15 Mar
2026
15 Mar
'26
2:08 p.m.
Dear all:
经社区Release SIG、QA SIG及CICD SIG评估,openEuler-20.03-LTS-SP4、openEuler-22.03-LTS-SP4、openEuler-24.03-LTS、openEuler-24.03-LTS-SP1、openEuler-24.03-LTS-SP2、openEuler-24.03-LTS-SP3版本满足出口质量,现进行发布公示
本公示分为9部分:
1.openEuler-20.03-LTS-SP4 Update 20260311 发布情况及待修复缺陷
2.openEuler-22.03-LTS-SP4 Update 20260311 发布情况及待修复缺陷
3.openEuler-24.03-LTS Update 20260311 发布情况及待修复缺陷
4.openEuler-24.03-LTS-SP1 Update 20260311 发布情况及待修复缺陷
5.openEuler-24.03-LTS-SP2 Update 20260311 发布情况及待修复缺陷
6.openEuler-24.03-LTS-SP3 Update 20260311 发布情况及待修复缺陷
7.openEuler关键组件修复CVE清单
8.openEuler关键组件修复缺陷清单
9.openEuler社区指导文档及开放平台链接
本次update版本发布后,下个版本里程碑点(预计在2026/03/20)提供update_20260318版本
openEuler-20.03-LTS-SP4 Update 20260311
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP4修复版本已知问题6个,已知漏洞51个。目前版本分支剩余待修复缺陷0个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件源码仓库
openEuler-20.03-LTS-SP4 Update版本CVE修复 及Bugfix list公示链接:
CVE列表:
ISSUE | CVE | 仓库 | SCORE |
CVE-2025-62168 | squid | 10.0 | |
CVE-2025-54574 | squid | 9.3 | |
CVE-2026-21876 | mod_security_crs | 9.3 | |
CVE-2024-38999 | nodejs-requirejs | 8.6 | |
CVE-2026-1642 | nginx | 8.2 | |
CVE-2026-28693 | ImageMagick | 8.1 | |
CVE-2025-26597 | libX11 | 7.8 | |
CVE-2025-13499 | wireshark | 7.8 | |
CVE-2026-28417 | vim | 7.8 | |
CVE-2026-30929 | ImageMagick | 7.7 | |
CVE-2026-27596 | exiv2 | 7.5 | |
CVE-2026-28691 | ImageMagick | 7.5 | |
CVE-2026-28494 | ImageMagick | 7.1 | |
CVE-2026-23209 | kernel | 7.0 | |
CVE-2026-26158 | busybox | 7.0 | |
CVE-2026-26157 | busybox | 7.0 | |
CVE-2026-28690 | ImageMagick | 6.9 | |
CVE-2026-30937 | ImageMagick | 6.8 | |
CVE-2026-28686 | ImageMagick | 6.8 | |
CVE-2025-5601 | wireshark | 6.5 | |
CVE-2026-0966 | libssh | 6.5 | |
CVE-2026-28689 | ImageMagick | 6.3 | |
CVE-2026-0990 | libxml2 | 5.9 | |
CVE-2026-30883 | ImageMagick | 5.7 | |
CVE-2026-3184 | util-linux | 5.6 | |
CVE-2025-39902 | kernel | 5.5 | |
CVE-2025-11626 | wireshark | 5.5 | |
CVE-2025-13946 | wireshark | 5.5 | |
CVE-2026-28418 | vim | 5.5 | |
CVE-2026-30936 | ImageMagick | 5.5 | |
CVE-2025-14831 | gnutls | 5.3 | |
CVE-2026-28421 | vim | 5.3 | |
CVE-2026-28419 | vim | 5.3 | |
CVE-2026-27631 | exiv2 | 5.3 | |
CVE-2026-28687 | ImageMagick | 5.3 | |
CVE-2025-66004 | usbmuxd | 5.1 | |
CVE-2026-0964 | libssh | 5.0 | |
CVE-2026-28692 | ImageMagick | 4.8 | |
CVE-2025-69277 | libsodium | 4.5 | |
CVE-2026-28420 | vim | 4.4 | |
CVE-2026-25068 | alsa-lib | 4.3 | |
CVE-2026-28688 | ImageMagick | 4.0 | |
CVE-2026-0989 | libxml2 | 3.7 | |
CVE-2025-8732 | libxml2 | 3.3 | |
CVE-2025-9615 | NetworkManager | 3.3 | |
CVE-2026-0965 | libssh | 3.3 | |
CVE-2026-0968 | libssh | 3.1 | |
CVE-2026-0992 | libxml2 | 2.9 | |
CVE-2026-25884 | exiv2 | 2.7 | |
CVE-2026-0967 | libssh | 2.2 | |
CVE-2026-28422 | vim | 2.2 |
Bugfix列表:
ISSUE | Bugfix | 仓库 |
systemd长稳专项中,出现网络networkmanager相关的coredump | NetworkManager | |
general protection fault in qdisc_tree_reduce_backlog | kernel | |
testEL_network_host_longstress概率性发生reboot卡住 | kernel | |
回退不涉及的CVE-2025-61143、CVE-2025-61145补丁 | libtiff | |
update to version 20260309 | linux-firmware | |
PCI: Fix pci_slot_trylock() error handling | kernel |
openEuler-20.03-LTS-SP4版本编译构建信息查询链接:
openEuler-20.03-LTS-SP4 Update版本发布源链接:
openEuler CVE 及安全公告公示链接:
openEuler-20.03-LTS-SP4 update版本待修复问题清单(任务ID标注红色的问题单优先级高):
序号 | 里程碑 | 任务ID | 任务标题 | 优先级 | sig组 | 关联仓库 | 任务路径 |
1 | openEuler-20.03-LTS-SP4-dailybuild | 3521979 | [EulerMaker] caja-extensions install problem in openEuler-20.03-LTS-SP4:epol | 严重 | sig-mate-desktop | src-openeuler/caja-extensions | |
2 | openEuler-20.03-LTS-SP4-dailybuild | 3534445 | [EulerMaker] nagios-plugins build problem in openEuler-20.03-LTS-SP4:everything | 严重 | Networking | src-openeuler/nagios-plugins | |
3 | openEuler-20.03-LTS-SP4-round-2 | 3567855 | 【20.03-SP4-rc2】【arm/x86】h2源码包本地自编译失败 | 主要 | DB | src-openeuler/h2 | |
4 | openEuler-20.03-LTS-SP4-alpha | 3519504 | 【openEuler-20.03-LTS-SP4 alpha】[arm/x86]vdsmd.service服务启动失败 | 次要 | oVirt | src-openeuler/vdsm |
openEuler-22.03-LTS-SP4 Update 20260311
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS-SP4修复版本已知问题21个,已知漏洞68个。目前版本分支剩余待修复缺陷0个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件源码仓库
openEuler-22.03-LTS-SP4 Update版本CVE修复 及Bugfix list公示链接:
CVE列表:
ISSUE | CVE | 仓库 | SCORE |
CVE-2025-56005 | python-ply | 9.8 | |
CVE-2025-10729 | qt5-qtsvg | 9.4 | |
CVE-2024-38999 | nodejs-requirejs | 8.6 | |
CVE-2025-40778 | dhcp | 8.6 | |
CVE-2026-27622 | OpenEXR | 8.4 | |
CVE-2025-58098 | httpd | 8.3 | |
CVE-2026-1642 | nginx | 8.2 | |
CVE-2026-28693 | ImageMagick | 8.1 | |
CVE-2025-26597 | libX11 | 7.8 | |
CVE-2024-57979 | kernel | 7.8 | |
CVE-2026-28417 | vim | 7.8 | |
CVE-2026-30929 | ImageMagick | 7.7 | |
CVE-2024-47866 | ceph | 7.5 | |
CVE-2025-65637 | runc | 7.5 | |
CVE-2026-27596 | exiv2 | 7.5 | |
CVE-2026-28691 | ImageMagick | 7.5 | |
CVE-2026-23191 | kernel | 7.1 | |
CVE-2026-28494 | ImageMagick | 7.1 | |
CVE-2026-23054 | kernel | 7.0 | |
CVE-2026-23209 | kernel | 7.0 | |
CVE-2026-26158 | busybox | 7.0 | |
CVE-2026-26157 | busybox | 7.0 | |
CVE-2026-28690 | ImageMagick | 6.9 | |
CVE-2026-30931 | ImageMagick | 6.8 | |
CVE-2026-30937 | ImageMagick | 6.8 | |
CVE-2026-28686 | ImageMagick | 6.8 | |
CVE-2025-65082 | httpd | 6.5 | |
CVE-2026-0966 | libssh | 6.5 | |
CVE-2026-28493 | ImageMagick | 6.5 | |
CVE-2026-28689 | ImageMagick | 6.3 | |
CVE-2026-0990 | libxml2 | 5.9 | |
CVE-2026-30883 | ImageMagick | 5.7 | |
CVE-2026-3184 | util-linux | 5.6 | |
CVE-2025-39902 | kernel | 5.5 | |
CVE-2025-39967 | kernel | 5.5 | |
CVE-2026-0961 | wireshark | 5.5 | |
CVE-2026-23138 | kernel | 5.5 | |
CVE-2026-3203 | wireshark | 5.5 | |
CVE-2026-28418 | vim | 5.5 | |
CVE-2026-30936 | ImageMagick | 5.5 | |
CVE-2025-37778 | kernel | 5.5 | |
CVE-2025-66200 | httpd | 5.4 | |
CVE-2025-66168 | activemq | 5.4 | |
CVE-2026-0959 | wireshark | 5.3 | |
CVE-2026-0962 | wireshark | 5.3 | |
CVE-2025-14831 | gnutls | 5.3 | |
CVE-2026-28421 | vim | 5.3 | |
CVE-2026-28419 | vim | 5.3 | |
CVE-2026-27631 | exiv2 | 5.3 | |
CVE-2026-28687 | ImageMagick | 5.3 | |
CVE-2026-0964 | libssh | 5.0 | |
CVE-2026-28692 | ImageMagick | 4.8 | |
CVE-2026-0960 | wireshark | 4.7 | |
CVE-2026-3201 | wireshark | 4.7 | |
CVE-2026-28420 | vim | 4.4 | |
CVE-2026-30935 | ImageMagick | 4.4 | |
CVE-2026-25068 | alsa-lib | 4.3 | |
CVE-2026-28688 | ImageMagick | 4.0 | |
CVE-2026-0989 | libxml2 | 3.7 | |
CVE-2025-8732 | libxml2 | 3.3 | |
CVE-2025-9615 | NetworkManager | 3.3 | |
CVE-2026-0965 | libssh | 3.3 | |
CVE-2026-0968 | libssh | 3.1 | |
CVE-2026-0992 | libxml2 | 2.9 | |
CVE-2026-25884 | exiv2 | 2.7 | |
CVE-2026-0967 | libssh | 2.2 | |
CVE-2026-28422 | vim | 2.2 | |
CVE-2026-23074 | kernel | 受影响版 |
Bugfix列表:
ISSUE | Bugfix | 仓库 |
systemd长稳专项中,出现网络networkmanager相关的coredump | NetworkManager | |
HiSock Enhancement | kernel | |
回退不涉及的CVE-2025-61143、CVE-2025-61145补丁 | libtiff | |
回合主线补丁:kexec: derive purgatory entry from symbol | kernel | |
[OLK-5.10] 从kernel上游linux stable tree回合nvme驱动重要的bugfix | kernel | |
oeaware集成分域调度特性 | oeAware-manager | |
【MPAM】【OLK-5.10】使能MPAM基础能力 | kernel | |
Update vendor name of Chengdu NorthLink Technology N5/N6 Series Network Card Drivers | kernel | |
回合主线补丁:procfs: fix missing RCU protection when reading real_parent in do_task_stat() | kernel | |
page soft offline 功能进行页隔离时,增加开关,可以打开或关闭大页隔离 | kernel | |
新增鲲鹏硬件ipmi驱动 | kernel | |
回合主线补丁:sched/rt: Skip currently executing CPU in rto_next_cpu() | kernel | |
【OLK 5.10】RDMA/rxe: Fix the failure of ibv_query_device() and ibv_query_device_ex() tests | kernel | |
bpf selftest cross compile fixes | kernel | |
Fix the CI | rdma-core | |
Improvements to CQ Handling and Error State Debugging | rdma-core | |
libhns: Remove MW support | rdma-core | |
update to version 20260309 | linux-firmware | |
[OLK-5.10] xprt_complete_bc_request+0xc5 空指针异常 | kernel | |
指定启动参数dhash_entries=1内核panic | kernel | |
sync some patch | kernel |
openEuler-22.03-LTS-SP4版本编译构建信息查询链接:
openEuler-22.03-LTS-SP4 Update版本发布源链接:
openEuler CVE 及安全公告公示链接:
openEuler-22.03-LTS-SP4 update版本待修复问题清单(任务ID标注红色的问题单优先级高):
序号 | 里程碑 | 任务ID | 任务标题 | 优先级 | sig组 | 关联仓库 | 任务路径 |
1 | openEuler-22.03-LTS-SP4 | 3791033 | 【openEuler-22.03-LTS-SP4-update20260304】【arm】oeAware-manager构建失败 | 不重要 | A-Tune | src-openeuler/oeAware-manager | |
2 | openEuler-22.03-LTS-SP4 | 3774564 | OM_features.md中特殊字符没有处理好 | 不重要 | sig-UB-ServiceCore | openeuler/knet | |
3 | openEuler-22.03-LTS-SP4 | 3774529 | 使用DPDK用户态虚拟Bond功能中接管的是网口,不是网卡 | 不重要 | sig-UB-ServiceCore | openeuler/knet | |
4 | openEuler-22.03-LTS-SP4 | 3767693 | release_note.md中配套关系的存在异议 | 不重要 | sig-UB-ServiceCore | openeuler/knet | |
5 | openEuler-22.03-LTS-SP4 | 3767677 | quick_start.md中安装knet实际命令写的是升级 | 不重要 | sig-UB-ServiceCore | openeuler/knet | |
6 | openEuler-22.03-LTS-SP4 | 3494840 | 22.03-LTS-SP4的edk2 release版本低于22.03-LTS-SP3 release版本 | 主要 | Virt | src-openeuler/edk2 | |
7 | openEuler-22.03-LTS-SP4-round-4 | 3658482 | 【22.03-LTS-SP4 rc4】DDE桌面以root用户登录可以删除自己 | 主要 | sig-DDE | src-openeuler/dde | |
8 | openEuler-22.03-LTS-SP4-round-4 | 3684390 | 【22.03-LTS-SP4 rc4】DDE桌面通过文档查看器打开pdf,djvu文档失败 | 主要 | sig-DDE | src-openeuler/dde | |
9 | openEuler-22.03-LTS-SP4-round-4 | 3658486 | 【22.03-LTS-SP4 rc4】DDE桌面打开文件管理器修改文件权限为只读,还原回收站文件成功 | 严重 | sig-DDE | src-openeuler/dde | |
10 | openEuler-22.03-LTS-SP4-round-4 | 3658462 | 【22.03-LTS-SP4 rc4】DDE桌面打开系统监视器界面不完全显示在桌面 | 严重 | sig-DDE | src-openeuler/dde |
openEuler-24.03-LTS Update 20260311
经各SIG及社区开发者贡献,本周openEuler-24.03-LTS修复版本已知问题6个,已知漏洞132个。目前版本分支剩余待修复缺陷0个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件源码仓库
openEuler-24.03-LTS Update版本CVE修复 及Bugfix list公示链接:
CVE列表:
ISSUE | CVE | 仓库 | SCORE |
CVE-2025-56005 | python-ply | 9.8 | |
CVE-2025-10729 | qt5-qtsvg | 9.4 | |
CVE-2024-38999 | nodejs-requirejs | 8.6 | |
CVE-2025-40778 | dhcp | 8.6 | |
CVE-2026-27622 | OpenEXR | 8.4 | |
CVE-2026-27601 | nodejs-underscore | 8.2 | |
CVE-2026-1642 | nginx | 8.2 | |
CVE-2026-28693 | ImageMagick | 8.1 | |
CVE-2025-26597 | libX11 | 7.8 | |
CVE-2025-38627 | kernel | 7.8 | |
CVE-2026-28417 | vim | 7.8 | |
CVE-2026-30929 | ImageMagick | 7.7 | |
CVE-2026-23112 | kernel | 7.6 | |
CVE-2026-23220 | kernel | 7.5 | |
CVE-2026-27596 | exiv2 | 7.5 | |
CVE-2026-28435 | cpp-httplib | 7.5 | |
CVE-2026-28691 | ImageMagick | 7.5 | |
CVE-2025-69419 | edk2 | 7.4 | |
CVE-2026-23010 | kernel | 7.3 | |
CVE-2026-23097 | kernel | 7.3 | |
CVE-2026-22984 | kernel | 7.1 | |
CVE-2026-23193 | kernel | 7.1 | |
CVE-2026-28494 | ImageMagick | 7.1 | |
CVE-2026-23054 | kernel | 7.0 | |
CVE-2026-23050 | kernel | 7.0 | |
CVE-2026-26158 | busybox | 7.0 | |
CVE-2026-26157 | busybox | 7.0 | |
CVE-2026-28690 | ImageMagick | 6.9 | |
CVE-2026-30931 | ImageMagick | 6.8 | |
CVE-2026-30937 | ImageMagick | 6.8 | |
CVE-2026-28686 | ImageMagick | 6.8 | |
CVE-2026-23011 | kernel | 6.6 | |
CVE-2025-71120 | kernel | 6.5 | |
CVE-2026-0966 | libssh | 6.5 | |
CVE-2026-23179 | kernel | 6.5 | |
CVE-2026-28493 | ImageMagick | 6.5 | |
CVE-2025-68282 | kernel | 6.3 | |
CVE-2026-23025 | kernel | 6.3 | |
CVE-2026-28689 | ImageMagick | 6.3 | |
CVE-2025-68819 | kernel | 6.1 | |
CVE-2025-71068 | kernel | 6.1 | |
CVE-2026-23003 | kernel | 6.1 | |
CVE-2026-0990 | libxml2 | 5.9 | |
CVE-2026-29076 | cpp-httplib | 5.9 | |
CVE-2025-40323 | kernel | 5.8 | |
CVE-2025-40329 | kernel | 5.8 | |
CVE-2025-71236 | kernel | 5.8 | |
CVE-2026-30883 | ImageMagick | 5.7 | |
CVE-2025-22090 | kernel | 5.5 | |
CVE-2025-38491 | kernel | 5.5 | |
CVE-2025-38660 | kernel | 5.5 | |
CVE-2025-39764 | kernel | 5.5 | |
CVE-2025-39902 | kernel | 5.5 | |
CVE-2025-39948 | kernel | 5.5 | |
CVE-2025-68192 | kernel | 5.5 | |
CVE-2025-68194 | kernel | 5.5 | |
CVE-2025-68237 | kernel | 5.5 | |
CVE-2025-68209 | kernel | 5.5 | |
CVE-2025-68204 | kernel | 5.5 | |
CVE-2025-68211 | kernel | 5.5 | |
CVE-2025-68231 | kernel | 5.5 | |
CVE-2025-68293 | kernel | 5.5 | |
CVE-2025-68313 | kernel | 5.5 | |
CVE-2025-68785 | kernel | 5.5 | |
CVE-2025-71065 | kernel | 5.5 | |
CVE-2025-68822 | kernel | 5.5 | |
CVE-2025-71096 | kernel | 5.5 | |
CVE-2025-71083 | kernel | 5.5 | |
CVE-2025-71097 | kernel | 5.5 | |
CVE-2025-71091 | kernel | 5.5 | |
CVE-2025-71129 | kernel | 5.5 | |
CVE-2026-0961 | wireshark | 5.5 | |
CVE-2025-71118 | kernel | 5.5 | |
CVE-2025-71141 | kernel | 5.5 | |
CVE-2026-22977 | kernel | 5.5 | |
CVE-2026-22979 | kernel | 5.5 | |
CVE-2026-22991 | kernel | 5.5 | |
CVE-2026-22999 | kernel | 5.5 | |
CVE-2026-23038 | kernel | 5.5 | |
CVE-2025-71186 | kernel | 5.5 | |
CVE-2026-23021 | kernel | 5.5 | |
CVE-2026-23047 | kernel | 5.5 | |
CVE-2026-23059 | kernel | 5.5 | |
CVE-2026-23084 | kernel | 5.5 | |
CVE-2026-23085 | kernel | 5.5 | |
CVE-2026-23094 | kernel | 5.5 | |
CVE-2026-23110 | kernel | 5.5 | |
CVE-2025-71221 | kernel | 5.5 | |
CVE-2026-23205 | kernel | 5.5 | |
CVE-2026-27171 | zlib | 5.5 | |
CVE-2026-23216 | kernel | 5.5 | |
CVE-2025-71232 | kernel | 5.5 | |
CVE-2025-71235 | kernel | 5.5 | |
CVE-2026-3203 | wireshark | 5.5 | |
CVE-2026-28418 | vim | 5.5 | |
CVE-2026-30936 | ImageMagick | 5.5 | |
CVE-2025-66168 | activemq | 5.4 | |
CVE-2025-56226 | libsndfile | 5.3 | |
CVE-2026-0959 | wireshark | 5.3 | |
CVE-2026-0962 | wireshark | 5.3 | |
CVE-2025-14831 | gnutls | 5.3 | |
CVE-2025-71225 | kernel | 5.3 | |
CVE-2026-23228 | kernel | 5.3 | |
CVE-2026-28421 | vim | 5.3 | |
CVE-2026-28419 | vim | 5.3 | |
CVE-2026-23865 | freetype | 5.3 | |
CVE-2026-27631 | exiv2 | 5.3 | |
CVE-2026-28434 | cpp-httplib | 5.3 | |
CVE-2026-28687 | ImageMagick | 5.3 | |
CVE-2026-28692 | ImageMagick | 4.8 | |
CVE-2024-57974 | kernel | 4.7 | |
CVE-2026-0960 | wireshark | 4.7 | |
CVE-2026-3201 | wireshark | 4.7 | |
CVE-2025-68768 | kernel | 4.4 | |
CVE-2026-23032 | kernel | 4.4 | |
CVE-2026-23163 | kernel | 4.4 | |
CVE-2026-28420 | vim | 4.4 | |
CVE-2026-30935 | ImageMagick | 4.4 | |
CVE-2026-25068 | alsa-lib | 4.3 | |
CVE-2026-28688 | ImageMagick | 4.0 | |
CVE-2026-0989 | libxml2 | 3.7 | |
CVE-2025-8732 | libxml2 | 3.3 | |
CVE-2025-9615 | NetworkManager | 3.3 | |
CVE-2026-0965 | libssh | 3.3 | |
CVE-2025-71220 | kernel | 3.3 | |
CVE-2025-71223 | kernel | 3.3 | |
CVE-2026-23190 | kernel | 3.3 | |
CVE-2026-0968 | libssh | 3.1 | |
CVE-2026-0992 | libxml2 | 2.9 | |
CVE-2026-25884 | exiv2 | 2.7 | |
CVE-2025-71084 | kernel | 2.5 | |
CVE-2026-28422 | vim | 2.2 |
Bugfix列表:
openEuler-24.03-LTS版本编译构建信息查询链接:
openEuler-24.03-LTS Update版本发布源链接:
openEuler CVE 及安全公告公示链接:
openEuler-24.03-LTS-SP1 Update 20260311
经各SIG及社区开发者贡献,本周openEuler-24.03-LTS-SP1修复版本已知问题8个,已知漏洞133个。目前版本分支剩余待修复缺陷0个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件源码仓库
openEuler-24.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
CVE列表:
ISSUE | CVE | 仓库 | SCORE |
CVE-2025-56005 | python-ply | 9.8 | |
CVE-2025-10729 | qt5-qtsvg | 9.4 | |
CVE-2024-38999 | nodejs-requirejs | 8.6 | |
CVE-2026-27622 | OpenEXR | 8.4 | |
CVE-2026-27601 | nodejs-underscore | 8.2 | |
CVE-2026-1642 | nginx | 8.2 | |
CVE-2026-28693 | ImageMagick | 8.1 | |
CVE-2025-26597 | libX11 | 7.8 | |
CVE-2025-38627 | kernel | 7.8 | |
CVE-2026-28417 | vim | 7.8 | |
CVE-2026-30929 | ImageMagick | 7.7 | |
CVE-2026-23112 | kernel | 7.6 | |
CVE-2026-23220 | kernel | 7.5 | |
CVE-2026-27596 | exiv2 | 7.5 | |
CVE-2026-28435 | cpp-httplib | 7.5 | |
CVE-2026-28691 | ImageMagick | 7.5 | |
CVE-2025-69419 | edk2 | 7.4 | |
CVE-2026-23010 | kernel | 7.3 | |
CVE-2026-23097 | kernel | 7.3 | |
CVE-2026-22984 | kernel | 7.1 | |
CVE-2026-23193 | kernel | 7.1 | |
CVE-2026-28494 | ImageMagick | 7.1 | |
CVE-2026-23054 | kernel | 7.0 | |
CVE-2026-23050 | kernel | 7.0 | |
CVE-2026-26158 | busybox | 7.0 | |
CVE-2026-26157 | busybox | 7.0 | |
CVE-2026-28690 | ImageMagick | 6.9 | |
CVE-2026-30931 | ImageMagick | 6.8 | |
CVE-2026-30937 | ImageMagick | 6.8 | |
CVE-2026-28686 | ImageMagick | 6.8 | |
CVE-2026-23011 | kernel | 6.6 | |
CVE-2025-71120 | kernel | 6.5 | |
CVE-2026-0966 | libssh | 6.5 | |
CVE-2026-23179 | kernel | 6.5 | |
CVE-2026-28493 | ImageMagick | 6.5 | |
CVE-2025-68282 | kernel | 6.3 | |
CVE-2026-23025 | kernel | 6.3 | |
CVE-2026-28689 | ImageMagick | 6.3 | |
CVE-2025-68819 | kernel | 6.1 | |
CVE-2025-71068 | kernel | 6.1 | |
CVE-2026-23003 | kernel | 6.1 | |
CVE-2026-0990 | libxml2 | 5.9 | |
CVE-2026-29076 | cpp-httplib | 5.9 | |
CVE-2025-40323 | kernel | 5.8 | |
CVE-2025-40329 | kernel | 5.8 | |
CVE-2025-71236 | kernel | 5.8 | |
CVE-2026-30883 | ImageMagick | 5.7 | |
CVE-2025-22090 | kernel | 5.5 | |
CVE-2025-38491 | kernel | 5.5 | |
CVE-2025-38660 | kernel | 5.5 | |
CVE-2025-39764 | kernel | 5.5 | |
CVE-2025-39902 | kernel | 5.5 | |
CVE-2025-39948 | kernel | 5.5 | |
CVE-2025-68194 | kernel | 5.5 | |
CVE-2025-68192 | kernel | 5.5 | |
CVE-2025-68237 | kernel | 5.5 | |
CVE-2025-68209 | kernel | 5.5 | |
CVE-2025-68204 | kernel | 5.5 | |
CVE-2025-68231 | kernel | 5.5 | |
CVE-2025-68211 | kernel | 5.5 | |
CVE-2025-68293 | kernel | 5.5 | |
CVE-2025-68313 | kernel | 5.5 | |
CVE-2025-68785 | kernel | 5.5 | |
CVE-2025-71065 | kernel | 5.5 | |
CVE-2025-68822 | kernel | 5.5 | |
CVE-2025-71083 | kernel | 5.5 | |
CVE-2025-71097 | kernel | 5.5 | |
CVE-2025-71096 | kernel | 5.5 | |
CVE-2025-71091 | kernel | 5.5 | |
CVE-2025-71118 | kernel | 5.5 | |
CVE-2025-71129 | kernel | 5.5 | |
CVE-2026-0961 | wireshark | 5.5 | |
CVE-2025-71141 | kernel | 5.5 | |
CVE-2026-22977 | kernel | 5.5 | |
CVE-2026-22979 | kernel | 5.5 | |
CVE-2026-22991 | kernel | 5.5 | |
CVE-2026-22999 | kernel | 5.5 | |
CVE-2025-71186 | kernel | 5.5 | |
CVE-2026-23038 | kernel | 5.5 | |
CVE-2026-23021 | kernel | 5.5 | |
CVE-2026-23047 | kernel | 5.5 | |
CVE-2026-23059 | kernel | 5.5 | |
CVE-2026-23084 | kernel | 5.5 | |
CVE-2026-23085 | kernel | 5.5 | |
CVE-2026-23110 | kernel | 5.5 | |
CVE-2026-23094 | kernel | 5.5 | |
CVE-2025-71221 | kernel | 5.5 | |
CVE-2026-27171 | zlib | 5.5 | |
CVE-2026-23205 | kernel | 5.5 | |
CVE-2026-23216 | kernel | 5.5 | |
CVE-2025-71235 | kernel | 5.5 | |
CVE-2025-71232 | kernel | 5.5 | |
CVE-2026-3203 | wireshark | 5.5 | |
CVE-2026-28418 | vim | 5.5 | |
CVE-2026-30936 | ImageMagick | 5.5 | |
CVE-2025-66168 | activemq | 5.4 | |
CVE-2025-56226 | libsndfile | 5.3 | |
CVE-2026-0959 | wireshark | 5.3 | |
CVE-2026-0962 | wireshark | 5.3 | |
CVE-2025-14831 | gnutls | 5.3 | |
CVE-2025-71225 | kernel | 5.3 | |
CVE-2026-23228 | kernel | 5.3 | |
CVE-2026-28421 | vim | 5.3 | |
CVE-2026-28419 | vim | 5.3 | |
CVE-2026-23865 | freetype | 5.3 | |
CVE-2026-27631 | exiv2 | 5.3 | |
CVE-2026-28434 | cpp-httplib | 5.3 | |
CVE-2026-28687 | ImageMagick | 5.3 | |
CVE-2026-0964 | libssh | 5.0 | |
CVE-2026-28692 | ImageMagick | 4.8 | |
CVE-2024-57974 | kernel | 4.7 | |
CVE-2026-0960 | wireshark | 4.7 | |
CVE-2026-3201 | wireshark | 4.7 | |
CVE-2025-68768 | kernel | 4.4 | |
CVE-2026-23032 | kernel | 4.4 | |
CVE-2026-23163 | kernel | 4.4 | |
CVE-2026-28420 | vim | 4.4 | |
CVE-2026-30935 | ImageMagick | 4.4 | |
CVE-2026-25068 | alsa-lib | 4.3 | |
CVE-2026-28688 | ImageMagick | 4.0 | |
CVE-2026-0989 | libxml2 | 3.7 | |
CVE-2025-8732 | libxml2 | 3.3 | |
CVE-2025-9615 | NetworkManager | 3.3 | |
CVE-2026-0965 | libssh | 3.3 | |
CVE-2025-71223 | kernel | 3.3 | |
CVE-2025-71220 | kernel | 3.3 | |
CVE-2026-23190 | kernel | 3.3 | |
CVE-2026-0968 | libssh | 3.1 | |
CVE-2026-0992 | libxml2 | 2.9 | |
CVE-2026-25884 | exiv2 | 2.7 | |
CVE-2025-71084 | kernel | 2.5 | |
CVE-2026-0967 | libssh | 2.2 | |
CVE-2026-28422 | vim | 2.2 |
Bugfix列表:
ISSUE | Bugfix | 仓库 |
systemd长稳专项中,出现网络networkmanager相关的coredump | NetworkManager | |
rpm新增对生成subr子版本的开关设置 | rpm | |
fix the CI | rdma-core | |
Code Optimization and Functional Updates | rdma-core | |
Error State Debugging | rdma-core | |
oeAware集成分域调度特性 | oeAware-manager | |
update to version 20260309 | linux-firmware | |
Fix CQ clean when CQ record doorbell enabled | rdma-core |
openEuler-24.03-LTS-SP1版本编译构建信息查询链接:
openEuler-24.03-LTS-SP1 Update版本发布源链接:
openEuler CVE 及安全公告公示链接:
openEuler-24.03-LTS-SP1 update版本待修复问题清单(任务ID标注红色的问题单优先级高):
序号 | 里程碑 | 任务ID | 任务标题 | 优先级 | sig组 | 关联仓库 | 任务路径 |
1 | openEuler-24.03-LTS-SP1 | 3791243 | 计算1823网卡驱动(联调版本)插入报错环境缺少符号表 | 不重要 | Kernel | src-openeuler/kernel | |
2 | openEuler-24.03-LTS-SP1 | 3634696 | 【24.03 LTS SP1】【arm】cobbler buildiso 命令报错 | 不重要 | sig-OS-Builder | src-openeuler/cobbler | |
3 | openEuler-24.03-LTS-SP1 | 3525273 | 【openEuler-24.03-LTS-SP1】 python3-pkginfo 卸载后有遗留文件没被清理 /usr/lib/python3.11/site-packages/pkginfo/ | 主要 | sig-python-modules | src-openeuler/python-pkginfo | |
4 | openEuler-24.03-LTS-SP1 | 3525309 | 【openEuler-24.03-LTS-SP1】 python3-pycpuinfo 卸载后有遗留文件没被清理 /usr/lib/python3.11/site-packages/cpuinfo/ | 主要 | sig-python-modules | src-openeuler/python-py-cpuinfo | |
5 | openEuler-24.03-LTS-SP1 | 3521384 | 【openEuler-24.03-LTS-SP1】 python3-apipkg 卸载后有遗留文件没被清理 /usr/lib/python3.11/site-packages/apipkg-3.0.2.dist-info/ | 主要 | sig-python-modules | src-openeuler/python-apipkg | |
6 | openEuler-24.03-LTS-SP1 | 3674098 | 920高性能版本中,24.03SP1release版本,NIC板载开启硬件GRO失败 | 主要 | Kernel | src-openeuler/kernel | |
7 | openEuler-24.03-LTS-SP1 | 3563375 | 【openEuler-24.03-LTS-SP1】【autotest】【arm】升级kernel重启之后,安装卸载kae_driver,卸载报错:depmod: ERROR: fstatat(4, uacce.ko): No such file or directory | 主要 | sig-AccLib | src-openeuler/kae_driver | |
8 | openEuler-24.03-LTS-SP1 | 3575473 | 【openEuler-24.03-LTS-SP1】【arm/x86】安装oeAware-manager,oeawarectl -e thread_scenario之后oeawarectl -d thread_scenario出现报错情况 | 主要 | A-Tune | src-openeuler/oeAware-manager | |
9 | openEuler-24.03-LTS-SP1-round2 | 3539994 | 【openEuler-24.03-LTS-SP1-round2】 mariadb-embedded包2403LTS升级到2403SP1出错 | 次要 | DB | src-openeuler/greatsql | |
10 | openEuler-24.03-LTS-SP1-64kb | 3654839 | 【openEuler-24.03-sp1-0701-64kb】【arm】ltp执行用例memcg_stat_rss报错 | 次要 | Kernel | src-openeuler/kernel | |
11 | openEuler-24.03-LTS-SP1-alpha | 3662535 | 【openEuler-25.03-alpha】【arm】syzkaller运行3天日志中出现了异常 | 主要 | Kernel | openeuler/kernel | |
12 | openEuler-24.03-LTS-SP1-alpha | 3647212 | 【EulerMaker】kernel-rt 在openEuler-24.03-LTS-SP1:everything 中构建失败 | 不重要 | Kernel | src-openeuler/kernel | |
13 | openEuler-24.03-LTS-SP1-update20250312 | 3669574 | 920系列服务器上安装openEuler24.03-LTS-SP1对比22.03-LTS-SP4测试unixbench-master多核性能劣化 | 不重要 | Kernel | openeuler/kernel |
openEuler-24.03-LTS-SP2 Update 20260311
经各SIG及社区开发者贡献,本周openEuler-24.03-LTS-SP2修复版本已知问题7个,已知漏洞137个。目前版本分支剩余待修复缺陷0个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件源码仓库
openEuler-24.03-LTS-SP2 Update版本CVE修复 及Bugfix list公示链接:
CVE列表:
ISSUE | CVE | 仓库 | SCORE |
CVE-2025-56005 | python-ply | 9.8 | |
CVE-2025-10729 | qt5-qtsvg | 9.4 | |
CVE-2024-38999 | nodejs-requirejs | 8.6 | |
CVE-2026-27622 | OpenEXR | 8.4 | |
CVE-2025-58098 | httpd | 8.3 | |
CVE-2026-27601 | nodejs-underscore | 8.2 | |
CVE-2026-1642 | nginx | 8.2 | |
CVE-2026-28693 | ImageMagick | 8.1 | |
CVE-2025-26597 | libX11 | 7.8 | |
CVE-2025-38627 | kernel | 7.8 | |
CVE-2026-28417 | vim | 7.8 | |
CVE-2026-30929 | ImageMagick | 7.7 | |
CVE-2026-23112 | kernel | 7.6 | |
CVE-2025-55753 | httpd | 7.5 | |
CVE-2026-23220 | kernel | 7.5 | |
CVE-2026-27596 | exiv2 | 7.5 | |
CVE-2026-28435 | cpp-httplib | 7.5 | |
CVE-2026-28691 | ImageMagick | 7.5 | |
CVE-2025-69419 | edk2 | 7.4 | |
CVE-2026-23010 | kernel | 7.3 | |
CVE-2026-23097 | kernel | 7.3 | |
CVE-2026-22984 | kernel | 7.1 | |
CVE-2026-23193 | kernel | 7.1 | |
CVE-2026-28494 | ImageMagick | 7.1 | |
CVE-2026-23054 | kernel | 7.0 | |
CVE-2026-23050 | kernel | 7.0 | |
CVE-2026-26158 | busybox | 7.0 | |
CVE-2026-26157 | busybox | 7.0 | |
CVE-2026-28690 | ImageMagick | 6.9 | |
CVE-2026-30931 | ImageMagick | 6.8 | |
CVE-2026-30937 | ImageMagick | 6.8 | |
CVE-2026-28686 | ImageMagick | 6.8 | |
CVE-2026-23011 | kernel | 6.6 | |
CVE-2025-65082 | httpd | 6.5 | |
CVE-2025-71120 | kernel | 6.5 | |
CVE-2026-0966 | libssh | 6.5 | |
CVE-2026-23179 | kernel | 6.5 | |
CVE-2026-28493 | ImageMagick | 6.5 | |
CVE-2025-68282 | kernel | 6.3 | |
CVE-2026-23025 | kernel | 6.3 | |
CVE-2026-28689 | ImageMagick | 6.3 | |
CVE-2025-68819 | kernel | 6.1 | |
CVE-2025-71068 | kernel | 6.1 | |
CVE-2026-23003 | kernel | 6.1 | |
CVE-2026-0990 | libxml2 | 5.9 | |
CVE-2026-29076 | cpp-httplib | 5.9 | |
CVE-2025-40323 | kernel | 5.8 | |
CVE-2025-40329 | kernel | 5.8 | |
CVE-2025-71236 | kernel | 5.8 | |
CVE-2026-30883 | ImageMagick | 5.7 | |
CVE-2025-22090 | kernel | 5.5 | |
CVE-2025-38491 | kernel | 5.5 | |
CVE-2025-38660 | kernel | 5.5 | |
CVE-2025-39764 | kernel | 5.5 | |
CVE-2025-39902 | kernel | 5.5 | |
CVE-2025-39948 | kernel | 5.5 | |
CVE-2025-68192 | kernel | 5.5 | |
CVE-2025-68194 | kernel | 5.5 | |
CVE-2025-68237 | kernel | 5.5 | |
CVE-2025-68209 | kernel | 5.5 | |
CVE-2025-68204 | kernel | 5.5 | |
CVE-2025-68211 | kernel | 5.5 | |
CVE-2025-68231 | kernel | 5.5 | |
CVE-2025-68293 | kernel | 5.5 | |
CVE-2025-68313 | kernel | 5.5 | |
CVE-2025-68785 | kernel | 5.5 | |
CVE-2025-71065 | kernel | 5.5 | |
CVE-2025-68822 | kernel | 5.5 | |
CVE-2025-71096 | kernel | 5.5 | |
CVE-2025-71083 | kernel | 5.5 | |
CVE-2025-71097 | kernel | 5.5 | |
CVE-2025-71091 | kernel | 5.5 | |
CVE-2025-71129 | kernel | 5.5 | |
CVE-2026-0961 | wireshark | 5.5 | |
CVE-2025-71118 | kernel | 5.5 | |
CVE-2025-71141 | kernel | 5.5 | |
CVE-2026-22977 | kernel | 5.5 | |
CVE-2026-22979 | kernel | 5.5 | |
CVE-2026-22991 | kernel | 5.5 | |
CVE-2026-22999 | kernel | 5.5 | |
CVE-2026-23038 | kernel | 5.5 | |
CVE-2025-71186 | kernel | 5.5 | |
CVE-2026-23021 | kernel | 5.5 | |
CVE-2026-23047 | kernel | 5.5 | |
CVE-2026-23059 | kernel | 5.5 | |
CVE-2026-23084 | kernel | 5.5 | |
CVE-2026-23085 | kernel | 5.5 | |
CVE-2026-23094 | kernel | 5.5 | |
CVE-2026-23110 | kernel | 5.5 | |
CVE-2025-71221 | kernel | 5.5 | |
CVE-2026-23205 | kernel | 5.5 | |
CVE-2026-27171 | zlib | 5.5 | |
CVE-2026-23216 | kernel | 5.5 | |
CVE-2025-71232 | kernel | 5.5 | |
CVE-2025-71235 | kernel | 5.5 | |
CVE-2026-3203 | wireshark | 5.5 | |
CVE-2026-28418 | vim | 5.5 | |
CVE-2026-30936 | ImageMagick | 5.5 | |
CVE-2025-66200 | httpd | 5.4 | |
CVE-2025-66168 | activemq | 5.4 | |
CVE-2025-56226 | libsndfile | 5.3 | |
CVE-2026-0959 | wireshark | 5.3 | |
CVE-2026-0962 | wireshark | 5.3 | |
CVE-2025-14831 | gnutls | 5.3 | |
CVE-2025-71225 | kernel | 5.3 | |
CVE-2026-23228 | kernel | 5.3 | |
CVE-2026-28421 | vim | 5.3 | |
CVE-2026-28419 | vim | 5.3 | |
CVE-2026-23865 | freetype | 5.3 | |
CVE-2026-27631 | exiv2 | 5.3 | |
CVE-2026-28434 | cpp-httplib | 5.3 | |
CVE-2026-28687 | ImageMagick | 5.3 | |
CVE-2026-0964 | libssh | 5.0 | |
CVE-2026-28692 | ImageMagick | 4.8 | |
CVE-2024-57974 | kernel | 4.7 | |
CVE-2026-0960 | wireshark | 4.7 | |
CVE-2026-3201 | wireshark | 4.7 | |
CVE-2025-68768 | kernel | 4.4 | |
CVE-2026-23032 | kernel | 4.4 | |
CVE-2026-23163 | kernel | 4.4 | |
CVE-2026-28420 | vim | 4.4 | |
CVE-2026-30935 | ImageMagick | 4.4 | |
CVE-2026-25068 | alsa-lib | 4.3 | |
CVE-2026-28688 | ImageMagick | 4.0 | |
CVE-2026-0989 | libxml2 | 3.7 | |
CVE-2025-8732 | libxml2 | 3.3 | |
CVE-2025-9615 | NetworkManager | 3.3 | |
CVE-2026-0965 | libssh | 3.3 | |
CVE-2025-71220 | kernel | 3.3 | |
CVE-2025-71223 | kernel | 3.3 | |
CVE-2026-23190 | kernel | 3.3 | |
CVE-2026-0968 | libssh | 3.1 | |
CVE-2026-0992 | libxml2 | 2.9 | |
CVE-2026-25884 | exiv2 | 2.7 | |
CVE-2025-71084 | kernel | 2.5 | |
CVE-2026-0967 | libssh | 2.2 | |
CVE-2026-28422 | vim | 2.2 |
Bugfix列表:
ISSUE | Bugfix | 仓库 |
systemd长稳专项中,出现网络networkmanager相关的coredump | NetworkManager | |
fix the CI | rdma-core | |
Code Optimization and Functional Updates | rdma-core | |
Error State Debugging | rdma-core | |
update to version 20260309 | linux-firmware | |
Fix CQ clean when CQ record doorbell enabled | rdma-core | |
基线度量工具不支持sve_vector_length、num_pmu_counters传参 | virtCCA_sdk |
openEuler-24.03-LTS-SP2版本编译构建信息查询链接:
openEuler-24.03-LTS-SP2 Update版本发布源链接:
openEuler CVE 及安全公告公示链接:
openEuler-24.03-LTS-SP2 update版本待修复问题清单(任务ID标注红色的问题单优先级高):
序号 | 里程碑 | 任务ID | 任务标题 | 优先级 | sig组 | 关联仓库 | 任务路径 |
1 | openEuler-24.03-LTS-SP2 | 3654928 | 【openEuler-24.03-LTS-SP2】【autotest】【x86】执行perf list >txt出现告警:WARNING: event 'hswep_unc_imc5::UNC_M_WR_CAS_RANK3:BANKG3' not valid (bits 16 of config '140bb' not supported by kernel)! | 主要 | Kernel | src-openeuler/kernel |
openEuler-24.03-LTS-SP3 Update 20260311
经各SIG及社区开发者贡献,本周openEuler-24.03-LTS-SP3修复版本已知问题11个,已知漏洞69个。目前版本分支剩余待修复缺陷0个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件源码仓库
openEuler-24.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
CVE列表:
ISSUE | CVE | 仓库 | SCORE |
CVE-2026-24054 | kata-containers-go | 10.0 | |
CVE-2026-24054 | kata-containers-go | 10.0 | |
CVE-2026-3731 | libssh | 9.8 | |
CVE-2025-10729 | qt5-qtsvg | 9.4 | |
CVE-2024-38999 | nodejs-requirejs | 8.6 | |
CVE-2026-27622 | OpenEXR | 8.4 | |
CVE-2026-27601 | nodejs-underscore | 8.2 | |
CVE-2026-1642 | nginx | 8.2 | |
CVE-2026-28693 | ImageMagick | 8.1 | |
CVE-2025-5202 | assimp | 7.8 | |
CVE-2025-5201 | assimp | 7.8 | |
CVE-2025-5203 | assimp | 7.8 | |
CVE-2025-5204 | assimp | 7.8 | |
CVE-2026-28417 | vim | 7.8 | |
CVE-2026-30929 | ImageMagick | 7.7 | |
CVE-2024-47866 | ceph | 7.5 | |
CVE-2026-27596 | exiv2 | 7.5 | |
CVE-2026-28435 | cpp-httplib | 7.5 | |
CVE-2026-28691 | ImageMagick | 7.5 | |
CVE-2026-28494 | ImageMagick | 7.1 | |
CVE-2026-26158 | busybox | 7.0 | |
CVE-2026-26157 | busybox | 7.0 | |
CVE-2026-28690 | ImageMagick | 6.9 | |
CVE-2026-30931 | ImageMagick | 6.8 | |
CVE-2026-30937 | ImageMagick | 6.8 | |
CVE-2026-28686 | ImageMagick | 6.8 | |
CVE-2026-0966 | libssh | 6.5 | |
CVE-2026-28493 | ImageMagick | 6.5 | |
CVE-2025-2755 | assimp | 6.3 | |
CVE-2026-28689 | ImageMagick | 6.3 | |
CVE-2026-0990 | libxml2 | 5.9 | |
CVE-2026-29076 | cpp-httplib | 5.9 | |
CVE-2026-30883 | ImageMagick | 5.7 | |
CVE-2026-0961 | wireshark | 5.5 | |
CVE-2026-27171 | zlib | 5.5 | |
CVE-2026-3203 | wireshark | 5.5 | |
CVE-2026-28418 | vim | 5.5 | |
CVE-2026-30936 | ImageMagick | 5.5 | |
CVE-2025-66168 | activemq | 5.4 | |
CVE-2025-56226 | libsndfile | 5.3 | |
CVE-2026-0959 | wireshark | 5.3 | |
CVE-2026-0962 | wireshark | 5.3 | |
CVE-2025-14831 | gnutls | 5.3 | |
CVE-2026-28421 | vim | 5.3 | |
CVE-2026-28419 | vim | 5.3 | |
CVE-2026-23865 | freetype | 5.3 | |
CVE-2026-27631 | exiv2 | 5.3 | |
CVE-2026-28434 | cpp-httplib | 5.3 | |
CVE-2026-28687 | ImageMagick | 5.3 | |
CVE-2026-23865 | freetype | 5.3 | |
CVE-2026-0964 | libssh | 5.0 | |
CVE-2026-28692 | ImageMagick | 4.8 | |
CVE-2026-0960 | wireshark | 4.7 | |
CVE-2026-3201 | wireshark | 4.7 | |
CVE-2026-28420 | vim | 4.4 | |
CVE-2026-30935 | ImageMagick | 4.4 | |
CVE-2025-2752 | assimp | 4.3 | |
CVE-2026-25068 | alsa-lib | 4.3 | |
CVE-2025-69418 | edk2 | 4.0 | |
CVE-2026-28688 | ImageMagick | 4.0 | |
CVE-2026-0989 | libxml2 | 3.7 | |
CVE-2025-8732 | libxml2 | 3.3 | |
CVE-2025-9615 | NetworkManager | 3.3 | |
CVE-2026-0965 | libssh | 3.3 | |
CVE-2026-0968 | libssh | 3.1 | |
CVE-2026-0992 | libxml2 | 2.9 | |
CVE-2026-25884 | exiv2 | 2.7 | |
CVE-2026-0967 | libssh | 2.2 | |
CVE-2026-28422 | vim | 2.2 |
Bugfix列表:
ISSUE | Bugfix | 仓库 |
fix the CI | rdma-core | |
Code Optimization and Functional Updates | rdma-core | |
Error State Debugging | rdma-core | |
当前gcc-14不支持变长memcpy inline,影响性能 | gcc-14 | |
update to version 20260309 | linux-firmware | |
oeAware集成分域调度特性 | oeAware-manager | |
Fix CQ clean when CQ record doorbell enabled | rdma-core | |
【update-20260226】【arm/x86】gala-anteater 安装有异常信息 | gala-anteater | |
Global Trust Authority: 支持CCA、DIM、昇腾NPU的远程证明 | release-management | |
Global Trust Authority: 支持CCA、DIM、昇腾NPU的远程证明 | release-management | |
Global Trust Authority: 支持CCA、DIM、昇腾NPU的远程证明 | global-trust-authority |
openEuler-24.03-LTS-SP3版本编译构建信息查询链接:
openEuler-24.03-LTS-SP3 Update版本发布源链接:
openEuler CVE 及安全公告公示链接:
openEuler-24.03-LTS-SP3 update版本待修复问题清单(任务ID标注红色的问题单优先级高):
序号 | 里程碑 | 任务ID | 任务标题 | 优先级 | sig组 | 关联仓库 | 任务路径 |
1 | openEuler-24.03-LTS-SP3 | 3791019 | 【openEuler-24.03-LTS-SP3-update20260304】【arm】oeAware-manager构建失败 | 不重要 | A-Tune | src-openeuler/oeAware-manager | |
2 | openEuler-24.03-LTS-SP3 | 3790642 | 【openEuler-24.03-LTS-SP1-update20260304】【arm】oeAware-manager构建失败 | 不重要 | A-Tune | src-openeuler/oeAware-manager | |
3 | openEuler-24.03-LTS-SP3 | 3781031 | 【update-20260226】【arm/x86】gala-anteater 安装有异常信息 | 严重 | sig-ops | src-openeuler/gala-anteater | |
4 | openEuler-24.03-LTS-SP3 | 3766635 | 【openEuler 24.03-LTS-SP3-update20260211】【aarch64】安装并启动ubse后,内核的ubcore call trace挂死 | 主要 | Kernel | src-openeuler/kernel | |
5 | openEuler-24.03-LTS-SP3 | 3755070 | oedp卸载openEuler-Intelligence失败 | 主要 | sig-ops | openeuler/oeDeploy | |
6 | openEuler-24.03-LTS-SP3 | 3749825 | 【24.03-LTS-SP3】gala-anteater.service服务启动失败 | 次要 | sig-ops | src-openeuler/gala-anteater | |
7 | openEuler-24.03-LTS-SP3 | 3742364 | 【24.03-LTS-SP3】 [arm/x86] python3-vllm安装包缺少许多依赖库 | 主要 | ai | src-openeuler/vllm | |
8 | openEuler-24.03-LTS-SP3 | 3722603 | 【24.03-LTS-SP3-update20260114】【arm】ub-pkg-manager.service,ub-pkg-mem.service,ub-pkg-urma.service,ub-pkg-virt.service服务启动失败,日志有报错 | 不重要 | sig-UnifiedBus | src-openeuler/ub-pkg-manager | |
9 | openEuler-24.03-LTS-SP3 | 3721302 | [24.03 -LTS-SP3][jotai]测试套部分测试用例使用参数"-O3 -fwhole-program -flto-partition=one -fipa-struct-reorg=6 -fipa-localize-array -fipa-alignment-propagation"编译的二进制报错segmentation fault (core dumped) | 不重要 | Compiler | src-openeuler/gcc | |
10 | openEuler-24.03-LTS-SP3 | 3706410 | 【EulerMaker】 ub-lldpd 在openEuler-24.03-LTS-SP3:everything中构建失败问题 | 不重要 | Networking | src-openeuler/ub-lldpd | |
11 | openEuler-24.03-LTS-SP3 | 3706407 | 【EulerMaker】 openhitls 在openEuler-24.03-LTS-SP3:everything中构建失败问题 | 不重要 | sig-security-facility | src-openeuler/openhitls | |
12 | openEuler-24.03-LTS-SP3 | 3706401 | 【EulerMaker】 cryptsetup 在openEuler-24.03-LTS-SP3:everything中构建失败问题 | 不重要 | Storage | src-openeuler/cryptsetup | |
13 | openEuler-24.03-LTS-SP3 | 3706216 | 【EulerMaker】 libyubikey 在openEuler-24.03-LTS-SP3:everything中构建失败问题 | 不重要 | src-openeuler/libyubikey |
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG关注涉及CVE组件的修复情况。
严重等级(Severity Rating) | 漏洞修复时长 |
致命(Critical) | 7天 |
高(High) | 14天 |
中(Medium) | 30天 |
低(Low) | 30天 |
近14天将超期CVE(2026-03-13)日数据
漏洞编号 | Issue ID | 剩余天数 | cvss评分 | 软件包 | 责任SIG |
CVE-2022-22483 | 13.82 | 0.0 | kernel | Kernel | |
CVE-2022-22487 | 13.77 | 0.0 | kernel | Kernel | |
CVE-2022-22489 | 13.77 | 0.0 | kernel | Kernel | |
CVE-2022-22493 | 13.77 | 0.0 | kernel | Kernel | |
CVE-2022-22494 | 13.77 | 0.0 | kernel | Kernel | |
CVE-2022-22496 | 13.77 | 0.0 | kernel | Kernel | |
CVE-2022-22329 | 13.76 | 0.0 | kernel | Kernel | |
CVE-2022-22330 | 13.76 | 0.0 | kernel | Kernel | |
CVE-2022-22373 | 13.76 | 0.0 | kernel | Kernel | |
CVE-2022-22411 | 13.76 | 0.0 | kernel | Kernel | |
CVE-2022-22424 | 13.76 | 0.0 | kernel | Kernel | |
CVE-2022-22450 | 13.76 | 0.0 | kernel | Kernel | |
CVE-2022-22452 | 13.76 | 0.0 | kernel | Kernel | |
CVE-2022-22453 | 13.76 | 0.0 | kernel | Kernel | |
CVE-2022-22460 | 13.76 | 0.0 | kernel | Kernel | |
CVE-2022-22472 | 13.76 | 0.0 | kernel | Kernel | |
CVE-2022-22473 | 13.76 | 0.0 | kernel | Kernel | |
CVE-2022-22477 | 13.76 | 0.0 | kernel | Kernel | |
CVE-2022-22478 | 13.76 | 0.0 | kernel | Kernel | |
CVE-2022-22480 | 13.76 | 0.0 | kernel | Kernel | |
CVE-2021-46837 | 13.71 | 0.0 | kernel | Kernel | |
CVE-2025-10010 | 13.51 | 0.0 | kernel | Kernel | |
CVE-2026-3099 | 13.43 | 0.0 | libsoup | Desktop | |
CVE-2021-47515 | 13.14 | 3.9 | kernel | Kernel | |
CVE-2025-40006 | 13.0 | 4.7 | kernel | Kernel | |
CVE-2026-23003 | 11.96 | 6.1 | kernel | Kernel | |
CVE-2026-22998 | 11.95 | 6.4 | kernel | Kernel | |
CVE-2025-40109 | 11.54 | 5.5 | kernel | Kernel | |
CVE-2025-71221 | 11.04 | 5.5 | kernel | Kernel | |
CVE-2023-53091 | 10.08 | 5.5 | kernel | Kernel | |
CVE-2025-38500 | 10.06 | 3.9 | kernel | Kernel | |
CVE-2026-27113 | 9.85 | 0.0 | zsh | Base-service | |
CVE-2025-38680 | 9.08 | 5.5 | kernel | Kernel | |
CVE-2022-49832 | 9.02 | 5.5 | kernel | Kernel | |
CVE-2025-38694 | 9.01 | 5.5 | kernel | Kernel | |
CVE-2025-23150 | 8.9 | 5.5 | kernel | Kernel | |
CVE-2026-2708 | 8.83 | 0.0 | libsoup | Desktop | |
CVE-2026-27205 | 8.82 | 0.0 | python-flask | Programming-language | |
CVE-2025-38124 | 8.78 | 5.5 | kernel | Kernel | |
CVE-2025-38120 | 8.76 | 5.5 | kernel | Kernel | |
CVE-2025-38050 | 8.49 | 3.9 | kernel | Kernel | |
CVE-2022-49938 | 8.45 | 5.5 | kernel | Kernel | |
CVE-2024-50286 | 8.39 | 7.0 | kernel | Kernel | |
CVE-2023-53384 | 7.98 | 5.5 | kernel | Kernel | |
CVE-2025-71108 | 7.98 | 5.5 | kernel | Kernel | |
CVE-2025-71113 | 7.98 | 5.5 | kernel | Kernel | |
CVE-2025-71119 | 7.98 | 5.5 | kernel | Kernel | |
CVE-2023-53369 | 7.92 | 5.5 | kernel | Kernel | |
CVE-2023-53395 | 7.91 | 5.7 | kernel | Kernel | |
CVE-2023-53506 | 7.87 | 4.5 | kernel | Kernel | |
CVE-2025-68734 | 7.82 | 5.5 | kernel | Kernel | |
CVE-2025-71236 | 7.58 | 5.8 | kernel | Kernel | |
CVE-2025-71235 | 7.58 | 5.5 | kernel | Kernel | |
CVE-2025-71234 | 7.58 | 5.8 | kernel | Kernel | |
CVE-2025-71233 | 7.58 | 4.4 | kernel | Kernel | |
CVE-2025-71232 | 7.58 | 5.5 | kernel | Kernel | |
CVE-2025-71231 | 7.58 | 5.5 | kernel | Kernel | |
CVE-2026-23230 | 7.58 | 6.3 | kernel | Kernel | |
CVE-2026-23229 | 7.58 | 5.5 | kernel | Kernel | |
CVE-2026-23228 | 7.58 | 5.3 | kernel | Kernel | |
CVE-2026-23222 | 7.58 | 5.5 | kernel | Kernel | |
CVE-2026-23221 | 7.58 | 5.5 | kernel | Kernel | |
CVE-2025-71229 | 7.58 | 5.5 | kernel | Kernel | |
CVE-2025-71225 | 7.52 | 5.3 | kernel | Kernel | |
CVE-2025-71227 | 7.52 | 0.0 | kernel | Kernel | |
CVE-2026-23212 | 7.52 | 5.3 | kernel | Kernel | |
CVE-2026-23213 | 7.52 | 0.0 | kernel | Kernel | |
CVE-2026-23214 | 7.52 | 0.0 | kernel | Kernel | |
CVE-2026-23217 | 7.52 | 0.0 | kernel | Kernel | |
CVE-2026-23085 | 7.04 | 5.5 | kernel | Kernel | |
CVE-2025-68788 | 7.0 | 5.5 | kernel | Kernel | |
CVE-2025-68791 | 7.0 | 5.5 | kernel | Kernel | |
CVE-2025-68798 | 7.0 | 5.5 | kernel | Kernel | |
CVE-2025-68805 | 7.0 | 6.4 | kernel | Kernel | |
CVE-2025-68821 | 7.0 | 5.5 | kernel | Kernel | |
CVE-2026-2641 | 6.8 | 0.0 | ctags | Base-service | |
CVE-2024-3596 | 6.72 | 9.0 | krb5 | Base-service | |
CVE-2025-61726 | 6.63 | 7.5 | golang | sig-golang | |
CVE-2023-53615 | 6.06 | 6.0 | kernel | Kernel | |
CVE-2022-50470 | 6.05 | 4.7 | kernel | Kernel | |
CVE-2026-2604 | 5.94 | 0.0 | evolution-data-server | Desktop | |
CVE-2025-40038 | 5.87 | 6.1 | kernel | Kernel | |
CVE-2023-53275 | 5.7 | 5.5 | kernel | Kernel | |
CVE-2023-53286 | 5.7 | 5.5 | kernel | Kernel | |
CVE-2025-71238 | 5.54 | 7.3 | kernel | Kernel | |
CVE-2025-21490 | 4.97 | 4.9 | mariadb | DB | |
CVE-2023-53150 | 4.94 | 5.5 | kernel | Kernel | |
CVE-2026-0032 | 3.73 | 7.8 | kernel | Kernel | |
CVE-2026-23205 | 3.62 | 5.5 | kernel | Kernel | |
CVE-2026-23208 | 3.62 | 6.5 | kernel | Kernel | |
CVE-2025-71203 | 3.61 | 0.0 | kernel | Kernel | |
CVE-2025-71204 | 3.61 | 5.5 | kernel | Kernel | |
CVE-2025-71220 | 3.61 | 3.3 | kernel | Kernel | |
CVE-2025-71223 | 3.61 | 3.3 | kernel | Kernel | |
CVE-2025-71224 | 3.61 | 0.0 | kernel | Kernel | |
CVE-2026-23177 | 3.61 | 5.5 | kernel | Kernel | |
CVE-2026-23178 | 3.61 | 5.5 | kernel | Kernel | |
CVE-2026-23179 | 3.61 | 6.5 | kernel | Kernel | |
CVE-2026-23180 | 3.61 | 0.0 | kernel | Kernel | |
CVE-2026-23181 | 3.61 | 0.0 | kernel | Kernel | |
CVE-2026-23186 | 3.61 | 0.0 | kernel | Kernel | |
CVE-2026-23190 | 3.61 | 3.3 | kernel | Kernel | |
CVE-2026-23198 | 3.61 | 4.7 | kernel | Kernel | |
CVE-2026-23146 | 3.59 | 0.0 | kernel | Kernel | |
CVE-2026-23154 | 3.59 | 3.3 | kernel | Kernel | |
CVE-2026-23157 | 3.59 | 0.0 | kernel | Kernel | |
CVE-2026-23161 | 3.59 | 5.5 | kernel | Kernel | |
CVE-2026-23163 | 3.59 | 4.4 | kernel | Kernel | |
CVE-2026-23164 | 3.59 | 0.0 | kernel | Kernel | |
CVE-2026-23167 | 3.59 | 0.0 | kernel | Kernel | |
CVE-2026-23169 | 3.59 | 5.6 | kernel | Kernel | |
CVE-2026-23170 | 3.59 | 5.5 | kernel | Kernel | |
CVE-2026-23173 | 3.59 | 4.1 | kernel | Kernel | |
CVE-2026-23138 | 3.57 | 5.5 | kernel | Kernel | |
CVE-2026-23142 | 3.57 | 0.0 | kernel | Kernel | |
CVE-2025-71202 | 3.57 | 6.5 | kernel | Kernel | |
CVE-2026-23141 | 3.57 | 0.0 | kernel | Kernel | |
CVE-2026-23140 | 3.57 | 5.5 | kernel | Kernel | |
CVE-2026-23137 | 3.57 | 4.4 | kernel | Kernel | |
CVE-2026-23133 | 3.57 | 4.7 | kernel | Kernel | |
CVE-2026-23144 | 3.57 | 0.0 | kernel | Kernel | |
CVE-2026-23145 | 3.57 | 3.3 | kernel | Kernel | |
CVE-2026-2436 | 3.56 | 0.0 | libsoup | Desktop | |
CVE-2026-23113 | 3.54 | 5.5 | kernel | Kernel | |
CVE-2026-23118 | 3.54 | 0.0 | kernel | Kernel | |
CVE-2026-23119 | 3.54 | 5.5 | kernel | Kernel | |
CVE-2026-23120 | 3.54 | 5.8 | kernel | Kernel | |
CVE-2026-23121 | 3.54 | 0.0 | kernel | Kernel | |
CVE-2026-23124 | 3.54 | 5.9 | kernel | Kernel | |
CVE-2026-23125 | 3.54 | 5.5 | kernel | Kernel | |
CVE-2026-23126 | 3.54 | 6.3 | kernel | Kernel | |
CVE-2026-23128 | 3.54 | 0.0 | kernel | Kernel | |
CVE-2023-53073 | 3.08 | 3.9 | kernel | Kernel | |
CVE-2025-39845 | 2.99 | 5.5 | kernel | Kernel | |
CVE-2025-38210 | 2.91 | 3.9 | kernel | Kernel | |
CVE-2026-2443 | 2.42 | 0.0 | libsoup | Desktop | |
CVE-2023-53010 | 2.09 | 5.5 | kernel | Kernel | |
CVE-2025-21892 | 1.99 | 4.7 | kernel | Kernel | |
CVE-2025-38345 | 1.88 | 3.9 | kernel | Kernel | |
CVE-2025-40088 | 1.76 | 5.5 | kernel | Kernel | |
CVE-2025-68121 | 1.42 | 0.0 | skopeo | sig-CloudNative | |
CVE-2025-68121 | 1.42 | 0.0 | git-lfs | Infrastructure | |
CVE-2025-39754 | 1.09 | 5.5 | kernel | Kernel | |
CVE-2024-25580 | 1.0 | 6.3 | qt5-qtbase | sig-QT | |
CVE-2025-71120 | 0.98 | 6.5 | kernel | Kernel | |
CVE-2023-7324 | 0.92 | 5.5 | kernel | Kernel | |
CVE-2023-53454 | 0.86 | 4.6 | kernel | Kernel | |
CVE-2025-22873 | 0.42 | 0.0 | skopeo | sig-CloudNative | |
CVE-2026-23209 | 0.35 | 7.0 | kernel | Kernel | |
CVE-2025-61732 | 0.3 | 8.6 | golang | sig-golang | |
CVE-2025-68119 | 0.3 | 7.0 | golang | sig-golang | |
CVE-2025-61731 | 0.3 | 7.8 | golang | sig-golang | |
CVE-2023-50387 | 0.0 | 7.5 | bind | Networking | |
CVE-2024-28180 | 0.0 | 4.3 | skopeo | sig-CloudNative | |
CVE-2025-68819 | 0.0 | 6.1 | kernel | Kernel | |
CVE-2025-71084 | 0.0 | 2.5 | kernel | Kernel | |
CVE-2025-71091 | 0.0 | 5.5 | kernel | Kernel |
社区关键组件待修复缺陷:
openEuler社区存在无版本里程碑的缺陷,请各个SIG 关注涉及质量等级为L1-L2软件包的缺陷修复情况。
社区提单可参考社区QA 版本测试提单规范
关键组件待修复缺陷清单(无版本里程碑):
序号 | 关联仓库名 | 工作项类型 | 工作项标题 | sig | 创建时间 | 优先级 | 工作项 ID 编号 |
1 | kernel | 任务 | 删除iptable_filter.ko时出现空指针问题 | sig/Kernel | 2022/5/19 20:36 | 无优先级 | |
2 | kernel | 任务 | OLK-5.10 page owner功能增强 | sig/Kernel | 2022/6/13 20:30 | 无优先级 | |
3 | kernel | 任务 | Upgrade to latest release [kernel: 5.10.0 -> 5.17] | sig/Kernel | 2022/6/21 10:01 | 无优先级 | |
4 | kernel | 任务 | 反复触发i40e网卡sriov增删vf后,iavf_remove触发BUG_ON at drivers/pci/msi.c:397 | sig/Kernel | 2022/8/29 20:23 | 无优先级 | |
5 | kernel | 任务 | 注入内存申请故障,i40iw_initialize_dev失败时出现oops复位 | sig/Kernel | 2022/9/2 9:56 | 无优先级 | |
6 | gcc | 缺陷 | Bug in openEuler/gcc (10.3.1) support for ARM SVE, which randomly modifies the prediction register | sig/Compiler | 2022/9/15 11:49 | 无优先级 | |
7 | kernel | 任务 | 内存可靠性分级需求 | sig/Kernel | 2022/9/16 16:16 | 无优先级 | |
8 | gcc | 缺陷 | -with-arch_32=x86-64是否有问题 | sig/Compiler | 2023/3/9 11:34 | 无优先级 | |
9 | openssl | 任务 | openssl 3.0 支持TLCP特性 | sig/sig-security-fac | 2023/3/13 11:35 | 无优先级 | |
10 | curl | 任务 | curl命令向hadoop3.2.1 webhdfs put文件失败 | sig/Networking | 2023/4/7 18:02 | 严重 | |
11 | gcc | 任务 | Bug in openEuler/gcc (10.3.0) support for ARM SVE openmp | sig/Compiler | 2023/4/10 16:14 | 无优先级 | |
12 | gtk2 | 任务 | Upgrade to latest release [gtk2: 2.24.33 2020/12/20 -> 4.11.4 2023/07/03] | sig/Desktop | 2023/7/17 20:50 | 无优先级 | |
13 | glibc | 缺陷 | 不能释放不连续的内存 | sig/Computing | 2023/11/21 13:16 | 无优先级 | |
14 | kernel | 任务 | dnf reinstall kernel 导致grub.conf 本内核项被删除 | sig/Kernel | 2023/11/29 10:30 | 无优先级 | |
15 | cronie | 任务 | Upgrade to latest release [cronie: 1.6.1 2022/04/25 -> 1.7.0 2023/10/13] | sig/Base-service | 2023/12/15 11:04 | 无优先级 | |
16 | dbus | 任务 | Upgrade to latest release [dbus: 1.14.8 2023/06/06 -> 1.15.8 2023/08/21] | sig/Base-service | 2023/12/15 11:06 | 无优先级 | |
17 | qemu | 任务 | qemu 4.1 虚拟机热迁移到qemu 6.2失败 | sig/Virt | 2024/1/2 17:01 | 无优先级 | |
18 | kernel | 任务 | 鲲鹏920服务器多次重启后系统盘盘符跳变 | sig/Kernel | 2024/1/8 11:18 | 无优先级 | |
19 | libcap | 任务 | Upgrade to latest release [libcap: 2.69 2023/05/14 -> 20071031 2007/10/31] | sig/sig-security-fac | 2024/1/12 9:17 | 无优先级 | |
20 | libselinux | 任务 | Upgrade to latest release [libselinux: 3.5 2023/02/23 -> 3.6 2023/12/13] | sig/sig-security-fac | 2024/1/12 9:17 | 无优先级 | |
21 | kernel | 缺陷 | rpm宏用$引用可能会出现空值 | sig/Kernel | 2024/1/21 22:27 | 无优先级 | |
22 | qemu | 任务 | 欧拉系统virt-install 创建虚拟机video类型默认使用qxl | sig/Virt | 2024/1/29 10:44 | 无优先级 | |
23 | qemu | 任务 | 【24.03 LTS】软件包选型 | sig/Virt | 2024/2/23 17:46 | 无优先级 | |
24 | qemu | 任务 | openEuler-22.03-LTS-SP3的6.2.0-88版本何时发布? | sig/Virt | 2024/3/4 0:39 | 无优先级 | |
25 | systemd | 任务 | systemd中缺少文件 | sig/Base-service | 2024/3/6 14:53 | 无优先级 | |
26 | kernel | 缺陷 | preempt-RT补丁中存在bug,运行2天以上的igh-ethercat时系统高概率死机 | sig/Kernel | 2024/3/12 16:09 | 无优先级 | |
27 | glibc | 任务 | 使用clang时缺少gnu/stubs-32.h文件 | sig/Computing | 2024/3/26 13:43 | 无优先级 | |
28 | kernel | 缺陷 | 【B/Y KV190 -BMC 系统测试】【长稳测试】【uniscan】DC第19次,OS进入紧急模式 | sig/Kernel | 2024/3/29 15:27 | 无优先级 | |
29 | kernel | 缺陷 | openEuler-22.03-LTS-SP1中自带的i40e网卡驱动,无法虚拟网卡 | sig/Kernel | 2024/3/29 16:57 | 无优先级 | |
30 | libvirt | 任务 | [openEuler-22.03-LTS] libvirt install failed | sig/Virt | 2024/4/11 15:44 | 无优先级 | |
31 | e2fsprogs | 任务 | 22.03-LTS-Next分支与22.03-LTS-SP3分支不同步,需要手动同步 | sig/Storage | 2024/4/11 16:57 | 无优先级 | |
32 | qemu | 缺陷 | mock编译aarch64架构qemu提示ERROR:Include dir /usr/include/openssl does not exist | sig/Virt | 2024/4/17 10:23 | 无优先级 | |
33 | e2fsprogs | 任务 | 虚拟机使用ext4文件系统,扩容磁盘后,执行resize2fs扩容文件系统出错 | sig/Storage | 2024/4/25 17:00 | 无优先级 | |
34 | gcc | 任务 | gcc 11.0.4 编译报错 cc1plus: internal compiler error: in fail_formatted, at selftest.c:63 | sig/Compiler | 2024/4/27 12:12 | 无优先级 | |
35 | qemu | 缺陷 | [openeuler 24.03] qemu8.2 无法创建uefi虚拟机 | sig/Virt | 2024/4/29 16:35 | 无优先级 | |
36 | kernel | 缺陷 | build error:nothing provides sign-openEuler | sig/Kernel | 2024/4/30 15:21 | 无优先级 | |
37 | openssl | 任务 | CVE-2022-2068已经修复 但是未在 changelog中体现 | sig/sig-security-fac | 2024/5/14 16:09 | 无优先级 | |
38 | libvirt | 任务 | libvert: Live migration with the PCIe device is not supported. | sig/Virt | 2024/5/16 14:13 | 无优先级 | |
39 | kernel | 缺陷 | 【22.03-SP1】安装22.03-SP1 rpm手册 | sig/Kernel | 2024/5/16 15:07 | 无优先级 | |
40 | kernel | 缺陷 | 【22.03-SP1】kernel.spec存在changelog错误规范,编译无法构建 | sig/Kernel | 2024/5/16 15:10 | 无优先级 | |
41 | libvirt | 缺陷 | virsh起虚机第一遍能成功,第二遍卡在UEFI的位置 | sig/Virt | 2024/5/17 16:42 | 无优先级 | |
42 | libvirt | 缺陷 | 【24.03-LTS-RTM】libvirt指向ovmf文件夹的路径错误导致无法加载ovmf组件新建虚拟机 | sig/Virt | 2024/6/13 9:52 | 无优先级 | |
43 | systemd | 任务 | systemd-udev更新设备分区符号链接失败报错 | sig/Base-service | 2024/6/13 16:25 | 无优先级 | |
44 | qemu | 任务 | openeuler2403 qemu8.2 不支持host-model模式启动虚拟机 | sig/Virt | 2024/6/19 15:54 | 无优先级 | |
45 | gcc | 缺陷 | libstdc++-devel中的c++config.h存在版本差异 | sig/Compiler | 2024/6/25 9:36 | 无优先级 | |
46 | qemu | 任务 | 22.03-sp3 arm64不支持cpu热插拔吗,guest-os是centos7 | sig/Virt | 2024/6/26 16:50 | 无优先级 | |
47 | qemu | 缺陷 | qemu-8.2.0在特定情况下无法启动虚拟机,blockdev中的断言语句报错 | sig/Virt | 2024/6/27 18:13 | 无优先级 | |
48 | qemu | 任务 | 飞腾服务器异平台虚拟机热迁移问题补丁 | sig/Virt | 2024/6/28 17:34 | 无优先级 | |
49 | dbus | 任务 | dbus报错,超过用户最大连接数 | sig/Base-service | 2024/7/3 21:19 | 无优先级 | |
50 | qemu | 缺陷 | [openEuler-22.03-LTS-SP4] [ppc64le] dtc secure comple补丁导致段错误问题 | sig/Virt | 2024/7/5 15:49 | 无优先级 | |
51 | bash | 任务 | 欧拉OS的shell操作日志中的明文口令可能被记录到journal日志文件中 | sig/Base-service | 2024/7/30 19:15 | 无优先级 | |
52 | kernel | 缺陷 | openeuler2403-LTS分支,源码为6.6.0-38内核启动失败,疑似pahole版本过旧导致 | sig/Kernel | 2024/8/19 16:12 | 无优先级 | |
53 | qemu | 缺陷 | ../blockdev.c:629: blockdev_init: Assertion `(bdrv_flags & BDRV_O_CACHE_MASK) == 0' failed. | sig/Virt | 2024/8/20 15:19 | 无优先级 | |
54 | kernel | 缺陷 | 5.10.0内核版本合入补丁,引入的bug,导致xfstest generic/223测试项不通过 | sig/Kernel | 2024/8/21 10:07 | 无优先级 | |
55 | kernel | 任务 | x86内核包,用rpm -qP命令查询出aarch64信息 | sig/Kernel | 2024/8/27 10:59 | 无优先级 | |
56 | kernel | 任务 | [OLK-5.10] kobject_uevent: Fix OOB access within zap_modalias_env() | sig/Kernel | 2024/8/28 21:26 | 无优先级 | |
57 | kernel | 任务 | [OLK-5.10] sched/fair: set_load_weight() must also call reweight_task() for SCHED_IDLE tasks | sig/Kernel | 2024/8/29 10:00 | 无优先级 | |
58 | gcc | 缺陷 | [22.03 SP1 aarch64] 使用gcc-10 编译libreoffice出现链接错误 | sig/Compiler | 2024/9/3 16:29 | 无优先级 | |
59 | kernel | 缺陷 | openEuler-22.03-LTS-SP4发布时缺少kernel-64kb包 | sig/Kernel | 2024/9/4 15:23 | 无优先级 | |
60 | kernel | 缺陷 | 内核再编译报错 | sig/Kernel | 2024/9/9 14:04 | 无优先级 | |
61 | kernel | 任务 | [OLK-6.6]sched/core: Fix unbalance set_rq_online/offline() in sched_cpu_deactivate() | sig/Kernel | 2024/9/12 10:49 | 无优先级 | |
62 | kernel | 任务 | 【OLK 5.10】KASAN: use-after-free Read in nfsd_file_queue_for_close | sig/Kernel | 2024/9/13 11:48 | 无优先级 | |
63 | kernel | 缺陷 | [openEuler 2203 sp4] RT spinlock panic | sig/Kernel | 2024/9/18 10:25 | 无优先级 | |
64 | kernel | 缺陷 | rpm查询内核provides信息,显示不合理 | sig/Kernel | 2024/9/20 11:52 | 无优先级 | |
65 | qemu | 缺陷 | 24.03-LTS 版本无法 qemu-system-x86_64 命令启动 | sig/Virt | 2024/9/23 20:27 | 无优先级 | |
66 | iproute | 任务 | 6.6.0版本相比6.4.0版本差异分析 | sig/Networking | 2024/9/24 23:22 | 无优先级 | |
67 | kernel | 缺陷 | 基于NFS存储的KVM虚拟机创建失败 | sig/Kernel | 2024/9/25 11:37 | 无优先级 | |
68 | gcc | 缺陷 | (X86平台)20.03LTS的版本上,g++编译附件的用例耗时异常问题 | sig/Compiler | 2024/9/26 14:26 | 无优先级 | |
69 | qemu | 缺陷 | qemu 转发端口失败 | sig/Virt | 2024/10/11 15:23 | 无优先级 | |
70 | kernel | 缺陷 | Cgroup限制对910b不生效 | sig/Kernel | 2024/10/11 16:19 | 无优先级 | |
71 | mesa | 任务 | 升级mesa版本 24.0.3版本后gtk4-widget-factory运行报错 | sig/Desktop | 2024/10/20 14:41 | 无优先级 | |
72 | qemu | 缺陷 | qemu-img create 非本地文件必然失败 | sig/Virt | 2024/10/23 17:31 | 无优先级 | |
73 | openssh | 任务 | scp传输大文件从10G以后速度极速下降 | sig/Networking | 2024/10/23 18:46 | 无优先级 | |
74 | openssh | 任务 | 升级openssh9.9导致服务无法启动,注释配置后,由于openssh官方禁用DSA,导致免密失效 | sig/Networking | 2024/10/25 11:47 | 无优先级 | |
75 | openssl | 任务 | openeuler24.03-LTS 构建不成功 backport-CVE-2024-2511-Fix-unconstrained-session-cache-growth-in-TLSv1.3.patch失败 | sig/sig-security-fac | 2024/10/30 16:38 | 无优先级 | |
76 | openssh | 任务 | 添加了编译宏PASSWD_NEEDS_USERNAME后,普通用户密码到期无法重置问题 | sig/Networking | 2024/11/1 13:59 | 无优先级 | |
77 | kernel | 任务 | [OLK-6.6]sched/core: Disable page allocation in task_tick_mm_cid() | sig/Kernel | 2024/11/3 21:16 | 无优先级 | |
78 | kernel | 任务 | 【EulerMaker】kernel-rt在openEuler-22.03-LTS-SP1/3/4:everything构建失败 | sig/Kernel | 2024/11/6 11:48 | 无优先级 | |
79 | kernel | 任务 | 5.10 主线补丁回合 | sig/Kernel | 2024/11/8 11:36 | 无优先级 | |
80 | gnutls | 任务 | upgrade to latest version 3.8.8 | sig/sig-security-fac | 2024/11/12 10:56 | 无优先级 | |
81 | zlib | 任务 | 同步master分支的1.3.1版本到2403分支 | sig/Base-service | 2024/11/13 9:58 | 无优先级 | |
82 | kernel | 缺陷 | openEuler 22.03 LTS SP3升级内核后,mlnx网卡驱动无法加载 | sig/Kernel | 2024/11/14 15:50 | 严重 | |
83 | kernel | 缺陷 | openEuler 22.03sp4比 22.03sp3系统调用耗时高40% | sig/Kernel | 2024/11/19 14:47 | 无优先级 | |
84 | kernel | 缺陷 | olk-6.6 smb3 xfstests generic/316失败 | sig/Kernel | 2024/11/19 16:09 | 无优先级 | |
85 | kernel | 缺陷 | kernel启动时输入用户名密码,显示module is unknow | sig/Kernel | 2024/11/19 16:14 | 无优先级 | |
86 | openssh | 任务 | build warnings:%patchN is deprecated (2 usages found), use %patch N (or %patch -P N) | sig/Networking | 2024/11/21 14:32 | 无优先级 | |
87 | kernel | 缺陷 | openouler操作系统,重启后网络配置文件没有生效 | sig/Kernel | 2024/11/26 21:54 | 无优先级 | |
88 | gcc | 缺陷 | [24.03-LTS-SP1 RC3] set(CMAKE_BUILD_TYPE "Release") 构建选项导致动态库报错 | sig/Compiler | 2024/12/2 15:00 | 无优先级 | |
89 | kernel | 任务 | hulk-6.6 冲突主线补丁回合 | sig/Kernel | 2024/12/4 11:05 | 无优先级 | |
90 | systemd | 任务 | credentials 特性会创建一个只读的ramfs文件系统,但是100%使用,剩余容量显示为0 | sig/Base-service | 2024/12/4 14:36 | 无优先级 | |
91 | kernel | 任务 | 主线补丁回合:uprobes: Fix race in uprobe_free_utask | sig/Kernel | 2025/2/5 16:56 | 无优先级 | |
92 | gcc | 缺陷 | 12.3.1-66 在 master 下导致部分包构建失败 | sig/Compiler | 2025/2/11 7:00 | 无优先级 | |
93 | kernel | 任务 | 【openEuler-25.03】GCC和kernel LTO暂不兼容,需要关闭默认启用的LTO | sig/Kernel | 2025/2/13 14:40 | 无优先级 | |
94 | kernel | 任务 | 欧拉系统(2.10)reboot命令会执行哪些动作,会对外设(如PCIE Atlas 300I DUO推理卡)重新上电或者复位吗 | sig/Kernel | 2025/2/18 19:27 | 无优先级 | |
95 | kernel | 任务 | 主线补丁回合:uio: Fix return value of poll | sig/Kernel | 2025/2/24 14:32 | 无优先级 | |
96 | kernel | 任务 | 主线补丁回合:of: Fix of_find_node_opts_by_path() handling of alias+path+options | sig/Kernel | 2025/2/24 15:11 | 无优先级 | |
97 | kernel | 任务 | 主线补丁回合:of: Fix refcount leakage for OF node returned by __of_get_dma_parent() | sig/Kernel | 2025/2/24 15:47 | 无优先级 | |
98 | kernel | 任务 | lockdep: upper limit LOCKDEP_CHAINS_BITS | sig/Kernel | 2025/2/24 20:26 | 无优先级 | |
99 | gcc | 任务 | openEuler-25.03分支构建gnutls包卡死 | sig/Compiler | 2025/2/27 19:19 | 无优先级 | |
100 | kernel | 任务 | openEuler-2203-LTS-SP4 kernel-rt 对有绑核任务的 cpu 执行 offline 失败 | sig/Kernel | 2025/2/28 11:44 | 无优先级 | |
101 | kernel | 任务 | 【补丁回合】uprobes: Reject the shared zeropage in uprobe_write_opcode() | sig/Kernel | 2025/3/3 21:19 | 无优先级 | |
102 | kernel | 任务 | backport mainline bugfix-2025/3 | sig/Kernel | 2025/3/4 20:55 | 无优先级 | |
103 | kernel | 缺陷 | 【openEuler-25.03】循环执行echo c > /proc/sysrq-trigger系统复位卡死无法正常重启 | sig/Kernel | 2025/3/6 20:28 | 无优先级 | |
104 | kernel | 任务 | openEuler 22.03(LTS-SP3)如何降低版本内核 | sig/Kernel | 2025/3/10 17:07 | 无优先级 | |
105 | kernel | 任务 | lockdep: Fix upper limit for LOCKDEP_*_BITS configs | sig/Kernel | 2025/3/11 10:40 | 无优先级 | |
106 | kernel | 任务 | lockdep: Fix upper limit for LOCKDEP_BITS configs | sig/Kernel | 2025/3/11 10:47 | 无优先级 | |
107 | kernel | 缺陷 | 运行程序出现cpu和内存持续上升趋势 | sig/Kernel | 2025/3/11 15:17 | 无优先级 | |
108 | gcc | 缺陷 | 2203版本gcc编译高版本gcc,编译时不带--disable-bootstrap选项,编译失败 | sig/Compiler | 2025/3/11 19:26 | 无优先级 | |
109 | kernel | 缺陷 | BMC查询cpu核数和线程数,与os下通过dmidecode -t 4查询到的 | sig/Kernel | 2025/3/13 20:43 | 无优先级 | |
110 | kernel | 任务 | 【OLK-6.6】补丁回合 | sig/Kernel | 2025/3/15 17:03 | 无优先级 | |
111 | kernel | 缺陷 | 【FT-2000+/64】安装22.03-TLS-SP1出现报错 | sig/Kernel | 2025/3/18 19:33 | 无优先级 | |
112 | kernel | 任务 | 共享网络模块CVE | sig/Kernel | 2025/3/18 20:49 | 无优先级 | |
113 | kernel | 缺陷 | 【openEuler-22.03-LTS-SP1】访问nfs挂载目录导致server重启 | sig/Kernel | 2025/3/19 10:58 | 无优先级 | |
114 | kernel | 任务 | bpf: Fix elem_size not being set for inner maps | sig/Kernel | 2025/3/26 11:49 | 无优先级 | |
115 | kernel | 任务 | bpf: Fix elem_size not being set for inner maps | sig/Kernel | 2025/3/26 11:50 | 无优先级 | |
116 | kernel | 任务 | selftests/bpf: Add access_inner_map selftest | sig/Kernel | 2025/3/26 11:51 | 无优先级 | |
117 | kernel | 任务 | backport cgroup: Remove steal time from usage_usec | sig/Kernel | 2025/3/27 19:03 | 无优先级 | |
118 | kernel | 任务 | backport memcg: drain obj stock on cpu hotplug teardown | sig/Kernel | 2025/3/27 20:14 | 无优先级 | |
119 | kernel | 任务 | 0核作为nohz_full核,设置最大的CPU为housekeeping核,重启环境串口报call trace | sig/Kernel | 2025/3/28 14:23 | 无优先级 | |
120 | kernel | 任务 | drbd: Fix five use after free bugs in get_initial_state | sig/Kernel | 2025/3/28 15:12 | 无优先级 | |
121 | gcc | 缺陷 | g++ OMP + SME 代码编译出现ICE | sig/Compiler | 2025/4/1 11:37 | 无优先级 | |
122 | kernel | 任务 | ASoC: SOF: topology: dynamically allocate and store DAI widget->private | sig/Kernel | 2025/4/2 17:51 | 无优先级 | |
123 | systemd | 任务 | GPU(Nvidia)容器实例设备节点权限偶发丢失问题 | sig/Base-service | 2025/4/7 10:50 | 无优先级 | |
124 | glibc | 任务 | GB 18030-2022一号修改单是否已支持 | sig/Computing | 2025/4/9 11:38 | 无优先级 | |
125 | kernel | 缺陷 | kylinsec-test-uplog | sig/Kernel | 2025/4/14 20:36 | 无优先级 | |
126 | gcc | 缺陷 | libtsan无法使用 | sig/Compiler | 2025/4/15 9:25 | 无优先级 | |
127 | kernel | 任务 | kernel.spec中变量写法错误 | sig/Kernel | 2025/4/18 15:39 | 无优先级 | |
128 | libvirt | 缺陷 | openEuler RISC-V 25.03 版本在 RISC-V 硬件设备上启动 libvirtd服务,查看其状态,提示 Host sysinfo extraction not supported on this platform: Function not implemented | sig/Virt | 2025/4/25 18:00 | 无优先级 | |
129 | kernel | 任务 | 回合主线补丁 【主线补丁分析】perf/x86: Fix non-sampling (counting) events on certain x86 platforms | sig/Kernel | 2025/4/27 14:40 | 无优先级 | |
130 | kernel | 缺陷 | 【openEuler-24.03-LTS-SP1】【riscv64】 acpi_ipmi 模块不支持,nbd, tee, regmap-i2c 模块无法执行 rmmod | sig/Kernel | 2025/4/27 14:57 | 无优先级 | |
131 | kernel | 缺陷 | BUG: unable to handle kernel paging request in dev_map_enqueue | sig/Kernel | 2025/5/7 17:42 | 无优先级 | |
132 | kernel | 任务 | 【LTS 补丁 回合】perf/core: Fix child_total_time_enabled accounting bug at task exit | sig/Kernel | 2025/5/12 10:47 | 无优先级 | |
133 | kernel | 任务 | 【OLK-6.6】主线补丁分析 iommu: Fix two issues in iommu_copy_struct_from_user | sig/Kernel | 2025/5/15 10:35 | 无优先级 | |
134 | openssl | 任务 | 使用cms命令进行加解密操作失败 | sig/sig-security-fac | 2025/5/16 11:34 | 无优先级 | |
135 | gcc | 缺陷 | [24.03-LTS-SP1] [riscv64] 没有 liblsan | sig/Compiler | 2025/5/16 19:31 | 无优先级 | |
136 | kernel | 缺陷 | 申请大规格内存并写入数据导致主机挂掉 | sig/Kernel | 2025/5/20 14:51 | 无优先级 | |
137 | kernel | 任务 | 【OLK-6.6】主线补丁分析:tracing: Fix oob write in trace_seq_to_buffer() | sig/Kernel | 2025/5/20 17:00 | 无优先级 | |
138 | kernel | 缺陷 | 【24.03 LTS SP1】【x86】modprobe einj 失败 | sig/Kernel | 2025/5/26 18:43 | 无优先级 | |
139 | kernel | 缺陷 | 【OLK-6.6】skb延迟释放机制导致虚拟化场景内存大页无法及时回收 | sig/Kernel | 2025/6/3 10:02 | 无优先级 | |
140 | kernel | 缺陷 | 安装机器时,dmesg,messages,journalctl日志报错 mm_spe_driver | sig/Kernel | 2025/6/3 11:43 | 无优先级 | |
141 | kernel | 缺陷 | KASAN: slab-use-after-free Read in tipc_aead_encrypt_done | sig/Kernel | 2025/6/4 10:14 | 无优先级 | |
142 | kernel | 缺陷 | kernel BUG in udp_queue_rcv_one_skb | sig/Kernel | 2025/6/4 10:41 | 无优先级 | |
143 | kernel | 缺陷 | NETDEV WATCHDOG: eth0 (bnxt_en): transmit queue 2 timed out | sig/Kernel | 2025/6/4 20:57 | 无优先级 | |
144 | kernel | 任务 | uprobes: make uprobe_register() return struct uprobe * | sig/Kernel | 2025/6/5 20:38 | 无优先级 | |
145 | kernel | 任务 | selftests/bpf: Add uretprobe syscall test for regs changes | sig/Kernel | 2025/6/5 20:40 | 无优先级 | |
146 | kernel | 任务 | bugfix for bpf uprobe not found due to inode changed | sig/Kernel | 2025/6/6 16:59 | 无优先级 | |
147 | kernel | 任务 | 【OLK-6.6】主线补丁分析:iommu: Protect against overflow in iommu_pgsize() | sig/Kernel | 2025/6/7 10:01 | 无优先级 | |
148 | kernel | 任务 | 【OLK-6.6】bperf支持 | sig/Kernel | 2025/6/9 10:05 | 无优先级 | |
149 | gcc | 任务 | LoongArch: Sync from upstream | sig/Compiler | 2025/6/11 9:17 | 无优先级 | |
150 | kernel | 缺陷 | 网络领域 kselftest 失败用例修复 | sig/Kernel | 2025/6/11 15:21 | 无优先级 | |
151 | iproute | 缺陷 | iproute 配置文件打包错误 | sig/Networking | 2025/6/12 16:52 | 无优先级 | |
152 | systemd | 缺陷 | systemctl --user 无法使用, user@1000.service 无法启动, systemd 用户态dbus套接没有创建 | sig/Base-service | 2025/6/13 11:39 | 无优先级 | |
153 | kernel | 任务 | 【OLK-5.10】【OLK-6.6】HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse() | sig/Kernel | 2025/6/17 9:22 | 无优先级 | |
154 | grep | 任务 | 2403sp1-lts使用 -m 时 grep 会有额外的输出与 -[lLq] | sig/Base-service | 2025/6/17 17:27 | 无优先级 | |
155 | gcc | 任务 | update ai model | sig/Compiler | 2025/6/17 20:30 | 无优先级 | |
156 | kernel | 缺陷 | 【OLK-6.6】【CIFS】 网络恢复后短时间间隔内,ls <挂载点> 命令执行失败,返回`Host is down` | sig/Kernel | 2025/6/18 14:51 | 无优先级 | |
157 | iproute | 任务 | 关于iprute2使用ip link xstats查询发生coredump的问题 | sig/Networking | 2025/6/19 15:41 | 无优先级 | |
158 | kernel | 任务 | olk-6.6 添加damon spe监控 | sig/Kernel | 2025/6/19 21:17 | 无优先级 | |
159 | mesa | 缺陷 | 缺失/usr/lib64/dri/zink_dri.so | sig/Desktop | 2025/6/24 9:27 | 无优先级 | |
160 | openssl | 任务 | CVE-2005-4900 | sig/sig-security-fac | 2025/6/25 9:14 | 无优先级 | |
161 | qemu | 缺陷 | [24.03 LTS SP1][ x86] qemu-seabios子包的使用场景是什么? | sig/Virt | 2025/6/25 9:44 | 无优先级 | |
162 | libvirt | 缺陷 | GB18030环境下libvirtd Abort | sig/Virt | 2025/6/25 11:29 | 无优先级 | |
163 | libiscsi | 任务 | openEuler-24.03-LTS分支Changelog异常整改 | sig/Storage | 2025/7/1 11:42 | 无优先级 | |
164 | gcc | 缺陷 | 12.3版本相较于10.3 X86架构下除0优化导致行为变更 | sig/Compiler | 2025/7/3 15:10 | 无优先级 | |
165 | libvirt | 任务 | 【 nvram 创建内部快照的支持】 internal snapshots of a VM with pflash based firmware are not supported | sig/Virt | 2025/7/4 12:13 | 无优先级 | |
166 | kernel | 任务 | hwrng: imx-rngc - add runtime pm | sig/Kernel | 2025/7/4 14:52 | 无优先级 | |
167 | kernel | 任务 | iommu/vt-d: Apply quirk_iommu_igfx for 8086:0044 (QM57/QS57) lts补丁回合 | sig/Kernel | 2025/7/4 15:37 | 无优先级 | |
168 | kernel | 任务 | 6.6lts补丁回合 coredump: hand a pidfd to the usermode coredump helper | sig/Kernel | 2025/7/5 14:41 | 无优先级 | |
169 | kernel | 任务 | 6.6 lts补丁回合 iommu: Handle race with default domain setup | sig/Kernel | 2025/7/5 15:51 | 无优先级 | |
170 | kernel | 任务 | SDMA驱动compile warning! | sig/Kernel | 2025/7/7 10:02 | 无优先级 | |
171 | kernel | 任务 | 主线补丁 perf: Fix sample vs do_exit() 回合 | sig/Kernel | 2025/7/7 11:42 | 无优先级 | |
172 | systemd | 缺陷 | cgroup v2模式下,systemd的cpuset配置无法持久化生效 | sig/Base-service | 2025/7/8 10:54 | 无优先级 | |
173 | qemu | 任务 | 【LoongArch64】qemu-system-loongarch64在其它架构未编译 | sig/Virt | 2025/7/8 17:00 | 无优先级 | |
174 | kernel | 任务 | printk: Remove the now superfluous sentinel elements from ctl_table array | sig/Kernel | 2025/7/8 17:43 | 无优先级 | |
175 | openssh | 缺陷 | 建立ssh连接时回显不符合预期 | sig/Networking | 2025/7/8 20:15 | 无优先级 | |
176 | openssh | 缺陷 | openssh子包pam_ssh_agent_auth的openEuler-24.03-LTS-SP1版本包相比于openEuler-22.03-LTS-SP1版本,出现降级 | sig/Networking | 2025/7/8 20:23 | 无优先级 | |
177 | ethtool | 任务 | backport patches to fix possible NULL dereference | sig/Networking | 2025/7/9 13:36 | 无优先级 | |
178 | systemd | 缺陷 | 【419x86】【稳定性】ltp压力测试系统卡着,bmc控制台一直打印systemd[1]:Failed to Journal Service | sig/Base-service | 2025/7/9 13:54 | 无优先级 | |
179 | kernel | 任务 | ftrace: Remove the now superfluous sentinel elements from ctl_table array | sig/Kernel | 2025/7/9 14:38 | 无优先级 | |
180 | kernel | 任务 | kprobes: Remove the now superfluous sentinel elements from ctl_table array | sig/Kernel | 2025/7/9 14:41 | 无优先级 | |
181 | iproute | 缺陷 | ipvlan_mode枚举值与内核不一致 | sig/Networking | 2025/7/10 10:10 | 无优先级 | |
182 | gcc | 缺陷 | GCC-12.3.1中,unixbench的整形跑分为0 | sig/Compiler | 2025/7/15 11:11 | 无优先级 | |
183 | oncn-bwm | 任务 | 当前proc接口不支持5.6以下内核 | sig/sig-high-perform | 2025/7/16 17:20 | 无优先级 | |
184 | kernel | 任务 | 鲲鹏920下:perf 命令行执行报 failed to get cpuid string for PMU hisi_sccl** | sig/Kernel | 2025/7/17 20:44 | 无优先级 | |
185 | openssl | 任务 | 为RISC-V 64平台添加SM2支持(使用基础整数指令集) | sig/sig-security-fac | 2025/7/18 9:37 | 无优先级 | |
186 | openssl | 任务 | 反合arm对sm2的算法优化基础框架 | sig/sig-security-fac | 2025/7/18 10:38 | 无优先级 | |
187 | qemu | 任务 | 【qemu版本升级】 | sig/Virt | 2025/7/18 11:56 | 无优先级 | |
188 | kernel | 缺陷 | openEuler 24.03 (LTS-SP1) cgroup v2下执行ltp概率出现hung_task | sig/Kernel | 2025/7/18 14:25 | 无优先级 | |
189 | e2fsprogs | 缺陷 | 同步补丁,并排查其它未同步补丁 | sig/Storage | 2025/7/21 16:30 | 无优先级 | |
190 | glib2 | 缺陷 | 升级2403sp1版本后,调用g_sliet_remove移除单链表的最后一个节点data,remove后data->next指针从null变成野指针 | sig/Base-service | 2025/7/23 12:01 | 无优先级 | |
191 | openssl | 任务 | 添加 RISC-V 汇编支持及特性 | sig/sig-security-fac | 2025/7/24 19:38 | 无优先级 | |
192 | openssl | 任务 | RV64GC优化Montgomery乘法 | sig/sig-security-fac | 2025/7/24 19:45 | 无优先级 | |
193 | kernel | 任务 | 主线补丁 libbpf: Fix null pointer dereference in btf_dump__free on allocation failure回合 | sig/Kernel | 2025/7/25 10:34 | 无优先级 | |
194 | glib2 | 缺陷 | glib2在25.09分支申请降级到2.78.6版本 | sig/Base-service | 2025/7/25 11:34 | 无优先级 |
Attachments:
1
Age (days ago)
1
Last active (days ago)
0 comments
1 participants
tags
participants (1)
-
update版本发布邮箱