java-17-openjdk-devel-1:17.0.7.0.7-1.el8_7.x86_64.rpm","java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_7.aarch64.rpm","java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_7.x86_64.rpm","java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_7.aarch64.rpm","java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_7.x86_64.rpm","java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_7.aarch64.rpm","java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_7.x86_64.rpm","java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_7.aarch64.rpm","java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_7.x86_64.rpm","java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_7.aarch64.rpm","java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_7.x86_64.rpm","java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_7.aarch64.rpm","java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_7.x86_64.rpm","java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_7.aarch64.rpm","java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_7.x86_64.rpm","java-17-openjdk-headless-1:17.0.7.0.7-1.el8_7.aarch64.rpm","java-17-openjdk-headless-1:17.0.7.0.7-1.el8_7.x86_64.rpm","java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_7.aarch64.rpm","java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_7.x86_64.rpm","java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_7.aarch64.rpm","java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_7.x86_64.rpm","java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_7.aarch64.rpm","java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_7.x86_64.rpm","java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_7.aarch64.rpm","java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_7.x86_64.rpm","java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_7.aarch64.rpm","java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_7.x86_64.rpm","java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_7.aarch64.rpm","java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_7.x86_64.rpm","java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_7.aarch64.rpm","java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_7.x86_64.rpm","java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_7.aarch64.rpm","java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_7.x86_64.rpm","java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_7.aarch64.rpm","java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_7.x86_64.rpm","java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_7.aarch64.rpm","java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_7.x86_64.rpm","java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_7.aarch64.rpm","java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_7.x86_64.rpm","java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_7.aarch64.rpm","java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_7.x86_64.rpm","java-17-openjdk-src-1:17.0.7.0.7-1.el8_7.aarch64.rpm","java-17-openjdk-src-1:17.0.7.0.7-1.el8_7.x86_64.rpm","java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_7.aarch64.rpm","java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_7.x86_64.rpm","java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_7.aarch64.rpm","java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_7.x86_64.rpm","java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_7.aarch64.rpm","java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_7.x86_64.rpm","java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_7.aarch64.rpm","java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_7.x86_64.rpm","java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_7.aarch64.rpm","java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_7.x86_64.rpm"]}},"rebootSuggested":false,"buildReferences":[]}

Rocky Linux: RLSA-2023:1898 java-17-openjdk security and bug fix update

April 26, 2023
An update is available for java-17-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list

Summary

An update is available for java-17-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list


The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Security Fix(es): * OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930) * OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939) * OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954) * OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967) * OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937) * OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938) * OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * In FIPS mode, the list of cryptographic services and algorithms available is limited to those that are FIPS compliant. It was found that this filtering was too strict and was also excluding service attributes. These attributes are now made available in FIPS mode, as they are in non-FIPS mode. (RHBZ#2186835) * Previously, the XML signature provider was unable to operate in FIPS mode. Following recent enhancements to FIPS mode support, the XML signature provider can now be supported. It is now enabled in FIPS mode. (RHBZ#2186827) * The PKCS#11 provider used by FIPS mode can be supported by different PKCS#11 tokens. It was found that some PKCS#11 tokens may not be initialised fully before use, leading to an exception being thrown by the provider. With this release, this exception is now expected and handled by the FIPS support code. (RHBZ#2186831)

RPMs

java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_7.x86_64.rpm

java-17-openjdk-1:17.0.7.0.7-1.el8_7.aarch64.rpm

java-17-openjdk-1:17.0.7.0.7-1.el8_7.src.rpm

java-17-openjdk-1:17.0.7.0.7-1.el8_7.x86_64.rpm

java-17-openjdk-debuginfo-1:17.0.7.0.7-1.el8_7.aarch64.rpm

java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_7.aarch64.rpm

java-17-openjdk-debugsource-1:17.0.7.0.7-1.el8_7.x86_64.rpm

java-17-openjdk-demo-1:17.0.7.0.7-1.el8_7.aarch64.rpm

java-17-openjdk-demo-1:17.0.7.0.7-1.el8_7.x86_64.rpm

java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_7.aarch64.rpm

java-17-openjdk-demo-fastdebug-1:17.0.7.0.7-1.el8_7.x86_64.rpm

java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_7.aarch64.rpm

java-17-openjdk-demo-slowdebug-1:17.0.7.0.7-1.el8_7.x86_64.rpm

java-17-openjdk-devel-1:17.0.7.0.7-1.el8_7.aarch64.rpm

java-17-openjdk-devel-1:17.0.7.0.7-1.el8_7.x86_64.rpm

java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_7.aarch64.rpm

java-17-openjdk-devel-debuginfo-1:17.0.7.0.7-1.el8_7.x86_64.rpm

java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_7.aarch64.rpm

java-17-openjdk-devel-fastdebug-1:17.0.7.0.7-1.el8_7.x86_64.rpm

java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_7.aarch64.rpm

java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_7.x86_64.rpm

java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_7.aarch64.rpm

java-17-openjdk-devel-slowdebug-1:17.0.7.0.7-1.el8_7.x86_64.rpm

java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_7.aarch64.rpm

java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_7.x86_64.rpm

java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_7.aarch64.rpm

java-17-openjdk-fastdebug-1:17.0.7.0.7-1.el8_7.x86_64.rpm

java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_7.aarch64.rpm

java-17-openjdk-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_7.x86_64.rpm

java-17-openjdk-headless-1:17.0.7.0.7-1.el8_7.aarch64.rpm

java-17-openjdk-headless-1:17.0.7.0.7-1.el8_7.x86_64.rpm

java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_7.aarch64.rpm

java-17-openjdk-headless-debuginfo-1:17.0.7.0.7-1.el8_7.x86_64.rpm

java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_7.aarch64.rpm

java-17-openjdk-headless-fastdebug-1:17.0.7.0.7-1.el8_7.x86_64.rpm

java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_7.aarch64.rpm

java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.7.0.7-1.el8_7.x86_64.rpm

java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_7.aarch64.rpm

java-17-openjdk-headless-slowdebug-1:17.0.7.0.7-1.el8_7.x86_64.rpm

java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_7.aarch64.rpm

java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_7.x86_64.rpm

java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_7.aarch64.rpm

java-17-openjdk-javadoc-1:17.0.7.0.7-1.el8_7.x86_64.rpm

java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_7.aarch64.rpm

java-17-openjdk-javadoc-zip-1:17.0.7.0.7-1.el8_7.x86_64.rpm

java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_7.aarch64.rpm

java-17-openjdk-jmods-1:17.0.7.0.7-1.el8_7.x86_64.rpm

java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_7.aarch64.rpm

java-17-openjdk-jmods-fastdebug-1:17.0.7.0.7-1.el8_7.x86_64.rpm

java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_7.aarch64.rpm

java-17-openjdk-jmods-slowdebug-1:17.0.7.0.7-1.el8_7.x86_64.rpm

java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_7.aarch64.rpm

java-17-openjdk-slowdebug-1:17.0.7.0.7-1.el8_7.x86_64.rpm

java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_7.aarch64.rpm

java-17-openjdk-slowdebug-debuginfo-1:17.0.7.0.7-1.el8_7.x86_64.rpm

java-17-openjdk-src-1:17.0.7.0.7-1.el8_7.aarch64.rpm

java-17-openjdk-src-1:17.0.7.0.7-1.el8_7.x86_64.rpm

java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_7.aarch64.rpm

java-17-openjdk-src-fastdebug-1:17.0.7.0.7-1.el8_7.x86_64.rpm

java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_7.aarch64.rpm

java-17-openjdk-src-slowdebug-1:17.0.7.0.7-1.el8_7.x86_64.rpm

java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_7.aarch64.rpm

java-17-openjdk-static-libs-1:17.0.7.0.7-1.el8_7.x86_64.rpm

java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_7.aarch64.rpm

java-17-openjdk-static-libs-fastdebug-1:17.0.7.0.7-1.el8_7.x86_64.rpm

java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_7.aarch64.rpm

java-17-openjdk-static-libs-slowdebug-1:17.0.7.0.7-1.el8_7.x86_64.rpm

References

No References

CVEs

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968

Severity
Name: RLSA-2023:1898
Affected Products: Rocky Linux 8

Fixes

https://bugzilla.redhat.com/show_bug.cgi?id=2186827

https://bugzilla.redhat.com/show_bug.cgi?id=2186831

https://bugzilla.redhat.com/show_bug.cgi?id=2186835

https://bugzilla.redhat.com/show_bug.cgi?id=2187435

https://bugzilla.redhat.com/show_bug.cgi?id=2187441

https://bugzilla.redhat.com/show_bug.cgi?id=2187704

https://bugzilla.redhat.com/show_bug.cgi?id=2187724

https://bugzilla.redhat.com/show_bug.cgi?id=2187758

https://bugzilla.redhat.com/show_bug.cgi?id=2187790

https://bugzilla.redhat.com/show_bug.cgi?id=2187802


Related News