Dev
Threads by month
- ----- 2025 -----
- February
- January
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
April 2024
- 11 participants
- 39 discussions
主题: openEuler update_20240410版本发布公告
Dear all,
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-22.03-LTS、openEuler-22.03-LTS-SP1、openEuler-22.03-LTS-SP2、openEuler-20.03-LTS-SP4及openEuler-22.03-LTS-SP3 update版本满足版本出口质量,现进行发布公示。
本公示分为九部分:
1、openEuler-20.03-LTS-SP1 Update 20240410发布情况及待修复缺陷
2、openEuler-22.03-LTS Update 20240410发布情况及待修复缺陷
3、openEuler-22.03-LTS-SP1 Update 20240410发布情况及待修复缺陷
4、openEuler-22.03-LTS-SP2 Update 20240410发布情况及待修复缺陷
5、openEuler-20.03-LTS-SP4 Update 20240410发布情况及待修复缺陷
6、openEuler-22.03-LTS-SP3 Update 20240410发布情况及待修复缺陷
7、openEuler 关键组件待修复CVE 清单
8、openEuler 关键组件待修复缺陷清单
9、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2024/04/19)提供 update_20240417 版本。
openEuler-20.03-LTS-SP1 Update 20240410
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题13个,已知漏洞106个。目前版本分支剩余待修复缺陷4个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9EP1X?from=project-i…
CVE修复:
CVE
仓库
score
#I58YVD:CVE-2022-1802<https://gitee.com/open_euler/dashboard?issue_id=I58YVD>
firefox
8.8
#I9AO3J:CVE-2022-31163<https://gitee.com/open_euler/dashboard?issue_id=I9AO3J>
rubygem-tzinfo
8.1
#I9ATGS:CVE-2022-2469<https://gitee.com/open_euler/dashboard?issue_id=I9ATGS>
libgsasl
8.1
#I9AURJ:CVE-2022-2639<https://gitee.com/open_euler/dashboard?issue_id=I9AURJ>
openvswitch
7.8
#I9AVQD:CVE-2021-32142<https://gitee.com/open_euler/dashboard?issue_id=I9AVQD>
LibRaw
7.8
#I9E4NC:CVE-2024-31083<https://gitee.com/open_euler/dashboard?issue_id=I9E4NC>
xorg-x11-server
7.8
#I8YV0T:CVE-2024-23307<https://gitee.com/open_euler/dashboard?issue_id=I8YV0T>
kernel
7.8
#I95LPF:CVE-2024-26622<https://gitee.com/open_euler/dashboard?issue_id=I95LPF>
kernel
7.8
#I96G7N:CVE-2023-52600<https://gitee.com/open_euler/dashboard?issue_id=I96G7N>
kernel
7.8
#I96GXM:CVE-2024-26625<https://gitee.com/open_euler/dashboard?issue_id=I96GXM>
kernel
7.8
#I990AF:CVE-2021-47131<https://gitee.com/open_euler/dashboard?issue_id=I990AF>
kernel
7.8
#I9B1Y1:CVE-2024-30156<https://gitee.com/open_euler/dashboard?issue_id=I9B1Y1>
varnish
7.5
#I977K3:CVE-2024-28757<https://gitee.com/open_euler/dashboard?issue_id=I977K3>
expat
7.5
#I9AUYL:CVE-2022-24999<https://gitee.com/open_euler/dashboard?issue_id=I9AUYL>
nodejs-qs
7.5
#I9AVYL:CVE-2022-48279<https://gitee.com/open_euler/dashboard?issue_id=I9AVYL>
mod_security
7.5
#I9E2PZ:CVE-2024-27316<https://gitee.com/open_euler/dashboard?issue_id=I9E2PZ>
mod_http2
7.5
#I9B1O1:CVE-2024-24784<https://gitee.com/open_euler/dashboard?issue_id=I9B1O1>
golang
7.5
#I9AWCO:CVE-2022-39028<https://gitee.com/open_euler/dashboard?issue_id=I9AWCO>
telnet
7.5
#I9ASUL:CVE-2022-2309<https://gitee.com/open_euler/dashboard?issue_id=I9ASUL>
libxml2
7.5
#I9ACE0:CVE-2024-2002<https://gitee.com/open_euler/dashboard?issue_id=I9ACE0>
libdwarf
7.5
#I9E4AM:CVE-2024-31082<https://gitee.com/open_euler/dashboard?issue_id=I9E4AM>
xorg-x11-server
7.3
#I9E4N0:CVE-2024-31081<https://gitee.com/open_euler/dashboard?issue_id=I9E4N0>
xorg-x11-server
7.3
#I9E4N4:CVE-2024-31080<https://gitee.com/open_euler/dashboard?issue_id=I9E4N4>
xorg-x11-server
7.3
#I9DS2T:CVE-2024-3205<https://gitee.com/open_euler/dashboard?issue_id=I9DS2T>
libyaml
7.3
#I99JOA:CVE-2024-1013<https://gitee.com/open_euler/dashboard?issue_id=I99JOA>
unixODBC
7.1
#I949C5:CVE-2021-46952<https://gitee.com/open_euler/dashboard?issue_id=I949C5>
kernel
7.1
#I96G7F:CVE-2023-52599<https://gitee.com/open_euler/dashboard?issue_id=I96G7F>
kernel
7.1
#I96G8Y:CVE-2023-52602<https://gitee.com/open_euler/dashboard?issue_id=I96G8Y>
kernel
7.1
#I96G93:CVE-2023-52603<https://gitee.com/open_euler/dashboard?issue_id=I96G93>
kernel
7.1
#I96GQ3:CVE-2023-52601<https://gitee.com/open_euler/dashboard?issue_id=I96GQ3>
kernel
7.1
#I95AXP:CVE-2023-52502<https://gitee.com/open_euler/dashboard?issue_id=I95AXP>
kernel
7
#I9DGZJ:CVE-2024-28219<https://gitee.com/open_euler/dashboard?issue_id=I9DGZJ>
python-pillow
6.7
#I9C342:CVE-2024-2398<https://gitee.com/open_euler/dashboard?issue_id=I9C342>
curl
6.5
#I94K6R:CVE-2023-23601<https://gitee.com/open_euler/dashboard?issue_id=I94K6R>
mozjs78
6.5
#I94K6T:CVE-2023-23599<https://gitee.com/open_euler/dashboard?issue_id=I94K6T>
mozjs78
6.5
#I9AMRI:CVE-2022-32325<https://gitee.com/open_euler/dashboard?issue_id=I9AMRI>
jpegoptim
6.5
#I9AW6M:CVE-2023-0666<https://gitee.com/open_euler/dashboard?issue_id=I9AW6M>
wireshark
6.5
#I9AH6G:CVE-2024-2494<https://gitee.com/open_euler/dashboard?issue_id=I9AH6G>
libvirt
6.2
#I99JV2:CVE-2024-26641<https://gitee.com/open_euler/dashboard?issue_id=I99JV2>
kernel
6.1
#I95RDW:CVE-2021-47101<https://gitee.com/open_euler/dashboard?issue_id=I95RDW>
kernel
6
#I96G8W:CVE-2023-52587<https://gitee.com/open_euler/dashboard?issue_id=I96G8W>
kernel
6
#I9A82U:CVE-2024-29018<https://gitee.com/open_euler/dashboard?issue_id=I9A82U>
docker
5.9
#I9138X:CVE-2023-52426<https://gitee.com/open_euler/dashboard?issue_id=I9138X>
expat
5.5
#I8OJ8L:CVE-2023-37328<https://gitee.com/open_euler/dashboard?issue_id=I8OJ8L>
gstreamer1-plugins-base
5.5
#I932W7:CVE-2023-52443<https://gitee.com/open_euler/dashboard?issue_id=I932W7>
kernel
5.5
#I93HCX:CVE-2024-26600<https://gitee.com/open_euler/dashboard?issue_id=I93HCX>
kernel
5.5
#I93LMH:CVE-2021-46904<https://gitee.com/open_euler/dashboard?issue_id=I93LMH>
kernel
5.5
#I94JCO:CVE-2021-46989<https://gitee.com/open_euler/dashboard?issue_id=I94JCO>
kernel
5.5
#I94JH2:CVE-2020-36780<https://gitee.com/open_euler/dashboard?issue_id=I94JH2>
kernel
5.5
#I95B1F:CVE-2023-52509<https://gitee.com/open_euler/dashboard?issue_id=I95B1F>
kernel
5.5
#I9909R:CVE-2021-47113<https://gitee.com/open_euler/dashboard?issue_id=I9909R>
kernel
5.5
#I9909V:CVE-2021-47114<https://gitee.com/open_euler/dashboard?issue_id=I9909V>
kernel
5.5
#I990A7:CVE-2021-47122<https://gitee.com/open_euler/dashboard?issue_id=I990A7>
kernel
5.5
#I95REH:CVE-2021-47091<https://gitee.com/open_euler/dashboard?issue_id=I95REH>
kernel
5.5
#I99K08:CVE-2024-26633<https://gitee.com/open_euler/dashboard?issue_id=I99K08>
kernel
5.5
#I9AH1K:CVE-2024-28834<https://gitee.com/open_euler/dashboard?issue_id=I9AH1K>
gnutls
5.3
#I9E2PU:CVE-2024-28182<https://gitee.com/open_euler/dashboard?issue_id=I9E2PU>
nghttp2
5.3
#I9DFPV:CVE-2023-7250<https://gitee.com/open_euler/dashboard?issue_id=I9DFPV>
iperf3
5.3
#I9E8PU:CVE-2024-21506<https://gitee.com/open_euler/dashboard?issue_id=I9E8PU>
python-pymongo
5.2
#I9BJ5S:CVE-2024-30204<https://gitee.com/open_euler/dashboard?issue_id=I9BJ5S>
emacs
5
#I9BJ5X:CVE-2024-30205<https://gitee.com/open_euler/dashboard?issue_id=I9BJ5X>
emacs
5
#I917LZ:CVE-2024-24855<https://gitee.com/open_euler/dashboard?issue_id=I917LZ>
kernel
4.7
#I9AJ87:CVE-2024-27281<https://gitee.com/open_euler/dashboard?issue_id=I9AJ87>
ruby
4.5
#I93L72:CVE-2023-52469<https://gitee.com/open_euler/dashboard?issue_id=I93L72>
kernel
4.4
#I93X0G:CVE-2024-26606<https://gitee.com/open_euler/dashboard?issue_id=I93X0G>
kernel
4.4
#I947PH:CVE-2021-46928<https://gitee.com/open_euler/dashboard?issue_id=I947PH>
kernel
4.4
#I947U7:CVE-2021-46935<https://gitee.com/open_euler/dashboard?issue_id=I947U7>
kernel
4.4
#I947OW:CVE-2021-46924<https://gitee.com/open_euler/dashboard?issue_id=I947OW>
kernel
4.3
#I95RE9:CVE-2021-47086<https://gitee.com/open_euler/dashboard?issue_id=I95RE9>
kernel
4
#I93EDF:CVE-2024-26597<https://gitee.com/open_euler/dashboard?issue_id=I93EDF>
kernel
3.3
#I947SE:CVE-2021-46934<https://gitee.com/open_euler/dashboard?issue_id=I947SE>
kernel
3.3
#I949D9:CVE-2020-36777<https://gitee.com/open_euler/dashboard?issue_id=I949D9>
kernel
3.3
#I94JHY:CVE-2020-36784<https://gitee.com/open_euler/dashboard?issue_id=I94JHY>
kernel
3.3
#I990AA:CVE-2021-47112<https://gitee.com/open_euler/dashboard?issue_id=I990AA>
kernel
3.3
#I9AJ8A:CVE-2024-27280<https://gitee.com/open_euler/dashboard?issue_id=I9AJ8A>
ruby
3.1
#I9A7Y2:CVE-2023-50967<https://gitee.com/open_euler/dashboard?issue_id=I9A7Y2>
jose
2.5
#I947TK:CVE-2021-46926<https://gitee.com/open_euler/dashboard?issue_id=I947TK>
kernel
2.3
#I9BGUB:CVE-2021-47142<https://gitee.com/open_euler/dashboard?issue_id=I9BGUB>
kernel
1
#I9BGMR:CVE-2021-47143<https://gitee.com/open_euler/dashboard?issue_id=I9BGMR>
kernel
1
#I9BGUR:CVE-2021-47144<https://gitee.com/open_euler/dashboard?issue_id=I9BGUR>
kernel
1
#I9BGQL:CVE-2021-47145<https://gitee.com/open_euler/dashboard?issue_id=I9BGQL>
kernel
1
#I9BGV4:CVE-2021-47146<https://gitee.com/open_euler/dashboard?issue_id=I9BGV4>
kernel
1
#I9BGKK:CVE-2021-47149<https://gitee.com/open_euler/dashboard?issue_id=I9BGKK>
kernel
1
#I9BGVY:CVE-2021-47150<https://gitee.com/open_euler/dashboard?issue_id=I9BGVY>
kernel
1
#I9BGWP:CVE-2021-47153<https://gitee.com/open_euler/dashboard?issue_id=I9BGWP>
kernel
1
#I9BHSG:CVE-2021-47159<https://gitee.com/open_euler/dashboard?issue_id=I9BHSG>
kernel
1
#I9BHG2:CVE-2021-47160<https://gitee.com/open_euler/dashboard?issue_id=I9BHG2>
kernel
1
#I9BHF9:CVE-2021-47162<https://gitee.com/open_euler/dashboard?issue_id=I9BHF9>
kernel
1
#I9BHRY:CVE-2021-47163<https://gitee.com/open_euler/dashboard?issue_id=I9BHRY>
kernel
1
#I9BHTI:CVE-2021-47167<https://gitee.com/open_euler/dashboard?issue_id=I9BHTI>
kernel
1
#I9BHLP:CVE-2021-47169<https://gitee.com/open_euler/dashboard?issue_id=I9BHLP>
kernel
1
#I9BHQL:CVE-2021-47170<https://gitee.com/open_euler/dashboard?issue_id=I9BHQL>
kernel
1
#I9BHNM:CVE-2021-47171<https://gitee.com/open_euler/dashboard?issue_id=I9BHNM>
kernel
1
#I9BHNX:CVE-2021-47173<https://gitee.com/open_euler/dashboard?issue_id=I9BHNX>
kernel
1
#I9BHQ7:CVE-2021-47180<https://gitee.com/open_euler/dashboard?issue_id=I9BHQ7>
kernel
1
#I9AK6C:CVE-2023-52620<https://gitee.com/open_euler/dashboard?issue_id=I9AK6C>
kernel
1
#I9BV4P:CVE-2023-52622<https://gitee.com/open_euler/dashboard?issue_id=I9BV4P>
kernel
1
#I9CTGE:CVE-2023-52629<https://gitee.com/open_euler/dashboard?issue_id=I9CTGE>
kernel
1
#I9AK56:CVE-2024-26642<https://gitee.com/open_euler/dashboard?issue_id=I9AK56>
kernel
1
#I9BV23:CVE-2024-26644<https://gitee.com/open_euler/dashboard?issue_id=I9BV23>
kernel
1
#I9BV24:CVE-2024-26645<https://gitee.com/open_euler/dashboard?issue_id=I9BV24>
kernel
1
#I9C6FA:CVE-2024-26651<https://gitee.com/open_euler/dashboard?issue_id=I9C6FA>
kernel
1
#I9DD86:CVE-2024-26654<https://gitee.com/open_euler/dashboard?issue_id=I9DD86>
kernel
1
#I9DNPD:CVE-2024-26668<https://gitee.com/open_euler/dashboard?issue_id=I9DNPD>
kernel
1
#I9E2O0:CVE-2024-26751<https://gitee.com/open_euler/dashboard?issue_id=I9E2O0>
kernel
1
#I9C6WS:CVE-2024-28085<https://gitee.com/open_euler/dashboard?issue_id=I9C6WS>
util-linux
0
Bugfix:
issue
仓库
#I9C04M:gssproxy服务停止时释放资源调用LIST_DEL宏参数错误可能导致进程崩溃<https://gitee.com/open_euler/dashboard?issue_id=I9C04M>
gssproxy
#I8Z2JH:openEuler 20.03 LTS SP3对盘通知式下电后,盘又被系统接管<https://gitee.com/open_euler/dashboard?issue_id=I8Z2JH>
kernel
#I9355O:keys: safe concurrent user->{session,uid}_keyring access<https://gitee.com/open_euler/dashboard?issue_id=I9355O>
kernel
#I97HJA:ext4: ext4_mb_use_inode_pa: Don't BUG_ON when 'pa->pa_free < len' in continue mode<https://gitee.com/open_euler/dashboard?issue_id=I97HJA>
kernel
#I991GQ:crypto: algif_aead - fix uninitialized ctx->init<https://gitee.com/open_euler/dashboard?issue_id=I991GQ>
kernel
#I992IL: crypto: algif_aead - Only wake up when ctx->more is zero<https://gitee.com/open_euler/dashboard?issue_id=I992IL>
kernel
#I9ARW6:【OLK-5.10】启动31台带内存带宽Qos的虚拟机,前端查看有2台虚拟机schemata值不符合预期设置的Qos值<https://gitee.com/open_euler/dashboard?issue_id=I9ARW6>
kernel
#I9AZFU:【OLK-5.10】 修复MPAM重复使能问题<https://gitee.com/open_euler/dashboard?issue_id=I9AZFU>
kernel
#I9BD67:【OLK-5.10】iostat以及/proc/diskstats显示异常大,会产生跳变,统计不准。<https://gitee.com/open_euler/dashboard?issue_id=I9BD67>
kernel
#I9BWES:mm: ksm: fix use-after-free kasan report in ksm_might_need_to_copy<https://gitee.com/open_euler/dashboard?issue_id=I9BWES>
kernel
#I9C0QZ:mlock 溢出没有返回失败<https://gitee.com/open_euler/dashboard?issue_id=I9C0QZ>
kernel
#I9D6UN:【openEuler-1.0-LTS/OLK-5.10/OLK-6.6】hns3网卡驱动在动态vlan模式下,可能出现VF无法收到带vlan报文的问题。<https://gitee.com/open_euler/dashboard?issue_id=I9D6UN>
kernel
#I9DOVK:盘被锁后芯片默认超时时间偏小引发IO异常完成<https://gitee.com/open_euler/dashboard?issue_id=I9DOVK>
kernel
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/docker_img/update/
openEuler CVE 及安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高):
里程碑
任务ID
任务标题
优先级
sig组
关联仓库
任务路径
openEuler 20.03LTS SP1 update2103
I3E5C1
【20.03-SP1】【arm/x86】服务启动失败
主要
sig/bigdata
src-openEuler/hadoop
https://gitee.com/open_euler/dashboard?issue_id=I3E5C1
openEuler-20.03-LTS-SP1
I3QGU7
系统不支持GB18030
无优先级
sig/TC
openEuler/community
https://gitee.com/open_euler/dashboard?issue_id=I3QGU7
openEuler 20.03LTS SP1 update210926
I4CMSV
【20.03-LTS-SP1】【arm/x86】搭建Kubernetes 集群缺少包etcd
无优先级
sig/TC
openEuler/community
https://gitee.com/open_euler/dashboard?issue_id=I4CMSV
openEuler-20.03-LTS-SP1-dailybuild
I5Y99T
mate-desktop install problem in openEuler:20:03:LTS:SP1
无优先级
sig/sig-mate-desktop
src-openEuler/mate-desktop
https://gitee.com/open_euler/dashboard?issue_id=I5Y99T
openEuler-22.03-LTS Update 20240410
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题4个,已知漏洞54个。目前版本分支剩余待修复缺陷6个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9EP1Z?from=project-i…
CVE修复:
CVE
仓库
score
#I9C6X1:CVE-2024-3019<https://gitee.com/open_euler/dashboard?issue_id=I9C6X1>
pcp
8.8
#I92HWD:CVE-2024-24474<https://gitee.com/open_euler/dashboard?issue_id=I92HWD>
qemu
8.2
#I9ATGS:CVE-2022-2469<https://gitee.com/open_euler/dashboard?issue_id=I9ATGS>
libgsasl
8.1
#I4BI7U:CVE-2019-25051<https://gitee.com/open_euler/dashboard?issue_id=I4BI7U>
aspell
7.8
#I9E4NC:CVE-2024-31083<https://gitee.com/open_euler/dashboard?issue_id=I9E4NC>
xorg-x11-server
7.8
#I9AURJ:CVE-2022-2639<https://gitee.com/open_euler/dashboard?issue_id=I9AURJ>
openvswitch
7.8
#I9AVQD:CVE-2021-32142<https://gitee.com/open_euler/dashboard?issue_id=I9AVQD>
LibRaw
7.8
#I932VH:CVE-2024-26589<https://gitee.com/open_euler/dashboard?issue_id=I932VH>
kernel
7.8
#I9AWCO:CVE-2022-39028<https://gitee.com/open_euler/dashboard?issue_id=I9AWCO>
telnet
7.5
#I9E2PZ:CVE-2024-27316<https://gitee.com/open_euler/dashboard?issue_id=I9E2PZ>
mod_http2
7.5
#I977K3:CVE-2024-28757<https://gitee.com/open_euler/dashboard?issue_id=I977K3>
expat
7.5
#I9B1Y1:CVE-2024-30156<https://gitee.com/open_euler/dashboard?issue_id=I9B1Y1>
varnish
7.5
#I9B1O1:CVE-2024-24784<https://gitee.com/open_euler/dashboard?issue_id=I9B1O1>
golang
7.5
#I9AUYL:CVE-2022-24999<https://gitee.com/open_euler/dashboard?issue_id=I9AUYL>
nodejs-qs
7.5
#I9AVYL:CVE-2022-48279<https://gitee.com/open_euler/dashboard?issue_id=I9AVYL>
mod_security
7.5
#I9ACE0:CVE-2024-2002<https://gitee.com/open_euler/dashboard?issue_id=I9ACE0>
libdwarf
7.5
#I9E4AM:CVE-2024-31082<https://gitee.com/open_euler/dashboard?issue_id=I9E4AM>
xorg-x11-server
7.3
#I9E4N0:CVE-2024-31081<https://gitee.com/open_euler/dashboard?issue_id=I9E4N0>
xorg-x11-server
7.3
#I9E4N4:CVE-2024-31080<https://gitee.com/open_euler/dashboard?issue_id=I9E4N4>
xorg-x11-server
7.3
#I99JOA:CVE-2024-1013<https://gitee.com/open_euler/dashboard?issue_id=I99JOA>
unixODBC
7.1
#I9DGZJ:CVE-2024-28219<https://gitee.com/open_euler/dashboard?issue_id=I9DGZJ>
python-pillow
6.7
#I9AMRI:CVE-2022-32325<https://gitee.com/open_euler/dashboard?issue_id=I9AMRI>
jpegoptim
6.5
#I9C342:CVE-2024-2398<https://gitee.com/open_euler/dashboard?issue_id=I9C342>
curl
6.5
#I9AVQ9:CVE-2023-28100<https://gitee.com/open_euler/dashboard?issue_id=I9AVQ9>
flatpak
6.5
#I94K6R:CVE-2023-23601<https://gitee.com/open_euler/dashboard?issue_id=I94K6R>
mozjs78
6.5
#I94K6T:CVE-2023-23599<https://gitee.com/open_euler/dashboard?issue_id=I94K6T>
mozjs78
6.5
#I9AW6M:CVE-2023-0666<https://gitee.com/open_euler/dashboard?issue_id=I9AW6M>
wireshark
6.5
#I93ED1:CVE-2023-52454<https://gitee.com/open_euler/dashboard?issue_id=I93ED1>
kernel
6.5
#I9AH6G:CVE-2024-2494<https://gitee.com/open_euler/dashboard?issue_id=I9AH6G>
libvirt
6.2
#I9138X:CVE-2023-52426<https://gitee.com/open_euler/dashboard?issue_id=I9138X>
expat
5.5
#I8OJ8L:CVE-2023-37328<https://gitee.com/open_euler/dashboard?issue_id=I8OJ8L>
gstreamer1-plugins-base
5.5
#I932W7:CVE-2023-52443<https://gitee.com/open_euler/dashboard?issue_id=I932W7>
kernel
5.5
#I93HCX:CVE-2024-2660<https://gitee.com/open_euler/dashboard?issue_id=I93HCX>
kernel
5.5
#I97N53:CVE-2024-1441<https://gitee.com/open_euler/dashboard?issue_id=I97N53>
libvirt
5.5
#I9DFPV:CVE-2023-7250<https://gitee.com/open_euler/dashboard?issue_id=I9DFPV>
iperf3
5.3
#I9E2PU:CVE-2024-28182<https://gitee.com/open_euler/dashboard?issue_id=I9E2PU>
nghttp2
5.3
#I9AH1K:CVE-2024-28834<https://gitee.com/open_euler/dashboard?issue_id=I9AH1K>
gnutls
5.3
#I93X74:CVE-2024-26144<https://gitee.com/open_euler/dashboard?issue_id=I93X74>
rubygem-activestorage
5.3
#I9E8PU:CVE-2024-21506<https://gitee.com/open_euler/dashboard?issue_id=I9E8PU>
python-pymongo
5.2
#I9BJ5S:CVE-2024-30204<https://gitee.com/open_euler/dashboard?issue_id=I9BJ5S>
emacs
5
#I9BJ5X:CVE-2024-30205<https://gitee.com/open_euler/dashboard?issue_id=I9BJ5X>
emacs
5
#I92REM:CVE-2024-26585<https://gitee.com/open_euler/dashboard?issue_id=I92REM>
kernel
4.7
#I93ELY:CVE-2024-26593<https://gitee.com/open_euler/dashboard?issue_id=I93ELY>
kernel
4.7
#I9AJ87:CVE-2024-27281<https://gitee.com/open_euler/dashboard?issue_id=I9AJ87>
ruby
4.5
#I93L72:CVE-2023-52469<https://gitee.com/open_euler/dashboard?issue_id=I93L72>
kernel
4.4
#I93L7E:CVE-2023-52467<https://gitee.com/open_euler/dashboard?issue_id=I93L7E>
kernel
4.4
#I93X0G:CVE-2024-26606<https://gitee.com/open_euler/dashboard?issue_id=I93X0G>
kernel
4.4
#I94K5J:CVE-2021-47037<https://gitee.com/open_euler/dashboard?issue_id=I94K5J>
kernel
4.4
#I9AVQ7:CVE-2023-28101<https://gitee.com/open_euler/dashboard?issue_id=I9AVQ7>
flatpak
4.3
#I93EEE:CVE-2023-52456<https://gitee.com/open_euler/dashboard?issue_id=I93EEE>
kernel
4
#I93EDF:CVE-2024-26597<https://gitee.com/open_euler/dashboard?issue_id=I93EDF>
kernel
3.3
#I9AJ8A:CVE-2024-27280<https://gitee.com/open_euler/dashboard?issue_id=I9AJ8A>
ruby
3.1
#I9A7Y2:CVE-2023-50967<https://gitee.com/open_euler/dashboard?issue_id=I9A7Y2>
jose
2.5
#I947TK:CVE-2021-46926<https://gitee.com/open_euler/dashboard?issue_id=I947TK>
kernel
2.3
Bugfix:
issue
仓库
#I9C04M:gssproxy服务停止时释放资源调用LIST_DEL宏参数错误可能导致进程崩溃<https://gitee.com/open_euler/dashboard?issue_id=I9C04M>
gssproxy
#I9EWHR:tbl访问未初始化的内存<https://gitee.com/src-openeuler/groff/issues/I9EWHR>
groff
#I90ZB5:在centos7 4.18与openeuler 5.10.0-136.14.2.90.oe2203sp1.x86_64测试nvme fio write时候,使用ext4文件系统存在性能差异<https://gitee.com/openeuler/kernel/issues/I90ZB5>
kernel
#I97HJA:ext4: ext4_mb_use_inode_pa: Don't BUG_ON when 'pa->pa_free < len' in continue mode<https://gitee.com/openeuler/kernel/issues/I97HJA>
kernel
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/docker_img/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/ob…
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-22.03-LTS Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高):
里程碑
任务ID
任务标题
优先级
sig组
关联仓库
任务路径
openEuler-22.03-LTS update20230726
I7ORCE
【22.03 LTS update20230726】【arm\x86】selinux-policy-base的版本不符合ceph子包的安装条件,ceph子包安装失败; cephadm卸载有异常打印
主要
sig/sig-SDS
src-openEuler/ceph
https://gitee.com/open_euler/dashboard?issue_id=I7ORCE
openEuler-22.03-LTS
I6VFRX
[22.03-LTS][x86/arm]mariadb授权给远程用户,远程连接服务失败
次要
sig/DB
src-openEuler/mariadb
https://gitee.com/open_euler/dashboard?issue_id=I6VFRX
openEuler-22.03-LTS
I72N5G
【22.03-lts】x86环境上同时安装php-fpm软件包和php-opcache软件包后会导致php-fpm.service服务启动失败
次要
sig/Base-service
src-openEuler/php
https://gitee.com/open_euler/dashboard?issue_id=I72N5G
openEuler-22.03-LTS-Dailybuild
I5RTUS
X86架构下无法对mysql8进行autobolt模式反馈编译,报错
无优先级
sig/Compiler,kind/feature
src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I5RTUS
openEuler-22.03-LTS-Dailybuild
I5XP8E
Bug in openEuler/gcc (10.3.0) ,22.03-LTS-performance 分支
无优先级
sig/Compiler
src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I5XP8E
openEuler-22.03-LTS-Dailybuild
I65UF9
aarch64架构boost icl模板库优化错误
无优先级
sig/Compiler
src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I65UF9
openEuler-22.03-LTS-SP1 Update 20240410
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS-SP1修复版本已知问题4个,已知漏洞69个,热补丁1个。目前版本分支剩余待修复缺陷5个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9EP1W?from=project-i…
CVE修复:
CVE
仓库
score
#I9C6X1:CVE-2024-3019<https://gitee.com/open_euler/dashboard?issue_id=I9C6X1>
pcp
8.8
#I92HWD:CVE-2024-24474<https://gitee.com/open_euler/dashboard?issue_id=I92HWD>
qemu
8.2
#I9ATGS:CVE-2022-2469<https://gitee.com/open_euler/dashboard?issue_id=I9ATGS>
libgsasl
8.1
#I4BI7U:CVE-2019-25051<https://gitee.com/open_euler/dashboard?issue_id=I4BI7U>
aspell
7.8
#I9E4NC:CVE-2024-31083<https://gitee.com/open_euler/dashboard?issue_id=I9E4NC>
xorg-x11-server
7.8
#I9AVQD:CVE-2021-32142<https://gitee.com/open_euler/dashboard?issue_id=I9AVQD>
LibRaw
7.8
#I9AURJ:CVE-2022-2639<https://gitee.com/open_euler/dashboard?issue_id=I9AURJ>
openvswitch
7.8
#I932VH:CVE-2024-26589<https://gitee.com/open_euler/dashboard?issue_id=I932VH>
kernel
7.8
#I9AUYL:CVE-2022-24999<https://gitee.com/open_euler/dashboard?issue_id=I9AUYL>
nodejs-qs
7.5
#I9B1Y1:CVE-2024-30156<https://gitee.com/open_euler/dashboard?issue_id=I9B1Y1>
varnish
7.5
#I9AVYL:CVE-2022-48279<https://gitee.com/open_euler/dashboard?issue_id=I9AVYL>
mod_security
7.5
#I9E2PZ:CVE-2024-27316<https://gitee.com/open_euler/dashboard?issue_id=I9E2PZ>
mod_http2
7.5
#I9ACE0:CVE-2024-2002<https://gitee.com/open_euler/dashboard?issue_id=I9ACE0>
libdwarf
7.5
#I8X4FY:CVE-2023-39325<https://gitee.com/open_euler/dashboard?issue_id=I8X4FY>
ignition
7.5
#I90BQQ:CVE-2022-41723<https://gitee.com/open_euler/dashboard?issue_id=I90BQQ>
cri-tools
7.5
#I8X4G2:CVE-2023-39325<https://gitee.com/open_euler/dashboard?issue_id=I8X4G2>
cri-tools
7.5
#I9B1P4:CVE-2024-24786<https://gitee.com/open_euler/dashboard?issue_id=I9B1P4>
cri-tools
7.5
#I90BSM:CVE-2022-41723<https://gitee.com/open_euler/dashboard?issue_id=I90BSM>
cri-o
7.5
#I8X4FZ:CVE-2023-39325<https://gitee.com/open_euler/dashboard?issue_id=I8X4FZ>
cri-o
7.5
#I977K3:CVE-2024-28757<https://gitee.com/open_euler/dashboard?issue_id=I977K3>
expat
7.5
#I9B1O1:CVE-2024-24784<https://gitee.com/open_euler/dashboard?issue_id=I9B1O1>
golang
7.5
#I9E4AM:CVE-2024-31082<https://gitee.com/open_euler/dashboard?issue_id=I9E4AM>
xorg-x11-server
7.3
#I9E4N0:CVE-2024-31081<https://gitee.com/open_euler/dashboard?issue_id=I9E4N0>
xorg-x11-server
7.3
#I9E4N4:CVE-2024-31080<https://gitee.com/open_euler/dashboard?issue_id=I9E4N4>
xorg-x11-server
7.3
#I99JOA:CVE-2024-1013<https://gitee.com/open_euler/dashboard?issue_id=I99JOA>
unixODBC
7.1
#I9DGZJ:CVE-2024-28219<https://gitee.com/open_euler/dashboard?issue_id=I9DGZJ>
python-pillow
6.7
#I9AMRI:CVE-2022-32325<https://gitee.com/open_euler/dashboard?issue_id=I9AMRI>
jpegoptim
6.5
#I94K6R:CVE-2023-23601<https://gitee.com/open_euler/dashboard?issue_id=I94K6R>
mozjs78
6.5
#I94K6T:CVE-2023-23599<https://gitee.com/open_euler/dashboard?issue_id=I94K6T>
mozjs78
6.5
#I9AW6M:CVE-2023-0666<https://gitee.com/open_euler/dashboard?issue_id=I9AW6M>
wireshark
6.5
#I9C342:CVE-2024-2398<https://gitee.com/open_euler/dashboard?issue_id=I9C342>
curl
6.5
#I9AVQ9:CVE-2023-28100<https://gitee.com/open_euler/dashboard?issue_id=I9AVQ9>
flatpak
6.5
#I93ED1:CVE-2023-52454<https://gitee.com/open_euler/dashboard?issue_id=I93ED1>
kernel
6.5
#I94PA7:CVE-2023-52475<https://gitee.com/open_euler/dashboard?issue_id=I94PA7>
kernel
6.3
#I9AH6G:CVE-2024-2494<https://gitee.com/open_euler/dashboard?issue_id=I9AH6G>
libvirt
6.2
#I675RB:CVE-2022-4318<https://gitee.com/src-openeuler/cri-o/issues/I675RB>
cri-o
6.1
#I9AYAU:CVE-2023-48795<https://gitee.com/open_euler/dashboard?issue_id=I9AYAU>
cri-o
5.9
#I8OJ8L:CVE-2023-37328<https://gitee.com/open_euler/dashboard?issue_id=I8OJ8L>
gstreamer1-plugins-base
5.5
#I97N53:CVE-2024-1441<https://gitee.com/open_euler/dashboard?issue_id=I97N53>
libvirt
5.5
#I9138X:CVE-2023-52426<https://gitee.com/open_euler/dashboard?issue_id=I9138X>
expat
5.5
#I932W7:CVE-2023-52443<https://gitee.com/open_euler/dashboard?issue_id=I932W7>
kernel
5.5
#I93HCX:CVE-2024-2660<https://gitee.com/open_euler/dashboard?issue_id=I93HCX>
kernel
5.5
#I94OZS:CVE-2023-52484<https://gitee.com/open_euler/dashboard?issue_id=I94OZS>
kernel
5.5
#I94P2I:CVE-2023-52479<https://gitee.com/open_euler/dashboard?issue_id=I94P2I>
kernel
5.5
#I93HD8:CVE-2024-26603<https://gitee.com/open_euler/dashboard?issue_id=I93HD8>
kernel
5.5
#I9DFPV:CVE-2023-7250<https://gitee.com/open_euler/dashboard?issue_id=I9DFPV>
iperf3
5.3
#I9AH1K:CVE-2024-28834<https://gitee.com/open_euler/dashboard?issue_id=I9AH1K>
gnutls
5.3
#I93X74:CVE-2024-26144<https://gitee.com/open_euler/dashboard?issue_id=I93X74>
rubygem-activestorage
5.3
#I9E2PU:CVE-2024-28182<https://gitee.com/open_euler/dashboard?issue_id=I9E2PU>
nghttp2
5.3
#I9E8PU:CVE-2024-21506<https://gitee.com/open_euler/dashboard?issue_id=I9E8PU>
python-pymongo
5.2
#I9BJ5S:CVE-2024-30204<https://gitee.com/open_euler/dashboard?issue_id=I9BJ5S>
emacs
5
#I9BJ5X:CVE-2024-30205<https://gitee.com/open_euler/dashboard?issue_id=I9BJ5X>
emacs
5
#I92REM:CVE-2024-26585<https://gitee.com/open_euler/dashboard?issue_id=I92REM>
kernel
4.7
#I93ELY:CVE-2024-26593<https://gitee.com/open_euler/dashboard?issue_id=I93ELY>
kernel
4.7
#I94P3R:CVE-2023-52476<https://gitee.com/open_euler/dashboard?issue_id=I94P3R>
kernel
4.7
#I94UOT:CVE-2024-26607<https://gitee.com/open_euler/dashboard?issue_id=I94UOT>
kernel
4.7
#I9AJ87:CVE-2024-27281<https://gitee.com/open_euler/dashboard?issue_id=I9AJ87>
ruby
4.5
#I93L72:CVE-2023-52469<https://gitee.com/open_euler/dashboard?issue_id=I93L72>
kernel
4.4
#I93L7E:CVE-2023-52467<https://gitee.com/open_euler/dashboard?issue_id=I93L7E>
kernel
4.4
#I93X0G:CVE-2024-26606<https://gitee.com/open_euler/dashboard?issue_id=I93X0G>
kernel
4.4
#I94K5J:CVE-2021-47037<https://gitee.com/open_euler/dashboard?issue_id=I94K5J>
kernel
4.4
#I94P5J:CVE-2023-52477<https://gitee.com/open_euler/dashboard?issue_id=I94P5J>
kernel
4.4
#I9AVQ7:CVE-2023-28101<https://gitee.com/open_euler/dashboard?issue_id=I9AVQ7>
flatpak
4.3
#I93EEE:CVE-2023-52456<https://gitee.com/open_euler/dashboard?issue_id=I93EEE>
kernel
4
#I97NHT:CVE-2024-26608<https://gitee.com/open_euler/dashboard?issue_id=I97NHT>
kernel
4
#I97NIJ:CVE-2024-2357<https://gitee.com/open_euler/dashboard?issue_id=I97NIJ>
libreswan
3.5
#I93EDF:CVE-2024-26597<https://gitee.com/open_euler/dashboard?issue_id=I93EDF>
kernel
3.3
#I9AJ8A:CVE-2024-27280<https://gitee.com/open_euler/dashboard?issue_id=I9AJ8A>
ruby
3.1
#I947TK:CVE-2021-46926<https://gitee.com/open_euler/dashboard?issue_id=I947TK>
kernel
2.3
Bugfix:
issue
仓库
#I9C04M:gssproxy服务停止时释放资源调用LIST_DEL宏参数错误可能导致进程崩溃<https://gitee.com/open_euler/dashboard?issue_id=I9C04M>
gssproxy
#I9EWHR:tbl访问未初始化的内存<https://gitee.com/src-openeuler/groff/issues/I9EWHR>
groff
#I90ZB5:在centos7 4.18与openeuler 5.10.0-136.14.2.90.oe2203sp1.x86_64测试nvme fio write时候,使用ext4文件系统存在性能差异<https://gitee.com/openeuler/kernel/issues/I90ZB5>
kernel
#I97HJA:ext4: ext4_mb_use_inode_pa: Don't BUG_ON when 'pa->pa_free < len' in continue mode<https://gitee.com/openeuler/kernel/issues/I97HJA>
kernel
热补丁:
仓库
CVE
score
kernel
CVE-2024-0841
7.8
openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/docker_img/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/hotpatch_update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_versio…
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_versio…
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_versio…
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-22.03-LTS-SP1 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高):
里程碑
任务ID
任务标题
优先级
sig组
关联仓库
任务路径
openEuler 22.03-SP1
I6B4V1
【22.03 SP1 update 20230118】【arm】libhdfs在arm架构降级失败,x86正常
主要
sig/bigdata
src-openEuler/hadoop
https://gitee.com/open_euler/dashboard?issue_id=I6B4V1
openEuler-22.03-LTS-SP1 update20230726
I7OR2I
【22.03 LTS SP1 update20230726】【arm\x86】selinux-policy-base的版本不符合ceph子包的安装条件,ceph子包安装失败
主要
sig/sig-SDS
src-openEuler/ceph
https://gitee.com/open_euler/dashboard?issue_id=I7OR2I
openEuler-22.03-LTS-SP1
I6VFV6
[22.03 SP1] [x86/arm] mariadb授权给远程用户,远程连接服务失败
次要
sig/DB
src-openEuler/mariadb
https://gitee.com/open_euler/dashboard?issue_id=I6VFV6
openEuler-22.03-LTS-SP1
I73CKF
【22.03-lts-sp1】x86环境上同时安装php-fpm软件包和php-opcache软件包后会导致php-fpm.service服务启动失败
次要
sig/Base-service
src-openEuler/php
https://gitee.com/open_euler/dashboard?issue_id=I73CKF
openEuler-22.03-LTS-SP1
I84L9F
openEuler 22.03 LTS-SP1版本上编译node-v18.18.0的代码失败
无优先级
sig/Compiler
src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I84L9F
openEuler-22.03-LTS-SP2 Update 20240410
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS-SP2修复版本已知问题5个,已知漏洞75个,热补丁1个,目前版本分支剩余待修复缺陷4个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS-SP2 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9EP1V?from=project-i…
CVE修复:
CVE
仓库
score
#I92HWD:CVE-2024-24474<https://gitee.com/open_euler/dashboard?issue_id=I92HWD>
qemu
8.2
#I9ATGS:CVE-2022-2469<https://gitee.com/open_euler/dashboard?issue_id=I9ATGS>
libgsasl
8.1
#I4BI7U:CVE-2019-25051<https://gitee.com/open_euler/dashboard?issue_id=I4BI7U>
aspell
7.8
#I89S5X:CVE-2023-45675<https://gitee.com/open_euler/dashboard?issue_id=I89S5X>
stb
7.8
#I9AURJ:CVE-2022-2639<https://gitee.com/open_euler/dashboard?issue_id=I9AURJ>
openvswitch
7.8
#I9AVQD:CVE-2021-32142<https://gitee.com/open_euler/dashboard?issue_id=I9AVQD>
LibRaw
7.8
#I9E4NC:CVE-2024-31083<https://gitee.com/open_euler/dashboard?issue_id=I9E4NC>
xorg-x11-server
7.8
#I932VH:CVE-2024-26589<https://gitee.com/open_euler/dashboard?issue_id=I932VH>
kernel
7.8
#I9AUYL:CVE-2022-24999<https://gitee.com/open_euler/dashboard?issue_id=I9AUYL>
nodejs-qs
7.5
#I8X4FY:CVE-2023-39325<https://gitee.com/open_euler/dashboard?issue_id=I8X4FY>
ignition
7.5
#I9E2PZ:CVE-2024-27316<https://gitee.com/open_euler/dashboard?issue_id=I9E2PZ>
mod_http2
7.5
#I9ACE0:CVE-2024-2002<https://gitee.com/open_euler/dashboard?issue_id=I9ACE0>
libdwarf
7.5
#I90BQQ:CVE-2022-41723<https://gitee.com/open_euler/dashboard?issue_id=I90BQQ>
cri-tools
7.5
#I8X4G2:CVE-2023-39325<https://gitee.com/open_euler/dashboard?issue_id=I8X4G2>
cri-tools
7.5
#I9B1P4:CVE-2024-24786<https://gitee.com/open_euler/dashboard?issue_id=I9B1P4>
cri-tools
7.5
#I90BSM:CVE-2022-41723<https://gitee.com/open_euler/dashboard?issue_id=I90BSM>
cri-o
7.5
#I8X4FZ:CVE-2023-39325<https://gitee.com/open_euler/dashboard?issue_id=I8X4FZ>
cri-o
7.5
#I977K3:CVE-2024-28757<https://gitee.com/open_euler/dashboard?issue_id=I977K3>
expat
7.5
#I9B1O1:CVE-2024-24784<https://gitee.com/open_euler/dashboard?issue_id=I9B1O1>
golang
7.5
#I9B1Y1:CVE-2024-30156<https://gitee.com/open_euler/dashboard?issue_id=I9B1Y1>
varnish
7.5
#I9AWCO:CVE-2022-39028<https://gitee.com/open_euler/dashboard?issue_id=I9AWCO>
telnet
7.5
#I9E4AM:CVE-2024-31082<https://gitee.com/open_euler/dashboard?issue_id=I9E4AM>
xorg-x11-server
7.3
#I9E4N0:CVE-2024-31081<https://gitee.com/open_euler/dashboard?issue_id=I9E4N0>
xorg-x11-server
7.3
#I9E4N4:CVE-2024-31080<https://gitee.com/open_euler/dashboard?issue_id=I9E4N4>
xorg-x11-server
7.3
#I99JOA:CVE-2024-1013<https://gitee.com/open_euler/dashboard?issue_id=I99JOA>
unixODBC
7.1
#I9DGZJ:CVE-2024-28219<https://gitee.com/open_euler/dashboard?issue_id=I9DGZJ>
python-pillow
6.7
#I9AMRI:CVE-2022-32325<https://gitee.com/open_euler/dashboard?issue_id=I9AMRI>
jpegoptim
6.5
#I94K6R:CVE-2023-23601<https://gitee.com/open_euler/dashboard?issue_id=I94K6R>
mozjs78
6.5
#I94K6T:CVE-2023-23599<https://gitee.com/open_euler/dashboard?issue_id=I94K6T>
mozjs78
6.5
#I9C342:CVE-2024-2398<https://gitee.com/open_euler/dashboard?issue_id=I9C342>
curl
6.5
#I9AW6M:CVE-2023-0666<https://gitee.com/open_euler/dashboard?issue_id=I9AW6M>
wireshark
6.5
#I9AVQ9:CVE-2023-28100<https://gitee.com/open_euler/dashboard?issue_id=I9AVQ9>
flatpak
6.5
#I93ED1:CVE-2023-52454<https://gitee.com/open_euler/dashboard?issue_id=I93ED1>
kernel
6.5
#I94PA7:CVE-2023-52475<https://gitee.com/open_euler/dashboard?issue_id=I94PA7>
kernel
6.3
#I9AH6G:CVE-2024-2494<https://gitee.com/open_euler/dashboard?issue_id=I9AH6G>
libvirt
6.2
#I9AYAU:CVE-2023-48795<https://gitee.com/open_euler/dashboard?issue_id=I9AYAU>
cri-o
5.9
#I97N53:CVE-2024-1441<https://gitee.com/open_euler/dashboard?issue_id=I97N53>
libvirt
5.5
#I8OJ8L:CVE-2023-37328<https://gitee.com/open_euler/dashboard?issue_id=I8OJ8L>
gstreamer1-plugins-base
5.5
#I9138X:CVE-2023-52426<https://gitee.com/open_euler/dashboard?issue_id=I9138X>
expat
5.5
#I932W7:CVE-2023-52443<https://gitee.com/open_euler/dashboard?issue_id=I932W7>
kernel
5.5
#I93HCX:CVE-2024-26600<https://gitee.com/open_euler/dashboard?issue_id=I93HCX>
kernel
5.5
#I93HD8:CVE-2024-26603<https://gitee.com/open_euler/dashboard?issue_id=I93HD8>
kernel
5.5
#I94OZS:CVE-2023-52484<https://gitee.com/open_euler/dashboard?issue_id=I94OZS>
kernel
5.5
#I94P2I:CVE-2023-52479<https://gitee.com/open_euler/dashboard?issue_id=I94P2I>
kernel
5.5
#I93X74:CVE-2024-26144<https://gitee.com/open_euler/dashboard?issue_id=I93X74>
rubygem-activestorage
5.3
#I9DFPV:CVE-2023-7250<https://gitee.com/open_euler/dashboard?issue_id=I9DFPV>
iperf3
5.3
#I9E2PU:CVE-2024-28182<https://gitee.com/open_euler/dashboard?issue_id=I9E2PU>
nghttp2
5.3
#I9AH1K:CVE-2024-28834<https://gitee.com/open_euler/dashboard?issue_id=I9AH1K>
gnutls
5.3
#I9E8PU:CVE-2024-21506<https://gitee.com/open_euler/dashboard?issue_id=I9E8PU>
python-pymongo
5.2
#I9BJ5S:CVE-2024-30204<https://gitee.com/open_euler/dashboard?issue_id=I9BJ5S>
emacs
5
#I9BJ5X:CVE-2024-30205<https://gitee.com/open_euler/dashboard?issue_id=I9BJ5X>
emacs
5
#I92REM:CVE-2024-26585<https://gitee.com/open_euler/dashboard?issue_id=I92REM>
kernel
4.7
#I93ELY:CVE-2024-26593<https://gitee.com/open_euler/dashboard?issue_id=I93ELY>
kernel
4.7
#I94P3R:CVE-2023-52476<https://gitee.com/open_euler/dashboard?issue_id=I94P3R>
kernel
4.7
#I94UOT:CVE-2024-26607<https://gitee.com/open_euler/dashboard?issue_id=I94UOT>
kernel
4.7
#I9AJ87:CVE-2024-27281<https://gitee.com/open_euler/dashboard?issue_id=I9AJ87>
ruby
4.5
#I93L72:CVE-2023-52469<https://gitee.com/open_euler/dashboard?issue_id=I93L72>
kernel
4.4
#I93L7E:CVE-2023-52467<https://gitee.com/open_euler/dashboard?issue_id=I93L7E>
kernel
4.4
#I93X0G:CVE-2024-26606<https://gitee.com/open_euler/dashboard?issue_id=I93X0G>
kernel
4.4
#I94K5J:CVE-2021-47037<https://gitee.com/open_euler/dashboard?issue_id=I94K5J>
kernel
4.4
#I93ED4:CVE-2023-52462<https://gitee.com/open_euler/dashboard?issue_id=I93ED4>
kernel
4.4
#I94P5J:CVE-2023-52477<https://gitee.com/open_euler/dashboard?issue_id=I94P5J>
kernel
4.4
#I9AVQ7:CVE-2023-28101<https://gitee.com/open_euler/dashboard?issue_id=I9AVQ7>
flatpak
4.3
#I93EDC:CVE-2023-52457<https://gitee.com/open_euler/dashboard?issue_id=I93EDC>
kernel
4.2
#I93EEE:CVE-2023-52456<https://gitee.com/open_euler/dashboard?issue_id=I93EEE>
kernel
4
#I97NHT:CVE-2024-26608<https://gitee.com/open_euler/dashboard?issue_id=I97NHT>
kernel
4
#I93EDF:CVE-2024-26597<https://gitee.com/open_euler/dashboard?issue_id=I93EDF>
kernel
3.3
#I9AJ8A:CVE-2024-27280<https://gitee.com/open_euler/dashboard?issue_id=I9AJ8A>
ruby
3.1
#I9A7Y2:CVE-2023-50967<https://gitee.com/open_euler/dashboard?issue_id=I9A7Y2>
jose
2.5
#I947TK:CVE-2021-46926<https://gitee.com/open_euler/dashboard?issue_id=I947TK>
kernel
2.3
#I9BV23:CVE-2024-26644<https://gitee.com/open_euler/dashboard?issue_id=I9BV23>
kernel
1
#I9DD86:CVE-2024-26654<https://gitee.com/open_euler/dashboard?issue_id=I9DD86>
kernel
1
#I9E2EQ:CVE-2024-26696<https://gitee.com/open_euler/dashboard?issue_id=I9E2EQ>
kernel
1
#I9E2M9:CVE-2024-26773<https://gitee.com/open_euler/dashboard?issue_id=I9E2M9>
kernel
1
#I9E46I:CVE-2024-26788<https://gitee.com/open_euler/dashboard?issue_id=I9E46I>
kernel
1
Bugfix:
issue
仓库
#I9C04M:gssproxy服务停止时释放资源调用LIST_DEL宏参数错误可能导致进程崩溃<https://gitee.com/open_euler/dashboard?issue_id=I9C04M>
gssproxy
#I9EWHR:tbl访问未初始化的内存<https://gitee.com/open_euler/dashboard?issue_id=I9EWHR>
groff
#I90ZB5:在centos7 4.18与openeuler 5.10.0-136.14.2.90.oe2203sp1.x86_64测试nvme fio write时候,使用ext4文件系统存在性能差异<https://gitee.com/open_euler/dashboard?issue_id=I90ZB5>
kernel
#I92AK4:支持获取minor版本号,以便支持mpam v0.1版本<https://gitee.com/open_euler/dashboard?issue_id=I92AK4>
kernel
#I97HJA:ext4: ext4_mb_use_inode_pa: Don't BUG_ON when 'pa->pa_free < len' in continue mode<https://gitee.com/open_euler/dashboard?issue_id=I97HJA>
kernel
热补丁:
仓库
CVE
score
kernel
CVE-2024-1086
7.8
openEuler-22.03-LTS SP2版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-22.03-LTS SP2 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/hotpatch_update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/docker_img/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/EPOL/update/multi_versio…
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/EPOL/update/multi_versio…
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
https://repo.openeuler.org/security/data/hotpatch_cvrf/
openEuler-22.03-LTS-SP2 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高):
里程碑
任务ID
任务标题
优先级
sig组
关联仓库
任务路径
openEuler-22.03-LTS-SP2-round-2
I795G3
【22.03-LTS-SP2 round2】本次转测源中出现多个版本的containers-common
主要
sig/sig-CloudNative
src-openEuler/skopeo
https://gitee.com/open_euler/dashboard?issue_id=I795G3
openEuler-22.03-LTS-SP2-SEC
I7AFIR
【22.03-LTS-SP2 round2】【x86/arm】libkae-1.2.10-6.oe2203sp2安全编译选项Rpath/Runpath不满足
主要
sig-AccLib
src-openEuler/libkae
https://gitee.com/open_euler/dashboard?issue_id=I7AFIR
openEuler-22.03-LTS-SP2-update20231018
I89NB0
22.03-LTS-SP2的ceph release版本低于22.03-LTS-SP1 release版本
次要
sig/sig-SDS
src-openEuler/ceph
https://gitee.com/open_euler/dashboard?issue_id=I89NB0
openEuler-22.03-LTS-SP2
I7B6X5
gcc-pie-arm64架构和操作手册结果不同
无优先级
sig/Compiler
src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I7B6X5
openEuler-20.03-LTS-SP4 Update 20240410
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP4修复版本已知问题13个,已知漏洞99个。目前版本分支剩余待修复缺陷7个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP4 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9EP1Y?from=project-i…
CVE修复:
CVE
仓库
score
#I58YVD:CVE-2022-1802<https://gitee.com/open_euler/dashboard?issue_id=I58YVD>
firefox
8.8
#I9AO3J:CVE-2022-31163<https://gitee.com/open_euler/dashboard?issue_id=I9AO3J>
rubygem-tzinfo
8.1
#I9ATGS:CVE-2022-2469<https://gitee.com/open_euler/dashboard?issue_id=I9ATGS>
libgsasl
8.1
#I9AURJ:CVE-2022-2639<https://gitee.com/open_euler/dashboard?issue_id=I9AURJ>
openvswitch
7.8
#I9E4NC:CVE-2024-31083<https://gitee.com/open_euler/dashboard?issue_id=I9E4NC>
xorg-x11-server
7.8
#I9AVQD:CVE-2021-32142<https://gitee.com/open_euler/dashboard?issue_id=I9AVQD>
LibRaw
7.8
#I8YV0T:CVE-2024-23307<https://gitee.com/open_euler/dashboard?issue_id=I8YV0T>
kernel
7.8
#I95LPF:CVE-2024-26622<https://gitee.com/open_euler/dashboard?issue_id=I95LPF>
kernel
7.8
#I96G7N:CVE-2023-52600<https://gitee.com/open_euler/dashboard?issue_id=I96G7N>
kernel
7.8
#I96GXM:CVE-2024-26625<https://gitee.com/open_euler/dashboard?issue_id=I96GXM>
kernel
7.8
#I990AF:CVE-2021-47131<https://gitee.com/open_euler/dashboard?issue_id=I990AF>
kernel
7.8
#I9AUYL:CVE-2022-24999<https://gitee.com/open_euler/dashboard?issue_id=I9AUYL>
nodejs-qs
7.5
#I9ACE0:CVE-2024-2002<https://gitee.com/open_euler/dashboard?issue_id=I9ACE0>
libdwarf
7.5
#I9ASUL:CVE-2022-2309<https://gitee.com/open_euler/dashboard?issue_id=I9ASUL>
libxml2
7.5
#I9AVYL:CVE-2022-48279<https://gitee.com/open_euler/dashboard?issue_id=I9AVYL>
mod_security
7.5
#I9AWCO:CVE-2022-39028<https://gitee.com/open_euler/dashboard?issue_id=I9AWCO>
telnet
7.5
#I9E2PZ:CVE-2024-27316<https://gitee.com/open_euler/dashboard?issue_id=I9E2PZ>
mod_http2
7.5
#I977K3:CVE-2024-28757<https://gitee.com/open_euler/dashboard?issue_id=I977K3>
expat
7.5
#I9B1O1:CVE-2024-24784<https://gitee.com/open_euler/dashboard?issue_id=I9B1O1>
golang
7.5
#I9B1Y1:CVE-2024-30156<https://gitee.com/open_euler/dashboard?issue_id=I9B1Y1>
varnish
7.5
#I9E4AM:CVE-2024-31082<https://gitee.com/open_euler/dashboard?issue_id=I9E4AM>
xorg-x11-server
7.3
#I9E4N0:CVE-2024-31081<https://gitee.com/open_euler/dashboard?issue_id=I9E4N0>
xorg-x11-server
7.3
#I9E4N4:CVE-2024-31080<https://gitee.com/open_euler/dashboard?issue_id=I9E4N4>
xorg-x11-server
7.3
#I99JOA:CVE-2024-1013<https://gitee.com/open_euler/dashboard?issue_id=I99JOA>
unixODBC
7.1
#I949C5:CVE-2021-46952<https://gitee.com/open_euler/dashboard?issue_id=I949C5>
kernel
7.1
#I96G7F:CVE-2023-52599<https://gitee.com/open_euler/dashboard?issue_id=I96G7F>
kernel
7.1
#I96GQ3:CVE-2023-52601<https://gitee.com/open_euler/dashboard?issue_id=I96GQ3>
kernel
7.1
#I95AXP:CVE-2023-52502<https://gitee.com/open_euler/dashboard?issue_id=I95AXP>
kernel
7
#I9DGZJ:CVE-2024-28219<https://gitee.com/open_euler/dashboard?issue_id=I9DGZJ>
python-pillow
6.7
#I9AMRI:CVE-2022-32325<https://gitee.com/open_euler/dashboard?issue_id=I9AMRI>
jpegoptim
6.5
#I94K6R:CVE-2023-23601<https://gitee.com/open_euler/dashboard?issue_id=I94K6R>
mozjs78
6.5
#I94K6T:CVE-2023-23599<https://gitee.com/open_euler/dashboard?issue_id=I94K6T>
mozjs78
6.5
#I9AW6M:CVE-2023-0666<https://gitee.com/open_euler/dashboard?issue_id=I9AW6M>
wireshark
6.5
#I9C342:CVE-2024-2398<https://gitee.com/open_euler/dashboard?issue_id=I9C342>
curl
6.5
#I99JV2:CVE-2024-26641<https://gitee.com/open_euler/dashboard?issue_id=I99JV2>
kernel
6.1
#I95RDW:CVE-2021-47101<https://gitee.com/open_euler/dashboard?issue_id=I95RDW>
kernel
6
#I96G8W:CVE-2023-52587<https://gitee.com/open_euler/dashboard?issue_id=I96G8W>
kernel
6
#I8OJ8L:CVE-2023-37328<https://gitee.com/open_euler/dashboard?issue_id=I8OJ8L>
gstreamer1-plugins-base
5.5
#I9138X:CVE-2023-52426<https://gitee.com/open_euler/dashboard?issue_id=I9138X>
expat
5.5
#I932W7:CVE-2023-52443<https://gitee.com/open_euler/dashboard?issue_id=I932W7>
kernel
5.5
#I93HCX:CVE-2024-26600<https://gitee.com/open_euler/dashboard?issue_id=I93HCX>
kernel
5.5
#I93LMH:CVE-2021-46904<https://gitee.com/open_euler/dashboard?issue_id=I93LMH>
kernel
5.5
#I94JCO:CVE-2021-46989<https://gitee.com/open_euler/dashboard?issue_id=I94JCO>
kernel
5.5
#I94JH2:CVE-2020-36780<https://gitee.com/open_euler/dashboard?issue_id=I94JH2>
kernel
5.5
#I95B1F:CVE-2023-52509<https://gitee.com/open_euler/dashboard?issue_id=I95B1F>
kernel
5.5
#I9909R:CVE-2021-47113<https://gitee.com/open_euler/dashboard?issue_id=I9909R>
kernel
5.5
#I9909V:CVE-2021-47114<https://gitee.com/open_euler/dashboard?issue_id=I9909V>
kernel
5.5
#I990A7:CVE-2021-47122<https://gitee.com/open_euler/dashboard?issue_id=I990A7>
kernel
5.5
#I95REH:CVE-2021-47091<https://gitee.com/open_euler/dashboard?issue_id=I95REH>
kernel
5.5
#I99K08:CVE-2024-26633<https://gitee.com/open_euler/dashboard?issue_id=I99K08>
kernel
5.5
#I9DFPV:CVE-2023-7250<https://gitee.com/open_euler/dashboard?issue_id=I9DFPV>
iperf3
5.3
#I9E2PU:CVE-2024-28182<https://gitee.com/open_euler/dashboard?issue_id=I9E2PU>
nghttp2
5.3
#I9AH1K:CVE-2024-28834<https://gitee.com/open_euler/dashboard?issue_id=I9AH1K>
gnutls
5.3
#I9E8PU:CVE-2024-21506<https://gitee.com/open_euler/dashboard?issue_id=I9E8PU>
python-pymongo
5.2
#I9BJ5S:CVE-2024-30204<https://gitee.com/open_euler/dashboard?issue_id=I9BJ5S>
emacs
5
#I9AJ87:CVE-2024-27281<https://gitee.com/open_euler/dashboard?issue_id=I9AJ87>
ruby
4.5
#I93L72:CVE-2023-52469<https://gitee.com/open_euler/dashboard?issue_id=I93L72>
kernel
4.4
#I93X0G:CVE-2024-26606<https://gitee.com/open_euler/dashboard?issue_id=I93X0G>
kernel
4.4
#I947PH:CVE-2021-46928<https://gitee.com/open_euler/dashboard?issue_id=I947PH>
kernel
4.4
#I947U7:CVE-2021-46935<https://gitee.com/open_euler/dashboard?issue_id=I947U7>
kernel
4.4
#I947OW:CVE-2021-46924<https://gitee.com/open_euler/dashboard?issue_id=I947OW>
kernel
4.3
#I93EDF:CVE-2024-26597<https://gitee.com/open_euler/dashboard?issue_id=I93EDF>
kernel
3.3
#I947SE:CVE-2021-46934<https://gitee.com/open_euler/dashboard?issue_id=I947SE>
kernel
3.3
#I949D9:CVE-2020-36777<https://gitee.com/open_euler/dashboard?issue_id=I949D9>
kernel
3.3
#I94JHY:CVE-2020-36784<https://gitee.com/open_euler/dashboard?issue_id=I94JHY>
kernel
3.3
#I990AA:CVE-2021-47112<https://gitee.com/open_euler/dashboard?issue_id=I990AA>
kernel
3.3
#I9AJ8A:CVE-2024-27280<https://gitee.com/open_euler/dashboard?issue_id=I9AJ8A>
ruby
3.1
#I9A7Y2:CVE-2023-50967<https://gitee.com/open_euler/dashboard?issue_id=I9A7Y2>
jose
2.5
#I947TK:CVE-2021-46926<https://gitee.com/open_euler/dashboard?issue_id=I947TK>
kernel
2.3
#I9BGUB:CVE-2021-47142<https://gitee.com/open_euler/dashboard?issue_id=I9BGUB>
kernel
1
#I9BGMR:CVE-2021-47143<https://gitee.com/open_euler/dashboard?issue_id=I9BGMR>
kernel
1
#I9BGUR:CVE-2021-47144<https://gitee.com/open_euler/dashboard?issue_id=I9BGUR>
kernel
1
#I9BGQL:CVE-2021-47145<https://gitee.com/open_euler/dashboard?issue_id=I9BGQL>
kernel
1
#I9BGV4:CVE-2021-47146<https://gitee.com/open_euler/dashboard?issue_id=I9BGV4>
kernel
1
#I9BGKK:CVE-2021-47149<https://gitee.com/open_euler/dashboard?issue_id=I9BGKK>
kernel
1
#I9BGVY:CVE-2021-47150<https://gitee.com/open_euler/dashboard?issue_id=I9BGVY>
kernel
1
#I9BGWP:CVE-2021-47153<https://gitee.com/open_euler/dashboard?issue_id=I9BGWP>
kernel
1
#I9BHSG:CVE-2021-47159<https://gitee.com/open_euler/dashboard?issue_id=I9BHSG>
kernel
1
#I9BHG2:CVE-2021-47160<https://gitee.com/open_euler/dashboard?issue_id=I9BHG2>
kernel
1
#I9BHF9:CVE-2021-47162<https://gitee.com/open_euler/dashboard?issue_id=I9BHF9>
kernel
1
#I9BHRY:CVE-2021-47163<https://gitee.com/open_euler/dashboard?issue_id=I9BHRY>
kernel
1
#I9BHTI:CVE-2021-47167<https://gitee.com/open_euler/dashboard?issue_id=I9BHTI>
kernel
1
#I9BHLP:CVE-2021-47169<https://gitee.com/open_euler/dashboard?issue_id=I9BHLP>
kernel
1
#I9BHQL:CVE-2021-47170<https://gitee.com/open_euler/dashboard?issue_id=I9BHQL>
kernel
1
#I9BHNM:CVE-2021-47171<https://gitee.com/open_euler/dashboard?issue_id=I9BHNM>
kernel
1
#I9BHNX:CVE-2021-47173<https://gitee.com/open_euler/dashboard?issue_id=I9BHNX>
kernel
1
#I9BHQ7:CVE-2021-47180<https://gitee.com/open_euler/dashboard?issue_id=I9BHQ7>
kernel
1
#I9AK6C:CVE-2023-52620<https://gitee.com/open_euler/dashboard?issue_id=I9AK6C>
kernel
1
#I9BV4P:CVE-2023-52622<https://gitee.com/open_euler/dashboard?issue_id=I9BV4P>
kernel
1
#I9CTGE:CVE-2023-52629<https://gitee.com/open_euler/dashboard?issue_id=I9CTGE>
kernel
1
#I9AK56:CVE-2024-26642<https://gitee.com/open_euler/dashboard?issue_id=I9AK56>
kernel
1
#I9BV23:CVE-2024-26644<https://gitee.com/open_euler/dashboard?issue_id=I9BV23>
kernel
1
#I9BV24:CVE-2024-26645<https://gitee.com/open_euler/dashboard?issue_id=I9BV24>
kernel
1
#I9C6FA:CVE-2024-26651<https://gitee.com/open_euler/dashboard?issue_id=I9C6FA>
kernel
1
#I9DD86:CVE-2024-26654<https://gitee.com/open_euler/dashboard?issue_id=I9DD86>
kernel
1
#I9DNPD:CVE-2024-26668<https://gitee.com/open_euler/dashboard?issue_id=I9DNPD>
kernel
1
#I9E2O0:CVE-2024-26751<https://gitee.com/open_euler/dashboard?issue_id=I9E2O0>
kernel
1
Bugfix:
issue
仓库
#I9C04M:gssproxy服务停止时释放资源调用LIST_DEL宏参数错误可能导致进程崩溃<https://gitee.com/open_euler/dashboard?issue_id=I9C04M>
gssproxy
#I8Z2JH:openEuler 20.03 LTS SP3对盘通知式下电后,盘又被系统接管<https://gitee.com/open_euler/dashboard?issue_id=I8Z2JH>
kernel
#I9355O:keys: safe concurrent user->{session,uid}_keyring access<https://gitee.com/open_euler/dashboard?issue_id=I9355O>
kernel
#I97HJA:ext4: ext4_mb_use_inode_pa: Don't BUG_ON when 'pa->pa_free < len' in continue mode<https://gitee.com/open_euler/dashboard?issue_id=I97HJA>
kernel
#I991GQ:crypto: algif_aead - fix uninitialized ctx->init<https://gitee.com/open_euler/dashboard?issue_id=I991GQ>
kernel
#I992IL: crypto: algif_aead - Only wake up when ctx->more is zero<https://gitee.com/open_euler/dashboard?issue_id=I992IL>
kernel
#I9ARW6:【OLK-5.10】启动31台带内存带宽Qos的虚拟机,前端查看有2台虚拟机schemata值不符合预期设置的Qos值<https://gitee.com/open_euler/dashboard?issue_id=I9ARW6>
kernel
#I9AZFU:【OLK-5.10】 修复MPAM重复使能问题<https://gitee.com/open_euler/dashboard?issue_id=I9AZFU>
kernel
#I9BD67:【OLK-5.10】iostat以及/proc/diskstats显示异常大,会产生跳变,统计不准。<https://gitee.com/open_euler/dashboard?issue_id=I9BD67>
kernel
#I9BWES:mm: ksm: fix use-after-free kasan report in ksm_might_need_to_copy<https://gitee.com/open_euler/dashboard?issue_id=I9BWES>
kernel
#I9C0QZ:mlock 溢出没有返回失败<https://gitee.com/open_euler/dashboard?issue_id=I9C0QZ>
kernel
#I9D6UN:【openEuler-1.0-LTS/OLK-5.10/OLK-6.6】hns3网卡驱动在动态vlan模式下,可能出现VF无法收到带vlan报文的问题。<https://gitee.com/open_euler/dashboard?issue_id=I9D6UN>
kernel
#I9DOVK:盘被锁后芯片默认超时时间偏小引发IO异常完成<https://gitee.com/open_euler/dashboard?issue_id=I9DOVK>
kernel
openEuler-20.03-LTS SP4版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-20.03-LTS SP4 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP4/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP4/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
https://repo.openeuler.org/security/data/hotpatch_cvrf/
openEuler-20.03-LTS-SP4 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高):
里程碑
任务ID
任务标题
优先级
标签
关联仓库
任务路径
openEuler-20.03-LTS-SP4-round-1
I8DT5M
【openEuler-20.03-LTS-SP4 rc1】redis-sentinel.service启动失败
主要
sig/bigdata
src-openEuler/redis6
https://gitee.com/open_euler/dashboard?issue_id=I8DT5M
openEuler-20.03-LTS-SP4-round-1
I8EKUI
【openEuler-20.03-LTS-SP4 rc1】strongswan-swanctl.service服务启动失败
主要
sig/sig-security-fac
src-openEuler/strongswan
https://gitee.com/open_euler/dashboard?issue_id=I8EKUI
openEuler-20.03-LTS-SP4-round-2
I8GDGR
【openEuler-20.03-LTS-SP4-RC2】【arm/x86】物理机安装gnome-*启用图形化界面重启之后卡住
主要
sig/GNOME
src-openEuler/gnome-desktop3
https://gitee.com/open_euler/dashboard?issue_id=I8GDGR
openEuler-20.03-LTS-SP4-alpha
I8B7XU
【openEuler-20.03-LTS-SP4 alpha】[arm/x86]vdsmd.service服务启动失败
主要
sig/oVirt
src-openEuler/vdsm
https://gitee.com/open_euler/dashboard?issue_id=I8B7XU
openEuler-20.03-LTS-SP4-round-2
I8G371
【20.03-SP4-rc2】【arm/x86】h2源码包本地自编译失败
次要
sig/DB
src-openEuler/h2
https://gitee.com/open_euler/dashboard?issue_id=I8G371
openEuler-20.03-LTS-SP4-dailybuild
I8GUMP
[EulerMaker] nagios-plugins build problem in openEuler-20.03-LTS-SP4:everything
不重要
sig/Networking
src-openEuler/nagios-plugins
https://gitee.com/open_euler/dashboard?issue_id=I8GUMP
openEuler-20.03-LTS-SP4-dailybuild
I8I8DQ
[EulerMaker] caja-extensions install problem in openEuler-20.03-LTS-SP4:epol
不重要
sig/sig-mate-desktop
src-openEuler/caja-extensions
https://gitee.com/open_euler/dashboard?issue_id=I8I8DQ
openEuler-22.03-LTS-SP3 Update 20240410
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS-SP3修复版本已知问题20个,已知漏洞75个。目前版本分支剩余待修复缺陷1个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9EP1T?from=project-i…
CVE修复:
CVE
仓库
score
#I9C6X1:CVE-2024-3019<https://gitee.com/open_euler/dashboard?issue_id=I9C6X1>
pcp
8.8
#I92HWD:CVE-2024-24474<https://gitee.com/open_euler/dashboard?issue_id=I92HWD>
qemu
8.2
#I9ATGS:CVE-2022-2469<https://gitee.com/open_euler/dashboard?issue_id=I9ATGS>
libgsasl
8.1
#I4BI7U:CVE-2019-25051<https://gitee.com/open_euler/dashboard?issue_id=I4BI7U>
aspell
7.8
#I9AURJ:CVE-2022-2639<https://gitee.com/open_euler/dashboard?issue_id=I9AURJ>
openvswitch
7.8
#I9E4NC:CVE-2024-31083<https://gitee.com/open_euler/dashboard?issue_id=I9E4NC>
xorg-x11-server
7.8
#I932VH:CVE-2024-26589<https://gitee.com/open_euler/dashboard?issue_id=I932VH>
kernel
7.8
#I89S5X:CVE-2023-45675<https://gitee.com/open_euler/dashboard?issue_id=I89S5X>
stb
7.8
#I9AWCO:CVE-2022-39028<https://gitee.com/open_euler/dashboard?issue_id=I9AWCO>
telnet
7.5
#I8X4FZ:CVE-2023-39325<https://gitee.com/open_euler/dashboard?issue_id=I8X4FZ>
cri-o
7.5
#I977K3:CVE-2024-28757<https://gitee.com/open_euler/dashboard?issue_id=I977K3>
expat
7.5
#I9B1O1:CVE-2024-24784<https://gitee.com/open_euler/dashboard?issue_id=I9B1O1>
golang
7.5
#I9B1Y1:CVE-2024-30156<https://gitee.com/open_euler/dashboard?issue_id=I9B1Y1>
varnish
7.5
#I8X4FY:CVE-2023-39325<https://gitee.com/open_euler/dashboard?issue_id=I8X4FY>
ignition
7.5
#I9E2PZ:CVE-2024-27316<https://gitee.com/open_euler/dashboard?issue_id=I9E2PZ>
mod_http2
7.5
#I8X4G2:CVE-2023-39325<https://gitee.com/open_euler/dashboard?issue_id=I8X4G2>
cri-tools
7.5
#I9B1P4:CVE-2024-24786<https://gitee.com/open_euler/dashboard?issue_id=I9B1P4>
cri-tools
7.5
#I9E4AM:CVE-2024-31082<https://gitee.com/open_euler/dashboard?issue_id=I9E4AM>
xorg-x11-server
7.3
#I9E4N0:CVE-2024-31081<https://gitee.com/open_euler/dashboard?issue_id=I9E4N0>
xorg-x11-server
7.3
#I9E4N4:CVE-2024-31080<https://gitee.com/open_euler/dashboard?issue_id=I9E4N4>
xorg-x11-server
7.3
#I96GQ3:CVE-2023-52601<https://gitee.com/open_euler/dashboard?issue_id=I96GQ3>
kernel
7.1
#I9DGZJ:CVE-2024-28219<https://gitee.com/open_euler/dashboard?issue_id=I9DGZJ>
python-pillow
6.7
#I94K6R:CVE-2023-23601<https://gitee.com/open_euler/dashboard?issue_id=I94K6R>
mozjs78
6.5
#I94K6T:CVE-2023-23599<https://gitee.com/open_euler/dashboard?issue_id=I94K6T>
mozjs78
6.5
#I9C342:CVE-2024-2398<https://gitee.com/open_euler/dashboard?issue_id=I9C342>
curl
6.5
#I9AVQ9:CVE-2023-28100<https://gitee.com/open_euler/dashboard?issue_id=I9AVQ9>
flatpak
6.5
#I93ED1:CVE-2023-52454<https://gitee.com/open_euler/dashboard?issue_id=I93ED1>
kernel
6.5
#I9AMRI:CVE-2022-32325<https://gitee.com/open_euler/dashboard?issue_id=I9AMRI>
jpegoptim
6.5
#I9AH6G:CVE-2024-2494<https://gitee.com/open_euler/dashboard?issue_id=I9AH6G>
libvirt
6.2
#I99JV2:CVE-2024-26641<https://gitee.com/open_euler/dashboard?issue_id=I99JV2>
kernel
6.1
#I95RDW:CVE-2021-47101<https://gitee.com/open_euler/dashboard?issue_id=I95RDW>
kernel
6
#I9AYAU:CVE-2023-48795<https://gitee.com/open_euler/dashboard?issue_id=I9AYAU>
cri-o
5.9
#I9138X:CVE-2023-52426<https://gitee.com/open_euler/dashboard?issue_id=I9138X>
expat
5.5
#I932W7:CVE-2023-52443<https://gitee.com/open_euler/dashboard?issue_id=I932W7>
kernel
5.5
#I93HCX:CVE-2024-2660<https://gitee.com/open_euler/dashboard?issue_id=I93HCX>
kernel
5.5
#I94OZS:CVE-2023-52484<https://gitee.com/open_euler/dashboard?issue_id=I94OZS>
kernel
5.5
#I94P2I:CVE-2023-52479<https://gitee.com/open_euler/dashboard?issue_id=I94P2I>
kernel
5.5
#I99K08:CVE-2024-26633<https://gitee.com/open_euler/dashboard?issue_id=I99K08>
kernel
5.5
#I97N53:CVE-2024-1441<https://gitee.com/open_euler/dashboard?issue_id=I97N53>
libvirt
5.5
#I93X74:CVE-2024-26144<https://gitee.com/open_euler/dashboard?issue_id=I93X74>
rubygem-activestorage
5.3
#I9DFPV:CVE-2023-7250<https://gitee.com/open_euler/dashboard?issue_id=I9DFPV>
iperf3
5.3
#I9E2PU:CVE-2024-28182<https://gitee.com/open_euler/dashboard?issue_id=I9E2PU>
nghttp2
5.3
#I9AH1K:CVE-2024-28834<https://gitee.com/open_euler/dashboard?issue_id=I9AH1K>
gnutls
5.3
#I9E8PU:CVE-2024-21506<https://gitee.com/open_euler/dashboard?issue_id=I9E8PU>
python-pymongo
5.2
#I9BJ5S:CVE-2024-30204<https://gitee.com/open_euler/dashboard?issue_id=I9BJ5S>
emacs
5
#I9BJ5X:CVE-2024-30205<https://gitee.com/open_euler/dashboard?issue_id=I9BJ5X>
emacs
5
#I92REM:CVE-2024-26585<https://gitee.com/open_euler/dashboard?issue_id=I92REM>
kernel
4.7
#I93ELY:CVE-2024-26593<https://gitee.com/open_euler/dashboard?issue_id=I93ELY>
kernel
4.7
#I94P3R:CVE-2023-52476<https://gitee.com/open_euler/dashboard?issue_id=I94P3R>
kernel
4.7
#I9AJ87:CVE-2024-27281<https://gitee.com/open_euler/dashboard?issue_id=I9AJ87>
ruby
4.5
#I93L72:CVE-2023-52469<https://gitee.com/open_euler/dashboard?issue_id=I93L72>
kernel
4.4
#I93L7E:CVE-2023-52467<https://gitee.com/open_euler/dashboard?issue_id=I93L7E>
kernel
4.4
#I93X0G:CVE-2024-26606<https://gitee.com/open_euler/dashboard?issue_id=I93X0G>
kernel
4.4
#I94K5J:CVE-2021-47037<https://gitee.com/open_euler/dashboard?issue_id=I94K5J>
kernel
4.4
#I93ED4:CVE-2023-52462<https://gitee.com/open_euler/dashboard?issue_id=I93ED4>
kernel
4.4
#I99JXH:CVE-2023-52617<https://gitee.com/open_euler/dashboard?issue_id=I99JXH>
kernel
4.4
#I9AVQ7:CVE-2023-28101<https://gitee.com/open_euler/dashboard?issue_id=I9AVQ7>
flatpak
4.3
#I93EDC:CVE-2023-52457<https://gitee.com/open_euler/dashboard?issue_id=I93EDC>
kernel
4.2
#I93EEE:CVE-2023-52456<https://gitee.com/open_euler/dashboard?issue_id=I93EEE>
kernel
4
#I97NHT:CVE-2024-26608<https://gitee.com/open_euler/dashboard?issue_id=I97NHT>
kernel
4
#I98BNA:CVE-2023-52608<https://gitee.com/open_euler/dashboard?issue_id=I98BNA>
kernel
4
#I93EDF:CVE-2024-26597<https://gitee.com/open_euler/dashboard?issue_id=I93EDF>
kernel
3.3
#I9AJ8A:CVE-2024-27280<https://gitee.com/open_euler/dashboard?issue_id=I9AJ8A>
ruby
3.1
#I9A7Y2:CVE-2023-50967<https://gitee.com/open_euler/dashboard?issue_id=I9A7Y2>
jose
2.5
#I947TK:CVE-2021-46926<https://gitee.com/open_euler/dashboard?issue_id=I947TK>
kernel
2.3
#I9BV23:CVE-2024-26644<https://gitee.com/open_euler/dashboard?issue_id=I9BV23>
kernel
1
#I9C6FA:CVE-2024-26651<https://gitee.com/open_euler/dashboard?issue_id=I9C6FA>
kernel
1
#I9DD86:CVE-2024-26654<https://gitee.com/open_euler/dashboard?issue_id=I9DD86>
kernel
1
#I9DNMI:CVE-2024-26680<https://gitee.com/open_euler/dashboard?issue_id=I9DNMI>
kernel
1
#I9DNPD:CVE-2024-26668<https://gitee.com/open_euler/dashboard?issue_id=I9DNPD>
kernel
1
#I9DNRC:CVE-2024-26679<https://gitee.com/open_euler/dashboard?issue_id=I9DNRC>
kernel
1
#I9DNRR:CVE-2023-52633<https://gitee.com/open_euler/dashboard?issue_id=I9DNRR>
kernel
1
#I9E2EQ:CVE-2024-26696<https://gitee.com/open_euler/dashboard?issue_id=I9E2EQ>
kernel
1
#I9E2MG:CVE-2024-26777<https://gitee.com/open_euler/dashboard?issue_id=I9E2MG>
kernel
1
#I9E46I:CVE-2024-26788<https://gitee.com/open_euler/dashboard?issue_id=I9E46I>
kernel
1
Bugfix:
issue
仓库
#I9C04M:gssproxy服务停止时释放资源调用LIST_DEL宏参数错误可能导致进程崩溃<https://gitee.com/open_euler/dashboard?issue_id=I9C04M>
gssproxy
#I9EQWC:gcc for openEuler 支持SME ACLE intrinsic 指令及操作系统提供的ABI<https://gitee.com/open_euler/dashboard?issue_id=I9EQWC>
gcc-12
#I9EQYZ:binutils 支持aarch64 SME指令<https://gitee.com/open_euler/dashboard?issue_id=I9EQYZ>
binutils
#I9ESZG:添加hip11 CPU流水线调度<https://gitee.com/open_euler/dashboard?issue_id=I9ESZG>
gcc
#I9EWHR:tbl访问未初始化的内存<https://gitee.com/open_euler/dashboard?issue_id=I9EWHR>
groff
#I9F66J:poissonsearch-oss从epol挪到everything<https://gitee.com/open_euler/dashboard?issue_id=I9F66J>
poissonsearch-oss
#I9F69C:poissonsearch-py从epol挪到everything<https://gitee.com/open_euler/dashboard?issue_id=I9F69C>
poissonsearch-py
#I9DE8T:[22.03 SP3][codedb]-march=armv8.5-a+sme选项导致POM_POM2K编译ICE: in compute_live_loop_exits, at tree-ssa-loop-manip.cc:247<https://gitee.com/open_euler/dashboard?issue_id=I9DE8T>
gcc-12
#I9D2TO:CPU核数超过248时,PWR_CPU_GetFreq接口会导致服务端coredump<https://gitee.com/open_euler/dashboard?issue_id=I9D2TO>
powerapi
#I9DR1P:powerapi中使用ipmitool,但是不在requires中<https://gitee.com/open_euler/dashboard?issue_id=I9DR1P>
powerapi
#I90ZB5:在centos7 4.18与openeuler 5.10.0-136.14.2.90.oe2203sp1.x86_64测试nvme fio write时候,使用ext4文件系统存在性能差异<https://gitee.com/open_euler/dashboard?issue_id=I90ZB5>
kernel
#I97HJA:ext4: ext4_mb_use_inode_pa: Don't BUG_ON when 'pa->pa_free < len' in continue mode<https://gitee.com/open_euler/dashboard?issue_id=I97HJA>
kernel
#I98AT9:【OLK-5.10】打开vhost-vdpa设备异常时,没有判断返回值,直接推出,导致vhost_vdpa设备不能再次使用,也不能卸载驱动<https://gitee.com/open_euler/dashboard?issue_id=I98AT9>
kernel
#I9ARW6:【OLK-5.10】启动31台带内存带宽Qos的虚拟机,前端查看有2台虚拟机schemata值不符合预期设置的Qos值<https://gitee.com/open_euler/dashboard?issue_id=I9ARW6>
kernel
#I9BBFQ:【OLK-5.10】【SAS】跑FIO,概率触发watchdog的soft lockup,性能下降<https://gitee.com/open_euler/dashboard?issue_id=I9BBFQ>
kernel
#I9COT9:cpuinfo_cur_freq 在高访存压力下,出现获取频率值误差过大,导致结果错误<https://gitee.com/open_euler/dashboard?issue_id=I9COT9>
kernel
#I9D6UN:【openEuler-1.0-LTS/OLK-5.10/OLK-6.6】hns3网卡驱动在动态vlan模式下,可能出现VF无法收到带vlan报文的问题。<https://gitee.com/open_euler/dashboard?issue_id=I9D6UN>
kernel
#I9DFT4:Backport 5.10.201 LTS patches from upstream<https://gitee.com/open_euler/dashboard?issue_id=I9DFT4>
kernel
#I9EEIG:smmu_v3 ecmdq代码逻辑存在问题<https://gitee.com/open_euler/dashboard?issue_id=I9EEIG>
kernel
#I9EMR9:[OLK 5.10] NIC 补丁回合<https://gitee.com/open_euler/dashboard?issue_id=I9EMR9>
kernel
openEuler-22.03-LTS-SP3版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-22.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP3/EPOL/update/main/
openEuler CVE及安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-22.03-LTS-SP3 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高):
里程碑
任务ID
任务标题
优先级
标签
关联仓库
任务路径
openEuler-22.03-LTS-SP3
I96ID7
[22.03-LTS-SP3]-O3 -flto -flto-partition=one -fipa-prefetch选项编译hmmer报Segmentation fault:during GIMPLE pass: vrp
主要
sig/Compiler
src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I96ID7
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE(4.12日数据):
漏洞编号
Issue ID
剩余天数
CVSS评分
软件包
责任SIG
issue码云链接
CVE-2024-24576
I9FBQX
5.23
10.0
rust
sig-Rust
https://gitee.com/src-openeuler/rust/issues/I9FBQX
CVE-2023-41419
I84A04
5.55
9.8
python-gevent
Programming-language
https://gitee.com/src-openeuler/python-gevent/issues/I84A04
CVE-2023-51698
I9F7X1
11.23
8.8
evince
GNOME
https://gitee.com/src-openeuler/evince/issues/I9F7X1
CVE-2024-3446
I9FBRQ
12.23
8.2
qemu
Virt
https://gitee.com/src-openeuler/qemu/issues/I9FBRQ
CVE-2024-31083
I9E4N6
7.23
7.8
xorg-x11-server-xwayland
Desktop
https://gitee.com/src-openeuler/xorg-x11-server-xwayland/issues/I9E4N6
CVE-2021-47131
I990AF
9.57
7.8
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I990AF
CVE-2024-26256
I9FBQR
12.23
7.8
libarchive
Base-service
https://gitee.com/src-openeuler/libarchive/issues/I9FBQR
CVE-2023-50868
I9B0OI
0.65
7.5
dhcp
Networking
https://gitee.com/src-openeuler/dhcp/issues/I9B0OI
CVE-2024-31309
I9E2OB
9.48
7.5
trafficserver
Networking
https://gitee.com/src-openeuler/trafficserver/issues/I9E2OB
CVE-2023-45288
I9E2PR
10.82
7.5
golang
sig-golang
https://gitee.com/src-openeuler/golang/issues/I9E2PR
CVE-2022-34169
I9F7Q2
11.23
7.5
icedtea-web
Compiler
https://gitee.com/src-openeuler/icedtea-web/issues/I9F7Q2
CVE-2023-50387
I9F7ML
11.23
7.5
systemd
Base-service
https://gitee.com/src-openeuler/systemd/issues/I9F7ML
CVE-2024-20932
I9F7I0
11.23
7.5
openjdk-17
Compiler
https://gitee.com/src-openeuler/openjdk-17/issues/I9F7I0
CVE-2024-24786
I9B1P2
11.82
7.5
cri-o
sig-CloudNative
https://gitee.com/src-openeuler/cri-o/issues/I9B1P2
CVE-2024-20918
I9F7K6
11.23
7.4
openjdk-17
Compiler
https://gitee.com/src-openeuler/openjdk-17/issues/I9F7K6
CVE-2024-20952
I9F7GS
11.23
7.4
openjdk-17
Compiler
https://gitee.com/src-openeuler/openjdk-17/issues/I9F7GS
CVE-2024-31080
I9E4NE
6.23
7.3
xorg-x11-server-xwayland
Desktop
https://gitee.com/src-openeuler/xorg-x11-server-xwayland/issues/I9E4NE
CVE-2024-31081
I9E4N7
6.23
7.3
xorg-x11-server-xwayland
Desktop
https://gitee.com/src-openeuler/xorg-x11-server-xwayland/issues/I9E4N7
CVE-2021-47084
I95REJ
12.57
6.7
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95REJ
CVE-2023-52524
I95B1R
12.57
6.7
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B1R
CVE-2021-46959
I94VP1
12.57
6.7
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VP1
CVE-2021-47063
I94VOL
12.57
6.7
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOL
CVE-2022-2447
I9AQ5D
9.23
6.6
openstack-keystone
sig-openstack
https://gitee.com/src-openeuler/openstack-keystone/issues/I9AQ5D
CVE-2023-28100
I9AVQ9
9.23
6.5
flatpak
Programming-language
https://gitee.com/src-openeuler/flatpak/issues/I9AVQ9
CVE-2022-2553
I9AO7E
9.23
6.5
booth
sig-Ha
https://gitee.com/src-openeuler/booth/issues/I9AO7E
CVE-2023-28746
I9AJ86
9.23
6.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9AJ86
CVE-2023-39368
I9B1R3
11.23
6.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9B1R3
CVE-2022-47950
I9B1HJ
11.23
6.5
python-swiftclient
sig-openstack
https://gitee.com/src-openeuler/python-swiftclient/issues/I9B1HJ
CVE-2019-25162
I93XA4
5.82
6.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I93XA4
CVE-2021-47083
I95RE4
12.57
6.1
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RE4
CVE-2023-52587
I96G8W
12.57
6.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I96G8W
CVE-2023-52598
I96G7Q
12.57
6.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I96G7Q
CVE-2021-46984
I96DIN
12.57
6.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I96DIN
CVE-2021-47105
I95RGH
12.57
6.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RGH
CVE-2021-47098
I95RFQ
12.57
6.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RFQ
CVE-2021-47095
I95REK
12.57
6.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95REK
CVE-2021-47099
I95RE7
12.57
6.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RE7
CVE-2021-47097
I95RDY
12.57
6.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RDY
CVE-2021-47101
I95RDW
12.57
6.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RDW
CVE-2023-52529
I95AVL
12.57
6.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AVL
CVE-2023-52519
I95ASU
12.57
6.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ASU
CVE-2023-52510
I95ASM
12.57
6.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ASM
CVE-2024-29018
I9A82U
8.23
5.9
docker
sig-CloudNative
https://gitee.com/src-openeuler/docker/issues/I9A82U
CVE-2023-52323
I9AZF2
10.23
5.9
fence-agents
sig-Ha
https://gitee.com/src-openeuler/fence-agents/issues/I9AZF2
CVE-2023-48795
I9AYAU
10.23
5.9
cri-o
sig-CloudNative
https://gitee.com/src-openeuler/cri-o/issues/I9AYAU
CVE-2023-48795
I9AYAQ
10.23
5.9
libssh2
Networking
https://gitee.com/src-openeuler/libssh2/issues/I9AYAQ
CVE-2024-29018
I9AWX6
10.23
5.9
skopeo
sig-CloudNative
https://gitee.com/src-openeuler/skopeo/issues/I9AWX6
CVE-2024-29018
I9AWWE
10.23
5.9
podman
sig-CloudNative
https://gitee.com/src-openeuler/podman/issues/I9AWWE
CVE-2024-29018
I9AWLZ
10.23
5.9
cri-tools
sig-CloudNative
https://gitee.com/src-openeuler/cri-tools/issues/I9AWLZ
CVE-2022-47951
I9AVCJ
9.23
5.7
openstack-glance
sig-openstack
https://gitee.com/src-openeuler/openstack-glance/issues/I9AVCJ
CVE-2022-47951
I9AVCG
9.23
5.7
openstack-nova
sig-openstack
https://gitee.com/src-openeuler/openstack-nova/issues/I9AVCG
CVE-2023-52507
I95B1K
12.57
5.7
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B1K
CVE-2021-47055
I94VON
12.57
5.7
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VON
CVE-2023-52575
I95AT9
12.57
5.6
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AT9
CVE-2021-46991
I94K17
5.82
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94K17
CVE-2021-46945
I949C7
5.82
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I949C7
CVE-2021-46963
I949BI
5.82
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I949BI
CVE-2021-46917
I944GE
5.82
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I944GE
CVE-2023-52464
I93EBW
5.82
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I93EBW
CVE-2022-2806
I9AR03
9.23
5.5
sos
Base-service
https://gitee.com/src-openeuler/sos/issues/I9AR03
CVE-2022-1962
I9AN6B
9.23
5.5
skopeo
sig-CloudNative
https://gitee.com/src-openeuler/skopeo/issues/I9AN6B
CVE-2022-1962
I9AN5R
9.23
5.5
podman
sig-CloudNative
https://gitee.com/src-openeuler/podman/issues/I9AN5R
CVE-2022-1962
I9B0A3
10.23
5.5
libslirp
CloudNative
https://gitee.com/src-openeuler/libslirp/issues/I9B0A3
CVE-2022-1962
I9B08Y
10.23
5.5
fuse-overlayfs
CloudNative
https://gitee.com/src-openeuler/fuse-overlayfs/issues/I9B08Y
CVE-2022-1962
I9B08S
10.23
5.5
slirp4netns
CloudNative
https://gitee.com/src-openeuler/slirp4netns/issues/I9B08S
CVE-2022-1962
I9B08R
10.23
5.5
containers-common
sig-CloudNative
https://gitee.com/src-openeuler/containers-common/issues/I9B08R
CVE-2022-1962
I9AXMR
10.23
5.5
crun
sig-CloudNative
https://gitee.com/src-openeuler/crun/issues/I9AXMR
CVE-2022-1962
I9AXMJ
10.23
5.5
container-selinux
sig-CloudNative
https://gitee.com/src-openeuler/container-selinux/issues/I9AXMJ
CVE-2023-38575
I9B1R5
11.23
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9B1R5
CVE-2022-1962
I9B1QW
11.23
5.5
etcd
sig-CloudNative
https://gitee.com/src-openeuler/etcd/issues/I9B1QW
CVE-2023-52607
I96GP1
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I96GP1
CVE-2023-52583
I96G92
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I96G92
CVE-2022-48629
I963KI
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I963KI
CVE-2021-47104
I95RGF
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RGF
CVE-2021-47106
I95RG2
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RG2
CVE-2021-47103
I95REP
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95REP
CVE-2021-47090
I95REF
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95REF
CVE-2021-47092
I95REC
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95REC
CVE-2021-47096
I95RE2
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RE2
CVE-2023-52503
I95B3Q
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B3Q
CVE-2023-52520
I95B2M
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B2M
CVE-2023-52501
I95B10
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B10
CVE-2024-26621
I95B0Y
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B0Y
CVE-2023-52532
I95AXS
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AXS
CVE-2023-52516
I95AXL
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AXL
CVE-2023-52521
I95AWP
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AWP
CVE-2023-52522
I95AWK
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AWK
CVE-2023-52574
I95ATZ
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATZ
CVE-2023-52578
I95ATV
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATV
CVE-2023-52581
I95ATS
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATS
CVE-2023-52562
I95ATR
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATR
CVE-2023-52564
I95ATP
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATP
CVE-2023-52559
I95ATH
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATH
CVE-2023-52580
I95ATC
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATC
CVE-2023-52576
I95AT8
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AT8
CVE-2023-52566
I95AT5
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AT5
CVE-2023-52569
I95AT1
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AT1
CVE-2023-52504
I95AT0
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AT0
CVE-2023-52523
I95ASW
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ASW
CVE-2023-52530
I95ASP
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ASP
CVE-2021-47077
I956GS
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I956GS
CVE-2021-47056
I94VOZ
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOZ
CVE-2023-22081
I88VNW
8.14
5.3
openjdk-latest
Compiler
https://gitee.com/src-openeuler/openjdk-latest/issues/I88VNW
CVE-2022-4122
I9ATC3
9.23
5.3
podman
sig-CloudNative
https://gitee.com/src-openeuler/podman/issues/I9ATC3
CVE-2023-43490
I9AJ89
9.23
5.3
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9AJ89
CVE-2023-39326
I9AY6T
10.23
5.3
promu
sig-CloudNative
https://gitee.com/src-openeuler/promu/issues/I9AY6T
CVE-2023-3817
I9AWVX
10.23
5.3
edk2
Virt
https://gitee.com/src-openeuler/edk2/issues/I9AWVX
CVE-2023-39326
I9B1Q3
11.23
5.3
toolbox
CloudNative
https://gitee.com/src-openeuler/toolbox/issues/I9B1Q3
CVE-2021-47078
I956GP
12.57
5.3
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I956GP
CVE-2024-20978
I9B0DW
10.23
4.9
mariadb
DB
https://gitee.com/src-openeuler/mariadb/issues/I9B0DW
CVE-2024-20976
I9B0CE
10.23
4.9
mariadb
DB
https://gitee.com/src-openeuler/mariadb/issues/I9B0CE
CVE-2022-0207
I9AL0Y
9.23
4.7
vdsm
oVirt
https://gitee.com/src-openeuler/vdsm/issues/I9AL0Y
CVE-2023-52597
I96GPO
12.57
4.7
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I96GPO
CVE-2021-47069
I956FU
12.57
4.7
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I956FU
CVE-2021-46972
I949C0
5.82
4.6
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I949C0
CVE-2023-52477
I94P5J
5.82
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94P5J
CVE-2022-48626
I93LMF
5.82
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I93LMF
CVE-2022-21595
I9AT7H
9.23
4.4
mariadb
DB
https://gitee.com/src-openeuler/mariadb/issues/I9AT7H
CVE-2023-52595
I96GO9
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I96GO9
CVE-2023-52589
I96GNU
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I96GNU
CVE-2023-52605
I96G8V
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I96G8V
CVE-2023-52585
I96G80
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I96G80
CVE-2023-52594
I96G7W
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I96G7W
CVE-2021-47082
I95REN
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95REN
CVE-2021-47100
I95RE3
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RE3
CVE-2023-52513
I95AWN
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AWN
CVE-2022-48627
I95ATI
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATI
CVE-2022-48628
I95ASY
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ASY
CVE-2023-52508
I95ASN
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ASN
CVE-2021-47079
I956GR
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I956GR
CVE-2021-47071
I956GH
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I956GH
CVE-2021-47081
I956GE
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I956GE
CVE-2021-47074
I956G7
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I956G7
CVE-2021-47070
I956G4
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I956G4
CVE-2021-47075
I956G0
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I956G0
CVE-2021-47080
I956FR
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I956FR
CVE-2021-47062
I94VOY
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOY
CVE-2021-47065
I94VOU
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOU
CVE-2023-28101
I9AVQ7
9.23
4.3
flatpak
Programming-language
https://gitee.com/src-openeuler/flatpak/issues/I9AVQ7
CVE-2023-52567
I95ATO
12.57
4.1
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATO
CVE-2023-52573
I95ATK
12.57
4.1
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATK
CVE-2023-52568
I95ATJ
12.57
4.1
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATJ
CVE-2023-52570
I95AT2
12.57
4.1
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AT2
CVE-2021-46905
I93LMJ
5.82
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I93LMJ
CVE-2021-46994
I94JCA
12.82
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94JCA
CVE-2023-52592
I96GPQ
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I96GPQ
CVE-2023-52590
I96GNO
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I96GNO
CVE-2024-26623
I96G9F
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I96G9F
CVE-2023-52596
I96G7I
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I96G7I
CVE-2021-47108
I95RG5
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RG5
CVE-2021-47085
I95RET
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RET
CVE-2021-47093
I95REL
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95REL
CVE-2021-47087
I95REA
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95REA
CVE-2023-52500
I95B2S
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B2S
CVE-2023-52512
I95B2K
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B2K
CVE-2023-52515
I95B1O
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B1O
CVE-2023-52511
I95B18
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B18
CVE-2023-52526
I95AXJ
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AXJ
CVE-2023-52525
I95AXH
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AXH
CVE-2023-52531
I95AWI
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AWI
CVE-2023-52572
I95AUA
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AUA
CVE-2023-52563
I95ATY
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATY
CVE-2023-52579
I95ATT
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATT
CVE-2023-52506
I95ATE
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATE
CVE-2023-52582
I95ATA
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATA
CVE-2023-52577
I95AT6
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AT6
CVE-2023-52505
I95AST
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AST
CVE-2023-52499
I95ASQ
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ASQ
CVE-2021-47072
I956GA
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I956GA
CVE-2021-47016
I94VOW
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOW
CVE-2021-47060
I94VOT
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOT
CVE-2021-47057
I94VOS
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOS
CVE-2021-47067
I94VOA
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOA
CVE-2021-47061
I94VO4
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VO4
CVE-2023-52485
I94VEN
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VEN
CVE-2023-52483
I94P64
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94P64
CVE-2021-47021
I94K5X
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94K5X
CVE-2021-47039
I94K5U
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94K5U
CVE-2021-47048
I94K5S
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94K5S
CVE-2020-36783
I94JR1
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94JR1
CVE-2021-47047
I94JOG
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94JOG
CVE-2021-46986
I94JH6
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94JH6
CVE-2020-36779
I94JCR
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94JCR
CVE-2023-22025
I88JFX
8.14
3.7
openjdk-latest
Compiler
https://gitee.com/src-openeuler/openjdk-latest/issues/I88JFX
CVE-2024-23944
I98QK9
2.23
3.5
zookeeper
sig-bigdata
https://gitee.com/src-openeuler/zookeeper/issues/I98QK9
CVE-2023-52571
I95ATW
12.57
3.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATW
CVE-2021-47046
I94K52
12.57
3.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94K52
CVE-2021-47058
I94VOQ
12.57
3.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOQ
CVE-2021-47066
I94VOC
12.57
3.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOC
CVE-2022-4123
I9ATB7
9.23
3.3
podman
sig-CloudNative
https://gitee.com/src-openeuler/podman/issues/I9ATB7
CVE-2023-52565
I95AU4
12.57
3.3
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AU4
CVE-2023-52560
I95ATG
12.57
3.3
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATG
CVE-2023-52561
I95ATF
12.57
3.3
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATF
CVE-2021-46926
I947TK
5.82
2.3
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I947TK
CVE-2021-46918
I9453G
5.82
2.3
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9453G
CVE-2021-47054
I94VOR
12.57
2.3
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOR
CVE-2021-47059
I94VOI
12.57
2.3
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOI
CVE-2021-47064
I94VO6
12.57
2.3
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VO6
社区关键组件待修复缺陷:
openEuler社区存在无版本里程碑的缺陷,请各个SIG 关注涉及质量等级为L1-L2软件包的缺陷修复情况。
社区提单可参考社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/master/%E7%A4%BE%E5%8C%BA%E7%89%88%E6%9…
关键组件待修复缺陷清单(无版本里程碑):
序号
任务ID
任务标题
任务类型
创建时间
优先级
关联仓库
sig组
任务路径
1
I4V9K0
gcc 10.3.0 __libc_vfork符号丢失(i686架构)
任务
2022/2/25 14:24
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I4V9K0
2
I4YT2R
iscsi登录操作并发sysfs读操作概率导致空指针访问
任务
2022/3/21 15:36
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I4YT2R
3
I58CJR
删除iptable_filter.ko时出现空指针问题
任务
2022/5/19 20:36
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I58CJR
4
I5C33B
OLK-5.10 page owner功能增强
任务
2022/6/13 20:30
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5C33B
5
I5D9J8
Upgrade to latest release [kernel: 5.10.0 -> 5.17]
任务
2022/6/21 10:01
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5D9J8
6
I5G321
【openEuler-1.0-LTS】nbd 加载/卸载模组 和 alloc config并发导致 panic
任务
2022/7/8 9:05
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5G321
7
I5H311
修复CVE-2022-2380
任务
2022/7/14 15:27
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5H311
8
I5I2M8
x86: Improve testing false positive for tst-cpu-features-cpuinfo with bad hardware.
任务
2022/7/21 9:47
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5I2M8
9
I5OOLB
反复触发i40e网卡sriov增删vf后,iavf_remove触发BUG_ON at drivers/pci/msi.c:397
任务
2022/8/29 20:23
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5OOLB
10
I5PBRB
注入内存申请故障,i40iw_initialize_dev失败时出现oops复位
任务
2022/9/2 9:56
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5PBRB
11
I5RH8C
内存可靠性分级需求
任务
2022/9/16 16:16
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5RH8C
12
I5V92B
openEuler是否有开启CONFIG_AUXILIARY_BUS配置的计划
任务
2022/10/12 11:37
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5V92B
13
I5VCIJ
openEuler如何适配新硬件,请提供适配流程指导
任务
2022/10/12 17:14
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5VCIJ
14
I5WCP1
回合bpftool prog attach/detach命令
任务
2022/10/18 16:10
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5WCP1
15
I67IFE
建议sssd拆分出对应功能的子包
任务
2022/12/26 16:49
无优先级
src-openEuler/sssd
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I67IFE
16
I6FZWY
主线回合scsi: iscsi_tcp: Fix UAF during logout and login
任务
2023/2/18 11:10
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6FZWY
17
I6HXB9
kernel.spec中是否会新增打包intel-sst工具
任务
2023/2/27 10:06
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6HXB9
18
I6MJB4
openssl 3.0 支持TLCP特性
任务
2023/3/13 11:35
无优先级
src-openEuler/openssl
sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I6MJB4
19
I6N49D
【openeuler-22.03-LTS-SP】
任务
2023/3/14 20:12
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6N49D
20
I6PA84
神威架构,虚拟化启动失败
任务
2023/3/22 17:20
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I6PA84
21
I6TQ8W
curl命令向hadoop3.2.1 webhdfs put文件失败
任务
2023/4/7 18:02
严重
src-openEuler/curl
Networking
https://gitee.com/open_euler/dashboard?issue_id=I6TQ8W
22
I6UDV8
Bug in openEuler/gcc (10.3.0) support for ARM SVE openmp
任务
2023/4/10 16:14
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I6UDV8
23
I6VWNS
主线补丁:udp: skip L4 aggregation for UDP tunnel packets分析
任务
2023/4/15 10:37
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6VWNS
24
I70VML
指针压缩选项的错误提示内容有误。
缺陷
2023/5/6 16:45
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I70VML
25
I71KX8
python3.spec文件中,无效的ifarch语句
任务
2023/5/9 15:00
无优先级
src-openEuler/python3
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I71KX8
26
I7A5FW
Fixed CPU topology issues and add lbt support for kvm.
任务
2023/6/1 17:18
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I7A5FW
27
I7B6KR
kerberos安装缺少krb5-auth-dialog 和 krb5-workstation
任务
2023/6/6 9:51
无优先级
src-openEuler/krb5
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I7B6KR
28
I7CKVY
peneuler 20.03 LTS arrch64 上安装 libreoffice 7.4.7.2 报错
缺陷
2023/6/11 22:45
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I7CKVY
29
I7CWOS
Bug in openEuler/gcc (10.3.1) support for ARM SVE under O0 compiler level
任务
2023/6/12 20:51
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I7CWOS
30
I7EZAZ
无法在sw_64下编译nodejs
任务
2023/6/20 16:50
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I7EZAZ
31
I7L968
Upgrade to latest release [qemu: 6.2.0 2021/12/14 -> 8.0.3 2023/07/09]
任务
2023/7/14 17:09
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I7L968
32
I7LSWG
Upgrade to latest release [gtk2: 2.24.33 2020/12/20 -> 4.11.4 2023/07/03]
任务
2023/7/17 20:50
无优先级
src-openEuler/gtk2
Desktop
https://gitee.com/open_euler/dashboard?issue_id=I7LSWG
33
I8790J
need EPYC-Genoa model support
任务
2023/10/11 16:53
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I8790J
34
I8A77R
Upgrade to latest release [alsa-lib: 1.2.9 2023/05/04 -> 1.2.10 2023/09/01]
任务
2023/10/23 16:22
无优先级
src-openEuler/alsa-lib
Computing
https://gitee.com/open_euler/dashboard?issue_id=I8A77R
35
I8KAVR
dnf reinstall kernel 导致grub.conf 本内核项被删除
任务
2023/11/29 10:30
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8KAVR
36
I8ON5A
Upgrade to latest release [cronie: 1.6.1 2022/04/25 -> 1.7.0 2023/10/13]
任务
2023/12/15 11:04
无优先级
src-openEuler/cronie
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I8ON5A
37
I8ON6X
Upgrade to latest release [dbus: 1.14.8 2023/06/06 -> 1.15.8 2023/08/21]
任务
2023/12/15 11:06
无优先级
src-openEuler/dbus
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I8ON6X
38
I8OOF1
Upgrade to latest release [krb5: 1.21.1 2023/07/10 -> 1.21.2 2023/08/14]
任务
2023/12/15 12:29
无优先级
src-openEuler/krb5
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I8OOF1
39
I8OOF5
Upgrade to latest release [libarchive: 3.7.1 2023/07/29 -> 3.7.2 2023/09/11]
任务
2023/12/15 12:31
无优先级
src-openEuler/libarchive
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I8OOF5
40
I8PL8Q
Upgrade to latest release [gcc: 12.3.1 -/-/- -> 14 2023/04/17]
任务
2023/12/19 11:22
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I8PL8Q
41
I8SZWW
qemu 4.1 虚拟机热迁移到qemu 6.2失败
任务
2024/1/2 17:01
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I8SZWW
42
I8UCFC
鲲鹏920服务器多次重启后系统盘盘符跳变
任务
2024/1/8 11:18
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8UCFC
43
I8VIRN
Upgrade to latest release [libcap: 2.69 2023/05/14 -> 20071031 2007/10/31]
任务
2024/1/12 9:17
无优先级
src-openEuler/libcap
sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I8VIRN
44
I8VIRQ
Upgrade to latest release [libselinux: 3.5 2023/02/23 -> 3.6 2023/12/13]
任务
2024/1/12 9:17
无优先级
src-openEuler/libselinux
sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I8VIRQ
45
I8XTDI
rpm宏用$引用可能会出现空值
缺陷
2024/1/21 22:27
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8XTDI
46
I8ZBUC
主线补丁:crypto: scomp - fix req->dst buffer overflow
任务
2024/1/27 11:36
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8ZBUC
47
I8ZJG1
欧拉系统virt-install 创建虚拟机video类型默认使用qxl
任务
2024/1/29 10:44
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I8ZJG1
48
I95DT3
openEuler-22.03-LTS-SP3的6.2.0-88版本何时发布?
任务
2024/3/4 0:39
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I95DT3
49
I96B4W
systemd中缺少文件
任务
2024/3/6 14:53
无优先级
src-openEuler/systemd
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I96B4W
50
I96BZU
逻辑卷组修复
任务
2024/3/6 15:36
无优先级
src-openEuler/lvm2
Storage
https://gitee.com/open_euler/dashboard?issue_id=I96BZU
51
I97R4T
【20.03-LTS-SP1~SP4】4.19 kernel加载并卸载vkms模块即可导致系统崩溃重启
缺陷
2024/3/12 11:36
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I97R4T
52
I97V59
preempt-RT补丁中存在bug,运行2天以上的igh-ethercat时系统高概率死机
缺陷
2024/3/12 16:09
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I97V59
53
I9BJX9
glib2-2.72.2-14 导致gnome 桌面崩溃
缺陷
2024/3/26 9:15
无优先级
src-openEuler/glib2
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9BJX9
54
I9BNUP
使用clang时缺少gnu/stubs-32.h文件
任务
2024/3/26 13:43
无优先级
src-openEuler/glibc
Computing
https://gitee.com/open_euler/dashboard?issue_id=I9BNUP
55
I9C507
gcc在2203版本默认关闭-fcommon选项导致Intel SPR芯片上UnixBench多核整形得分劣化
缺陷
2024/3/27 18:22
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I9C507
56
I9COZE
【B/Y KV190 -BMC 系统测试】【长稳测试】【uniscan】DC第19次,OS进入紧急模式
缺陷
2024/3/29 15:27
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9COZE
57
I9CQSL
openEuler-22.03-LTS-SP1中自带的i40e网卡驱动,无法虚拟网卡
缺陷
2024/3/29 16:57
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9CQSL
58
I9CXWG
当mount挂载点多的时候,systemd-hostnamd服务启动时间太长
任务
2024/3/30 18:58
无优先级
src-openEuler/systemd
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9CXWG
59
I9DV2U
spec文件不同架构分支存在相同构建方式
任务
2024/4/3 11:24
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I9DV2U
60
I9EDEH
【22.03 LTS SP1】glib2自编译check阶段用例失败
缺陷
2024/4/7 10:26
无优先级
src-openEuler/glib2
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9EDEH
61
I9EDQG
udev事件接收到磁盘被拔出后,调用umount /home/test卸载磁盘,mount信息中有残留磁盘挂载信息。
缺陷
2024/4/7 10:41
无优先级
src-openEuler/systemd
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9EDQG
62
I9EHLX
openEuler22.03 sp1设置成gb18030编码以后,timedatectl 报Eaile to print table:Invalid argument
任务
2024/4/7 14:55
无优先级
src-openEuler/systemd
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9EHLX
63
I9EU9I
openEuler 24.03 RISC-V中,切换至新建的用户的umask权限没有改变
缺陷
2024/4/8 15:14
无优先级
src-openEuler/bash
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9EU9I
64
I9FI38
【obs】glib2在openEuler:22.03:LTS构建失败
缺陷
2024/4/10 15:34
无优先级
src-openEuler/glib2
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9FI38
65
I9FU1M
[openEuler-22.03-LTS] libvirt install failed
任务
2024/4/11 15:44
无优先级
src-openEuler/libvirt
Virt
https://gitee.com/open_euler/dashboard?issue_id=I9FU1M
66
I9FVI3
22.03-LTS-Next分支与22.03-LTS-SP3分支不同步,需要手动同步
任务
2024/4/11 16:57
无优先级
src-openEuler/e2fsprogs
Storage
https://gitee.com/open_euler/dashboard?issue_id=I9FVI3
67
I9FYER
libcgroup-3.1.0.tar.gz无法正常解压
任务
2024/4/11 21:49
无优先级
src-openEuler/libcgroup
sig-CloudNative
https://gitee.com/open_euler/dashboard?issue_id=I9FYER
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/master/%E7%A4%BE%E5%8C%BA%E7%89%88%E6%9…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
1
0
各位openeuler社区的maintainer、 committer和contributor们好:
社区CICD sig基于release sig制定openeuler 24.03 LTS版本的release plan,将于4月14号18点创建快照,开始构建RC3版本,此时间点之后合入PR默认不带入版本!
From: xiasenlin [mailto:xiasenlin1@huawei.com]
Sent: Wednesday, April 3, 2024 9:37 PM
To: dev <dev(a)openeuler.org>; release <release(a)openeuler.org>
Subject: openeuler 24.03 LTS RC2&Beta版本构建通知
各位openeuler社区的maintainer、 committer和contributor们好:
社区CICD sig基于release sig制定openeuler 24.03 LTS版本的release plan,将于4月7号12点创建快照,开始构建RC2&Beta版本,此时间点之后合入PR默认不带入版本!
________________________________
夏森林 Xia Senlin
Mobile:+86-50000041340<tel:+86-50000041340>(For Welink,eSpace Calls)
Email:xiasenlin1(a)huawei.com<mailto:xiasenlin1@huawei.com>
1
0
Sorry! The WeLink meeting will be held at 2024-04-12 14:15 scheduled by Marketing SIG has been cancelled.
1
0
您好!
bigdata 邀请您参加 2024-04-12 16:00 召开的Zoom会议(自动录制)
会议主题:bigdata SIG例会
会议链接:https://us06web.zoom.us/j/81461189512?pwd=0j1rLoSbmoRHOmR38YqG0bcWkIa4P2.1
会议纪要:https://etherpad.openeuler.org/p/bigdata-meetings
更多资讯尽在:https://www.openeuler.org/zh/
Hello!
bigdata invites you to attend the Zoom conference(auto recording) will be held at 2024-04-12 16:00,
The subject of the conference is bigdata SIG例会,
You can join the meeting at https://us06web.zoom.us/j/81461189512?pwd=0j1rLoSbmoRHOmR38YqG0bcWkIa4P2.1.
Add topics at https://etherpad.openeuler.org/p/bigdata-meetings.
More information: https://www.openeuler.org/en/
1
0
您好!
sig-Yocto 邀请您参加 2024-04-11 14:30 召开的Tencent会议(自动录制)
会议主题:yocto & embedded sig例会
会议内容:
欢迎申报议题,会议链接以此为准。
会议链接:https://meeting.tencent.com/dm/ZrYNzJjqfaqs
会议纪要:https://etherpad.openeuler.org/p/sig-Yocto-meetings
更多资讯尽在:https://www.openeuler.org/zh/
Hello!
sig-Yocto invites you to attend the Tencent conference(auto recording) will be held at 2024-04-11 14:30,
The subject of the conference is yocto & embedded sig例会,
Summary:
欢迎申报议题,会议链接以此为准。
You can join the meeting at https://meeting.tencent.com/dm/ZrYNzJjqfaqs.
Add topics at https://etherpad.openeuler.org/p/sig-Yocto-meetings.
More information: https://www.openeuler.org/en/
1
0
您好!
Marketing 邀请您参加 2024-04-12 14:15 召开的WeLink会议
会议主题:odd2024开工会
会议内容:
同步odd2024的会议策划、包括主论坛、技术分论坛、sig组开放会议和展区,欢迎社区开发者参会,群策群力。
会议链接:https://meeting.huaweicloud.com:36443/#/j/985669809
会议纪要:https://etherpad.openeuler.org/p/Marketing-meetings
更多资讯尽在:https://www.openeuler.org/zh/
Hello!
Marketing invites you to attend the WeLink conference will be held at 2024-04-12 14:15,
The subject of the conference is odd2024开工会,
Summary:
同步odd2024的会议策划、包括主论坛、技术分论坛、sig组开放会议和展区,欢迎社区开发者参会,群策群力。
You can join the meeting at https://meeting.huaweicloud.com:36443/#/j/985669809.
Add topics at https://etherpad.openeuler.org/p/Marketing-meetings.
More information: https://www.openeuler.org/en/
1
0
您好!
Marketing 邀请您参加 2024-04-12 14:15 召开的WeLink会议
会议主题:odd2024开工会
会议内容:
同步odd2024的会议策划、包括主论坛、技术分论坛、sig组开放会议和展区,欢迎社区开发者参会,群策群力。
会议链接:https://meeting.huaweicloud.com:36443/#/j/986215132
会议纪要:https://etherpad.openeuler.org/p/Marketing-meetings
更多资讯尽在:https://www.openeuler.org/zh/
Hello!
Marketing invites you to attend the WeLink conference will be held at 2024-04-12 14:15,
The subject of the conference is odd2024开工会,
Summary:
同步odd2024的会议策划、包括主论坛、技术分论坛、sig组开放会议和展区,欢迎社区开发者参会,群策群力。
You can join the meeting at https://meeting.huaweicloud.com:36443/#/j/986215132.
Add topics at https://etherpad.openeuler.org/p/Marketing-meetings.
More information: https://www.openeuler.org/en/
1
0
申报议题:
【openEuler-24.03-LTS】软件版本变更情况说明
| |
江枫
|
|
zjllovejia(a)163.com
|
---- 回复的原邮件 ----
| 发件人 | openEuler conference<public(a)openeuler.org> |
| 发送日期 | 2024年4月10日 11:04 |
| 收件人 | <qa(a)openeuler.org> |
| 主题 | [Qa] qa sig 双周例会 |
您好!
sig-QA 邀请您参加 2024-04-10 14:15 召开的WeLink会议(自动录制)
会议主题:qa sig 双周例会
会议内容:
qa sig 双周例会
会议链接:https://meeting.huaweicloud.com:36443/#/j/968369917
会议纪要:https://etherpad.openeuler.org/p/sig-QA-meetings
更多资讯尽在:https://www.openeuler.org/zh/
Hello!
sig-QA invites you to attend the WeLink conference(auto recording) will be held at 2024-04-10 14:15,
The subject of the conference is qa sig 双周例会,
Summary:
qa sig 双周例会
You can join the meeting at https://meeting.huaweicloud.com:36443/#/j/968369917.
Add topics at https://etherpad.openeuler.org/p/sig-QA-meetings.
More information: https://www.openeuler.org/en/
1
0
您好!
sig-confidential-computing 邀请您参加 2024-04-11 14:15 召开的WeLink会议
会议主题:机密计算SIG双周例会
会议内容:
1. 进展更新
欢迎大家申报议题
会议链接:https://meeting.huaweicloud.com:36443/#/j/983261633
会议纪要:https://etherpad.openeuler.org/p/sig-confidential-computing-meetings
更多资讯尽在:https://www.openeuler.org/zh/
Hello!
sig-confidential-computing invites you to attend the WeLink conference will be held at 2024-04-11 14:15,
The subject of the conference is 机密计算SIG双周例会,
Summary:
1. 进展更新
欢迎大家申报议题
You can join the meeting at https://meeting.huaweicloud.com:36443/#/j/983261633.
Add topics at https://etherpad.openeuler.org/p/sig-confidential-computing-meetings.
More information: https://www.openeuler.org/en/
1
0
您好!
doc 邀请您参加 2024-04-15 09:45 召开的WeLink会议
会议主题:doc & G11N SIG例会
会议内容:
1. osseu 议题内容讨论
2. doc SIG logo 方案评审
3. 欢迎大家申报议题
会议链接:https://meeting.huaweicloud.com:36443/#/j/969706775
会议纪要:https://etherpad.openeuler.org/p/doc-meetings
更多资讯尽在:https://www.openeuler.org/zh/
Hello!
doc invites you to attend the WeLink conference will be held at 2024-04-15 09:45,
The subject of the conference is doc & G11N SIG例会,
Summary:
1. osseu 议题内容讨论
2. doc SIG logo 方案评审
3. 欢迎大家申报议题
You can join the meeting at https://meeting.huaweicloud.com:36443/#/j/969706775.
Add topics at https://etherpad.openeuler.org/p/doc-meetings.
More information: https://www.openeuler.org/en/
1
0