Qa
Threads by month
- ----- 2025 -----
- February
- January
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
May 2024
- 5 participants
- 13 discussions
主题: openEuler update_20240508版本发布公告
Dear all,
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-22.03-LTS、openEuler-22.03-LTS-SP1、openEuler-22.03-LTS-SP2、openEuler-20.03-LTS-SP4及openEuler-22.03-LTS-SP3 update版本满足版本出口质量,现进行发布公示。
本公示分为九部分:
1、openEuler-20.03-LTS-SP1 Update 20240508发布情况及待修复缺陷
2、openEuler-22.03-LTS Update 20240508发布情况及待修复缺陷
3、openEuler-22.03-LTS-SP1 Update 20240508发布情况及待修复缺陷
4、openEuler-22.03-LTS-SP2 Update 20240508发布情况及待修复缺陷
5、openEuler-20.03-LTS-SP4 Update 20240508发布情况及待修复缺陷
6、openEuler-22.03-LTS-SP3 Update 20240508发布情况及待修复缺陷
7、openEuler 关键组件待修复CVE 清单
8、openEuler 关键组件待修复缺陷清单
9、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2024/05/17)提供 update_20240515 版本。
openEuler-20.03-LTS-SP1 Update 20240508
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题13个,已知漏洞75个。目前版本分支剩余待修复缺陷6个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9MBTI?from=project-i…
CVE修复:
CVE
仓库
score
I4BY7B:CVE-2020-26950<https://gitee.com/src-openeuler/firefox/issues/I4BY7B>
firefox
8.8
I9FNG2:CVE-2021-47194<https://gitee.com/src-openeuler/kernel/issues/I9FNG2>
kernel
7.8
I9HJY0:CVE-2024-26898<https://gitee.com/src-openeuler/kernel/issues/I9HJY0>
kernel
7.8
I9HK6X:CVE-2024-26884<https://gitee.com/src-openeuler/kernel/issues/I9HK6X>
kernel
7.8
I9HKCB:CVE-2024-26883<https://gitee.com/src-openeuler/kernel/issues/I9HKCB>
kernel
7.8
I9ENQO:CVE-2020-36829<https://gitee.com/src-openeuler/perl-Mojolicious/issues/I9ENQO>
perl-Mojolicious
7.5
I9ENQW:CVE-2021-47208<https://gitee.com/src-openeuler/perl-Mojolicious/issues/I9ENQW>
perl-Mojolicious
7.5
I9E2Q0:CVE-2024-27316<https://gitee.com/src-openeuler/httpd/issues/I9E2Q0>
httpd
7.5
I9J3YK:CVE-2024-32661<https://gitee.com/src-openeuler/freerdp/issues/I9J3YK>
freerdp
7.5
I9DS2T:CVE-2024-3205<https://gitee.com/src-openeuler/libyaml/issues/I9DS2T>
libyaml
7.3
I9HWXO:CVE-2023-3758<https://gitee.com/src-openeuler/sssd/issues/I9HWXO>
sssd
7.1
I9J6JG:CVE-2020-35850<https://gitee.com/src-openeuler/cockpit/issues/I9J6JG>
cockpit
6.5
I9E577:CVE-2023-38709<https://gitee.com/src-openeuler/httpd/issues/I9E577>
httpd
6.1
I9E58K:CVE-2024-24795<https://gitee.com/src-openeuler/httpd/issues/I9E58K>
httpd
6.1
I9EZL9:CVE-2024-2511<https://gitee.com/src-openeuler/openssl/issues/I9EZL9>
openssl
5.9
I9LGC9:CVE-2024-34402<https://gitee.com/src-openeuler/uriparser/issues/I9LGC9>
uriparser
5.5
I9LGCZ:CVE-2024-34403<https://gitee.com/src-openeuler/uriparser/issues/I9LGCZ>
uriparser
5.5
I9EZYH:CVE-2024-31047<https://gitee.com/src-openeuler/OpenEXR/issues/I9EZYH>
OpenEXR
5.5
I99JQV:CVE-2023-52619<https://gitee.com/src-openeuler/kernel/issues/I99JQV>
kernel
5.5
I9BGKK:CVE-2021-47149<https://gitee.com/src-openeuler/kernel/issues/I9BGKK>
kernel
5.5
I9BV23:CVE-2024-26644<https://gitee.com/src-openeuler/kernel/issues/I9BV23>
kernel
5.5
I9E2M9:CVE-2024-26773<https://gitee.com/src-openeuler/kernel/issues/I9E2M9>
kernel
5.5
I9E2MF:CVE-2024-26772<https://gitee.com/src-openeuler/kernel/issues/I9E2MF>
kernel
5.5
I9E2MG:CVE-2024-26777<https://gitee.com/src-openeuler/kernel/issues/I9E2MG>
kernel
5.5
I9E2Y8:CVE-2024-26778<https://gitee.com/src-openeuler/kernel/issues/I9E2Y8>
kernel
5.5
I9HOEF:CVE-2021-47210<https://gitee.com/src-openeuler/kernel/issues/I9HOEF>
kernel
5.5
I9LK3Y:CVE-2022-48674<https://gitee.com/src-openeuler/kernel/issues/I9LK3Y>
kernel
5.5
I9AR03:CVE-2022-2806<https://gitee.com/src-openeuler/sos/issues/I9AR03>
sos
5.5
I9HK1I:CVE-2024-26901<https://gitee.com/src-openeuler/kernel/issues/I9HK1I>
kernel
5.5
I9HK4U:CVE-2024-26904<https://gitee.com/src-openeuler/kernel/issues/I9HK4U>
kernel
5.5
I917MX:CVE-2024-24860<https://gitee.com/src-openeuler/kernel/issues/I917MX>
kernel
5.3
I990B2:CVE-2021-47121<https://gitee.com/src-openeuler/kernel/issues/I990B2>
kernel
4.7
I9E6TS:CVE-2024-26810<https://gitee.com/src-openeuler/kernel/issues/I9E6TS>
kernel
4.4
I9E6TU:CVE-2024-27437<https://gitee.com/src-openeuler/kernel/issues/I9E6TU>
kernel
4.4
I9FV3V:CVE-2024-3652<https://gitee.com/src-openeuler/libreswan/issues/I9FV3V>
libreswan
3.5
I9JBL4:CVE-2024-27282<https://gitee.com/src-openeuler/ruby/issues/I9JBL4>
ruby
3.5
I9E2O0:CVE-2024-26751<https://gitee.com/src-openeuler/kernel/issues/I9E2O0>
kernel
3.3
I9E2O3:CVE-2024-26764<https://gitee.com/src-openeuler/kernel/issues/I9E2O3>
kernel
3.3
I9HIQ7:CVE-2024-3177<https://gitee.com/src-openeuler/kubernetes/issues/I9HIQ7>
kubernetes
2.7
I9E6TQ:CVE-2024-26813<https://gitee.com/src-openeuler/kernel/issues/I9E6TQ>
kernel
1
I9GE8D:CVE-2024-26817<https://gitee.com/src-openeuler/kernel/issues/I9GE8D>
kernel
1
I9HJPD:CVE-2024-26839<https://gitee.com/src-openeuler/kernel/issues/I9HJPD>
kernel
1
I9HJQC:CVE-2024-26845<https://gitee.com/src-openeuler/kernel/issues/I9HJQC>
kernel
1
I9HJRD:CVE-2024-26828<https://gitee.com/src-openeuler/kernel/issues/I9HJRD>
kernel
1
I9HJUW:CVE-2024-26825<https://gitee.com/src-openeuler/kernel/issues/I9HJUW>
kernel
1
I9HJVQ:CVE-2024-26840<https://gitee.com/src-openeuler/kernel/issues/I9HJVQ>
kernel
1
I9HJVU:CVE-2023-52642<https://gitee.com/src-openeuler/kernel/issues/I9HJVU>
kernel
1
I9HJX7:CVE-2024-26878<https://gitee.com/src-openeuler/kernel/issues/I9HJX7>
kernel
1
I9HJXK:CVE-2024-26863<https://gitee.com/src-openeuler/kernel/issues/I9HJXK>
kernel
1
I9HJXV:CVE-2024-26880<https://gitee.com/src-openeuler/kernel/issues/I9HJXV>
kernel
1
I9HJZO:CVE-2024-26882<https://gitee.com/src-openeuler/kernel/issues/I9HJZO>
kernel
1
I9HK5V:CVE-2024-26874<https://gitee.com/src-openeuler/kernel/issues/I9HK5V>
kernel
1
I9HK63:CVE-2024-26894<https://gitee.com/src-openeuler/kernel/issues/I9HK63>
kernel
1
I9HK8R:CVE-2024-26875<https://gitee.com/src-openeuler/kernel/issues/I9HK8R>
kernel
1
I9HK8Y:CVE-2024-26872<https://gitee.com/src-openeuler/kernel/issues/I9HK8Y>
kernel
1
I9HK9B:CVE-2024-26857<https://gitee.com/src-openeuler/kernel/issues/I9HK9B>
kernel
1
I9HK9J:CVE-2024-26859<https://gitee.com/src-openeuler/kernel/issues/I9HK9J>
kernel
1
I9HK9R:CVE-2024-26852<https://gitee.com/src-openeuler/kernel/issues/I9HK9R>
kernel
1
I9HKAZ:CVE-2024-26851<https://gitee.com/src-openeuler/kernel/issues/I9HKAZ>
kernel
1
I9HKEE:CVE-2024-26876<https://gitee.com/src-openeuler/kernel/issues/I9HKEE>
kernel
1
I9HL6R:CVE-2024-26915<https://gitee.com/src-openeuler/kernel/issues/I9HL6R>
kernel
1
I9J3KG:CVE-2024-26922<https://gitee.com/src-openeuler/kernel/issues/I9J3KG>
kernel
1
I9J7N6:CVE-2024-26813<https://gitee.com/src-openeuler/kernel/issues/I9J7N6>
kernel
1
I9JFG0:CVE-2024-26923<https://gitee.com/src-openeuler/kernel/issues/I9JFG0>
kernel
1
I9JJ2F:CVE-2024-26926<https://gitee.com/src-openeuler/kernel/issues/I9JJ2F>
kernel
1
I9KHGY:CVE-2022-48664<https://gitee.com/src-openeuler/kernel/issues/I9KHGY>
kernel
1
I9L5IQ:CVE-2024-26993<https://gitee.com/src-openeuler/kernel/issues/I9L5IQ>
kernel
1
I9L5QJ:CVE-2024-26973<https://gitee.com/src-openeuler/kernel/issues/I9L5QJ>
kernel
1
I9LKE1:CVE-2022-48702<https://gitee.com/src-openeuler/kernel/issues/I9LKE1>
kernel
1
I9F94L:CVE-2023-45935<https://gitee.com/src-openeuler/qt5-qtbase/issues/I9F94L>
qt5-qtbase
0
I9FNFF:CVE-2021-47183<https://gitee.com/src-openeuler/kernel/issues/I9FNFF>
kernel
0
I9FNFK:CVE-2021-47182<https://gitee.com/src-openeuler/kernel/issues/I9FNFK>
kernel
0
I9FNFO:CVE-2021-47217<https://gitee.com/src-openeuler/kernel/issues/I9FNFO>
kernel
0
I9FNFQ:CVE-2021-47211<https://gitee.com/src-openeuler/kernel/issues/I9FNFQ>
kernel
0
I9FNFL:CVE-2021-47210<https://gitee.com/src-openeuler/kernel/issues/I9FNFL>
kernel
0
Bugfix:
issue
仓库
#I8S3VP:cdrkit: delete autosetup macro in changelog:cdrkit: delete autosetup macro in changelog
cdrkit
#I9GURX:httpd社区补丁分析回合:httpd社区补丁分析回合
httpd
#I64WN8:authvar的-i命令无法执行:authvar的-i命令无法执行
pesign
#I9ER36:【olk - 6.6】cgroup结合cpu上下线测试长稳环境出现 BUG: unable to handle page fault for address: 00003984d0425d58:【olk - 6.6】cgroup结合cpu上下线测试长稳环境出现 BUG: unable to handle page fault for address: 00003984d0425d58
kernel
#I9GV9R:【openeuler-1.0-lts】网络lts 4.19.308补丁回合:【openeuler-1.0-lts】网络lts 4.19.308补丁回合
kernel
#I9HSOM:【openeuler-1.0-LTS】oom_kill.c: futex: delay the OOM reaper to allow time for proper futex cleanup:【openeuler-1.0-LTS】oom_kill.c: futex: delay the OOM reaper to allow time for proper futex cleanup
kernel
#I9IPML:【penEuler-1.0-LTS】tty: fix read of tty->pgrp outside of ctrl_lock:【penEuler-1.0-LTS】tty: fix read of tty->pgrp outside of ctrl_lock
kernel
#I9J08D:【OLK-5.10】多PF并发创建VF时间变长:【OLK-5.10】多PF并发创建VF时间变长
kernel
#I9JNPZ:【OLK-5.10】 4月主线补丁分析回合:【OLK-5.10】 4月主线补丁分析回合
kernel
#I9K34B:sched/rt: Fix sysctl_sched_rr_timeslice intial value:sched/rt: Fix sysctl_sched_rr_timeslice intial value
kernel
#I9K4H3:sched/rt: sysctl_sched_rr_timeslice show default timeslice after reset:sched/rt: sysctl_sched_rr_timeslice show default timeslice after reset
kernel
#I9K4JZ:sched/rt: Disallow writing invalid values to sched_rt_period_us:sched/rt: Disallow writing invalid values to sched_rt_period_us
kernel
#I9K8XT:【openEuler-1.0-LTS】mm/madvise: fix potential pte_unmap_unlock pte error:【openEuler-1.0-LTS】mm/madvise: fix potential pte_unmap_unlock pte error
kernel
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/docker_img/update/
openEuler CVE 及安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示:
序号
里程碑
任务ID
任务标题
任务类型
创建时间
优先级
关联仓库
sig组
任务路径
1
openEuler 20.03LTS SP1 update2103
I3E5C1
【20.03-SP1】【arm/x86】服务启动失败
缺陷
2021/3/30 10:01
主要
src-openEuler/hadoop
bigdata
https://gitee.com/open_euler/dashboard?issue_id=I3E5C1
2
openEuler-20.03-LTS-SP1
I5OYJZ
kernel源码包构建失败
任务
2022/8/31 11:21
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5OYJZ
3
openEuler-20.03-LTS-SP1-dailybuild
I5Y99T
mate-desktop install problem in openEuler:20:03:LTS:SP1
缺陷
2022/10/28 15:22
无优先级
src-openEuler/mate-desktop
sig-mate-desktop
https://gitee.com/open_euler/dashboard?issue_id=I5Y99T
4
openEuler-20.03-LTS-SP1
I8B80Y
gcc中LTO的功能好像出现异常
任务
2023/10/26 19:15
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I8B80Y
5
openEuler-20.03-LTS-SP1
I9O25N
[20.03-LTS-SP1]安装apr-util-devel有报错提示
缺陷
2024/5/10 10:13
次要
src-openEuler/apr-util
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9O25N
6
openEuler-20.03-LTS-SP1-round-3
I9O8SA
【24.03-LTS-RC3】DDE桌面单击任务栏电源按钮无反应
任务
2024/5/10 17:26
无优先级
src-openEuler/dde
sig-DDE
https://gitee.com/open_euler/dashboard?issue_id=I9O8SA
openEuler-22.03-LTS Update 20240508
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题7个,已知漏洞96个。目前版本分支剩余待修复缺陷13个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9MBTC?from=project-i…
CVE修复:
CVE
仓库
score
I9HK1R:CVE-2024-26885<https://gitee.com/src-openeuler/kernel/issues/I9HK1R>
kernel
7.8
I9HK6X:CVE-2024-26884<https://gitee.com/src-openeuler/kernel/issues/I9HK6X>
kernel
7.8
I9HKCB:CVE-2024-26883<https://gitee.com/src-openeuler/kernel/issues/I9HKCB>
kernel
7.8
I9JQQ2:CVE-2024-33599<https://gitee.com/src-openeuler/glibc/issues/I9JQQ2>
glibc
7.6
I9ENQO:CVE-2020-36829<https://gitee.com/src-openeuler/perl-Mojolicious/issues/I9ENQO>
perl-Mojolicious
7.5
I9ENQW:CVE-2021-47208<https://gitee.com/src-openeuler/perl-Mojolicious/issues/I9ENQW>
perl-Mojolicious
7.5
I9E2Q0:CVE-2024-27316<https://gitee.com/src-openeuler/httpd/issues/I9E2Q0>
httpd
7.5
I9J3YK:CVE-2024-32661<https://gitee.com/src-openeuler/freerdp/issues/I9J3YK>
freerdp
7.5
I9L9FT:CVE-2024-4340<https://gitee.com/src-openeuler/python-sqlparse/issues/I9L9FT>
python-sqlparse
7.5
I9JQRA:CVE-2024-33600<https://gitee.com/src-openeuler/glibc/issues/I9JQRA>
glibc
7.5
I9DS2T:CVE-2024-3205<https://gitee.com/src-openeuler/libyaml/issues/I9DS2T>
libyaml
7.3
I9HWXO:CVE-2023-3758<https://gitee.com/src-openeuler/sssd/issues/I9HWXO>
sssd
7.1
I8TQCT:CVE-2023-6270<https://gitee.com/src-openeuler/kernel/issues/I8TQCT>
kernel
7
I9J6JG:CVE-2020-35850<https://gitee.com/src-openeuler/cockpit/issues/I9J6JG>
cockpit
6.5
I8WQRS:CVE-2024-20973<https://gitee.com/src-openeuler/mysql/issues/I8WQRS>
mysql
6.5
I8WQRY:CVE-2024-20962<https://gitee.com/src-openeuler/mysql/issues/I8WQRY>
mysql
6.5
I8WQRZ:CVE-2024-20977<https://gitee.com/src-openeuler/mysql/issues/I8WQRZ>
mysql
6.5
I8WQS2:CVE-2024-20963<https://gitee.com/src-openeuler/mysql/issues/I8WQS2>
mysql
6.5
I8WQVV:CVE-2024-20985<https://gitee.com/src-openeuler/mysql/issues/I8WQVV>
mysql
6.5
I8WQTY:CVE-2024-20961<https://gitee.com/src-openeuler/mysql/issues/I8WQTY>
mysql
6.5
I8WQUL:CVE-2024-20960<https://gitee.com/src-openeuler/mysql/issues/I8WQUL>
mysql
6.5
I9KGKD:CVE-2023-6129<https://gitee.com/src-openeuler/mysql/issues/I9KGKD>
mysql
6.5
I9JQQ3:CVE-2024-33601<https://gitee.com/src-openeuler/glibc/issues/I9JQQ3>
glibc
6.2
I9E58K:CVE-2024-24795<https://gitee.com/src-openeuler/httpd/issues/I9E58K>
httpd
6.1
I9E577:CVE-2023-38709<https://gitee.com/src-openeuler/httpd/issues/I9E577>
httpd
6.1
I9JUKA:CVE-2022-48682<https://gitee.com/src-openeuler/fdupes/issues/I9JUKA>
fdupes
6
I9EZL9:CVE-2024-2511<https://gitee.com/src-openeuler/openssl/issues/I9EZL9>
openssl
5.9
I9AR03:CVE-2022-2806<https://gitee.com/src-openeuler/sos/issues/I9AR03>
sos
5.5
I9LGC9:CVE-2024-34402<https://gitee.com/src-openeuler/uriparser/issues/I9LGC9>
uriparser
5.5
I9LGCZ:CVE-2024-34403<https://gitee.com/src-openeuler/uriparser/issues/I9LGCZ>
uriparser
5.5
I9EZYH:CVE-2024-31047<https://gitee.com/src-openeuler/OpenEXR/issues/I9EZYH>
OpenEXR
5.5
I8WQU9:CVE-2024-20967<https://gitee.com/src-openeuler/mysql/issues/I8WQU9>
mysql
5.5
I8WQXN:CVE-2024-20969<https://gitee.com/src-openeuler/mysql/issues/I8WQXN>
mysql
5.5
I9BV23:CVE-2024-26644<https://gitee.com/src-openeuler/kernel/issues/I9BV23>
kernel
5.5
I9E2GU:CVE-2024-26698<https://gitee.com/src-openeuler/kernel/issues/I9E2GU>
kernel
5.5
I9E2M9:CVE-2024-26773<https://gitee.com/src-openeuler/kernel/issues/I9E2M9>
kernel
5.5
I9E2MF:CVE-2024-26772<https://gitee.com/src-openeuler/kernel/issues/I9E2MF>
kernel
5.5
I9E2MG:CVE-2024-26777<https://gitee.com/src-openeuler/kernel/issues/I9E2MG>
kernel
5.5
I9E2Y8:CVE-2024-26778<https://gitee.com/src-openeuler/kernel/issues/I9E2Y8>
kernel
5.5
I9E3E9:CVE-2024-26736<https://gitee.com/src-openeuler/kernel/issues/I9E3E9>
kernel
5.5
I9E46I:CVE-2024-26788<https://gitee.com/src-openeuler/kernel/issues/I9E46I>
kernel
5.5
I91L79:CVE-2024-25739<https://gitee.com/src-openeuler/kernel/issues/I91L79>
kernel
5.5
I9HK1I:CVE-2024-26901<https://gitee.com/src-openeuler/kernel/issues/I9HK1I>
kernel
5.5
I9HKBT:CVE-2024-26900<https://gitee.com/src-openeuler/kernel/issues/I9HKBT>
kernel
5.5
I8WQRN:CVE-2024-20964<https://gitee.com/src-openeuler/mysql/issues/I8WQRN>
mysql
5.3
I9H9UX:CVE-2024-20994<https://gitee.com/src-openeuler/mysql/issues/I9H9UX>
mysql
5.3
I8WQRQ:CVE-2024-20971<https://gitee.com/src-openeuler/mysql/issues/I8WQRQ>
mysql
4.9
I8WQRR:CVE-2024-20976<https://gitee.com/src-openeuler/mysql/issues/I8WQRR>
mysql
4.9
I8WQRU:CVE-2024-20978<https://gitee.com/src-openeuler/mysql/issues/I8WQRU>
mysql
4.9
I8WQRW:CVE-2024-20981<https://gitee.com/src-openeuler/mysql/issues/I8WQRW>
mysql
4.9
I8WQSX:CVE-2024-20965<https://gitee.com/src-openeuler/mysql/issues/I8WQSX>
mysql
4.9
I8WQT7:CVE-2024-20972<https://gitee.com/src-openeuler/mysql/issues/I8WQT7>
mysql
4.9
I8WQTZ:CVE-2024-20982<https://gitee.com/src-openeuler/mysql/issues/I8WQTZ>
mysql
4.9
I8WQU7:CVE-2024-20970<https://gitee.com/src-openeuler/mysql/issues/I8WQU7>
mysql
4.9
I8WQUE:CVE-2024-20974<https://gitee.com/src-openeuler/mysql/issues/I8WQUE>
mysql
4.9
I8WQUG:CVE-2024-20966<https://gitee.com/src-openeuler/mysql/issues/I8WQUG>
mysql
4.9
I9H9TA:CVE-2024-21069<https://gitee.com/src-openeuler/mysql/issues/I9H9TA>
mysql
4.9
I9H9TE:CVE-2024-21009<https://gitee.com/src-openeuler/mysql/issues/I9H9TE>
mysql
4.9
I9H9TF:CVE-2024-21061<https://gitee.com/src-openeuler/mysql/issues/I9H9TF>
mysql
4.9
I9H9TG:CVE-2024-20993<https://gitee.com/src-openeuler/mysql/issues/I9H9TG>
mysql
4.9
I9H9TO:CVE-2024-21047<https://gitee.com/src-openeuler/mysql/issues/I9H9TO>
mysql
4.9
I9H9TP:CVE-2024-20998<https://gitee.com/src-openeuler/mysql/issues/I9H9TP>
mysql
4.9
I9H9TZ:CVE-2024-21055<https://gitee.com/src-openeuler/mysql/issues/I9H9TZ>
mysql
4.9
I9H9V4:CVE-2024-21057<https://gitee.com/src-openeuler/mysql/issues/I9H9V4>
mysql
4.9
I9H9U6:CVE-2024-21060<https://gitee.com/src-openeuler/mysql/issues/I9H9U6>
mysql
4.9
I9H9UD:CVE-2024-21102<https://gitee.com/src-openeuler/mysql/issues/I9H9UD>
mysql
4.9
I9H9UE:CVE-2024-21054<https://gitee.com/src-openeuler/mysql/issues/I9H9UE>
mysql
4.9
I9H9UG:CVE-2024-21062<https://gitee.com/src-openeuler/mysql/issues/I9H9UG>
mysql
4.9
I9H9VR:CVE-2024-21096<https://gitee.com/src-openeuler/mysql/issues/I9H9VR>
mysql
4.9
I9LHKK:CVE-2024-34062<https://gitee.com/src-openeuler/python-tqdm/issues/I9LHKK>
python-tqdm
4.8
I9G0JY:CVE-2024-3096<https://gitee.com/src-openeuler/php/issues/I9G0JY>
php
4.8
I94UOT:CVE-2024-26607<https://gitee.com/src-openeuler/kernel/issues/I94UOT>
kernel
4.7
I8WQUA:CVE-2024-20984<https://gitee.com/src-openeuler/mysql/issues/I8WQUA>
mysql
4.4
I9H9U2:CVE-2024-21013<https://gitee.com/src-openeuler/mysql/issues/I9H9U2>
mysql
4.4
I9H9UA:CVE-2024-21008<https://gitee.com/src-openeuler/mysql/issues/I9H9UA>
mysql
4.4
I9E6TS:CVE-2024-26810<https://gitee.com/src-openeuler/kernel/issues/I9E6TS>
kernel
4.4
I9E6TU:CVE-2024-27437<https://gitee.com/src-openeuler/kernel/issues/I9E6TU>
kernel
4.4
I9JQRC:CVE-2024-33602<https://gitee.com/src-openeuler/glibc/issues/I9JQRC>
glibc
4
I9H9T9:CVE-2024-21000<https://gitee.com/src-openeuler/mysql/issues/I9H9T9>
mysql
3.8
I9FV3V:CVE-2024-3652<https://gitee.com/src-openeuler/libreswan/issues/I9FV3V>
libreswan
3.5
I9E2O0:CVE-2024-26751<https://gitee.com/src-openeuler/kernel/issues/I9E2O0>
kernel
3.3
I9E2O3:CVE-2024-26764<https://gitee.com/src-openeuler/kernel/issues/I9E2O3>
kernel
3.3
I9FNF8:CVE-2021-47212<https://gitee.com/src-openeuler/kernel/issues/I9FNF8>
kernel
1
I9GE8D:CVE-2024-26817<https://gitee.com/src-openeuler/kernel/issues/I9GE8D>
kernel
1
I9HJPD:CVE-2024-26839<https://gitee.com/src-openeuler/kernel/issues/I9HJPD>
kernel
1
I9HJU0:CVE-2024-26843<https://gitee.com/src-openeuler/kernel/issues/I9HJU0>
kernel
1
I9HJVQ:CVE-2024-26840<https://gitee.com/src-openeuler/kernel/issues/I9HJVQ>
kernel
1
I9HJVU:CVE-2023-52642<https://gitee.com/src-openeuler/kernel/issues/I9HJVU>
kernel
1
I9HJZO:CVE-2024-26882<https://gitee.com/src-openeuler/kernel/issues/I9HJZO>
kernel
1
I9HK2H:CVE-2024-26855<https://gitee.com/src-openeuler/kernel/issues/I9HK2H>
kernel
1
I9HK5V:CVE-2024-26874<https://gitee.com/src-openeuler/kernel/issues/I9HK5V>
kernel
1
I9HK63:CVE-2024-26894<https://gitee.com/src-openeuler/kernel/issues/I9HK63>
kernel
1
I9HK8R:CVE-2024-26875<https://gitee.com/src-openeuler/kernel/issues/I9HK8R>
kernel
1
I9HK9F:CVE-2024-26893<https://gitee.com/src-openeuler/kernel/issues/I9HK9F>
kernel
1
I9FNFK:CVE-2021-47182<https://gitee.com/src-openeuler/kernel/issues/I9FNFK>
kernel
0
I9FNFQ:CVE-2021-47211<https://gitee.com/src-openeuler/kernel/issues/I9FNFQ>
kernel
0
Bugfix:
issue
仓库
#I8S3VP:cdrkit: delete autosetup macro in changelog:cdrkit: delete autosetup macro in changelog
cdrkit
#I64WN8:authvar的-i命令无法执行:authvar的-i命令无法执行
pesign
#I9GURX:httpd社区补丁分析回合:httpd社区补丁分析回合
httpd
#I9MLX3:TPCM功能问题:TPCM功能问题
shim
#I9GVYW:【openEuler-22.03-LTS-SP4】Add hugetlb MADV_DONTNEED support:【openEuler-22.03-LTS-SP4】Add hugetlb MADV_DONTNEED support
kernel
#I9JPDJ:【OLK-5.10】4/5 月内存主线补丁回合:【OLK-5.10】4/5 月内存主线补丁回合
kernel
#I9MXH3:主线补丁回合kprobes: Fix check for probe enabled in kill_kprobe():主线补丁回合kprobes: Fix check for probe enabled in kill_kprobe()
kernel
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/docker_img/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/ob…
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-22.03-LTS Update版本待修复问题清单公示:
序号
里程碑
任务ID
任务标题
任务类型
创建时间
优先级
关联仓库
sig组
任务路径
1
openEuler-22.03-LTS-Dailybuild
I4UTGM
22.03分支kernel子包perf与libtraceevent有安装冲突
任务
2022/2/22 20:23
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I4UTGM
2
openEuler-22.03-LTS-Dailybuild
I5CHET
使用nftables添加过多的规则时,内核将出现softlockup
任务
2022/6/15 19:33
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5CHET
3
openEuler-22.03-LTS-Dailybuild
I5LO4A
【22.03 LTS ARM】鲲鹏 920 x8 安装 OS 时,卡死在内核启动界面。
任务
2022/8/10 17:19
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5LO4A
4
openEuler-22.03-LTS-Dailybuild
I5RTUS
X86架构下无法对mysql8进行autobolt模式反馈编译,报错
缺陷
2022/9/19 15:47
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I5RTUS
5
openEuler-22.03-LTS-Dailybuild
I5XP8E
Bug in openEuler/gcc (10.3.0) ,22.03-LTS-performance 分支
缺陷
2022/10/26 9:13
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I5XP8E
6
openEuler-22.03-LTS-round-4
I65BIS
swapoff 与 do_swap_page race问题
任务
2022/12/8 16:32
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I65BIS
7
openEuler-22.03-LTS-Dailybuild
I65UF9
aarch64架构boost icl模板库优化错误
缺陷
2022/12/12 17:17
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I65UF9
8
openEuler-22.03-LTS
I6VFRX
[22.03-LTS][x86/arm]mariadb授权给远程用户,远程连接服务失败
缺陷
2023/4/13 16:35
次要
src-openEuler/mariadb
DB
https://gitee.com/open_euler/dashboard?issue_id=I6VFRX
9
openEuler-22.03-LTS
I72N5G
【22.03-lts】x86环境上同时安装php-fpm软件包和php-opcache软件包后会导致php-fpm.service服务启动失败
缺陷
2023/5/12 15:38
次要
src-openEuler/php
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I72N5G
10
openEuler-22.03-LTS-Dailybuild
I7KBUF
pyconfig-64.h中定义了__CHAR_UNSIGNED__ 改变了编译行为,导致程序运行出错
任务
2023/7/11 16:27
无优先级
src-openEuler/python3
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I7KBUF
11
openEuler-22.03-LTS update20230726
I7ORCE
【22.03 LTS update20230726】【arm\x86】selinux-policy-base的版本不符合ceph子包的安装条件,ceph子包安装失败; cephadm卸载有异常打印
缺陷
2023/7/28 14:51
主要
src-openEuler/ceph
sig-SDS
https://gitee.com/open_euler/dashboard?issue_id=I7ORCE
12
openEuler-22.03-LTS-Dailybuild
I7YRN6
openEuler-20.03-LTS-SP3版本与openEuler-22.03-LTS版本x86上gcc参数差异导致编译出的二进制性能下降
任务
2023/9/5 17:06
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I7YRN6
13
openEuler-22.03-LTS-Dailybuild
I8OWON
[openEuler-22.03-LTS]arch64在飞腾D2000内核初始化失败
任务
2023/12/16 9:40
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8OWON
openEuler-22.03-LTS-SP1 Update 20240508
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS-SP1修复版本已知问题7个,已知漏洞89个。目前版本分支剩余待修复缺陷13个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9MBTF?from=project-i…
CVE修复:
CVE
仓库
score
I8VT5F:CVE-2023-51698<https://gitee.com/src-openeuler/atril/issues/I8VT5F>
atril
8.8
I9HK1R:CVE-2024-26885<https://gitee.com/src-openeuler/kernel/issues/I9HK1R>
kernel
7.8
I9HK6X:CVE-2024-26884<https://gitee.com/src-openeuler/kernel/issues/I9HK6X>
kernel
7.8
I9HKCB:CVE-2024-26883<https://gitee.com/src-openeuler/kernel/issues/I9HKCB>
kernel
7.8
I9L9FT:CVE-2024-4340<https://gitee.com/src-openeuler/python-sqlparse/issues/I9L9FT>
python-sqlparse
7.5
I9E2Q0:CVE-2024-27316<https://gitee.com/src-openeuler/httpd/issues/I9E2Q0>
httpd
7.5
I9J3YK:CVE-2024-32661<https://gitee.com/src-openeuler/freerdp/issues/I9J3YK>
freerdp
7.5
I9E4NE:CVE-2024-31080<https://gitee.com/src-openeuler/xorg-x11-server-xwayland/issues/I9E4NE>
xorg-x11-server-xwayland
7.3
I9HWXO:CVE-2023-3758<https://gitee.com/src-openeuler/sssd/issues/I9HWXO>
sssd
7.1
I8TQCT:CVE-2023-6270<https://gitee.com/src-openeuler/kernel/issues/I8TQCT>
kernel
7
I9J6JG:CVE-2020-35850<https://gitee.com/src-openeuler/cockpit/issues/I9J6JG>
cockpit
6.5
I8WQRS:CVE-2024-20973<https://gitee.com/src-openeuler/mysql/issues/I8WQRS>
mysql
6.5
I8WQRY:CVE-2024-20962<https://gitee.com/src-openeuler/mysql/issues/I8WQRY>
mysql
6.5
I8WQRZ:CVE-2024-20977<https://gitee.com/src-openeuler/mysql/issues/I8WQRZ>
mysql
6.5
I8WQS2:CVE-2024-20963<https://gitee.com/src-openeuler/mysql/issues/I8WQS2>
mysql
6.5
I8WQVV:CVE-2024-20985<https://gitee.com/src-openeuler/mysql/issues/I8WQVV>
mysql
6.5
I8WQTY:CVE-2024-20961<https://gitee.com/src-openeuler/mysql/issues/I8WQTY>
mysql
6.5
I8WQUL:CVE-2024-20960<https://gitee.com/src-openeuler/mysql/issues/I8WQUL>
mysql
6.5
I9KGKD:CVE-2023-6129<https://gitee.com/src-openeuler/mysql/issues/I9KGKD>
mysql
6.5
I9E577:CVE-2023-38709<https://gitee.com/src-openeuler/httpd/issues/I9E577>
httpd
6.1
I9E58K:CVE-2024-24795<https://gitee.com/src-openeuler/httpd/issues/I9E58K>
httpd
6.1
I9JUKA:CVE-2022-48682<https://gitee.com/src-openeuler/fdupes/issues/I9JUKA>
fdupes
6
I9EZL9:CVE-2024-2511<https://gitee.com/src-openeuler/openssl/issues/I9EZL9>
openssl
5.9
I9AR03:CVE-2022-2806<https://gitee.com/src-openeuler/sos/issues/I9AR03>
sos
5.5
I9LGC9:CVE-2024-34402<https://gitee.com/src-openeuler/uriparser/issues/I9LGC9>
uriparser
5.5
I8WQU9:CVE-2024-20967<https://gitee.com/src-openeuler/mysql/issues/I8WQU9>
mysql
5.5
I8WQXN:CVE-2024-20969<https://gitee.com/src-openeuler/mysql/issues/I8WQXN>
mysql
5.5
I91L79:CVE-2024-25739<https://gitee.com/src-openeuler/kernel/issues/I91L79>
kernel
5.5
I94P5J:CVE-2023-52477<https://gitee.com/src-openeuler/kernel/issues/I94P5J>
kernel
5.5
I9BV23:CVE-2024-26644<https://gitee.com/src-openeuler/kernel/issues/I9BV23>
kernel
5.5
I9E2GU:CVE-2024-26698<https://gitee.com/src-openeuler/kernel/issues/I9E2GU>
kernel
5.5
I9E2M9:CVE-2024-26773<https://gitee.com/src-openeuler/kernel/issues/I9E2M9>
kernel
5.5
I9E2MF:CVE-2024-26772<https://gitee.com/src-openeuler/kernel/issues/I9E2MF>
kernel
5.5
I9E2MG:CVE-2024-26777<https://gitee.com/src-openeuler/kernel/issues/I9E2MG>
kernel
5.5
I9E2Y8:CVE-2024-26778<https://gitee.com/src-openeuler/kernel/issues/I9E2Y8>
kernel
5.5
I9E3E9:CVE-2024-26736<https://gitee.com/src-openeuler/kernel/issues/I9E3E9>
kernel
5.5
I9E46I:CVE-2024-26788<https://gitee.com/src-openeuler/kernel/issues/I9E46I>
kernel
5.5
I9HK1I:CVE-2024-26901<https://gitee.com/src-openeuler/kernel/issues/I9HK1I>
kernel
5.5
I9HKBT:CVE-2024-26900<https://gitee.com/src-openeuler/kernel/issues/I9HKBT>
kernel
5.5
I8WQRN:CVE-2024-20964<https://gitee.com/src-openeuler/mysql/issues/I8WQRN>
mysql
5.3
I9H9UX:CVE-2024-20994<https://gitee.com/src-openeuler/mysql/issues/I9H9UX>
mysql
5.3
I8WQRQ:CVE-2024-20971<https://gitee.com/src-openeuler/mysql/issues/I8WQRQ>
mysql
4.9
I8WQRR:CVE-2024-20976<https://gitee.com/src-openeuler/mysql/issues/I8WQRR>
mysql
4.9
I8WQRU:CVE-2024-20978<https://gitee.com/src-openeuler/mysql/issues/I8WQRU>
mysql
4.9
I8WQRW:CVE-2024-20981<https://gitee.com/src-openeuler/mysql/issues/I8WQRW>
mysql
4.9
I8WQSX:CVE-2024-20965<https://gitee.com/src-openeuler/mysql/issues/I8WQSX>
mysql
4.9
I8WQT7:CVE-2024-20972<https://gitee.com/src-openeuler/mysql/issues/I8WQT7>
mysql
4.9
I8WQTZ:CVE-2024-20982<https://gitee.com/src-openeuler/mysql/issues/I8WQTZ>
mysql
4.9
I8WQU7:CVE-2024-20970<https://gitee.com/src-openeuler/mysql/issues/I8WQU7>
mysql
4.9
I8WQUE:CVE-2024-20974<https://gitee.com/src-openeuler/mysql/issues/I8WQUE>
mysql
4.9
I8WQUG:CVE-2024-20966<https://gitee.com/src-openeuler/mysql/issues/I8WQUG>
mysql
4.9
I9H9TA:CVE-2024-21069<https://gitee.com/src-openeuler/mysql/issues/I9H9TA>
mysql
4.9
I9H9TE:CVE-2024-21009<https://gitee.com/src-openeuler/mysql/issues/I9H9TE>
mysql
4.9
I9H9TF:CVE-2024-21061<https://gitee.com/src-openeuler/mysql/issues/I9H9TF>
mysql
4.9
I9H9TG:CVE-2024-20993<https://gitee.com/src-openeuler/mysql/issues/I9H9TG>
mysql
4.9
I9H9TO:CVE-2024-21047<https://gitee.com/src-openeuler/mysql/issues/I9H9TO>
mysql
4.9
I9H9TP:CVE-2024-20998<https://gitee.com/src-openeuler/mysql/issues/I9H9TP>
mysql
4.9
I9H9TZ:CVE-2024-21055<https://gitee.com/src-openeuler/mysql/issues/I9H9TZ>
mysql
4.9
I9H9V4:CVE-2024-21057<https://gitee.com/src-openeuler/mysql/issues/I9H9V4>
mysql
4.9
I9H9U6:CVE-2024-21060<https://gitee.com/src-openeuler/mysql/issues/I9H9U6>
mysql
4.9
I9H9UD:CVE-2024-21102<https://gitee.com/src-openeuler/mysql/issues/I9H9UD>
mysql
4.9
I9H9UE:CVE-2024-21054<https://gitee.com/src-openeuler/mysql/issues/I9H9UE>
mysql
4.9
I9H9UG:CVE-2024-21062<https://gitee.com/src-openeuler/mysql/issues/I9H9UG>
mysql
4.9
I9H9VR:CVE-2024-21096<https://gitee.com/src-openeuler/mysql/issues/I9H9VR>
mysql
4.9
I9LHKK:CVE-2024-34062<https://gitee.com/src-openeuler/python-tqdm/issues/I9LHKK>
python-tqdm
4.8
I94UOT:CVE-2024-26607<https://gitee.com/src-openeuler/kernel/issues/I94UOT>
kernel
4.7
I8WQUA:CVE-2024-20984<https://gitee.com/src-openeuler/mysql/issues/I8WQUA>
mysql
4.4
I9H9U2:CVE-2024-21013<https://gitee.com/src-openeuler/mysql/issues/I9H9U2>
mysql
4.4
I9H9UA:CVE-2024-21008<https://gitee.com/src-openeuler/mysql/issues/I9H9UA>
mysql
4.4
I9E6TS:CVE-2024-26810<https://gitee.com/src-openeuler/kernel/issues/I9E6TS>
kernel
4.4
I9E6TU:CVE-2024-27437<https://gitee.com/src-openeuler/kernel/issues/I9E6TU>
kernel
4.4
I9H9T9:CVE-2024-21000<https://gitee.com/src-openeuler/mysql/issues/I9H9T9>
mysql
3.8
I9FV3V:CVE-2024-3652<https://gitee.com/src-openeuler/libreswan/issues/I9FV3V>
libreswan
3.5
I9E2O0:CVE-2024-26751<https://gitee.com/src-openeuler/kernel/issues/I9E2O0>
kernel
3.3
I9E2O3:CVE-2024-26764<https://gitee.com/src-openeuler/kernel/issues/I9E2O3>
kernel
3.3
I9FNF8:CVE-2021-47212<https://gitee.com/src-openeuler/kernel/issues/I9FNF8>
kernel
1
I9GE8D:CVE-2024-26817<https://gitee.com/src-openeuler/kernel/issues/I9GE8D>
kernel
1
I9HJPD:CVE-2024-26839<https://gitee.com/src-openeuler/kernel/issues/I9HJPD>
kernel
1
I9HJU0:CVE-2024-26843<https://gitee.com/src-openeuler/kernel/issues/I9HJU0>
kernel
1
I9HJVQ:CVE-2024-26840<https://gitee.com/src-openeuler/kernel/issues/I9HJVQ>
kernel
1
I9HJVU:CVE-2023-52642<https://gitee.com/src-openeuler/kernel/issues/I9HJVU>
kernel
1
I9HJZO:CVE-2024-26882<https://gitee.com/src-openeuler/kernel/issues/I9HJZO>
kernel
1
I9HK2H:CVE-2024-26855<https://gitee.com/src-openeuler/kernel/issues/I9HK2H>
kernel
1
I9HK5V:CVE-2024-26874<https://gitee.com/src-openeuler/kernel/issues/I9HK5V>
kernel
1
I9HK63:CVE-2024-26894<https://gitee.com/src-openeuler/kernel/issues/I9HK63>
kernel
1
I9HK8R:CVE-2024-26875<https://gitee.com/src-openeuler/kernel/issues/I9HK8R>
kernel
1
I9HK9F:CVE-2024-26893<https://gitee.com/src-openeuler/kernel/issues/I9HK9F>
kernel
1
I9FNFK:CVE-2021-47182<https://gitee.com/src-openeuler/kernel/issues/I9FNFK>
kernel
0
I9FNFQ:CVE-2021-47211<https://gitee.com/src-openeuler/kernel/issues/I9FNFQ>
kernel
0
Bugfix:
issue
仓库
#I8S3VP:cdrkit: delete autosetup macro in changelog:cdrkit: delete autosetup macro in changelog
cdrkit
#I7DJYR:/etc/os-release文件同时存在ID和ID_LIKE时,构建报错:/etc/os-release文件同时存在ID和ID_LIKE时,构建报错
libreswan
#I64WN8:authvar的-i命令无法执行:authvar的-i命令无法执行
pesign
#I9GURX:httpd社区补丁分析回合:httpd社区补丁分析回合
httpd
#I9MLX3:TPCM功能问题:TPCM功能问题
shim
#I9JPDJ:【OLK-5.10】4/5 月内存主线补丁回合:【OLK-5.10】4/5 月内存主线补丁回合
kernel
#I9MXH3:主线补丁回合kprobes: Fix check for probe enabled in kill_kprobe():主线补丁回合kprobes: Fix check for probe enabled in kill_kprobe()
kernel
openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/docker_img/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/hotpatch_update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_versio…
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_versio…
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_versio…
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-22.03-LTS-SP1 Update版本待修复问题清单公示:
序号
里程碑
任务ID
任务标题
任务类型
创建时间
优先级
关联仓库
sig组
任务路径
1
openEuler-22.03-LTS-SP1
I6N49G
【openeuler-22.03-LTS-SP1】openeuler-22.03-LTS-SP1 x86默认不再编译bcache,导致bcache业务无法正常使用
任务
2023/3/14 20:13
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6N49G
2
openEuler-22.03-LTS-SP1
I6OLND
关闭kdump情况下触发panic可能会卡死
任务
2023/3/20 16:58
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6OLND
3
openEuler-22.03-LTS-SP1
I6ORVZ
【22.03-LTS-SP1】modprobe强制加载内核模块失败Key was rejected by service
任务
2023/3/21 10:52
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6ORVZ
4
openEuler-22.03-LTS-SP1
I6P3II
[openEuler-22.03-LTS-SP1] arm 内核不支持files cgroup
任务
2023/3/22 10:20
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6P3II
5
openEuler-22.03-LTS-SP1
I6VFV6
[22.03 SP1] [x86/arm] mariadb授权给远程用户,远程连接服务失败
缺陷
2023/4/13 16:38
次要
src-openEuler/mariadb
DB
https://gitee.com/open_euler/dashboard?issue_id=I6VFV6
6
openEuler-22.03-LTS-SP1
I6ZOUM
qemu-6.2.0 内存预分配性能比 qemu-4.1.0有严重下降
任务
2023/4/28 17:37
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I6ZOUM
7
openEuler-22.03-LTS-SP1
I73CKF
【22.03-lts-sp1】x86环境上同时安装php-fpm软件包和php-opcache软件包后会导致php-fpm.service服务启动失败
缺陷
2023/5/16 9:01
次要
src-openEuler/php
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I73CKF
8
openEuler-22.03-LTS-SP1
I73TNL
开启FIPS模式重启系统内核自检ofb(aes)算法失败导致panic
任务
2023/5/17 14:33
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I73TNL
9
openEuler-22.03-LTS-SP1
I7BM6U
【openEuler-22.03-LTS-SP1 】548子项异常波动问题跟踪
任务
2023/6/7 14:54
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I7BM6U
10
openEuler-22.03-LTS-SP1 update20230726
I7OR2I
【22.03 LTS SP1 update20230726】【arm\x86】selinux-policy-base的版本不符合ceph子包的安装条件,ceph子包安装失败
缺陷
2023/7/28 14:38
主要
src-openEuler/ceph
sig-SDS
https://gitee.com/open_euler/dashboard?issue_id=I7OR2I
11
openEuler-22.03-LTS-SP1
I84L9F
openEuler 22.03 LTS-SP1版本上编译node-v18.18.0的代码失败
缺陷
2023/9/26 19:24
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I84L9F
12
openEuler-22.03-LTS-SP1
I9CO8M
【openEuler-22.03-LTS-SP1】【x86】执行clang xx -o xx报错:“error: unknown target triple 'x86_64-unknown-linux-gnu', please use -triple or -arch”
缺陷
2024/3/29 14:46
主要
src-openEuler/clang
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I9CO8M
13
openEuler-22.03-LTS-SP1
I9K172
[22.03 LTS-SP1][deja] deja扫描类型用例执行部分失败
缺陷
2024/4/26 18:51
次要
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I9K172
openEuler-22.03-LTS-SP2 Update 20240508
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS-SP2修复版本已知问题5个,已知漏洞91个,目前版本分支剩余待修复缺陷8个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS-SP2 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9MBTG?from=project-i…
CVE修复:
CVE
仓库
score
I6VZAQ:CVE-2023-2091<https://gitee.com/src-openeuler/youker-assistant/issues/I6VZAQ>
youker-assistant
7.8
I8XH1F:CVE-2023-6816<https://gitee.com/src-openeuler/xorg-x11-server-xwayland/issues/I8XH1F>
xorg-x11-server-xwayland
7.8
I9HK1R:CVE-2024-26885<https://gitee.com/src-openeuler/kernel/issues/I9HK1R>
kernel
7.8
I9HK6X:CVE-2024-26884<https://gitee.com/src-openeuler/kernel/issues/I9HK6X>
kernel
7.8
I9HKCB:CVE-2024-26883<https://gitee.com/src-openeuler/kernel/issues/I9HKCB>
kernel
7.8
I9L9FT:CVE-2024-4340<https://gitee.com/src-openeuler/python-sqlparse/issues/I9L9FT>
python-sqlparse
7.5
I9C6X6:CVE-2022-32149<https://gitee.com/src-openeuler/podman/issues/I9C6X6>
podman
7.5
I90BS5:CVE-2022-41723<https://gitee.com/src-openeuler/ignition/issues/I90BS5>
ignition
7.5
I9E2Q0:CVE-2024-27316<https://gitee.com/src-openeuler/httpd/issues/I9E2Q0>
httpd
7.5
I8YZNS:CVE-2023-6478<https://gitee.com/src-openeuler/xorg-x11-server-xwayland/issues/I8YZNS>
xorg-x11-server-xwayland
7.5
I9J3YK:CVE-2024-32661<https://gitee.com/src-openeuler/freerdp/issues/I9J3YK>
freerdp
7.5
I9DS2T:CVE-2024-3205<https://gitee.com/src-openeuler/libyaml/issues/I9DS2T>
libyaml
7.3
I9E4N7:CVE-2024-31081<https://gitee.com/src-openeuler/xorg-x11-server-xwayland/issues/I9E4N7>
xorg-x11-server-xwayland
7.3
I8TQCT:CVE-2023-6270<https://gitee.com/src-openeuler/kernel/issues/I8TQCT>
kernel
7
I8WQRS:CVE-2024-20973<https://gitee.com/src-openeuler/mysql/issues/I8WQRS>
mysql
6.5
I8WQRY:CVE-2024-20962<https://gitee.com/src-openeuler/mysql/issues/I8WQRY>
mysql
6.5
I8WQRZ:CVE-2024-20977<https://gitee.com/src-openeuler/mysql/issues/I8WQRZ>
mysql
6.5
I8WQS2:CVE-2024-20963<https://gitee.com/src-openeuler/mysql/issues/I8WQS2>
mysql
6.5
I8WQVV:CVE-2024-20985<https://gitee.com/src-openeuler/mysql/issues/I8WQVV>
mysql
6.5
I8WQTY:CVE-2024-20961<https://gitee.com/src-openeuler/mysql/issues/I8WQTY>
mysql
6.5
I8WQUL:CVE-2024-20960<https://gitee.com/src-openeuler/mysql/issues/I8WQUL>
mysql
6.5
I9KGKD:CVE-2023-6129<https://gitee.com/src-openeuler/mysql/issues/I9KGKD>
mysql
6.5
I9E58K:CVE-2024-24795<https://gitee.com/src-openeuler/httpd/issues/I9E58K>
httpd
6.1
I9JUKA:CVE-2022-48682<https://gitee.com/src-openeuler/fdupes/issues/I9JUKA>
fdupes
6
I9EZL9:CVE-2024-2511<https://gitee.com/src-openeuler/openssl/issues/I9EZL9>
openssl
5.9
I9AR03:CVE-2022-2806<https://gitee.com/src-openeuler/sos/issues/I9AR03>
sos
5.5
I9LGC9:CVE-2024-34402<https://gitee.com/src-openeuler/uriparser/issues/I9LGC9>
uriparser
5.5
I9EZYH:CVE-2024-31047<https://gitee.com/src-openeuler/OpenEXR/issues/I9EZYH>
OpenEXR
5.5
I8XBI4:CVE-2024-0408<https://gitee.com/src-openeuler/xorg-x11-server-xwayland/issues/I8XBI4>
xorg-x11-server-xwayland
5.5
I8WQU9:CVE-2024-20967<https://gitee.com/src-openeuler/mysql/issues/I8WQU9>
mysql
5.5
I8WQXN:CVE-2024-20969<https://gitee.com/src-openeuler/mysql/issues/I8WQXN>
mysql
5.5
I91L79:CVE-2024-25739<https://gitee.com/src-openeuler/kernel/issues/I91L79>
kernel
5.5
I9BV23:CVE-2024-26644<https://gitee.com/src-openeuler/kernel/issues/I9BV23>
kernel
5.5
I9E2GU:CVE-2024-26698<https://gitee.com/src-openeuler/kernel/issues/I9E2GU>
kernel
5.5
I9E2M9:CVE-2024-26773<https://gitee.com/src-openeuler/kernel/issues/I9E2M9>
kernel
5.5
I9E2MF:CVE-2024-26772<https://gitee.com/src-openeuler/kernel/issues/I9E2MF>
kernel
5.5
I9E2MG:CVE-2024-26777<https://gitee.com/src-openeuler/kernel/issues/I9E2MG>
kernel
5.5
I9E2Y8:CVE-2024-26778<https://gitee.com/src-openeuler/kernel/issues/I9E2Y8>
kernel
5.5
I9E3E9:CVE-2024-26736<https://gitee.com/src-openeuler/kernel/issues/I9E3E9>
kernel
5.5
I9E46I:CVE-2024-26788<https://gitee.com/src-openeuler/kernel/issues/I9E46I>
kernel
5.5
I9HK1I:CVE-2024-26901<https://gitee.com/src-openeuler/kernel/issues/I9HK1I>
kernel
5.5
I9HKBT:CVE-2024-26900<https://gitee.com/src-openeuler/kernel/issues/I9HKBT>
kernel
5.5
I8WQRN:CVE-2024-20964<https://gitee.com/src-openeuler/mysql/issues/I8WQRN>
mysql
5.3
I9H9UX:CVE-2024-20994<https://gitee.com/src-openeuler/mysql/issues/I9H9UX>
mysql
5.3
I8WQRR:CVE-2024-20976<https://gitee.com/src-openeuler/mysql/issues/I8WQRR>
mysql
4.9
I8WQRU:CVE-2024-20978<https://gitee.com/src-openeuler/mysql/issues/I8WQRU>
mysql
4.9
I8WQRW:CVE-2024-20981<https://gitee.com/src-openeuler/mysql/issues/I8WQRW>
mysql
4.9
I8WQSX:CVE-2024-20965<https://gitee.com/src-openeuler/mysql/issues/I8WQSX>
mysql
4.9
I8WQT7:CVE-2024-20972<https://gitee.com/src-openeuler/mysql/issues/I8WQT7>
mysql
4.9
I8WQTZ:CVE-2024-20982<https://gitee.com/src-openeuler/mysql/issues/I8WQTZ>
mysql
4.9
I8WQU7:CVE-2024-20970<https://gitee.com/src-openeuler/mysql/issues/I8WQU7>
mysql
4.9
I8WQUE:CVE-2024-20974<https://gitee.com/src-openeuler/mysql/issues/I8WQUE>
mysql
4.9
I8WQUG:CVE-2024-20966<https://gitee.com/src-openeuler/mysql/issues/I8WQUG>
mysql
4.9
I9H9TA:CVE-2024-21069<https://gitee.com/src-openeuler/mysql/issues/I9H9TA>
mysql
4.9
I9H9TE:CVE-2024-21009<https://gitee.com/src-openeuler/mysql/issues/I9H9TE>
mysql
4.9
I9H9TF:CVE-2024-21061<https://gitee.com/src-openeuler/mysql/issues/I9H9TF>
mysql
4.9
I9H9TG:CVE-2024-20993<https://gitee.com/src-openeuler/mysql/issues/I9H9TG>
mysql
4.9
I9H9TO:CVE-2024-21047<https://gitee.com/src-openeuler/mysql/issues/I9H9TO>
mysql
4.9
I9H9TP:CVE-2024-20998<https://gitee.com/src-openeuler/mysql/issues/I9H9TP>
mysql
4.9
I9H9TZ:CVE-2024-21055<https://gitee.com/src-openeuler/mysql/issues/I9H9TZ>
mysql
4.9
I9H9V4:CVE-2024-21057<https://gitee.com/src-openeuler/mysql/issues/I9H9V4>
mysql
4.9
I9H9U6:CVE-2024-21060<https://gitee.com/src-openeuler/mysql/issues/I9H9U6>
mysql
4.9
I9H9UD:CVE-2024-21102<https://gitee.com/src-openeuler/mysql/issues/I9H9UD>
mysql
4.9
I9H9UE:CVE-2024-21054<https://gitee.com/src-openeuler/mysql/issues/I9H9UE>
mysql
4.9
I9H9UG:CVE-2024-21062<https://gitee.com/src-openeuler/mysql/issues/I9H9UG>
mysql
4.9
I9H9VR:CVE-2024-21096<https://gitee.com/src-openeuler/mysql/issues/I9H9VR>
mysql
4.9
I94UOT:CVE-2024-26607<https://gitee.com/src-openeuler/kernel/issues/I94UOT>
kernel
4.7
I8WQUA:CVE-2024-20984<https://gitee.com/src-openeuler/mysql/issues/I8WQUA>
mysql
4.4
I9H9U2:CVE-2024-21013<https://gitee.com/src-openeuler/mysql/issues/I9H9U2>
mysql
4.4
I9H9UA:CVE-2024-21008<https://gitee.com/src-openeuler/mysql/issues/I9H9UA>
mysql
4.4
I9E6TS:CVE-2024-26810<https://gitee.com/src-openeuler/kernel/issues/I9E6TS>
kernel
4.4
I9E6TU:CVE-2024-27437<https://gitee.com/src-openeuler/kernel/issues/I9E6TU>
kernel
4.4
I9H9T9:CVE-2024-21000<https://gitee.com/src-openeuler/mysql/issues/I9H9T9>
mysql
3.8
I9FV3V:CVE-2024-3652<https://gitee.com/src-openeuler/libreswan/issues/I9FV3V>
libreswan
3.5
I9E2O0:CVE-2024-26751<https://gitee.com/src-openeuler/kernel/issues/I9E2O0>
kernel
3.3
I9E2O3:CVE-2024-26764<https://gitee.com/src-openeuler/kernel/issues/I9E2O3>
kernel
3.3
I9FNF8:CVE-2021-47212<https://gitee.com/src-openeuler/kernel/issues/I9FNF8>
kernel
1
I9GE8D:CVE-2024-26817<https://gitee.com/src-openeuler/kernel/issues/I9GE8D>
kernel
1
I9HJPD:CVE-2024-26839<https://gitee.com/src-openeuler/kernel/issues/I9HJPD>
kernel
1
I9HJU0:CVE-2024-26843<https://gitee.com/src-openeuler/kernel/issues/I9HJU0>
kernel
1
I9HJVQ:CVE-2024-26840<https://gitee.com/src-openeuler/kernel/issues/I9HJVQ>
kernel
1
I9HJVU:CVE-2023-52642<https://gitee.com/src-openeuler/kernel/issues/I9HJVU>
kernel
1
I9HJZO:CVE-2024-26882<https://gitee.com/src-openeuler/kernel/issues/I9HJZO>
kernel
1
I9HK2H:CVE-2024-26855<https://gitee.com/src-openeuler/kernel/issues/I9HK2H>
kernel
1
I9HK5V:CVE-2024-26874<https://gitee.com/src-openeuler/kernel/issues/I9HK5V>
kernel
1
I9HK63:CVE-2024-26894<https://gitee.com/src-openeuler/kernel/issues/I9HK63>
kernel
1
I9HK8R:CVE-2024-26875<https://gitee.com/src-openeuler/kernel/issues/I9HK8R>
kernel
1
I9HK9F:CVE-2024-26893<https://gitee.com/src-openeuler/kernel/issues/I9HK9F>
kernel
1
I9F94L:CVE-2023-45935<https://gitee.com/src-openeuler/qt5-qtbase/issues/I9F94L>
qt5-qtbase
0
I9FNFK:CVE-2021-47182<https://gitee.com/src-openeuler/kernel/issues/I9FNFK>
kernel
0
I9FNFQ:CVE-2021-47211<https://gitee.com/src-openeuler/kernel/issues/I9FNFQ>
kernel
0
Bugfix:
issue
仓库
#I6IAVJ:delete static library:delete static library
ipset
#I8S3VP:cdrkit: delete autosetup macro in changelog:cdrkit: delete autosetup macro in changelog
cdrkit
#I9MLX3:TPCM功能问题:TPCM功能问题
shim
#I9JPDJ:【OLK-5.10】4/5 月内存主线补丁回合:【OLK-5.10】4/5 月内存主线补丁回合
kernel
#I9MXH3:主线补丁回合kprobes: Fix check for probe enabled in kill_kprobe():主线补丁回合kprobes: Fix check for probe enabled in kill_kprobe()
kernel
openEuler-22.03-LTS SP2版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-22.03-LTS SP2 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/hotpatch_update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/docker_img/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/EPOL/update/multi_versio…
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/EPOL/update/multi_versio…
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
https://repo.openeuler.org/security/data/hotpatch_cvrf/
openEuler-22.03-LTS-SP2 Update版本待修复问题清单公示:
序号
里程碑
任务ID
任务标题
任务类型
创建时间
优先级
关联仓库
sig组
任务路径
1
openEuler-22.03-LTS-SP2-round-2
I795G3
【22.03-LTS-SP2 round2】本次转测源中出现多个版本的containers-common
缺陷
2023/5/29 15:50
主要
src-openEuler/skopeo
sig-CloudNative
https://gitee.com/open_euler/dashboard?issue_id=I795G3
2
openEuler-22.03-LTS-SP2
I7AAWF
2203-SP2下安装虚拟机,CPU为FT-2000+,使用host-model启动虚拟机失败
任务
2023/6/2 10:46
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I7AAWF
3
openEuler-22.03-LTS-SP2-SEC
I7AFIR
【22.03-LTS-SP2 round2】【x86/arm】libkae-1.2.10-6.oe2203sp2安全编译选项Rpath/Runpath不满足
缺陷
2023/6/2 16:14
主要
src-openEuler/libkae
sig-AccLib
https://gitee.com/open_euler/dashboard?issue_id=I7AFIR
4
openEuler-22.03-LTS-SP2
I7B6X5
gcc-pie-arm64架构和操作手册结果不同
缺陷
2023/6/6 10:11
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I7B6X5
5
openEuler-22.03-LTS-SP2
I7BRC1
perf 与 libtraceevent 软件包存在安装冲突
任务
2023/6/7 20:42
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I7BRC1
6
openEuler-22.03-LTS-SP2-update20231018
I89NB0
22.03-LTS-SP2的ceph release版本低于22.03-LTS-SP1 release版本
缺陷
2023/10/20 15:35
次要
src-openEuler/ceph
sig-SDS
https://gitee.com/open_euler/dashboard?issue_id=I89NB0
7
openEuler-22.03-LTS-SP2
I8C74L
实时补丁版本选择
任务
2023/10/31 9:53
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8C74L
8
openEuler-22.03-LTS-SP2
I9CODR
【openEuler-22.03-LTS-SP2】【x86】执行clang xx -o xx报错:“error: unknown target triple 'x86_64-unknown-linux-gnu', please use -triple or -arch”
缺陷
2024/3/29 14:53
主要
src-openEuler/clang
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I9CODR
openEuler-20.03-LTS-SP4 Update 20240508
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP4修复版本已知问题13个,已知漏洞75个。目前版本分支剩余待修复缺陷10个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP4 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9MBTL?from=project-i…
CVE修复:
CVE
仓库
score
I8VT5F:CVE-2023-51698<https://gitee.com/src-openeuler/atril/issues/I8VT5F>
atril
8.8
I4BY7B:CVE-2020-26950<https://gitee.com/src-openeuler/firefox/issues/I4BY7B>
firefox
8.8
I9FNG2:CVE-2021-47194<https://gitee.com/src-openeuler/kernel/issues/I9FNG2>
kernel
7.8
I9HK6X:CVE-2024-26884<https://gitee.com/src-openeuler/kernel/issues/I9HK6X>
kernel
7.8
I9HKCB:CVE-2024-26883<https://gitee.com/src-openeuler/kernel/issues/I9HKCB>
kernel
7.8
I9L9FT:CVE-2024-4340<https://gitee.com/src-openeuler/python-sqlparse/issues/I9L9FT>
python-sqlparse
7.5
I9ENQO:CVE-2020-36829<https://gitee.com/src-openeuler/perl-Mojolicious/issues/I9ENQO>
perl-Mojolicious
7.5
I9ENQW:CVE-2021-47208<https://gitee.com/src-openeuler/perl-Mojolicious/issues/I9ENQW>
perl-Mojolicious
7.5
I9E2Q0:CVE-2024-27316<https://gitee.com/src-openeuler/httpd/issues/I9E2Q0>
httpd
7.5
I9DS2T:CVE-2024-3205<https://gitee.com/src-openeuler/libyaml/issues/I9DS2T>
libyaml
7.3
I9GEXT:CVE-2024-32487<https://gitee.com/src-openeuler/less/issues/I9GEXT>
less
6.8
I9J6JG:CVE-2020-35850<https://gitee.com/src-openeuler/cockpit/issues/I9J6JG>
cockpit
6.5
I9E58K:CVE-2024-24795<https://gitee.com/src-openeuler/httpd/issues/I9E58K>
httpd
6.1
I9E577:CVE-2023-38709<https://gitee.com/src-openeuler/httpd/issues/I9E577>
httpd
6.1
I9JUKA:CVE-2022-48682<https://gitee.com/src-openeuler/fdupes/issues/I9JUKA>
fdupes
6
I9EZL9:CVE-2024-2511<https://gitee.com/src-openeuler/openssl/issues/I9EZL9>
openssl
5.9
I9AR03:CVE-2022-2806<https://gitee.com/src-openeuler/sos/issues/I9AR03>
sos
5.5
I9LGC9:CVE-2024-34402<https://gitee.com/src-openeuler/uriparser/issues/I9LGC9>
uriparser
5.5
I9LGCZ:CVE-2024-34403<https://gitee.com/src-openeuler/uriparser/issues/I9LGCZ>
uriparser
5.5
I9EZYH:CVE-2024-31047<https://gitee.com/src-openeuler/OpenEXR/issues/I9EZYH>
OpenEXR
5.5
I99JQV:CVE-2023-52619<https://gitee.com/src-openeuler/kernel/issues/I99JQV>
kernel
5.5
I9BGKK:CVE-2021-47149<https://gitee.com/src-openeuler/kernel/issues/I9BGKK>
kernel
5.5
I9BV23:CVE-2024-26644<https://gitee.com/src-openeuler/kernel/issues/I9BV23>
kernel
5.5
I9E2M9:CVE-2024-26773<https://gitee.com/src-openeuler/kernel/issues/I9E2M9>
kernel
5.5
I9E2MF:CVE-2024-26772<https://gitee.com/src-openeuler/kernel/issues/I9E2MF>
kernel
5.5
I9E2MG:CVE-2024-26777<https://gitee.com/src-openeuler/kernel/issues/I9E2MG>
kernel
5.5
I9E2Y8:CVE-2024-26778<https://gitee.com/src-openeuler/kernel/issues/I9E2Y8>
kernel
5.5
I9HOEF:CVE-2021-47210<https://gitee.com/src-openeuler/kernel/issues/I9HOEF>
kernel
5.5
I9LK3Y:CVE-2022-48674<https://gitee.com/src-openeuler/kernel/issues/I9LK3Y>
kernel
5.5
I9HK1I:CVE-2024-26901<https://gitee.com/src-openeuler/kernel/issues/I9HK1I>
kernel
5.5
I9HK4U:CVE-2024-26904<https://gitee.com/src-openeuler/kernel/issues/I9HK4U>
kernel
5.5
I917MX:CVE-2024-24860<https://gitee.com/src-openeuler/kernel/issues/I917MX>
kernel
5.3
I990B2:CVE-2021-47121<https://gitee.com/src-openeuler/kernel/issues/I990B2>
kernel
4.7
I9E6TS:CVE-2024-26810<https://gitee.com/src-openeuler/kernel/issues/I9E6TS>
kernel
4.4
I9E6TU:CVE-2024-27437<https://gitee.com/src-openeuler/kernel/issues/I9E6TU>
kernel
4.4
I9JQRC:CVE-2024-33602<https://gitee.com/src-openeuler/glibc/issues/I9JQRC>
glibc
4
I9FV3V:CVE-2024-3652<https://gitee.com/src-openeuler/libreswan/issues/I9FV3V>
libreswan
3.5
I9E2O0:CVE-2024-26751<https://gitee.com/src-openeuler/kernel/issues/I9E2O0>
kernel
3.3
I9E2O3:CVE-2024-26764<https://gitee.com/src-openeuler/kernel/issues/I9E2O3>
kernel
3.3
I9E6TQ:CVE-2024-26813<https://gitee.com/src-openeuler/kernel/issues/I9E6TQ>
kernel
1
I9GE8D:CVE-2024-26817<https://gitee.com/src-openeuler/kernel/issues/I9GE8D>
kernel
1
I9HJPD:CVE-2024-26839<https://gitee.com/src-openeuler/kernel/issues/I9HJPD>
kernel
1
I9HJQC:CVE-2024-26845<https://gitee.com/src-openeuler/kernel/issues/I9HJQC>
kernel
1
I9HJRD:CVE-2024-26828<https://gitee.com/src-openeuler/kernel/issues/I9HJRD>
kernel
1
I9HJUW:CVE-2024-26825<https://gitee.com/src-openeuler/kernel/issues/I9HJUW>
kernel
1
I9HJVQ:CVE-2024-26840<https://gitee.com/src-openeuler/kernel/issues/I9HJVQ>
kernel
1
I9HJVU:CVE-2023-52642<https://gitee.com/src-openeuler/kernel/issues/I9HJVU>
kernel
1
I9HJX7:CVE-2024-26878<https://gitee.com/src-openeuler/kernel/issues/I9HJX7>
kernel
1
I9HJXK:CVE-2024-26863<https://gitee.com/src-openeuler/kernel/issues/I9HJXK>
kernel
1
I9HJXV:CVE-2024-26880<https://gitee.com/src-openeuler/kernel/issues/I9HJXV>
kernel
1
I9HJZO:CVE-2024-26882<https://gitee.com/src-openeuler/kernel/issues/I9HJZO>
kernel
1
I9HK5V:CVE-2024-26874<https://gitee.com/src-openeuler/kernel/issues/I9HK5V>
kernel
1
I9HK63:CVE-2024-26894<https://gitee.com/src-openeuler/kernel/issues/I9HK63>
kernel
1
I9HK8R:CVE-2024-26875<https://gitee.com/src-openeuler/kernel/issues/I9HK8R>
kernel
1
I9HK8Y:CVE-2024-26872<https://gitee.com/src-openeuler/kernel/issues/I9HK8Y>
kernel
1
I9HK9B:CVE-2024-26857<https://gitee.com/src-openeuler/kernel/issues/I9HK9B>
kernel
1
I9HK9J:CVE-2024-26859<https://gitee.com/src-openeuler/kernel/issues/I9HK9J>
kernel
1
I9HK9R:CVE-2024-26852<https://gitee.com/src-openeuler/kernel/issues/I9HK9R>
kernel
1
I9HKAZ:CVE-2024-26851<https://gitee.com/src-openeuler/kernel/issues/I9HKAZ>
kernel
1
I9HKEE:CVE-2024-26876<https://gitee.com/src-openeuler/kernel/issues/I9HKEE>
kernel
1
I9HL6R:CVE-2024-26915<https://gitee.com/src-openeuler/kernel/issues/I9HL6R>
kernel
1
I9J3KG:CVE-2024-26922<https://gitee.com/src-openeuler/kernel/issues/I9J3KG>
kernel
1
I9J7N6:CVE-2024-26813<https://gitee.com/src-openeuler/kernel/issues/I9J7N6>
kernel
1
I9JFG0:CVE-2024-26923<https://gitee.com/src-openeuler/kernel/issues/I9JFG0>
kernel
1
I9JJ2F:CVE-2024-26926<https://gitee.com/src-openeuler/kernel/issues/I9JJ2F>
kernel
1
I9KHGY:CVE-2022-48664<https://gitee.com/src-openeuler/kernel/issues/I9KHGY>
kernel
1
I9L5IQ:CVE-2024-26993<https://gitee.com/src-openeuler/kernel/issues/I9L5IQ>
kernel
1
I9L5QJ:CVE-2024-26973<https://gitee.com/src-openeuler/kernel/issues/I9L5QJ>
kernel
1
I9LKE1:CVE-2022-48702<https://gitee.com/src-openeuler/kernel/issues/I9LKE1>
kernel
1
I9F94L:CVE-2023-45935<https://gitee.com/src-openeuler/qt5-qtbase/issues/I9F94L>
qt5-qtbase
0
I9FNFF:CVE-2021-47183<https://gitee.com/src-openeuler/kernel/issues/I9FNFF>
kernel
0
I9FNFK:CVE-2021-47182<https://gitee.com/src-openeuler/kernel/issues/I9FNFK>
kernel
0
I9FNFO:CVE-2021-47217<https://gitee.com/src-openeuler/kernel/issues/I9FNFO>
kernel
0
I9FNFQ:CVE-2021-47211<https://gitee.com/src-openeuler/kernel/issues/I9FNFQ>
kernel
0
I9FNFL:CVE-2021-47210<https://gitee.com/src-openeuler/kernel/issues/I9FNFL>
kernel
0
Bugfix:
issue
仓库
#I8S3VP:cdrkit: delete autosetup macro in changelog:cdrkit: delete autosetup macro in changelog
cdrkit
#I64WN8:authvar的-i命令无法执行:authvar的-i命令无法执行
pesign
#I9GURX:httpd社区补丁分析回合:httpd社区补丁分析回合
httpd
#I9ER36:【olk - 6.6】cgroup结合cpu上下线测试长稳环境出现 BUG: unable to handle page fault for address: 00003984d0425d58:【olk - 6.6】cgroup结合cpu上下线测试长稳环境出现 BUG: unable to handle page fault for address: 00003984d0425d58
kernel
#I9GV9R:【openeuler-1.0-lts】网络lts 4.19.308补丁回合:【openeuler-1.0-lts】网络lts 4.19.308补丁回合
kernel
#I9HSOM:【openeuler-1.0-LTS】oom_kill.c: futex: delay the OOM reaper to allow time for proper futex cleanup:【openeuler-1.0-LTS】oom_kill.c: futex: delay the OOM reaper to allow time for proper futex cleanup
kernel
#I9IPML:【penEuler-1.0-LTS】tty: fix read of tty->pgrp outside of ctrl_lock:【penEuler-1.0-LTS】tty: fix read of tty->pgrp outside of ctrl_lock
kernel
#I9J08D:【OLK-5.10】多PF并发创建VF时间变长:【OLK-5.10】多PF并发创建VF时间变长
kernel
#I9JNPZ:【OLK-5.10】 4月主线补丁分析回合:【OLK-5.10】 4月主线补丁分析回合
kernel
#I9K34B:sched/rt: Fix sysctl_sched_rr_timeslice intial value:sched/rt: Fix sysctl_sched_rr_timeslice intial value
kernel
#I9K4H3:sched/rt: sysctl_sched_rr_timeslice show default timeslice after reset:sched/rt: sysctl_sched_rr_timeslice show default timeslice after reset
kernel
#I9K4JZ:sched/rt: Disallow writing invalid values to sched_rt_period_us:sched/rt: Disallow writing invalid values to sched_rt_period_us
kernel
#I9K8XT:【openEuler-1.0-LTS】mm/madvise: fix potential pte_unmap_unlock pte error:【openEuler-1.0-LTS】mm/madvise: fix potential pte_unmap_unlock pte error
kernel
openEuler-20.03-LTS SP4版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-20.03-LTS SP4 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP4/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP4/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
https://repo.openeuler.org/security/data/hotpatch_cvrf/
openEuler-20.03-LTS-SP4 Update版本待修复问题清单公示:
序号
里程碑
任务ID
任务标题
任务类型
创建时间
优先级
关联仓库
sig组
任务路径
1
openEuler-20.03-LTS-SP4-alpha
I8B7XU
【openEuler-20.03-LTS-SP4 alpha】[arm/x86]vdsmd.service服务启动失败
缺陷
2023/10/26 19:02
主要
src-openEuler/vdsm
oVirt
https://gitee.com/open_euler/dashboard?issue_id=I8B7XU
2
openEuler-20.03-LTS-SP4-round-1
I8DT5M
【openEuler-20.03-LTS-SP4 rc1】redis-sentinel.service启动失败
缺陷
2023/11/4 17:34
主要
src-openEuler/redis6
bigdata
https://gitee.com/open_euler/dashboard?issue_id=I8DT5M
3
openEuler-20.03-LTS-SP4 release
I8EAHA
[20.03-lts-sp4]Support handle CXL devices AER errors in firmware-first mode
任务
2023/11/6 22:23
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8EAHA
4
openEuler-20.03-LTS-SP4-round-1
I8EKUI
【openEuler-20.03-LTS-SP4 rc1】strongswan-swanctl.service服务启动失败
缺陷
2023/11/7 17:23
主要
src-openEuler/strongswan
sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I8EKUI
5
openEuler-20.03-LTS-SP4 release
I8F7ZR
[20.03-lts-sp4]The Hisi SAS driver supports the MQ feature
任务
2023/11/9 17:03
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8F7ZR
6
openEuler-20.03-LTS-SP4 release
I8F80L
[20.03-lts-sp4]The Hisi SAS driver supports loopback bit stream
任务
2023/11/9 17:05
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8F80L
7
openEuler-20.03-LTS-SP4-round-2
I8G371
【20.03-SP4-rc2】【arm/x86】h2源码包本地自编译失败
缺陷
2023/11/13 16:59
次要
src-openEuler/h2
DB
https://gitee.com/open_euler/dashboard?issue_id=I8G371
8
openEuler-20.03-LTS-SP4-round-2
I8GDGR
【openEuler-20.03-LTS-SP4-RC2】【arm/x86】物理机安装gnome-*启用图形化界面重启之后卡住
缺陷
2023/11/14 15:36
主要
src-openEuler/gnome-desktop3
GNOME
https://gitee.com/open_euler/dashboard?issue_id=I8GDGR
9
openEuler-20.03-LTS-SP4-dailybuild
I8GUMP
[EulerMaker] nagios-plugins build problem in openEuler-20.03-LTS-SP4:everything
缺陷
2023/11/16 9:18
不重要
src-openEuler/nagios-plugins
Networking
https://gitee.com/open_euler/dashboard?issue_id=I8GUMP
10
openEuler-20.03-LTS-SP4-dailybuild
I8I8DQ
[EulerMaker] caja-extensions install problem in openEuler-20.03-LTS-SP4:epol
缺陷
2023/11/21 15:31
不重要
src-openEuler/caja-extensions
sig-mate-desktop
https://gitee.com/open_euler/dashboard?issue_id=I8I8DQ
openEuler-22.03-LTS-SP3 Update 20240508
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS-SP3修复版本已知问题24个,已知漏洞122个。目前版本分支剩余待修复缺陷5个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9MAU2?from=project-i…
CVE修复:
CVE
仓库
score
#I8VT5F:CVE-2023-51698<https://gitee.com/open_euler/dashboard?issue_id=I8VT5F>
atril
8.8
#I8XH1F:CVE-2023-6816<https://gitee.com/open_euler/dashboard?issue_id=I8XH1F>
xorg-x11-server-xwayland
7.8
#I9HJY0:CVE-2024-26898<https://gitee.com/open_euler/dashboard?issue_id=I9HJY0>
kernel
7.8
#I9HK1R:CVE-2024-26885<https://gitee.com/open_euler/dashboard?issue_id=I9HK1R>
kernel
7.8
#I9HK6L:CVE-2024-26907<https://gitee.com/open_euler/dashboard?issue_id=I9HK6L>
kernel
7.8
#I9HK6X:CVE-2024-26884<https://gitee.com/open_euler/dashboard?issue_id=I9HK6X>
kernel
7.8
#I9HKCB:CVE-2024-26883<https://gitee.com/open_euler/dashboard?issue_id=I9HKCB>
kernel
7.8
#I90BQX:CVE-2022-41723<https://gitee.com/open_euler/dashboard?issue_id=I90BQX>
skopeo
7.5
#I90BS5:CVE-2022-41723<https://gitee.com/open_euler/dashboard?issue_id=I90BS5>
ignition
7.5
#I9C6X6:CVE-2022-32149<https://gitee.com/open_euler/dashboard?issue_id=I9C6X6>
podman
7.5
#I9E2Q0:CVE-2024-27316<https://gitee.com/open_euler/dashboard?issue_id=I9E2Q0>
httpd
7.5
#I8YZNS:CVE-2023-6478<https://gitee.com/open_euler/dashboard?issue_id=I8YZNS>
xorg-x11-server-xwayland
7.5
#I9J3YK:CVE-2024-32661<https://gitee.com/open_euler/dashboard?issue_id=I9J3YK>
freerdp
7.5
#I9E4N7:CVE-2024-31081<https://gitee.com/open_euler/dashboard?issue_id=I9E4N7>
xorg-x11-server-xwayland
7.3
#I9HWXO:CVE-2023-3758<https://gitee.com/open_euler/dashboard?issue_id=I9HWXO>
sssd
7.1
#I8WQRS:CVE-2024-20973<https://gitee.com/open_euler/dashboard?issue_id=I8WQRS>
mysql
6.5
#I8WQRY:CVE-2024-20962<https://gitee.com/open_euler/dashboard?issue_id=I8WQRY>
mysql
6.5
#I8WQRZ:CVE-2024-20977<https://gitee.com/open_euler/dashboard?issue_id=I8WQRZ>
mysql
6.5
#I8WQS2:CVE-2024-20963<https://gitee.com/open_euler/dashboard?issue_id=I8WQS2>
mysql
6.5
#I8WQVV:CVE-2024-20985<https://gitee.com/open_euler/dashboard?issue_id=I8WQVV>
mysql
6.5
#I8WQTY:CVE-2024-20961<https://gitee.com/open_euler/dashboard?issue_id=I8WQTY>
mysql
6.5
#I8WQUL:CVE-2024-20960<https://gitee.com/open_euler/dashboard?issue_id=I8WQUL>
mysql
6.5
#I9KGKD:CVE-2023-6129<https://gitee.com/open_euler/dashboard?issue_id=I9KGKD>
mysql
6.5
#I9E58K:CVE-2024-24795<https://gitee.com/open_euler/dashboard?issue_id=I9E58K>
httpd
6.1
#I9E577:CVE-2023-38709<https://gitee.com/open_euler/dashboard?issue_id=I9E577>
httpd
6.1
#I9JUKA:CVE-2022-48682<https://gitee.com/open_euler/dashboard?issue_id=I9JUKA>
fdupes
6
#I9EZL9:CVE-2024-2511<https://gitee.com/open_euler/dashboard?issue_id=I9EZL9>
openssl
5.9
#I9AR03:CVE-2022-2806<https://gitee.com/open_euler/dashboard?issue_id=I9AR03>
sos
5.5
#I8XBI4:CVE-2024-0408<https://gitee.com/open_euler/dashboard?issue_id=I8XBI4>
xorg-x11-server-xwayland
5.5
#I8WQU9:CVE-2024-20967<https://gitee.com/open_euler/dashboard?issue_id=I8WQU9>
mysql
5.5
#I8WQXN:CVE-2024-20969<https://gitee.com/open_euler/dashboard?issue_id=I8WQXN>
mysql
5.5
#I91L79:CVE-2024-25739<https://gitee.com/open_euler/dashboard?issue_id=I91L79>
kernel
5.5
#I99JQV:CVE-2023-52619<https://gitee.com/open_euler/dashboard?issue_id=I99JQV>
kernel
5.5
#I9BV23:CVE-2024-26644<https://gitee.com/open_euler/dashboard?issue_id=I9BV23>
kernel
5.5
#I9E2GU:CVE-2024-26698<https://gitee.com/open_euler/dashboard?issue_id=I9E2GU>
kernel
5.5
#I9E2M9:CVE-2024-26773<https://gitee.com/open_euler/dashboard?issue_id=I9E2M9>
kernel
5.5
#I9E2MF:CVE-2024-26772<https://gitee.com/open_euler/dashboard?issue_id=I9E2MF>
kernel
5.5
#I9E2MG:CVE-2024-26777<https://gitee.com/open_euler/dashboard?issue_id=I9E2MG>
kernel
5.5
#I9E2Y8:CVE-2024-26778<https://gitee.com/open_euler/dashboard?issue_id=I9E2Y8>
kernel
5.5
#I9E3E9:CVE-2024-26736<https://gitee.com/open_euler/dashboard?issue_id=I9E3E9>
kernel
5.5
#I9E46I:CVE-2024-26788<https://gitee.com/open_euler/dashboard?issue_id=I9E46I>
kernel
5.5
#I9LK3Y:CVE-2022-48674<https://gitee.com/open_euler/dashboard?issue_id=I9LK3Y>
kernel
5.5
#I9FNET:CVE-2021-47193<https://gitee.com/open_euler/dashboard?issue_id=I9FNET>
kernel
5.5
#I9HK1I:CVE-2024-26901<https://gitee.com/open_euler/dashboard?issue_id=I9HK1I>
kernel
5.5
#I9HK4U:CVE-2024-26904<https://gitee.com/open_euler/dashboard?issue_id=I9HK4U>
kernel
5.5
#I9HKBT:CVE-2024-26900<https://gitee.com/open_euler/dashboard?issue_id=I9HKBT>
kernel
5.5
#I8WQRN:CVE-2024-20964<https://gitee.com/open_euler/dashboard?issue_id=I8WQRN>
mysql
5.3
#I9H9UX:CVE-2024-20994<https://gitee.com/open_euler/dashboard?issue_id=I9H9UX>
mysql
5.3
#I917MX:CVE-2024-24860<https://gitee.com/open_euler/dashboard?issue_id=I917MX>
kernel
5.3
#I8WQRQ:CVE-2024-20971<https://gitee.com/open_euler/dashboard?issue_id=I8WQRQ>
mysql
4.9
#I8WQRR:CVE-2024-20976<https://gitee.com/open_euler/dashboard?issue_id=I8WQRR>
mysql
4.9
#I8WQRU:CVE-2024-20978<https://gitee.com/open_euler/dashboard?issue_id=I8WQRU>
mysql
4.9
#I8WQRW:CVE-2024-20981<https://gitee.com/open_euler/dashboard?issue_id=I8WQRW>
mysql
4.9
#I8WQSX:CVE-2024-20965<https://gitee.com/open_euler/dashboard?issue_id=I8WQSX>
mysql
4.9
#I8WQT7:CVE-2024-20972<https://gitee.com/open_euler/dashboard?issue_id=I8WQT7>
mysql
4.9
#I8WQTZ:CVE-2024-20982<https://gitee.com/open_euler/dashboard?issue_id=I8WQTZ>
mysql
4.9
#I8WQU7:CVE-2024-20970<https://gitee.com/open_euler/dashboard?issue_id=I8WQU7>
mysql
4.9
#I8WQUE:CVE-2024-20974<https://gitee.com/open_euler/dashboard?issue_id=I8WQUE>
mysql
4.9
#I8WQUG:CVE-2024-20966<https://gitee.com/open_euler/dashboard?issue_id=I8WQUG>
mysql
4.9
#I9H9TA:CVE-2024-21069<https://gitee.com/open_euler/dashboard?issue_id=I9H9TA>
mysql
4.9
#I9H9TE:CVE-2024-21009<https://gitee.com/open_euler/dashboard?issue_id=I9H9TE>
mysql
4.9
#I9H9TF:CVE-2024-21061<https://gitee.com/open_euler/dashboard?issue_id=I9H9TF>
mysql
4.9
#I9H9TG:CVE-2024-20993<https://gitee.com/open_euler/dashboard?issue_id=I9H9TG>
mysql
4.9
#I9H9TO:CVE-2024-21047<https://gitee.com/open_euler/dashboard?issue_id=I9H9TO>
mysql
4.9
#I9H9TP:CVE-2024-20998<https://gitee.com/open_euler/dashboard?issue_id=I9H9TP>
mysql
4.9
#I9H9TZ:CVE-2024-21055<https://gitee.com/open_euler/dashboard?issue_id=I9H9TZ>
mysql
4.9
#I9H9V4:CVE-2024-21057<https://gitee.com/open_euler/dashboard?issue_id=I9H9V4>
mysql
4.9
#I9H9U6:CVE-2024-21060<https://gitee.com/open_euler/dashboard?issue_id=I9H9U6>
mysql
4.9
#I9H9UD:CVE-2024-21102<https://gitee.com/open_euler/dashboard?issue_id=I9H9UD>
mysql
4.9
#I9H9UE:CVE-2024-21054<https://gitee.com/open_euler/dashboard?issue_id=I9H9UE>
mysql
4.9
#I9H9UG:CVE-2024-21062<https://gitee.com/open_euler/dashboard?issue_id=I9H9UG>
mysql
4.9
#I9H9VR:CVE-2024-21096<https://gitee.com/open_euler/dashboard?issue_id=I9H9VR>
mysql
4.9
#I94UOT:CVE-2024-26607<https://gitee.com/open_euler/dashboard?issue_id=I94UOT>
kernel
4.7
#I8WQUA:CVE-2024-20984<https://gitee.com/open_euler/dashboard?issue_id=I8WQUA>
mysql
4.4
#I9H9U2:CVE-2024-21013<https://gitee.com/open_euler/dashboard?issue_id=I9H9U2>
mysql
4.4
#I9H9UA:CVE-2024-21008<https://gitee.com/open_euler/dashboard?issue_id=I9H9UA>
mysql
4.4
#I9E6TS:CVE-2024-26810<https://gitee.com/open_euler/dashboard?issue_id=I9E6TS>
kernel
4.4
#I9E6TU:CVE-2024-27437<https://gitee.com/open_euler/dashboard?issue_id=I9E6TU>
kernel
4.4
#I9E6TH:CVE-2024-26814<https://gitee.com/open_euler/dashboard?issue_id=I9E6TH>
kernel
4.4
#I9H9T9:CVE-2024-21000<https://gitee.com/open_euler/dashboard?issue_id=I9H9T9>
mysql
3.8
#I9FV3V:CVE-2024-3652<https://gitee.com/open_euler/dashboard?issue_id=I9FV3V>
libreswan
3.5
#I9E2O0:CVE-2024-26751<https://gitee.com/open_euler/dashboard?issue_id=I9E2O0>
kernel
3.3
#I9E2O3:CVE-2024-26764<https://gitee.com/open_euler/dashboard?issue_id=I9E2O3>
kernel
3.3
#I9E6TQ:CVE-2024-26813<https://gitee.com/open_euler/dashboard?issue_id=I9E6TQ>
kernel
1
#I9GE8D:CVE-2024-26817<https://gitee.com/open_euler/dashboard?issue_id=I9GE8D>
kernel
1
#I9HJP4:CVE-2024-26829<https://gitee.com/open_euler/dashboard?issue_id=I9HJP4>
kernel
1
#I9HJPD:CVE-2024-26839<https://gitee.com/open_euler/dashboard?issue_id=I9HJPD>
kernel
1
#I9HJQC:CVE-2024-26845<https://gitee.com/open_euler/dashboard?issue_id=I9HJQC>
kernel
1
#I9HJRD:CVE-2024-26828<https://gitee.com/open_euler/dashboard?issue_id=I9HJRD>
kernel
1
#I9HJSI:CVE-2024-26846<https://gitee.com/open_euler/dashboard?issue_id=I9HJSI>
kernel
1
#I9HJU0:CVE-2024-26843<https://gitee.com/open_euler/dashboard?issue_id=I9HJU0>
kernel
1
#I9HJUW:CVE-2024-26825<https://gitee.com/open_euler/dashboard?issue_id=I9HJUW>
kernel
1
#I9HJVQ:CVE-2024-26840<https://gitee.com/open_euler/dashboard?issue_id=I9HJVQ>
kernel
1
#I9HJVU:CVE-2023-52642<https://gitee.com/open_euler/dashboard?issue_id=I9HJVU>
kernel
1
#I9HJXK:CVE-2024-26863<https://gitee.com/open_euler/dashboard?issue_id=I9HJXK>
kernel
1
#I9HJXV:CVE-2024-26880<https://gitee.com/open_euler/dashboard?issue_id=I9HJXV>
kernel
1
#I9HJZO:CVE-2024-26882<https://gitee.com/open_euler/dashboard?issue_id=I9HJZO>
kernel
1
#I9HK2H:CVE-2024-26855<https://gitee.com/open_euler/dashboard?issue_id=I9HK2H>
kernel
1
#I9HK5V:CVE-2024-26874<https://gitee.com/open_euler/dashboard?issue_id=I9HK5V>
kernel
1
#I9HK63:CVE-2024-26894<https://gitee.com/open_euler/dashboard?issue_id=I9HK63>
kernel
1
#I9HK6R:CVE-2024-26862<https://gitee.com/open_euler/dashboard?issue_id=I9HK6R>
kernel
1
#I9HK78:CVE-2024-26870<https://gitee.com/open_euler/dashboard?issue_id=I9HK78>
kernel
1
#I9HK8R:CVE-2024-26875<https://gitee.com/open_euler/dashboard?issue_id=I9HK8R>
kernel
1
#I9HK8Y:CVE-2024-26872<https://gitee.com/open_euler/dashboard?issue_id=I9HK8Y>
kernel
1
#I9HK9F:CVE-2024-26893<https://gitee.com/open_euler/dashboard?issue_id=I9HK9F>
kernel
1
#I9HK9J:CVE-2024-26859<https://gitee.com/open_euler/dashboard?issue_id=I9HK9J>
kernel
1
#I9HK9R:CVE-2024-26852<https://gitee.com/open_euler/dashboard?issue_id=I9HK9R>
kernel
1
#I9HKBX:CVE-2024-26896<https://gitee.com/open_euler/dashboard?issue_id=I9HKBX>
kernel
1
#I9HKE5:CVE-2024-26869<https://gitee.com/open_euler/dashboard?issue_id=I9HKE5>
kernel
1
#I9HVTH:CVE-2024-26921<https://gitee.com/open_euler/dashboard?issue_id=I9HVTH>
kernel
1
#I9J3KG:CVE-2024-26922<https://gitee.com/open_euler/dashboard?issue_id=I9J3KG>
kernel
1
#I9JFG0:CVE-2024-26923<https://gitee.com/open_euler/dashboard?issue_id=I9JFG0>
kernel
1
#I9JJ2F:CVE-2024-26926<https://gitee.com/open_euler/dashboard?issue_id=I9JJ2F>
kernel
1
#I9L5IQ:CVE-2024-26993<https://gitee.com/open_euler/dashboard?issue_id=I9L5IQ>
kernel
1
#I9L5KR:CVE-2024-26999<https://gitee.com/open_euler/dashboard?issue_id=I9L5KR>
kernel
1
#I9L5QJ:CVE-2024-26973<https://gitee.com/open_euler/dashboard?issue_id=I9L5QJ>
kernel
1
#I9L9J6:CVE-2024-27075<https://gitee.com/open_euler/dashboard?issue_id=I9L9J6>
kernel
1
#I9L9OA:CVE-2023-52650<https://gitee.com/open_euler/dashboard?issue_id=I9L9OA>
kernel
1
#I91OJD:CVE-2024-25580<https://gitee.com/open_euler/dashboard?issue_id=I91OJD>
qt5-qtbase
0
#I9F94L:CVE-2023-45935<https://gitee.com/open_euler/dashboard?issue_id=I9F94L>
qt5-qtbase
0
#I9FNFK:CVE-2021-47182<https://gitee.com/open_euler/dashboard?issue_id=I9FNFK>
kernel
0
#I9FNFQ:CVE-2021-47211<https://gitee.com/open_euler/dashboard?issue_id=I9FNFQ>
kernel
0
Bugfix:
issue
仓库
#I6IAVJ:delete static library<https://gitee.com/open_euler/dashboard?issue_id=I6IAVJ>
ipset
#I8S3VP:cdrkit: delete autosetup macro in changelog<https://gitee.com/open_euler/dashboard?issue_id=I8S3VP>
cdrkit
#I9ML16:1.22及以上版本,在遇到一些内置类型时生成btf会出现报错<https://gitee.com/open_euler/dashboard?issue_id=I9ML16>
dwarves
#I9GURX:httpd社区补丁分析回合<https://gitee.com/open_euler/dashboard?issue_id=I9GURX>
httpd
#I9E58K:CVE-2024-24795<https://gitee.com/open_euler/dashboard?issue_id=I9E58K>
httpd
#I9E577:CVE-2023-38709<https://gitee.com/open_euler/dashboard?issue_id=I9E577>
httpd
#I9E2Q0:CVE-2024-27316<https://gitee.com/open_euler/dashboard?issue_id=I9E2Q0>
httpd
#I9MLX3:TPCM功能问题<https://gitee.com/open_euler/dashboard?issue_id=I9MLX3>
shim
#I8V1IQ:【OpenEuler22.03-LTS-SP3】HNS3 UDMA特性问题修复,代码优化<https://gitee.com/open_euler/dashboard?issue_id=I8V1IQ>
kernel
#I99GLS:【OpenEuler22.03-LTS-SP4】HNS3驱动新增对全新设备的支持&支持新Link层<https://gitee.com/open_euler/dashboard?issue_id=I99GLS>
kernel
#I9CC0X:【OLK-5.10】add support for arm virtcca vm<https://gitee.com/open_euler/dashboard?issue_id=I9CC0X>
kernel
#I9CK0O:【OLK-6.6】支持 hns roce DCA 模式<https://gitee.com/open_euler/dashboard?issue_id=I9CK0O>
kernel
#I9E9HL:【OpenEuler22.03-LTS-SP3】HNS3 UDMA特性user_ctrl功能优化<https://gitee.com/open_euler/dashboard?issue_id=I9E9HL>
kernel
#I9ER2W:【olk - 5.10】cgroup结合cpu上下线测试长稳环境出现 BUG: unable to handle page fault for address: 00003984d0425d58<https://gitee.com/open_euler/dashboard?issue_id=I9ER2W>
kernel
#I9FAYN:[OLK 5.10] RDMA/hns: Fix incorrect iteration number of DCA umem sg entries and error return in hns_roce_v2_modify_srq()<https://gitee.com/open_euler/dashboard?issue_id=I9FAYN>
kernel
#I9GVYW:【openEuler-22.03-LTS-SP4】Add hugetlb MADV_DONTNEED support<https://gitee.com/open_euler/dashboard?issue_id=I9GVYW>
kernel
#I9H643:【OLK-5.10】增加华为智能网卡RDMA驱动<https://gitee.com/open_euler/dashboard?issue_id=I9H643>
kernel
#I9J08D:【OLK-5.10】多PF并发创建VF时间变长<https://gitee.com/open_euler/dashboard?issue_id=I9J08D>
kernel
#I9J4PL:Backport 5.10.204 LTS patches from upstream<https://gitee.com/open_euler/dashboard?issue_id=I9J4PL>
kernel
#I9JNPZ:【OLK-5.10】 4月主线补丁分析回合<https://gitee.com/open_euler/dashboard?issue_id=I9JNPZ>
kernel
#I9JPDJ:【OLK-5.10】4/5 月内存主线补丁回合<https://gitee.com/open_euler/dashboard?issue_id=I9JPDJ>
kernel
#I9JPUP:Backport 5.10.205 LTS patches from upstream<https://gitee.com/open_euler/dashboard?issue_id=I9JPUP>
kernel
#I9K8D1:自研补丁推送openeuler社区<https://gitee.com/open_euler/dashboard?issue_id=I9K8D1>
kernel
#I9MMNG:【OLK-5.10】 主线补丁分析回合<https://gitee.com/open_euler/dashboard?issue_id=I9MMNG>
kernel
openEuler-22.03-LTS-SP3版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-22.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP3/EPOL/update/main/
openEuler CVE及安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-22.03-LTS-SP3 Update版本待修复问题清单公示:
序号
里程碑
任务ID
任务标题
任务类型
创建时间
优先级
关联仓库
sig组
任务路径
1
openEuler-22.03-LTS-SP3
I96ID7
[22.03-LTS-SP3]-O3 -flto -flto-partition=one -fipa-prefetch选项编译hmmer报Segmentation fault:during GIMPLE pass: vrp
缺陷
2024/3/7 9:35
主要
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I96ID7
2
openEuler-22.03-LTS-SP3
I9AF9S
【22.03 LTS SP3】【arm/x86】openmpi相关命令执行失败
缺陷
2024/3/21 16:24
次要
src-openEuler/openmpi
Application
https://gitee.com/open_euler/dashboard?issue_id=I9AF9S
3
openEuler-22.03-LTS-SP3
I9AFKH
【22.03 LTS SP3】【arm/x86】su - amandabackup -c "amdump_client --config DailySet1 list" 失败
缺陷
2024/3/21 16:39
次要
src-openEuler/amanda
Application
https://gitee.com/open_euler/dashboard?issue_id=I9AFKH
4
openEuler-22.03-LTS-SP3
I9COG1
【openEuler-22.03-LTS-SP3】【x86】执行clang xx -o xx报错:“error: unknown target triple 'x86_64-unknown-linux-gnu', please use -triple or -arch”
缺陷
2024/3/29 14:58
主要
src-openEuler/clang
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I9COG1
5
openEuler-22.03-LTS-SP3
I9KPF6
[22.03-LTS-SP3][deja]-floop-crc特性deja相关用例报错
缺陷
2024/4/29 16:32
次要
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I9KPF6
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE(5.10日数据):
漏洞编号
Issue ID
剩余天数
CVSS评分
软件包
责任SIG
issue码云链接
CVE-2022-41723
I90BQX
0.0
7.5
skopeo
sig-CloudNative
https://gitee.com/src-openeuler/skopeo/issues/I90BQX
CVE-2024-26814
I9E6TH
2.14
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E6TH
CVE-2024-26809
I9E4AC
2.14
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E4AC
CVE-2024-26808
I9E49K
2.14
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E49K
CVE-2024-26804
I9E47C
2.14
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E47C
CVE-2024-26805
I9E46W
2.14
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E46W
CVE-2024-26790
I9E46Q
2.14
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E46Q
CVE-2024-26801
I9E46O
2.14
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E46O
CVE-2024-26792
I9E46G
2.14
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E46G
CVE-2024-26787
I9E461
2.14
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E461
CVE-2024-26793
I9E451
2.14
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E451
CVE-2024-26798
I9E448
2.14
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E448
CVE-2024-26782
I9E442
2.14
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E442
CVE-2024-26744
I9E3EE
2.14
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E3EE
CVE-2024-26735
I9E3E4
2.14
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E3E4
CVE-2024-26747
I9E2O4
2.14
4.3
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2O4
CVE-2024-26776
I9E2NX
2.14
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2NX
CVE-2024-26749
I9E2NW
2.14
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2NW
CVE-2024-26748
I9E2MS
2.14
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2MS
CVE-2024-26774
I9E2MQ
2.14
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2MQ
CVE-2024-26769
I9E2MJ
2.14
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2MJ
CVE-2024-26754
I9E2MH
2.14
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2MH
CVE-2024-26733
I9E2MB
2.14
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2MB
CVE-2024-26743
I9E2M7
2.14
3.3
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2M7
CVE-2023-52641
I9E2M0
2.14
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2M0
CVE-2024-26739
I9E2LZ
2.14
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2LZ
CVE-2024-26763
I9E2LW
2.14
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2LW
CVE-2024-26740
I9E2LT
2.14
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2LT
CVE-2023-52637
I9E2H0
2.14
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2H0
CVE-2023-52638
I9E2GX
2.14
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2GX
CVE-2022-40523
I9GEWN
3.28
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9GEWN
CVE-2022-48655
I9KHI4
4.28
7.8
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9KHI4
CVE-2024-26907
I9HK6L
4.28
7.8
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9HK6L
CVE-2024-26898
I9HJY0
4.28
7.8
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9HJY0
CVE-2024-24863
I9GHPY
4.28
5.3
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9GHPY
CVE-2024-24862
I9GHPV
4.28
5.3
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9GHPV
CVE-2023-52623
I9BV4V
4.78
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9BV4V
CVE-2023-52621
I9BV4S
4.78
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9BV4S
CVE-2023-52627
I9BV4R
4.78
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9BV4R
CVE-2024-26646
I9BV4D
4.78
4.9
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9BV4D
CVE-2024-26645
I9BV24
4.78
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9BV24
CVE-2024-26643
I9AK7L
4.78
4.7
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9AK7L
CVE-2023-52620
I9AK6C
4.78
4.7
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9AK6C
CVE-2024-26642
I9AK56
4.78
4.7
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9AK56
CVE-2024-32980
I9NN4A
5.28
9.1
perl-version
sig-perl-modules
https://gitee.com/src-openeuler/perl-version/issues/I9NN4A
CVE-2023-44431
I9LH30
7.28
7.1
bluez
Base-service
https://gitee.com/src-openeuler/bluez/issues/I9LH30
CVE-2024-24856
I9HIEG
7.28
5.3
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9HIEG
CVE-2024-21085
I9H9VN
7.28
3.7
openjdk-1.8.0
Compiler
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9VN
CVE-2024-21094
I9H9UK
7.28
3.7
openjdk-1.8.0
Compiler
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9UK
CVE-2024-21011
I9H9UI
7.28
3.7
openjdk-1.8.0
Compiler
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9UI
CVE-2024-21068
I9H9U3
7.28
3.7
openjdk-1.8.0
Compiler
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9U3
CVE-2024-21004
I9H9TR
7.28
2.5
openjdk-1.8.0
Compiler
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9TR
CVE-2024-21003
I9H9T8
7.28
3.1
openjdk-1.8.0
Compiler
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9T8
CVE-2024-21012
I9H9SG
7.28
3.7
openjdk-1.8.0
Compiler
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9SG
CVE-2024-21002
I9H9SF
7.28
2.5
openjdk-1.8.0
Compiler
https://gitee.com/src-openeuler/openjdk-1.8.0/issues/I9H9SF
CVE-2021-47210
I9HOEF
7.61
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9HOEF
CVE-2024-21012
I9HP9P
8.28
3.7
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9HP9P
CVE-2024-21094
I9HP9L
8.28
3.7
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9HP9L
CVE-2024-21085
I9HP43
8.28
3.7
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9HP43
CVE-2024-21011
I9HP38
8.28
3.7
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9HP38
CVE-2024-21068
I9HOZZ
8.28
3.7
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9HOZZ
CVE-2024-3651
I9GOTV
9.62
6.5
python-idna
Networking
https://gitee.com/src-openeuler/python-idna/issues/I9GOTV
CVE-2023-28100
I9AVQ9
10.14
6.5
flatpak
Programming-language
https://gitee.com/src-openeuler/flatpak/issues/I9AVQ9
CVE-2023-28101
I9AVQ7
10.14
4.3
flatpak
Programming-language
https://gitee.com/src-openeuler/flatpak/issues/I9AVQ7
CVE-2021-47195
I9FNFV
10.28
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9FNFV
CVE-2023-52639
I9E2GQ
11.78
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2GQ
CVE-2024-26706
I9E2GP
11.78
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2GP
CVE-2024-26689
I9E2GN
11.78
6.3
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2GN
CVE-2024-26712
I9E2FQ
11.78
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2FQ
CVE-2024-26685
I9E2FP
11.78
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2FP
CVE-2024-26707
I9E2FK
11.78
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2FK
CVE-2024-26697
I9E2FH
11.78
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2FH
CVE-2024-26702
I9E2FC
11.78
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2FC
CVE-2024-26726
I9E2F7
11.78
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2F7
CVE-2024-26719
I9E2F5
11.78
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2F5
CVE-2024-26688
I9E2F0
11.78
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2F0
CVE-2024-26686
I9E2EL
11.78
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2EL
CVE-2024-26722
I9E2EF
11.78
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2EF
CVE-2024-26720
I9E2EC
11.78
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9E2EC
CVE-2024-26671
I9DO35
11.78
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9DO35
CVE-2024-26684
I9DNZK
11.78
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9DNZK
CVE-2023-52631
I9DNXE
11.78
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9DNXE
CVE-2024-26665
I9DNVF
11.78
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9DNVF
CVE-2023-52633
I9DNRR
11.78
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9DNRR
CVE-2024-26679
I9DNRC
11.78
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9DNRC
CVE-2024-26659
I9DNQ5
11.78
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9DNQ5
CVE-2024-26668
I9DNPD
11.78
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9DNPD
CVE-2024-26680
I9DNMI
11.78
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9DNMI
CVE-2024-26673
I9DNKQ
11.78
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9DNKQ
CVE-2024-26669
I9DNKF
11.78
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9DNKF
CVE-2024-26675
I9DNIJ
11.78
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9DNIJ
CVE-2024-26664
I9DNHE
11.78
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9DNHE
CVE-2023-52635
I9DNGK
11.78
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9DNGK
CVE-2024-26661
I9DNF6
11.78
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9DNF6
CVE-2023-52630
I9DNCI
11.78
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9DNCI
CVE-2024-2746
I9NBRE
12.28
8.8
dbus
Base-service
https://gitee.com/src-openeuler/dbus/issues/I9NBRE
CVE-2024-28180
I9IN8W
12.28
4.3
skopeo
sig-CloudNative
https://gitee.com/src-openeuler/skopeo/issues/I9IN8W
CVE-2024-3661
I9NNC2
13.28
7.6
dhcp
Networking
https://gitee.com/src-openeuler/dhcp/issues/I9NNC2
社区关键组件待修复缺陷:
openEuler社区存在无版本里程碑的缺陷,请各个SIG 关注涉及质量等级为L1-L2软件包的缺陷修复情况。
社区提单可参考社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/master/%E7%A4%BE%E5%8C%BA%E7%89%88%E6%9…
关键组件待修复缺陷清单(无版本里程碑):
序号
任务ID
任务标题
任务类型
创建时间
优先级
关联仓库
sig组
任务路径
1
I8A77R
Upgrade to latest release [alsa-lib: 1.2.9 2023/05/04 -> 1.2.10 2023/09/01]
任务
2023/10/23 16:22
无优先级
src-openEuler/alsa-lib
Computing
https://gitee.com/open_euler/dashboard?issue_id=I8A77R
2
I8ON5A
Upgrade to latest release [cronie: 1.6.1 2022/04/25 -> 1.7.0 2023/10/13]
任务
2023/12/15 11:04
无优先级
src-openEuler/cronie
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I8ON5A
3
I6TQ8W
curl命令向hadoop3.2.1 webhdfs put文件失败
任务
2023/4/7 18:02
严重
src-openEuler/curl
Networking
https://gitee.com/open_euler/dashboard?issue_id=I6TQ8W
4
I9G2PH
测试!!!软件市场精品应用curl-null镜像自动更新,8.4.0->8.4.1
任务
2024/4/12 11:45
无优先级
src-openEuler/curl
Networking
https://gitee.com/open_euler/dashboard?issue_id=I9G2PH
5
I8ON6X
Upgrade to latest release [dbus: 1.14.8 2023/06/06 -> 1.15.8 2023/08/21]
任务
2023/12/15 11:06
无优先级
src-openEuler/dbus
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I8ON6X
6
I9FVI3
22.03-LTS-Next分支与22.03-LTS-SP3分支不同步,需要手动同步
任务
2024/4/11 16:57
无优先级
src-openEuler/e2fsprogs
Storage
https://gitee.com/open_euler/dashboard?issue_id=I9FVI3
7
I9JNBG
虚拟机使用ext4文件系统,扩容磁盘后,执行resize2fs扩容文件系统出错
任务
2024/4/25 17:00
无优先级
src-openEuler/e2fsprogs
Storage
https://gitee.com/open_euler/dashboard?issue_id=I9JNBG
8
I9MM3F
回合上游社区补丁,补丁数量:3
缺陷
2024/5/6 16:39
无优先级
src-openEuler/e2fsprogs
Storage
https://gitee.com/open_euler/dashboard?issue_id=I9MM3F
9
I9MM3H
回合上游社区补丁,补丁数量:2
缺陷
2024/5/6 16:39
无优先级
src-openEuler/e2fsprogs
Storage
https://gitee.com/open_euler/dashboard?issue_id=I9MM3H
10
I9MM3K
回合上游社区补丁,补丁数量:3
缺陷
2024/5/6 16:39
无优先级
src-openEuler/e2fsprogs
Storage
https://gitee.com/open_euler/dashboard?issue_id=I9MM3K
11
I9NFH0
/usr/lib/sysctl.d/10-default-yama-scope.conf文件标记情况
任务
2024/5/8 13:57
无优先级
src-openEuler/elfutils
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9NFH0
12
I9OAJG
[OLK 6.6]ethtool: add support for vxlan feature
任务
2024/5/10 20:37
无优先级
src-openEuler/ethtool
Networking
https://gitee.com/open_euler/dashboard?issue_id=I9OAJG
13
I4V9K0
gcc 10.3.0 __libc_vfork符号丢失(i686架构)
任务
2022/2/25 14:24
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I4V9K0
14
I6UDV8
Bug in openEuler/gcc (10.3.0) support for ARM SVE openmp
任务
2023/4/10 16:14
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I6UDV8
15
I70VML
指针压缩选项的错误提示内容有误。
缺陷
2023/5/6 16:45
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I70VML
16
I7CKVY
peneuler 20.03 LTS arrch64 上安装 libreoffice 7.4.7.2 报错
缺陷
2023/6/11 22:45
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I7CKVY
17
I7CWOS
Bug in openEuler/gcc (10.3.1) support for ARM SVE under O0 compiler level
任务
2023/6/12 20:51
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I7CWOS
18
I7EZAZ
无法在sw_64下编译nodejs
任务
2023/6/20 16:50
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I7EZAZ
19
I8PL8Q
Upgrade to latest release [gcc: 12.3.1 -/-/- -> 14 2023/04/17]
任务
2023/12/19 11:22
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I8PL8Q
20
I9C507
gcc在2203版本默认关闭-fcommon选项导致Intel SPR芯片上UnixBench多核整形得分劣化
缺陷
2024/3/27 18:22
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I9C507
21
I9DV2U
spec文件不同架构分支存在相同构建方式
任务
2024/4/3 11:24
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I9DV2U
22
I9K3JP
gcc 11.0.4 编译报错 cc1plus: internal compiler error: in fail_formatted, at selftest.c:63
任务
2024/4/27 12:12
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I9K3JP
23
I9BNUP
使用clang时缺少gnu/stubs-32.h文件
任务
2024/3/26 13:43
无优先级
src-openEuler/glibc
Computing
https://gitee.com/open_euler/dashboard?issue_id=I9BNUP
24
I9NACB
回合上游社区补丁,补丁数量:6
缺陷
2024/5/8 9:32
无优先级
src-openEuler/glibc
Computing
https://gitee.com/open_euler/dashboard?issue_id=I9NACB
25
I7LSWG
Upgrade to latest release [gtk2: 2.24.33 2020/12/20 -> 4.11.4 2023/07/03]
任务
2023/7/17 20:50
无优先级
src-openEuler/gtk2
Desktop
https://gitee.com/open_euler/dashboard?issue_id=I7LSWG
26
I9O69Y
回合上游社区高版本补丁,补丁数量:1
缺陷
2024/5/10 15:15
无优先级
src-openEuler/iproute
Networking
https://gitee.com/open_euler/dashboard?issue_id=I9O69Y
27
I4YT2R
iscsi登录操作并发sysfs读操作概率导致空指针访问
任务
2022/3/21 15:36
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I4YT2R
28
I58CJR
删除iptable_filter.ko时出现空指针问题
任务
2022/5/19 20:36
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I58CJR
29
I5C33B
OLK-5.10 page owner功能增强
任务
2022/6/13 20:30
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5C33B
30
I5D9J8
Upgrade to latest release [kernel: 5.10.0 -> 5.17]
任务
2022/6/21 10:01
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5D9J8
31
I5G321
【openEuler-1.0-LTS】nbd 加载/卸载模组 和 alloc config并发导致 panic
任务
2022/7/8 9:05
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5G321
32
I5H311
修复CVE-2022-2380
任务
2022/7/14 15:27
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5H311
33
I5I2M8
x86: Improve testing false positive for tst-cpu-features-cpuinfo with bad hardware.
任务
2022/7/21 9:47
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5I2M8
34
I5OOLB
反复触发i40e网卡sriov增删vf后,iavf_remove触发BUG_ON at drivers/pci/msi.c:397
任务
2022/8/29 20:23
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5OOLB
35
I5PBRB
注入内存申请故障,i40iw_initialize_dev失败时出现oops复位
任务
2022/9/2 9:56
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5PBRB
36
I5RH8C
内存可靠性分级需求
任务
2022/9/16 16:16
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5RH8C
37
I5V92B
openEuler是否有开启CONFIG_AUXILIARY_BUS配置的计划
任务
2022/10/12 11:37
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5V92B
38
I5VCIJ
openEuler如何适配新硬件,请提供适配流程指导
任务
2022/10/12 17:14
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5VCIJ
39
I5WCP1
回合bpftool prog attach/detach命令
任务
2022/10/18 16:10
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5WCP1
40
I6FZWY
主线回合scsi: iscsi_tcp: Fix UAF during logout and login
任务
2023/2/18 11:10
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6FZWY
41
I6HXB9
kernel.spec中是否会新增打包intel-sst工具
任务
2023/2/27 10:06
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6HXB9
42
I6N49D
【openeuler-22.03-LTS-SP】
任务
2023/3/14 20:12
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6N49D
43
I6VWNS
主线补丁:udp: skip L4 aggregation for UDP tunnel packets分析
任务
2023/4/15 10:37
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6VWNS
44
I8KAVR
dnf reinstall kernel 导致grub.conf 本内核项被删除
任务
2023/11/29 10:30
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8KAVR
45
I8UCFC
鲲鹏920服务器多次重启后系统盘盘符跳变
任务
2024/1/8 11:18
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8UCFC
46
I8XTDI
rpm宏用$引用可能会出现空值
缺陷
2024/1/21 22:27
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8XTDI
47
I97V59
preempt-RT补丁中存在bug,运行2天以上的igh-ethercat时系统高概率死机
缺陷
2024/3/12 16:09
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I97V59
48
I9COZE
【B/Y KV190 -BMC 系统测试】【长稳测试】【uniscan】DC第19次,OS进入紧急模式
缺陷
2024/3/29 15:27
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9COZE
49
I9CQSL
openEuler-22.03-LTS-SP1中自带的i40e网卡驱动,无法虚拟网卡
缺陷
2024/3/29 16:57
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9CQSL
50
I9H2MR
【误解提示】救援模式下,提示用户输入root密码
缺陷
2024/4/16 14:39
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9H2MR
51
I9J6XR
【OLK 5.10】主线补丁回合:mm/mmap: fix memory leak in mmap_region()
任务
2024/4/24 11:22
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9J6XR
52
I9J6ZB
【OLK 5.10】主线补丁回合:powerpc/32: Call mmu_mark_initmem_nx() regardless of data block mapping.
任务
2024/4/24 11:23
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9J6ZB
53
I9J6ZO
【OLK 5.10】主线补丁回合:x86/mm/tlb: Revert retpoline avoidance approach
任务
2024/4/24 11:23
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9J6ZO
54
I9KYID
build error:nothing provides sign-openEuler
缺陷
2024/4/30 15:21
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9KYID
55
I9MYC8
【22.03-SP3】使用x86的RT版本,出现hardlockup
缺陷
2024/5/7 11:45
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9MYC8
56
I7B6KR
kerberos安装缺少krb5-auth-dialog 和 krb5-workstation
任务
2023/6/6 9:51
无优先级
src-openEuler/krb5
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I7B6KR
57
I8OOF1
Upgrade to latest release [krb5: 1.21.1 2023/07/10 -> 1.21.2 2023/08/14]
任务
2023/12/15 12:29
无优先级
src-openEuler/krb5
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I8OOF1
58
I9MKV9
Do not reload a modified profile data object,回合上游社区补丁,补丁数量:1
任务
2024/5/6 16:00
无优先级
src-openEuler/krb5
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9MKV9
59
I8OOF5
Upgrade to latest release [libarchive: 3.7.1 2023/07/29 -> 3.7.2 2023/09/11]
任务
2023/12/15 12:31
无优先级
src-openEuler/libarchive
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I8OOF5
60
I8VIRN
Upgrade to latest release [libcap: 2.69 2023/05/14 -> 20071031 2007/10/31]
任务
2024/1/12 9:17
无优先级
src-openEuler/libcap
sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I8VIRN
61
I9H736
Upgrade to latest release [libiscsi: 1.19.0 -> 1.20.0]
任务
2024/4/16 17:40
无优先级
src-openEuler/libiscsi
Storage
https://gitee.com/open_euler/dashboard?issue_id=I9H736
62
I8VIRQ
Upgrade to latest release [libselinux: 3.5 2023/02/23 -> 3.6 2023/12/13]
任务
2024/1/12 9:17
无优先级
src-openEuler/libselinux
sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I8VIRQ
63
I9FU1M
[openEuler-22.03-LTS] libvirt install failed
任务
2024/4/11 15:44
无优先级
src-openEuler/libvirt
Virt
https://gitee.com/open_euler/dashboard?issue_id=I9FU1M
64
I96BZU
逻辑卷组修复
任务
2024/3/6 15:36
无优先级
src-openEuler/lvm2
Storage
https://gitee.com/open_euler/dashboard?issue_id=I96BZU
65
I9NW26
回合上游社区补丁,补丁数量:1
缺陷
2024/5/9 16:10
无优先级
src-openEuler/lvm2
Storage
https://gitee.com/open_euler/dashboard?issue_id=I9NW26
66
I9O5FD
[24.03-LTS]libvdpau_virtio_gpu.so 重复打包
任务
2024/5/10 14:31
无优先级
src-openEuler/mesa
Desktop
https://gitee.com/open_euler/dashboard?issue_id=I9O5FD
67
I6MJB4
openssl 3.0 支持TLCP特性
任务
2023/3/13 11:35
无优先级
src-openEuler/openssl
sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I6MJB4
68
I71KX8
python3.spec文件中,无效的ifarch语句
任务
2023/5/9 15:00
无优先级
src-openEuler/python3
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I71KX8
69
I9KDQU
【oe-24.03】执行场景复现脚本报错
任务
2024/4/28 16:10
无优先级
src-openEuler/python3
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9KDQU
70
I6PA84
神威架构,虚拟化启动失败
任务
2023/3/22 17:20
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I6PA84
71
I7A5FW
Fixed CPU topology issues and add lbt support for kvm.
任务
2023/6/1 17:18
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I7A5FW
72
I7L968
Upgrade to latest release [qemu: 6.2.0 2021/12/14 -> 8.0.3 2023/07/09]
任务
2023/7/14 17:09
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I7L968
73
I8790J
need EPYC-Genoa model support
任务
2023/10/11 16:53
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I8790J
74
I8SZWW
qemu 4.1 虚拟机热迁移到qemu 6.2失败
任务
2024/1/2 17:01
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I8SZWW
75
I8ZJG1
欧拉系统virt-install 创建虚拟机video类型默认使用qxl
任务
2024/1/29 10:44
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I8ZJG1
76
I95DT3
openEuler-22.03-LTS-SP3的6.2.0-88版本何时发布?
任务
2024/3/4 0:39
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I95DT3
77
I9GV9V
qemu-8.2.0-6.oe2403.x86_64.src.rpm 在编译的check阶段执行tests/qtest/bios-tables-test是测试失败
缺陷
2024/4/15 20:30
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I9GV9V
78
I9HBPH
mock编译aarch64架构qemu提示ERROR:Include dir /usr/include/openssl does not exist
缺陷
2024/4/17 10:23
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I9HBPH
79
I9KPI1
[openeuler 24.03] qemu8.2 无法创建uefi虚拟机
缺陷
2024/4/29 16:35
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I9KPI1
80
I9NPRO
x86服务器使用aarch64-openeuler-linux-gcc工具链交叉编译shadow软件包失败
缺陷
2024/5/9 10:24
无优先级
src-openEuler/shadow
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9NPRO
81
I96B4W
systemd中缺少文件
任务
2024/3/6 14:53
无优先级
src-openEuler/systemd
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I96B4W
82
I9NZT3
systemctl运行service-log-level和service-log-target命令时,不能自动提示补全
任务
2024/5/9 21:03
无优先级
src-openEuler/systemd
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9NZT3
83
I9NGLB
中文情况下,sfdisk /dev/sdb产生core文件
缺陷
2024/5/8 14:51
无优先级
src-openEuler/util-linux
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9NGLB
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/master/%E7%A4%BE%E5%8C%BA%E7%89%88%E6%9…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
1
0
各位openeuler社区的maintainer、 committer和contributor们好:
社区计划5.14号进行openEuler 24.03-LTS版本的第五轮转测,涉及以下特性的owner需要提前编写特性测试验证报告,并在5.15号的QA sig例会上申报议题进行评审,涉及特性的链接如下所示:
涉及特性链接:openEuler-24.03-LTS/release-plan.md ・ openEuler/release-management - Gitee.com<https://gitee.com/openeuler/release-management/blob/master/openEuler-24.03-…>
QA sig议题申报链接:sig-QA-meetings | Etherpad (openeuler.org)<https://etherpad.openeuler.org/p/sig-QA-meetings>
1
0
议题可以邮件反馈,也可以直接在纪要内反馈
https://etherpad.openeuler.org/p/TC-meetings
-----Original Appointment-----
From: openEuler conference <public(a)openeuler.org>
Sent: Friday, May 3, 2024 7:54 AM
To: ,tc(a)openeuler.org
Subject: [Tc] 技术委员会例会
When: 2024年5月8日星期三 10:00-12:00(UTC+08:00) 北京,重庆,香港特别行政区,乌鲁木齐。
Where:
您好!
TC 邀请您参加 2024-05-08 10:00 召开的WeLink会议(自动录制)
会议主题:技术委员会例会
会议链接:https://meeting.huaweicloud.com:36443/#/j/988233505
会议纪要:https://etherpad.openeuler.org/p/TC-meetings
更多资讯尽在:https://www.openeuler.org/zh/
Hello!
TC invites you to attend the WeLink conference(auto recording) will be held at 2024-05-08 10:00,
The subject of the conference is 技术委员会例会,
You can join the meeting at https://meeting.huaweicloud.com:36443/#/j/988233505.
Add topics at https://etherpad.openeuler.org/p/TC-meetings.
More information: https://www.openeuler.org/en/
1
0