Release
Threads by month
- ----- 2025 -----
- February
- January
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
April 2024
- 6 participants
- 16 discussions
主题: openEuler update_20240424版本发布公告
Dear all,
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-22.03-LTS、openEuler-22.03-LTS-SP1、openEuler-22.03-LTS-SP2、openEuler-20.03-LTS-SP4及openEuler-22.03-LTS-SP3 update版本满足版本出口质量,现进行发布公示。
本公示分为九部分:
1、openEuler-20.03-LTS-SP1 Update 20240424发布情况及待修复缺陷
2、openEuler-22.03-LTS Update 20240424发布情况及待修复缺陷
3、openEuler-22.03-LTS-SP1 Update 20240424发布情况及待修复缺陷
4、openEuler-22.03-LTS-SP2 Update 20240424发布情况及待修复缺陷
5、openEuler-20.03-LTS-SP4 Update 20240424发布情况及待修复缺陷
6、openEuler-22.03-LTS-SP3 Update 20240424发布情况及待修复缺陷
7、openEuler 关键组件待修复CVE 清单
8、openEuler 关键组件待修复缺陷清单
9、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2024/05/10)提供 update_20240508 版本。
openEuler-20.03-LTS-SP1 Update 20240424
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题4个,已知漏洞50个。目前版本分支剩余待修复缺陷4个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9IIBD?from=project-i…
CVE修复:
CVE
仓库
score
I9IS6E:CVE-2024-32458<https://gitee.com/src-openeuler/freerdp/issues/I9IS6E>
freerdp
9.8
I9IS6G:CVE-2024-32041<https://gitee.com/src-openeuler/freerdp/issues/I9IS6G>
freerdp
9.8
I9IS7K:CVE-2024-32459<https://gitee.com/src-openeuler/freerdp/issues/I9IS7K>
freerdp
9.8
I9IVRE:CVE-2024-32039<https://gitee.com/src-openeuler/freerdp/issues/I9IVRE>
freerdp
9.8
I9J3WZ:CVE-2024-32658<https://gitee.com/src-openeuler/freerdp/issues/I9J3WZ>
freerdp
9.8
I9J3YJ:CVE-2024-32659<https://gitee.com/src-openeuler/freerdp/issues/I9J3YJ>
freerdp
9.8
I9HX1E:CVE-2024-32462<https://gitee.com/src-openeuler/flatpak/issues/I9HX1E>
flatpak
8.4
I9FBRQ:CVE-2024-3446<https://gitee.com/src-openeuler/qemu/issues/I9FBRQ>
qemu
8.2
I9IS6F:CVE-2024-32040<https://gitee.com/src-openeuler/freerdp/issues/I9IS6F>
freerdp
8.1
I9IS7M:CVE-2024-32460<https://gitee.com/src-openeuler/freerdp/issues/I9IS7M>
freerdp
8.1
I8YZNM:CVE-2023-52076<https://gitee.com/src-openeuler/atril/issues/I8YZNM>
atril
7.8
I9F7ML:CVE-2023-50387<https://gitee.com/src-openeuler/systemd/issues/I9F7ML>
systemd
7.5
I9F7QD:CVE-2023-50868<https://gitee.com/src-openeuler/systemd/issues/I9F7QD>
systemd
7.5
I9J3YI:CVE-2024-32660<https://gitee.com/src-openeuler/freerdp/issues/I9J3YI>
freerdp
7.5
I9HY69:CVE-2023-44488<https://gitee.com/src-openeuler/firefox/issues/I9HY69>
firefox
7.5
I8TQCT:CVE-2023-6270<https://gitee.com/src-openeuler/kernel/issues/I8TQCT>
kernel
7
I9GEXT:CVE-2024-32487<https://gitee.com/src-openeuler/less/issues/I9GEXT>
less
6.8
I8DQ75:CVE-2023-47233<https://gitee.com/src-openeuler/kernel/issues/I8DQ75>
kernel
6.3
I917JN:CVE-2024-24861<https://gitee.com/src-openeuler/kernel/issues/I917JN>
kernel
6.3
I6AW3R:CVE-2023-0330<https://gitee.com/src-openeuler/qemu/issues/I6AW3R>
qemu
6
I9FAAQ:CVE-2024-3447<https://gitee.com/src-openeuler/qemu/issues/I9FAAQ>
qemu
6
I9F9VB:CVE-2024-2511<https://gitee.com/src-openeuler/edk2/issues/I9F9VB>
edk2
5.9
I8QF9K:CVE-2023-7042<https://gitee.com/src-openeuler/kernel/issues/I8QF9K>
kernel
5.5
I91L79:CVE-2024-25739<https://gitee.com/src-openeuler/kernel/issues/I91L79>
kernel
5.5
I95AT0:CVE-2023-52504<https://gitee.com/src-openeuler/kernel/issues/I95AT0>
kernel
5.5
I95ATZ:CVE-2023-52574<https://gitee.com/src-openeuler/kernel/issues/I95ATZ>
kernel
5.5
I95B1R:CVE-2023-52524<https://gitee.com/src-openeuler/kernel/issues/I95B1R>
kernel
5.5
I963KI:CVE-2022-48629<https://gitee.com/src-openeuler/kernel/issues/I963KI>
kernel
5.5
I96GP1:CVE-2023-52607<https://gitee.com/src-openeuler/kernel/issues/I96GP1>
kernel
5.5
I97NHS:CVE-2024-26615<https://gitee.com/src-openeuler/kernel/issues/I97NHS>
kernel
5.5
I97NI1:CVE-2023-52486<https://gitee.com/src-openeuler/kernel/issues/I97NI1>
kernel
5.5
I9DD86:CVE-2024-26654<https://gitee.com/src-openeuler/kernel/issues/I9DD86>
kernel
5.5
I9DNZ2:CVE-2024-26663<https://gitee.com/src-openeuler/kernel/issues/I9DNZ2>
kernel
5.5
I9E2EQ:CVE-2024-26696<https://gitee.com/src-openeuler/kernel/issues/I9E2EQ>
kernel
5.5
I9HOEF:CVE-2021-47210<https://gitee.com/src-openeuler/kernel/issues/I9HOEF>
kernel
5.5
I95ATI:CVE-2022-48627<https://gitee.com/src-openeuler/kernel/issues/I95ATI>
kernel
4.4
I9E2GX:CVE-2023-52638<https://gitee.com/src-openeuler/kernel/issues/I9E2GX>
kernel
1
I9E2MB:CVE-2024-26733<https://gitee.com/src-openeuler/kernel/issues/I9E2MB>
kernel
1
I9E2O3:CVE-2024-26764<https://gitee.com/src-openeuler/kernel/issues/I9E2O3>
kernel
1
I9E451:CVE-2024-26793<https://gitee.com/src-openeuler/kernel/issues/I9E451>
kernel
1
I9E46O:CVE-2024-26801<https://gitee.com/src-openeuler/kernel/issues/I9E46O>
kernel
1
I9E46W:CVE-2024-26805<https://gitee.com/src-openeuler/kernel/issues/I9E46W>
kernel
1
I9FNFA:CVE-2021-47216<https://gitee.com/src-openeuler/kernel/issues/I9FNFA>
kernel
1
I9FNFI:CVE-2021-47203<https://gitee.com/src-openeuler/kernel/issues/I9FNFI>
kernel
1
I9FNFL:CVE-2021-47210<https://gitee.com/src-openeuler/kernel/issues/I9FNFL>
kernel
1
I9FNFQ:CVE-2021-47211<https://gitee.com/src-openeuler/kernel/issues/I9FNFQ>
kernel
1
I9HK0E:CVE-2024-26908<https://gitee.com/src-openeuler/kernel/issues/I9HK0E>
kernel
1
I9HK6X:CVE-2024-26884<https://gitee.com/src-openeuler/kernel/issues/I9HK6X>
kernel
1
I9HL6U:CVE-2024-26920<https://gitee.com/src-openeuler/kernel/issues/I9HL6U>
kernel
1
Bugfix:
issue
仓库
#I9H4XD:【OLK-5.10】修改rmid 错误返回码与last_cmd_status 不一致:【OLK-5.10】修改rmid 错误返回码与last_cmd_status 不一致
kernel
#I9H4YE:【OLK-5.10】L3CODEPBM:0=0 接口输入0 实际返回 ffffff:【OLK-5.10】L3CODEPBM:0=0 接口输入0 实际返回 ffffff
kernel
#I9HXKB:解决SELinux策略重载时IMA偶发的panic问题:解决SELinux策略重载时IMA偶发的panic问题
kernel
#I9HCQ7:修复CVE-2024-31083引入的双重释放问题:修复CVE-2024-31083引入的双重释放问题
xorg-x11-server
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/docker_img/update/
openEuler CVE 及安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高):
里程碑
任务ID
任务标题
优先级
sig组
关联仓库
任务路径
openEuler 20.03LTS SP1 update2103
I3E5C1
【20.03-SP1】【arm/x86】服务启动失败
主要
sig/bigdata
src-openEuler/hadoop
https://gitee.com/open_euler/dashboard?issue_id=I3E5C1
openEuler-20.03-LTS-SP1
I3QGU7
系统不支持GB18030
无优先级
sig/TC
openEuler/community
https://gitee.com/open_euler/dashboard?issue_id=I3QGU7
openEuler 20.03LTS SP1 update210926
I4CMSV
【20.03-LTS-SP1】【arm/x86】搭建Kubernetes 集群缺少包etcd
无优先级
sig/TC
openEuler/community
https://gitee.com/open_euler/dashboard?issue_id=I4CMSV
openEuler-20.03-LTS-SP1-dailybuild
I5Y99T
mate-desktop install problem in openEuler:20:03:LTS:SP1
无优先级
sig/sig-mate-desktop
src-openEuler/mate-desktop
https://gitee.com/open_euler/dashboard?issue_id=I5Y99T
openEuler-22.03-LTS Update 20240424
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题6个,已知漏洞47个。目前版本分支剩余待修复缺陷6个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9IIB7?from=project-i…
CVE修复:
CVE
仓库
score
I9IS6E:CVE-2024-32458<https://gitee.com/src-openeuler/freerdp/issues/I9IS6E>
freerdp
9.8
I9IS6G:CVE-2024-32041<https://gitee.com/src-openeuler/freerdp/issues/I9IS6G>
freerdp
9.8
I9IS7K:CVE-2024-32459<https://gitee.com/src-openeuler/freerdp/issues/I9IS7K>
freerdp
9.8
I9IVRE:CVE-2024-32039<https://gitee.com/src-openeuler/freerdp/issues/I9IVRE>
freerdp
9.8
I9J3WZ:CVE-2024-32658<https://gitee.com/src-openeuler/freerdp/issues/I9J3WZ>
freerdp
9.8
I9J3YJ:CVE-2024-32659<https://gitee.com/src-openeuler/freerdp/issues/I9J3YJ>
freerdp
9.8
I8VT5F:CVE-2023-51698<https://gitee.com/src-openeuler/atril/issues/I8VT5F>
atril
8.8
I9HX1E:CVE-2024-32462<https://gitee.com/src-openeuler/flatpak/issues/I9HX1E>
flatpak
8.4
I92HWD:CVE-2024-24474<https://gitee.com/src-openeuler/qemu/issues/I92HWD>
qemu
8.2
I9FBRQ:CVE-2024-3446<https://gitee.com/src-openeuler/qemu/issues/I9FBRQ>
qemu
8.2
I9IS6F:CVE-2024-32040<https://gitee.com/src-openeuler/freerdp/issues/I9IS6F>
freerdp
8.1
I9IS7M:CVE-2024-32460<https://gitee.com/src-openeuler/freerdp/issues/I9IS7M>
freerdp
8.1
I4BI7U:CVE-2019-25051<https://gitee.com/src-openeuler/aspell/issues/I4BI7U>
aspell
7.8
I92OOJ:CVE-2023-52441<https://gitee.com/src-openeuler/kernel/issues/I92OOJ>
kernel
7.8
I90BQX:CVE-2022-41723<https://gitee.com/src-openeuler/skopeo/issues/I90BQX>
skopeo
7.5
I9F7ML:CVE-2023-50387<https://gitee.com/src-openeuler/systemd/issues/I9F7ML>
systemd
7.5
I9F7QD:CVE-2023-50868<https://gitee.com/src-openeuler/systemd/issues/I9F7QD>
systemd
7.5
I9J3YI:CVE-2024-32660<https://gitee.com/src-openeuler/freerdp/issues/I9J3YI>
freerdp
7.5
I9HY69:CVE-2023-44488<https://gitee.com/src-openeuler/firefox/issues/I9HY69>
firefox
7.5
I9GEXT:CVE-2024-32487<https://gitee.com/src-openeuler/less/issues/I9GEXT>
less
6.8
I97NHT:CVE-2024-26608<https://gitee.com/src-openeuler/kernel/issues/I97NHT>
kernel
6.5
I917JN:CVE-2024-24861<https://gitee.com/src-openeuler/kernel/issues/I917JN>
kernel
6.3
I97NHC:CVE-2023-52491<https://gitee.com/src-openeuler/kernel/issues/I97NHC>
kernel
6.2
I97NHW:CVE-2023-52492<https://gitee.com/src-openeuler/kernel/issues/I97NHW>
kernel
6.2
I6AW3R:CVE-2023-0330<https://gitee.com/src-openeuler/qemu/issues/I6AW3R>
qemu
6
I9FAAQ:CVE-2024-3447<https://gitee.com/src-openeuler/qemu/issues/I9FAAQ>
qemu
6
I9F9VB:CVE-2024-2511<https://gitee.com/src-openeuler/edk2/issues/I9F9VB>
edk2
5.9
I8QF9K:CVE-2023-7042<https://gitee.com/src-openeuler/kernel/issues/I8QF9K>
kernel
5.5
I95AT0:CVE-2023-52504<https://gitee.com/src-openeuler/kernel/issues/I95AT0>
kernel
5.5
I95ATZ:CVE-2023-52574<https://gitee.com/src-openeuler/kernel/issues/I95ATZ>
kernel
5.5
I95B1R:CVE-2023-52524<https://gitee.com/src-openeuler/kernel/issues/I95B1R>
kernel
5.5
I96GP1:CVE-2023-52607<https://gitee.com/src-openeuler/kernel/issues/I96GP1>
kernel
5.5
I97NHS:CVE-2024-26615<https://gitee.com/src-openeuler/kernel/issues/I97NHS>
kernel
5.5
I97NI1:CVE-2023-52486<https://gitee.com/src-openeuler/kernel/issues/I97NI1>
kernel
5.5
I98BNA:CVE-2023-52608<https://gitee.com/src-openeuler/kernel/issues/I98BNA>
kernel
5.5
I9DD86:CVE-2024-26654<https://gitee.com/src-openeuler/kernel/issues/I9DD86>
kernel
5.5
I9DO1Z:CVE-2024-26656<https://gitee.com/src-openeuler/kernel/issues/I9DO1Z>
kernel
5.5
I9E2EQ:CVE-2024-26696<https://gitee.com/src-openeuler/kernel/issues/I9E2EQ>
kernel
5.5
I97NHA:CVE-2023-52493<https://gitee.com/src-openeuler/kernel/issues/I97NHA>
kernel
5.1
I9AFM6:CVE-2024-28835<https://gitee.com/src-openeuler/gnutls/issues/I9AFM6>
gnutls
5
I95B3Q:CVE-2023-52503<https://gitee.com/src-openeuler/kernel/issues/I95B3Q>
kernel
4.5
I97NHG:CVE-2023-52494<https://gitee.com/src-openeuler/kernel/issues/I97NHG>
kernel
4.4
I97NIA:CVE-2023-52498<https://gitee.com/src-openeuler/kernel/issues/I97NIA>
kernel
4.4
I99JXH:CVE-2023-52617<https://gitee.com/src-openeuler/kernel/issues/I99JXH>
kernel
4.4
I9E2O3:CVE-2024-26764<https://gitee.com/src-openeuler/kernel/issues/I9E2O3>
kernel
1
I9E466:CVE-2024-26795<https://gitee.com/src-openeuler/kernel/issues/I9E466>
kernel
1
I9FNFK:CVE-2021-47182<https://gitee.com/src-openeuler/kernel/issues/I9FNFK>
kernel
1
Bugfix:
issue
仓库
#I9H7IN:update源当前最新版本未使用最新的glib2编译,glib2升级后,软件包无法正常使用:update源当前最新版本未使用最新的glib2编译,glib2升级后,软件包无法正常使用
libsoup
#I7VI96:例行分析dnf补丁,需要回合补丁:例行分析dnf补丁,需要回合补丁
dnf
#I7VIAC:例行分析dnf-plugins-core补丁,需要回合补丁:例行分析dnf-plugins-core补丁,需要回合补丁
dnf-plugins-core
#I9IID1:update to 11.0.23+8(ga):update to 11.0.23+8(ga)
openjdk-11
#I90ZKU:gcc是否可以选择默认禁用isl选项:gcc是否可以选择默认禁用isl选项
gcc
#I9HCQ7:修复CVE-2024-31083引入的双重释放问题:修复CVE-2024-31083引入的双重释放问题
xorg-x11-server
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/docker_img/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/ob…
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-22.03-LTS Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高):
里程碑
任务ID
任务标题
优先级
sig组
关联仓库
任务路径
openEuler-22.03-LTS update20230726
I7ORCE
【22.03 LTS update20230726】【arm\x86】selinux-policy-base的版本不符合ceph子包的安装条件,ceph子包安装失败; cephadm卸载有异常打印
主要
sig/sig-SDS
src-openEuler/ceph
https://gitee.com/open_euler/dashboard?issue_id=I7ORCE
openEuler-22.03-LTS
I6VFRX
[22.03-LTS][x86/arm]mariadb授权给远程用户,远程连接服务失败
次要
sig/DB
src-openEuler/mariadb
https://gitee.com/open_euler/dashboard?issue_id=I6VFRX
openEuler-22.03-LTS
I72N5G
【22.03-lts】x86环境上同时安装php-fpm软件包和php-opcache软件包后会导致php-fpm.service服务启动失败
次要
sig/Base-service
src-openEuler/php
https://gitee.com/open_euler/dashboard?issue_id=I72N5G
openEuler-22.03-LTS-Dailybuild
I5RTUS
X86架构下无法对mysql8进行autobolt模式反馈编译,报错
无优先级
sig/Compiler,kind/feature
src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I5RTUS
openEuler-22.03-LTS-Dailybuild
I5XP8E
Bug in openEuler/gcc (10.3.0) ,22.03-LTS-performance 分支
无优先级
sig/Compiler
src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I5XP8E
openEuler-22.03-LTS-Dailybuild
I65UF9
aarch64架构boost icl模板库优化错误
无优先级
sig/Compiler
src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I65UF9
openEuler-22.03-LTS-SP1 Update 20240424
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS-SP1修复版本已知问题6个,已知漏洞43个。目前版本分支剩余待修复缺陷5个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9IIB8?from=project-i…
CVE修复:
CVE
仓库
score
I9IS6E:CVE-2024-32458<https://gitee.com/src-openeuler/freerdp/issues/I9IS6E>
freerdp
9.8
I9IS6G:CVE-2024-32041<https://gitee.com/src-openeuler/freerdp/issues/I9IS6G>
freerdp
9.8
I9IS7K:CVE-2024-32459<https://gitee.com/src-openeuler/freerdp/issues/I9IS7K>
freerdp
9.8
I9IVRE:CVE-2024-32039<https://gitee.com/src-openeuler/freerdp/issues/I9IVRE>
freerdp
9.8
I9J3WZ:CVE-2024-32658<https://gitee.com/src-openeuler/freerdp/issues/I9J3WZ>
freerdp
9.8
I9J3YJ:CVE-2024-32659<https://gitee.com/src-openeuler/freerdp/issues/I9J3YJ>
freerdp
9.8
I9HX1E:CVE-2024-32462<https://gitee.com/src-openeuler/flatpak/issues/I9HX1E>
flatpak
8.4
I9FBRQ:CVE-2024-3446<https://gitee.com/src-openeuler/qemu/issues/I9FBRQ>
qemu
8.2
I9IS6F:CVE-2024-32040<https://gitee.com/src-openeuler/freerdp/issues/I9IS6F>
freerdp
8.1
I9IS7M:CVE-2024-32460<https://gitee.com/src-openeuler/freerdp/issues/I9IS7M>
freerdp
8.1
I4BI7U:CVE-2019-25051<https://gitee.com/src-openeuler/aspell/issues/I4BI7U>
aspell
7.8
I92OOJ:CVE-2023-52441<https://gitee.com/src-openeuler/kernel/issues/I92OOJ>
kernel
7.8
I90BS5:CVE-2022-41723<https://gitee.com/src-openeuler/ignition/issues/I90BS5>
ignition
7.5
I9F7ML:CVE-2023-50387<https://gitee.com/src-openeuler/systemd/issues/I9F7ML>
systemd
7.5
I9F7QD:CVE-2023-50868<https://gitee.com/src-openeuler/systemd/issues/I9F7QD>
systemd
7.5
I9J3YI:CVE-2024-32660<https://gitee.com/src-openeuler/freerdp/issues/I9J3YI>
freerdp
7.5
I9HY69:CVE-2023-44488<https://gitee.com/src-openeuler/firefox/issues/I9HY69>
firefox
7.5
I97NHT:CVE-2024-26608<https://gitee.com/src-openeuler/kernel/issues/I97NHT>
kernel
6.5
I917JN:CVE-2024-24861<https://gitee.com/src-openeuler/kernel/issues/I917JN>
kernel
6.3
I97NHC:CVE-2023-52491<https://gitee.com/src-openeuler/kernel/issues/I97NHC>
kernel
6.2
I97NHW:CVE-2023-52492<https://gitee.com/src-openeuler/kernel/issues/I97NHW>
kernel
6.2
I6AW3R:CVE-2023-0330<https://gitee.com/src-openeuler/qemu/issues/I6AW3R>
qemu
6
I9FAAQ:CVE-2024-3447<https://gitee.com/src-openeuler/qemu/issues/I9FAAQ>
qemu
6
I9F9VB:CVE-2024-2511<https://gitee.com/src-openeuler/edk2/issues/I9F9VB>
edk2
5.9
I8QF9K:CVE-2023-7042<https://gitee.com/src-openeuler/kernel/issues/I8QF9K>
kernel
5.5
I95AT0:CVE-2023-52504<https://gitee.com/src-openeuler/kernel/issues/I95AT0>
kernel
5.5
I95ATZ:CVE-2023-52574<https://gitee.com/src-openeuler/kernel/issues/I95ATZ>
kernel
5.5
I95B1R:CVE-2023-52524<https://gitee.com/src-openeuler/kernel/issues/I95B1R>
kernel
5.5
I96GP1:CVE-2023-52607<https://gitee.com/src-openeuler/kernel/issues/I96GP1>
kernel
5.5
I97NHS:CVE-2024-26615<https://gitee.com/src-openeuler/kernel/issues/I97NHS>
kernel
5.5
I97NI1:CVE-2023-52486<https://gitee.com/src-openeuler/kernel/issues/I97NI1>
kernel
5.5
I98BNA:CVE-2023-52608<https://gitee.com/src-openeuler/kernel/issues/I98BNA>
kernel
5.5
I9DD86:CVE-2024-26654<https://gitee.com/src-openeuler/kernel/issues/I9DD86>
kernel
5.5
I9DO1Z:CVE-2024-26656<https://gitee.com/src-openeuler/kernel/issues/I9DO1Z>
kernel
5.5
I9E2EQ:CVE-2024-26696<https://gitee.com/src-openeuler/kernel/issues/I9E2EQ>
kernel
5.5
I97NHA:CVE-2023-52493<https://gitee.com/src-openeuler/kernel/issues/I97NHA>
kernel
5.1
I95B3Q:CVE-2023-52503<https://gitee.com/src-openeuler/kernel/issues/I95B3Q>
kernel
4.5
I97NHG:CVE-2023-52494<https://gitee.com/src-openeuler/kernel/issues/I97NHG>
kernel
4.4
I97NIA:CVE-2023-52498<https://gitee.com/src-openeuler/kernel/issues/I97NIA>
kernel
4.4
I99JXH:CVE-2023-52617<https://gitee.com/src-openeuler/kernel/issues/I99JXH>
kernel
4.4
I9E2O3:CVE-2024-26764<https://gitee.com/src-openeuler/kernel/issues/I9E2O3>
kernel
1
I9E466:CVE-2024-26795<https://gitee.com/src-openeuler/kernel/issues/I9E466>
kernel
1
I9FNFK:CVE-2021-47182<https://gitee.com/src-openeuler/kernel/issues/I9FNFK>
kernel
1
Bugfix:
issue
仓库
#I9H7IN:update源当前最新版本未使用最新的glib2编译,glib2升级后,软件包无法正常使用:update源当前最新版本未使用最新的glib2编译,glib2升级后,软件包无法正常使用
libsoup
#I9HDFB:libdnf Modify loongarch64 patch use all arch:libdnf Modify loongarch64 patch use all arch
libdnf
#I90ZKU:gcc是否可以选择默认禁用isl选项:gcc是否可以选择默认禁用isl选项
gcc
#I8Y0RW:【OLK-5.10】cgroup1_writeback的死锁问题:【OLK-5.10】cgroup1_writeback的死锁问题
kernel
#I99KM6:【OLK-5.10】cgroup1_writeback softlockup:【OLK-5.10】cgroup1_writeback softlockup
kernel
#I9HCQ7:修复CVE-2024-31083引入的双重释放问题:修复CVE-2024-31083引入的双重释放问题
xorg-x11-server
openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/docker_img/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/hotpatch_update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_versio…
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_versio…
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_versio…
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-22.03-LTS-SP1 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高):
里程碑
任务ID
任务标题
优先级
sig组
关联仓库
任务路径
openEuler 22.03-SP1
I6B4V1
【22.03 SP1 update 20230118】【arm】libhdfs在arm架构降级失败,x86正常
主要
sig/bigdata
src-openEuler/hadoop
https://gitee.com/open_euler/dashboard?issue_id=I6B4V1
openEuler-22.03-LTS-SP1 update20230726
I7OR2I
【22.03 LTS SP1 update20230726】【arm\x86】selinux-policy-base的版本不符合ceph子包的安装条件,ceph子包安装失败
主要
sig/sig-SDS
src-openEuler/ceph
https://gitee.com/open_euler/dashboard?issue_id=I7OR2I
openEuler-22.03-LTS-SP1
I6VFV6
[22.03 SP1] [x86/arm] mariadb授权给远程用户,远程连接服务失败
次要
sig/DB
src-openEuler/mariadb
https://gitee.com/open_euler/dashboard?issue_id=I6VFV6
openEuler-22.03-LTS-SP1
I73CKF
【22.03-lts-sp1】x86环境上同时安装php-fpm软件包和php-opcache软件包后会导致php-fpm.service服务启动失败
次要
sig/Base-service
src-openEuler/php
https://gitee.com/open_euler/dashboard?issue_id=I73CKF
openEuler-22.03-LTS-SP1
I84L9F
openEuler 22.03 LTS-SP1版本上编译node-v18.18.0的代码失败
无优先级
sig/Compiler
src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I84L9F
openEuler-22.03-LTS-SP2 Update 20240424
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS-SP2修复版本已知问题11个,已知漏洞50个,目前版本分支剩余待修复缺陷4个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS-SP2 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9IIBB?from=project-i…
CVE修复:
CVE
仓库
score
I9IS6E:CVE-2024-32458<https://gitee.com/src-openeuler/freerdp/issues/I9IS6E>
freerdp
9.8
I9IS6G:CVE-2024-32041<https://gitee.com/src-openeuler/freerdp/issues/I9IS6G>
freerdp
9.8
I9IS7K:CVE-2024-32459<https://gitee.com/src-openeuler/freerdp/issues/I9IS7K>
freerdp
9.8
I9IVRE:CVE-2024-32039<https://gitee.com/src-openeuler/freerdp/issues/I9IVRE>
freerdp
9.8
I9J3WZ:CVE-2024-32658<https://gitee.com/src-openeuler/freerdp/issues/I9J3WZ>
freerdp
9.8
I9J3YJ:CVE-2024-32659<https://gitee.com/src-openeuler/freerdp/issues/I9J3YJ>
freerdp
9.8
I9C6X1:CVE-2024-3019<https://gitee.com/src-openeuler/pcp/issues/I9C6X1>
pcp
8.8
I9HX1E:CVE-2024-32462<https://gitee.com/src-openeuler/flatpak/issues/I9HX1E>
flatpak
8.4
I9FBRQ:CVE-2024-3446<https://gitee.com/src-openeuler/qemu/issues/I9FBRQ>
qemu
8.2
I9IS6F:CVE-2024-32040<https://gitee.com/src-openeuler/freerdp/issues/I9IS6F>
freerdp
8.1
I9IS7M:CVE-2024-32460<https://gitee.com/src-openeuler/freerdp/issues/I9IS7M>
freerdp
8.1
I4BI7U:CVE-2019-25051<https://gitee.com/src-openeuler/aspell/issues/I4BI7U>
aspell
7.8
I92OOJ:CVE-2023-52441<https://gitee.com/src-openeuler/kernel/issues/I92OOJ>
kernel
7.8
I90BQX:CVE-2022-41723<https://gitee.com/src-openeuler/skopeo/issues/I90BQX>
skopeo
7.5
I9F7ML:CVE-2023-50387<https://gitee.com/src-openeuler/systemd/issues/I9F7ML>
systemd
7.5
I9F7QD:CVE-2023-50868<https://gitee.com/src-openeuler/systemd/issues/I9F7QD>
systemd
7.5
I9AVYL:CVE-2022-48279<https://gitee.com/src-openeuler/mod_security/issues/I9AVYL>
mod_security
7.5
I9J3YI:CVE-2024-32660<https://gitee.com/src-openeuler/freerdp/issues/I9J3YI>
freerdp
7.5
I9HY69:CVE-2023-44488<https://gitee.com/src-openeuler/firefox/issues/I9HY69>
firefox
7.5
I9GEXT:CVE-2024-32487<https://gitee.com/src-openeuler/less/issues/I9GEXT>
less
6.8
I97NHT:CVE-2024-26608<https://gitee.com/src-openeuler/kernel/issues/I97NHT>
kernel
6.5
I917JN:CVE-2024-24861<https://gitee.com/src-openeuler/kernel/issues/I917JN>
kernel
6.3
I97NHC:CVE-2023-52491<https://gitee.com/src-openeuler/kernel/issues/I97NHC>
kernel
6.2
I97NHW:CVE-2023-52492<https://gitee.com/src-openeuler/kernel/issues/I97NHW>
kernel
6.2
I6AW3R:CVE-2023-0330<https://gitee.com/src-openeuler/qemu/issues/I6AW3R>
qemu
6
I9FAAQ:CVE-2024-3447<https://gitee.com/src-openeuler/qemu/issues/I9FAAQ>
qemu
6
I9F9VB:CVE-2024-2511<https://gitee.com/src-openeuler/edk2/issues/I9F9VB>
edk2
5.9
I8QF9K:CVE-2023-7042<https://gitee.com/src-openeuler/kernel/issues/I8QF9K>
kernel
5.5
I95AT0:CVE-2023-52504<https://gitee.com/src-openeuler/kernel/issues/I95AT0>
kernel
5.5
I95AT9:CVE-2023-52575<https://gitee.com/src-openeuler/kernel/issues/I95AT9>
kernel
5.5
I95ATZ:CVE-2023-52574<https://gitee.com/src-openeuler/kernel/issues/I95ATZ>
kernel
5.5
I95B1R:CVE-2023-52524<https://gitee.com/src-openeuler/kernel/issues/I95B1R>
kernel
5.5
I96GP1:CVE-2023-52607<https://gitee.com/src-openeuler/kernel/issues/I96GP1>
kernel
5.5
I97NHS:CVE-2024-26615<https://gitee.com/src-openeuler/kernel/issues/I97NHS>
kernel
5.5
I97NI1:CVE-2023-52486<https://gitee.com/src-openeuler/kernel/issues/I97NI1>
kernel
5.5
I98BNA:CVE-2023-52608<https://gitee.com/src-openeuler/kernel/issues/I98BNA>
kernel
5.5
I9DD86:CVE-2024-26654<https://gitee.com/src-openeuler/kernel/issues/I9DD86>
kernel
5.5
I9DO1Z:CVE-2024-26656<https://gitee.com/src-openeuler/kernel/issues/I9DO1Z>
kernel
5.5
I9E2EQ:CVE-2024-26696<https://gitee.com/src-openeuler/kernel/issues/I9E2EQ>
kernel
5.5
I97NHA:CVE-2023-52493<https://gitee.com/src-openeuler/kernel/issues/I97NHA>
kernel
5.1
I9AFM6:CVE-2024-28835<https://gitee.com/src-openeuler/gnutls/issues/I9AFM6>
gnutls
5
I95B3Q:CVE-2023-52503<https://gitee.com/src-openeuler/kernel/issues/I95B3Q>
kernel
4.5
I97NHG:CVE-2023-52494<https://gitee.com/src-openeuler/kernel/issues/I97NHG>
kernel
4.4
I97NIA:CVE-2023-52498<https://gitee.com/src-openeuler/kernel/issues/I97NIA>
kernel
4.4
I99JXH:CVE-2023-52617<https://gitee.com/src-openeuler/kernel/issues/I99JXH>
kernel
4.4
I95ATO:CVE-2023-52567<https://gitee.com/src-openeuler/kernel/issues/I95ATO>
kernel
2.3
I9E2O3:CVE-2024-26764<https://gitee.com/src-openeuler/kernel/issues/I9E2O3>
kernel
1
I9E466:CVE-2024-26795<https://gitee.com/src-openeuler/kernel/issues/I9E466>
kernel
1
I9FNFK:CVE-2021-47182<https://gitee.com/src-openeuler/kernel/issues/I9FNFK>
kernel
1
Bugfix:
issue
仓库
#I9H7IN:update源当前最新版本未使用最新的glib2编译,glib2升级后,软件包无法正常使用:update源当前最新版本未使用最新的glib2编译,glib2升级后,软件包无法正常使用
libsoup
#I9HDFB:libdnf Modify loongarch64 patch use all arch:libdnf Modify loongarch64 patch use all arch
libdnf
#I7GH64:例行分析dnf-plugins-core补丁,需要回合补丁:例行分析dnf-plugins-core补丁,需要回合补丁
dnf-plugins-core
#I90ZKU:gcc是否可以选择默认禁用isl选项:gcc是否可以选择默认禁用isl选项
gcc
#I8ELKA:cpufreq: CPPC: 修正 cppc_get_perf_ctrs_sample 的 cpu参数:cpufreq: CPPC: 修正 cppc_get_perf_ctrs_sample 的 cpu参数
kernel
#I8TPP6:全核上下线后,设置policy318频率未响应,重定向到cpu0和1:全核上下线后,设置policy318频率未响应,重定向到cpu0和1
kernel
#I8W708:cpufreq: schedutils/conservative/ondemand 采样频率异常:cpufreq: schedutils/conservative/ondemand 采样频率异常
kernel
#I8WAED:cpufreq: bios 要求支持上报cpu最高频率和最低频率相等的场景:cpufreq: bios 要求支持上报cpu最高频率和最低频率相等的场景
kernel
#I8Y0RW:【OLK-5.10】cgroup1_writeback的死锁问题:【OLK-5.10】cgroup1_writeback的死锁问题
kernel
#I99KM6:【OLK-5.10】cgroup1_writeback softlockup:【OLK-5.10】cgroup1_writeback softlockup
kernel
#I9HCQ7:修复CVE-2024-31083引入的双重释放问题:修复CVE-2024-31083引入的双重释放问题
xorg-x11-server
openEuler-22.03-LTS SP2版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-22.03-LTS SP2 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/hotpatch_update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/docker_img/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/EPOL/update/multi_versio…
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/EPOL/update/multi_versio…
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
https://repo.openeuler.org/security/data/hotpatch_cvrf/
openEuler-22.03-LTS-SP2 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高):
里程碑
任务ID
任务标题
优先级
sig组
关联仓库
任务路径
openEuler-22.03-LTS-SP2-round-2
I795G3
【22.03-LTS-SP2 round2】本次转测源中出现多个版本的containers-common
主要
sig/sig-CloudNative
src-openEuler/skopeo
https://gitee.com/open_euler/dashboard?issue_id=I795G3
openEuler-22.03-LTS-SP2-SEC
I7AFIR
【22.03-LTS-SP2 round2】【x86/arm】libkae-1.2.10-6.oe2203sp2安全编译选项Rpath/Runpath不满足
主要
sig-AccLib
src-openEuler/libkae
https://gitee.com/open_euler/dashboard?issue_id=I7AFIR
openEuler-22.03-LTS-SP2-update20231018
I89NB0
22.03-LTS-SP2的ceph release版本低于22.03-LTS-SP1 release版本
次要
sig/sig-SDS
src-openEuler/ceph
https://gitee.com/open_euler/dashboard?issue_id=I89NB0
openEuler-22.03-LTS-SP2
I7B6X5
gcc-pie-arm64架构和操作手册结果不同
无优先级
sig/Compiler
src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I7B6X5
openEuler-20.03-LTS-SP4 Update 20240424
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP4修复版本已知问题4个,已知漏洞47个。目前版本分支剩余待修复缺陷7个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP4 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9IIBE?from=project-i…
CVE修复:
CVE
仓库
score
I9IS6E:CVE-2024-32458<https://gitee.com/src-openeuler/freerdp/issues/I9IS6E>
freerdp
9.8
I9IS6G:CVE-2024-32041<https://gitee.com/src-openeuler/freerdp/issues/I9IS6G>
freerdp
9.8
I9IS7K:CVE-2024-32459<https://gitee.com/src-openeuler/freerdp/issues/I9IS7K>
freerdp
9.8
I9IVRE:CVE-2024-32039<https://gitee.com/src-openeuler/freerdp/issues/I9IVRE>
freerdp
9.8
I9J3WZ:CVE-2024-32658<https://gitee.com/src-openeuler/freerdp/issues/I9J3WZ>
freerdp
9.8
I9J3YJ:CVE-2024-32659<https://gitee.com/src-openeuler/freerdp/issues/I9J3YJ>
freerdp
9.8
I9HX1E:CVE-2024-32462<https://gitee.com/src-openeuler/flatpak/issues/I9HX1E>
flatpak
8.4
I9FBRQ:CVE-2024-3446<https://gitee.com/src-openeuler/qemu/issues/I9FBRQ>
qemu
8.2
I9IS6F:CVE-2024-32040<https://gitee.com/src-openeuler/freerdp/issues/I9IS6F>
freerdp
8.1
I9IS7M:CVE-2024-32460<https://gitee.com/src-openeuler/freerdp/issues/I9IS7M>
freerdp
8.1
I9F7ML:CVE-2023-50387<https://gitee.com/src-openeuler/systemd/issues/I9F7ML>
systemd
7.5
I9F7QD:CVE-2023-50868<https://gitee.com/src-openeuler/systemd/issues/I9F7QD>
systemd
7.5
I9J3YI:CVE-2024-32660<https://gitee.com/src-openeuler/freerdp/issues/I9J3YI>
freerdp
7.5
I9HY69:CVE-2023-44488<https://gitee.com/src-openeuler/firefox/issues/I9HY69>
firefox
7.5
I8TQCT:CVE-2023-6270<https://gitee.com/src-openeuler/kernel/issues/I8TQCT>
kernel
7
I8DQ75:CVE-2023-47233<https://gitee.com/src-openeuler/kernel/issues/I8DQ75>
kernel
6.3
I917JN:CVE-2024-24861<https://gitee.com/src-openeuler/kernel/issues/I917JN>
kernel
6.3
I6AW3R:CVE-2023-0330<https://gitee.com/src-openeuler/qemu/issues/I6AW3R>
qemu
6
I9FAAQ:CVE-2024-3447<https://gitee.com/src-openeuler/qemu/issues/I9FAAQ>
qemu
6
I9F9VB:CVE-2024-2511<https://gitee.com/src-openeuler/edk2/issues/I9F9VB>
edk2
5.9
I8QF9K:CVE-2023-7042<https://gitee.com/src-openeuler/kernel/issues/I8QF9K>
kernel
5.5
I91L79:CVE-2024-25739<https://gitee.com/src-openeuler/kernel/issues/I91L79>
kernel
5.5
I95AT0:CVE-2023-52504<https://gitee.com/src-openeuler/kernel/issues/I95AT0>
kernel
5.5
I95B1R:CVE-2023-52524<https://gitee.com/src-openeuler/kernel/issues/I95B1R>
kernel
5.5
I963KI:CVE-2022-48629<https://gitee.com/src-openeuler/kernel/issues/I963KI>
kernel
5.5
I96GP1:CVE-2023-52607<https://gitee.com/src-openeuler/kernel/issues/I96GP1>
kernel
5.5
I97NHS:CVE-2024-26615<https://gitee.com/src-openeuler/kernel/issues/I97NHS>
kernel
5.5
I97NI1:CVE-2023-52486<https://gitee.com/src-openeuler/kernel/issues/I97NI1>
kernel
5.5
I9DD86:CVE-2024-26654<https://gitee.com/src-openeuler/kernel/issues/I9DD86>
kernel
5.5
I9DNZ2:CVE-2024-26663<https://gitee.com/src-openeuler/kernel/issues/I9DNZ2>
kernel
5.5
I9E2EQ:CVE-2024-26696<https://gitee.com/src-openeuler/kernel/issues/I9E2EQ>
kernel
5.5
I9HOEF:CVE-2021-47210<https://gitee.com/src-openeuler/kernel/issues/I9HOEF>
kernel
5.5
I95ATI:CVE-2022-48627<https://gitee.com/src-openeuler/kernel/issues/I95ATI>
kernel
4.4
I9E2GX:CVE-2023-52638<https://gitee.com/src-openeuler/kernel/issues/I9E2GX>
kernel
1
I9E2MB:CVE-2024-26733<https://gitee.com/src-openeuler/kernel/issues/I9E2MB>
kernel
1
I9E2O3:CVE-2024-26764<https://gitee.com/src-openeuler/kernel/issues/I9E2O3>
kernel
1
I9E451:CVE-2024-26793<https://gitee.com/src-openeuler/kernel/issues/I9E451>
kernel
1
I9E46O:CVE-2024-26801<https://gitee.com/src-openeuler/kernel/issues/I9E46O>
kernel
1
I9E46W:CVE-2024-26805<https://gitee.com/src-openeuler/kernel/issues/I9E46W>
kernel
1
I9FNFA:CVE-2021-47216<https://gitee.com/src-openeuler/kernel/issues/I9FNFA>
kernel
1
I9FNFI:CVE-2021-47203<https://gitee.com/src-openeuler/kernel/issues/I9FNFI>
kernel
1
I9FNFL:CVE-2021-47210<https://gitee.com/src-openeuler/kernel/issues/I9FNFL>
kernel
1
I9FNFQ:CVE-2021-47211<https://gitee.com/src-openeuler/kernel/issues/I9FNFQ>
kernel
1
I9HK0E:CVE-2024-26908<https://gitee.com/src-openeuler/kernel/issues/I9HK0E>
kernel
1
I9HK6X:CVE-2024-26884<https://gitee.com/src-openeuler/kernel/issues/I9HK6X>
kernel
1
I9HL6U:CVE-2024-26920<https://gitee.com/src-openeuler/kernel/issues/I9HL6U>
kernel
1
Bugfix:
issue
仓库
#I9H4XD:【OLK-5.10】修改rmid 错误返回码与last_cmd_status 不一致:【OLK-5.10】修改rmid 错误返回码与last_cmd_status 不一致
kernel
#I9H4YE:【OLK-5.10】L3CODEPBM:0=0 接口输入0 实际返回 ffffff:【OLK-5.10】L3CODEPBM:0=0 接口输入0 实际返回 ffffff
kernel
#I9HXKB:解决SELinux策略重载时IMA偶发的panic问题:解决SELinux策略重载时IMA偶发的panic问题
kernel
#I9HCQ7:修复CVE-2024-31083引入的双重释放问题:修复CVE-2024-31083引入的双重释放问题
xorg-x11-server
openEuler-20.03-LTS SP4版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-20.03-LTS SP4 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP4/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP4/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
https://repo.openeuler.org/security/data/hotpatch_cvrf/
openEuler-20.03-LTS-SP4 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高):
里程碑
任务ID
任务标题
优先级
标签
关联仓库
任务路径
openEuler-20.03-LTS-SP4-round-1
I8DT5M
【openEuler-20.03-LTS-SP4 rc1】redis-sentinel.service启动失败
主要
sig/bigdata
src-openEuler/redis6
https://gitee.com/open_euler/dashboard?issue_id=I8DT5M
openEuler-20.03-LTS-SP4-round-1
I8EKUI
【openEuler-20.03-LTS-SP4 rc1】strongswan-swanctl.service服务启动失败
主要
sig/sig-security-fac
src-openEuler/strongswan
https://gitee.com/open_euler/dashboard?issue_id=I8EKUI
openEuler-20.03-LTS-SP4-round-2
I8GDGR
【openEuler-20.03-LTS-SP4-RC2】【arm/x86】物理机安装gnome-*启用图形化界面重启之后卡住
主要
sig/GNOME
src-openEuler/gnome-desktop3
https://gitee.com/open_euler/dashboard?issue_id=I8GDGR
openEuler-20.03-LTS-SP4-alpha
I8B7XU
【openEuler-20.03-LTS-SP4 alpha】[arm/x86]vdsmd.service服务启动失败
主要
sig/oVirt
src-openEuler/vdsm
https://gitee.com/open_euler/dashboard?issue_id=I8B7XU
openEuler-20.03-LTS-SP4-round-2
I8G371
【20.03-SP4-rc2】【arm/x86】h2源码包本地自编译失败
次要
sig/DB
src-openEuler/h2
https://gitee.com/open_euler/dashboard?issue_id=I8G371
openEuler-20.03-LTS-SP4-dailybuild
I8GUMP
[EulerMaker] nagios-plugins build problem in openEuler-20.03-LTS-SP4:everything
不重要
sig/Networking
src-openEuler/nagios-plugins
https://gitee.com/open_euler/dashboard?issue_id=I8GUMP
openEuler-20.03-LTS-SP4-dailybuild
I8I8DQ
[EulerMaker] caja-extensions install problem in openEuler-20.03-LTS-SP4:epol
不重要
sig/sig-mate-desktop
src-openEuler/caja-extensions
https://gitee.com/open_euler/dashboard?issue_id=I8I8DQ
openEuler-22.03-LTS-SP3 Update 20240424
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS-SP3修复版本已知问题14个,已知漏洞62个。目前版本分支剩余待修复缺陷1个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9II2W?from=project-i…
CVE修复:
CVE
仓库
score
#I9IS6E:CVE-2024-32458<https://gitee.com/open_euler/dashboard?issue_id=I9IS6E>
freerdp
9.8
#I9IS6G:CVE-2024-32041<https://gitee.com/open_euler/dashboard?issue_id=I9IS6G>
freerdp
9.8
#I9IS7K:CVE-2024-32459<https://gitee.com/open_euler/dashboard?issue_id=I9IS7K>
freerdp
9.8
#I9IVRE:CVE-2024-32039<https://gitee.com/open_euler/dashboard?issue_id=I9IVRE>
freerdp
9.8
#I9J3WZ:CVE-2024-32658<https://gitee.com/open_euler/dashboard?issue_id=I9J3WZ>
freerdp
9.8
#I9J3YJ:CVE-2024-32659<https://gitee.com/open_euler/dashboard?issue_id=I9J3YJ>
freerdp
9.8
#I9HX1E:CVE-2024-32462<https://gitee.com/open_euler/dashboard?issue_id=I9HX1E>
flatpak
8.4
#I9FBRQ:CVE-2024-3446<https://gitee.com/open_euler/dashboard?issue_id=I9FBRQ>
qemu
8.2
#I9IS6F:CVE-2024-32040<https://gitee.com/open_euler/dashboard?issue_id=I9IS6F>
freerdp
8.1
#I9IS7M:CVE-2024-32460<https://gitee.com/open_euler/dashboard?issue_id=I9IS7M>
freerdp
8.1
#I4BI7U:CVE-2019-25051<https://gitee.com/open_euler/dashboard?issue_id=I4BI7U>
aspell
7.8
#I92OOJ:CVE-2023-52441<https://gitee.com/open_euler/dashboard?issue_id=I92OOJ>
kernel
7.8
#I9F7ML:CVE-2023-50387<https://gitee.com/open_euler/dashboard?issue_id=I9F7ML>
systemd
7.5
#I9F7QD:CVE-2023-50868<https://gitee.com/open_euler/dashboard?issue_id=I9F7QD>
systemd
7.5
#I9J3YI:CVE-2024-32660<https://gitee.com/open_euler/dashboard?issue_id=I9J3YI>
freerdp
7.5
#I9HY69:CVE-2023-44488<https://gitee.com/open_euler/dashboard?issue_id=I9HY69>
firefox
7.5
#I8TQCT:CVE-2023-6270<https://gitee.com/open_euler/dashboard?issue_id=I8TQCT>
kernel
7
#I9GEXT:CVE-2024-32487<https://gitee.com/open_euler/dashboard?issue_id=I9GEXT>
less
6.8
#I97NHT:CVE-2024-26608<https://gitee.com/open_euler/dashboard?issue_id=I97NHT>
kernel
6.5
#I917JN:CVE-2024-24861<https://gitee.com/open_euler/dashboard?issue_id=I917JN>
kernel
6.3
#I8DQ75:CVE-2023-47233<https://gitee.com/open_euler/dashboard?issue_id=I8DQ75>
kernel
6.3
#I97NHC:CVE-2023-52491<https://gitee.com/open_euler/dashboard?issue_id=I97NHC>
kernel
6.2
#I97NHW:CVE-2023-52492<https://gitee.com/open_euler/dashboard?issue_id=I97NHW>
kernel
6.2
#I6AW3R:CVE-2023-0330<https://gitee.com/open_euler/dashboard?issue_id=I6AW3R>
qemu
6
#I9FAAQ:CVE-2024-3447<https://gitee.com/open_euler/dashboard?issue_id=I9FAAQ>
qemu
6
#I9F9VB:CVE-2024-2511<https://gitee.com/open_euler/dashboard?issue_id=I9F9VB>
edk2
5.9
#I8QF9K:CVE-2023-7042<https://gitee.com/open_euler/dashboard?issue_id=I8QF9K>
kernel
5.5
#I95AT0:CVE-2023-52504<https://gitee.com/open_euler/dashboard?issue_id=I95AT0>
kernel
5.5
#I95AT9:CVE-2023-52575<https://gitee.com/open_euler/dashboard?issue_id=I95AT9>
kernel
5.5
#I95ATZ:CVE-2023-52574<https://gitee.com/open_euler/dashboard?issue_id=I95ATZ>
kernel
5.5
#I95B1R:CVE-2023-52524<https://gitee.com/open_euler/dashboard?issue_id=I95B1R>
kernel
5.5
#I96GP1:CVE-2023-52607<https://gitee.com/open_euler/dashboard?issue_id=I96GP1>
kernel
5.5
#I97NHS:CVE-2024-26615<https://gitee.com/open_euler/dashboard?issue_id=I97NHS>
kernel
5.5
#I97NI1:CVE-2023-52486<https://gitee.com/open_euler/dashboard?issue_id=I97NI1>
kernel
5.5
#I98BNA:CVE-2023-52608<https://gitee.com/open_euler/dashboard?issue_id=I98BNA>
kernel
5.5
#I9DD86:CVE-2024-26654<https://gitee.com/open_euler/dashboard?issue_id=I9DD86>
kernel
5.5
#I9DO1Z:CVE-2024-26656<https://gitee.com/open_euler/dashboard?issue_id=I9DO1Z>
kernel
5.5
#I9E2EQ:CVE-2024-26696<https://gitee.com/open_euler/dashboard?issue_id=I9E2EQ>
kernel
5.5
#I97NHA:CVE-2023-52493<https://gitee.com/open_euler/dashboard?issue_id=I97NHA>
kernel
5.1
#I9AFM6:CVE-2024-28835<https://gitee.com/open_euler/dashboard?issue_id=I9AFM6>
gnutls
5
#I95B3Q:CVE-2023-52503<https://gitee.com/open_euler/dashboard?issue_id=I95B3Q>
kernel
4.5
#I97NHG:CVE-2023-52494<https://gitee.com/open_euler/dashboard?issue_id=I97NHG>
kernel
4.4
#I97NIA:CVE-2023-52498<https://gitee.com/open_euler/dashboard?issue_id=I97NIA>
kernel
4.4
#I99JXH:CVE-2023-52617<https://gitee.com/open_euler/dashboard?issue_id=I99JXH>
kernel
4.4
#I95ATO:CVE-2023-52567<https://gitee.com/open_euler/dashboard?issue_id=I95ATO>
kernel
2.3
#I9E2H0:CVE-2023-52637<https://gitee.com/open_euler/dashboard?issue_id=I9E2H0>
kernel
1
#I9E2LZ:CVE-2024-26739<https://gitee.com/open_euler/dashboard?issue_id=I9E2LZ>
kernel
1
#I9E2M1:CVE-2024-26734<https://gitee.com/open_euler/dashboard?issue_id=I9E2M1>
kernel
1
#I9E2MB:CVE-2024-26733<https://gitee.com/open_euler/dashboard?issue_id=I9E2MB>
kernel
1
#I9E2O3:CVE-2024-26764<https://gitee.com/open_euler/dashboard?issue_id=I9E2O3>
kernel
1
#I9E46O:CVE-2024-26801<https://gitee.com/open_euler/dashboard?issue_id=I9E46O>
kernel
1
#I9E46W:CVE-2024-26805<https://gitee.com/open_euler/dashboard?issue_id=I9E46W>
kernel
1
#I9E47C:CVE-2024-26804<https://gitee.com/open_euler/dashboard?issue_id=I9E47C>
kernel
1
#I9E49K:CVE-2024-26808<https://gitee.com/open_euler/dashboard?issue_id=I9E49K>
kernel
1
#I9FNF8:CVE-2021-47212<https://gitee.com/open_euler/dashboard?issue_id=I9FNF8>
kernel
1
#I9FNFK:CVE-2021-47182<https://gitee.com/open_euler/dashboard?issue_id=I9FNFK>
kernel
1
#I9FNFQ:CVE-2021-47211<https://gitee.com/open_euler/dashboard?issue_id=I9FNFQ>
kernel
1
#I9FNFU:CVE-2021-47199<https://gitee.com/open_euler/dashboard?issue_id=I9FNFU>
kernel
1
#I9HK0E:CVE-2024-26908<https://gitee.com/open_euler/dashboard?issue_id=I9HK0E>
kernel
1
#I9HKEH:CVE-2024-26895<https://gitee.com/open_euler/dashboard?issue_id=I9HKEH>
kernel
1
#I9HL6L:CVE-2024-26917<https://gitee.com/open_euler/dashboard?issue_id=I9HL6L>
kernel
1
#I9HL6U:CVE-2024-26920<https://gitee.com/open_euler/dashboard?issue_id=I9HL6U>
kernel
1
Bugfix:
issue
仓库
#I9HCQ7:修复CVE-2024-31083引入的双重释放问题<https://gitee.com/open_euler/dashboard?issue_id=I9HCQ7>
xorg-x11-server
#I9HHPO:当前版本,seinux状态为enforce,会影响部分进程打补丁 (22.03-LTS-SP3)<https://gitee.com/open_euler/dashboard?issue_id=I9HHPO>
syscare
#I9FSEN:syscare加载激活之后,补丁内容未生效<https://gitee.com/open_euler/dashboard?issue_id=I9FSEN>
syscare
#I9FI9K:22-03当前版本syscare check命令无法检测符号冲突<https://gitee.com/open_euler/dashboard?issue_id=I9FI9K>
syscare
#I9FGS2:selinux关闭的情况下,upatch服务启动失败<https://gitee.com/open_euler/dashboard?issue_id=I9FGS2>
syscare
#I9H7IN:update源当前最新版本未使用最新的glib2编译,glib2升级后,软件包无法正常使用<https://gitee.com/open_euler/dashboard?issue_id=I9H7IN>
libsoup
#I90ZKU:gcc是否可以选择默认禁用isl选项<https://gitee.com/open_euler/dashboard?issue_id=I90ZKU>
gcc
#I9J9U2:【openEuler-22.03-LTS-SP3】gala-gopher提供eBPF全栈可观测能力(openEuler 2403 LTS同步)<https://gitee.com/open_euler/dashboard?issue_id=I9J9U2>
gala-gopher
#I8V1IQ:【OpenEuler22.03-LTS-SP3】HNS3 UDMA特性问题修复,代码优化<https://gitee.com/open_euler/dashboard?issue_id=I8V1IQ>
kernel
#I99KM6:【OLK-5.10】cgroup1_writeback softlockup<https://gitee.com/open_euler/dashboard?issue_id=I99KM6>
kernel
#I9H4XD:【OLK-5.10】修改rmid 错误返回码与last_cmd_status 不一致<https://gitee.com/open_euler/dashboard?issue_id=I9H4XD>
kernel
#I9H4YE:【OLK-5.10】L3CODEPBM:0=0 接口输入0 实际返回 ffffff<https://gitee.com/open_euler/dashboard?issue_id=I9H4YE>
kernel
#I9HNHF:【OLK-5.10】scsi: hisi_sas: Remove hisi_hba->timer for v3 hw<https://gitee.com/open_euler/dashboard?issue_id=I9HNHF>
kernel
#I9HXKB:解决SELinux策略重载时IMA偶发的panic问题<https://gitee.com/open_euler/dashboard?issue_id=I9HXKB>
kernel
openEuler-22.03-LTS-SP3版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-22.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP3/EPOL/update/main/
openEuler CVE及安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-22.03-LTS-SP3 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高):
里程碑
任务ID
任务标题
优先级
标签
关联仓库
任务路径
openEuler-22.03-LTS-SP3
I96ID7
[22.03-LTS-SP3]-O3 -flto -flto-partition=one -fipa-prefetch选项编译hmmer报Segmentation fault:during GIMPLE pass: vrp
主要
sig/Compiler
src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I96ID7
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE(4.26日数据):
漏洞编号
Issue ID
剩余天数
CVSS评分
软件包
SIG
issue码云链接
CVE-2021-47194
I9FNG2
9.33
7.8
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9FNG2
CVE-2021-47198
I9FNFZ
9.33
7.8
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9FNFZ
CVE-2023-52628
I9CH5W
10.83
7.8
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9CH5W
CVE-2024-1135
I9H10B
5.33
7.5
python-gunicorn
sig-python-modules
https://gitee.com/src-openeuler/python-gunicorn/issues/I9H10B
CVE-2024-2757
I9G2UU
9.67
7.5
php
Base-service
https://gitee.com/src-openeuler/php/issues/I9G2UU
CVE-2024-32662
I9J3YP
13.33
7.5
freerdp
Application
https://gitee.com/src-openeuler/freerdp/issues/I9J3YP
CVE-2024-32661
I9J3YK
13.33
7.5
freerdp
Application
https://gitee.com/src-openeuler/freerdp/issues/I9J3YK
CVE-2023-3758
I9HWXO
8.33
7.1
sssd
Base-service
https://gitee.com/src-openeuler/sssd/issues/I9HWXO
CVE-2023-28100
I9AVQ9
10.14
6.5
flatpak
Programming-language
https://gitee.com/src-openeuler/flatpak/issues/I9AVQ9
CVE-2023-52610
I99JTC
12.67
6.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I99JTC
CVE-2024-2397
I9E7NF
11.33
6.3
tcpdump
Networking
https://gitee.com/src-openeuler/tcpdump/issues/I9E7NF
CVE-2024-26641
I99JV2
12.67
6.1
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I99JV2
CVE-2024-26635
I99JSA
12.67
6.1
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I99JSA
CVE-2023-52612
I99K14
12.67
6
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I99K14
CVE-2024-27188
I9C1XR
1.33
5.9
plasma-breeze
sig-KDE
https://gitee.com/src-openeuler/plasma-breeze/issues/I9C1XR
CVE-2024-28867
I9CTY2
3.33
5.9
prometheus
sig-CloudNative
https://gitee.com/src-openeuler/prometheus/issues/I9CTY2
CVE-2023-48795
I9AYAQ
4.14
5.9
libssh2
Networking
https://gitee.com/src-openeuler/libssh2/issues/I9AYAQ
CVE-2024-26614
I97NHZ
5.61
5.9
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NHZ
CVE-2023-48795
I9AYAU
11.14
5.9
cri-o
sig-CloudNative
https://gitee.com/src-openeuler/cri-o/issues/I9AYAU
CVE-2024-3262
I9E4AO
9.33
5.5
openjfx11
Compiler
https://gitee.com/src-openeuler/openjfx11/issues/I9E4AO
CVE-2024-26633
I99K08
12.67
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I99K08
CVE-2024-26636
I99JVI
12.67
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I99JVI
CVE-2023-52619
I99JQV
12.67
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I99JQV
CVE-2021-47119
I990AW
12.67
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I990AW
CVE-2021-47111
I990AT
12.67
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I990AT
CVE-2021-47117
I990AP
12.67
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I990AP
CVE-2021-47120
I990AE
12.67
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I990AE
CVE-2021-47127
I990AC
12.67
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I990AC
CVE-2023-22081
I88VNW
8.14
5.3
openjdk-latest
Compiler
https://gitee.com/src-openeuler/openjdk-latest/issues/I88VNW
CVE-2021-47121
I990B2
12.67
4.7
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I990B2
CVE-2023-52618
I99K1F
12.67
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I99K1F
CVE-2023-52614
I99JWC
12.67
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I99JWC
CVE-2023-52615
I99JR3
12.67
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I99JR3
CVE-2024-28180
I9C55E
8.14
4.3
cri-o
sig-CloudNative
https://gitee.com/src-openeuler/cri-o/issues/I9C55E
CVE-2023-28101
I9AVQ7
10.14
4.3
flatpak
Programming-language
https://gitee.com/src-openeuler/flatpak/issues/I9AVQ7
CVE-2023-45803
I9C54B
1.33
4.2
python-s3transfer
sig-python-modules
https://gitee.com/src-openeuler/python-s3transfer/issues/I9C54B
CVE-2023-45803
I9C543
1.33
4.2
fence-agents
sig-Ha
https://gitee.com/src-openeuler/fence-agents/issues/I9C543
CVE-2023-52609
I99JWJ
12.67
4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I99JWJ
CVE-2023-22025
I88JFX
8.14
3.7
openjdk-latest
Compiler
https://gitee.com/src-openeuler/openjdk-latest/issues/I88JFX
社区关键组件待修复缺陷:
openEuler社区存在无版本里程碑的缺陷,请各个SIG 关注涉及质量等级为L1-L2软件包的缺陷修复情况。
社区提单可参考社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/master/%E7%A4%BE%E5%8C%BA%E7%89%88%E6%9…
关键组件待修复缺陷清单(无版本里程碑):
序号
任务ID
任务标题
任务类型
创建时间
优先级
关联仓库
sig组
任务路径
1
I4MFPO
webbench成功执行后返回值不为0
缺陷
2021/12/14 14:34
无优先级
src-openEuler/webbench
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I4MFPO
2
I4ON3D
Log4j 漏洞风险
任务
2021/12/29 19:21
无优先级
src-openEuler/flink
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I4ON3D
3
I52YS4
[合规提升]建议统一spec文件的License名称规范
任务
2022/4/15 16:55
无优先级
src-openEuler/perl-Compress-LZF
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I52YS4
4
I58ASM
初始化kylin-printer仓库
任务
2022/5/19 16:38
无优先级
src-openEuler/kylin-printer
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I58ASM
5
I5CXW7
Submit yaml file into this repository: openEuler_chroot
任务
2022/6/18 15:44
无优先级
src-openEuler/openEuler_chroot
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5CXW7
6
I5DV0T
Upgrade to latest release [derby: 10.13.1.1 -> 10.16.1.1]
任务
2022/6/24 2:05
无优先级
src-openEuler/derby
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5DV0T
7
I5DX0S
Upgrade to latest release [rubygem-concurrent-ruby: 1.0.5 -> 1.1.10]
任务
2022/6/24 11:25
无优先级
src-openEuler/rubygem-concurrent-ruby
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5DX0S
8
I5DZZ9
Upgrade to latest release [rubygem-prawn: 2.2.2 -> 2.4.0]
任务
2022/6/24 16:12
无优先级
src-openEuler/rubygem-prawn
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5DZZ9
9
I5NU9G
注意changelog撰写规范
任务
2022/8/24 11:31
无优先级
src-openEuler/hdf
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5NU9G
10
I5P376
spec编包缺失依赖
任务
2022/8/31 22:03
无优先级
src-openEuler/rubygem-activemodel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5P376
11
I5P37L
spec编包缺失依赖
任务
2022/8/31 22:04
无优先级
src-openEuler/xfce4-battery-plugin
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5P37L
12
I5TKU3
Submit yaml file into this repository: R-mockery
任务
2022/9/28 14:08
无优先级
src-openEuler/R-mockery
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5TKU3
13
I5TKU4
Submit yaml file into this repository: R-multcomp
任务
2022/9/28 14:09
无优先级
src-openEuler/R-multcomp
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5TKU4
14
I5TKV0
Submit yaml file into this repository: R-pkgbuild
任务
2022/9/28 14:09
无优先级
src-openEuler/R-pkgbuild
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5TKV0
15
I6B499
Upgrade to latest release [qt5-qttranslations: 5.15.2 -> 6.4.2]
任务
2023/1/19 23:11
无优先级
src-openEuler/qt5-qttranslations
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6B499
16
I6B94H
Upgrade to latest release [xmltool: 3.3 -> 4.4]
任务
2023/1/27 21:12
无优先级
src-openEuler/xmltool
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6B94H
17
I6BE0L
Upgrade to latest release [python-hamcrest: 2.0.3 -> 2.0.4]
任务
2023/1/28 18:44
无优先级
src-openEuler/python-hamcrest
sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I6BE0L
18
I6BE2Y
Upgrade to latest release [python-pyroute2: 0.7.3 -> 0.7.4]
任务
2023/1/28 19:21
无优先级
src-openEuler/python-pyroute2
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6BE2Y
19
I6FNAE
该仓库为空,建议加入
任务
2023/2/16 18:05
无优先级
src-openEuler/clitest
Virt
https://gitee.com/open_euler/dashboard?issue_id=I6FNAE
20
I6IPE2
qla2xxx.spec 编译的rpm,在系统安装的过程中动态加载时识别不了
缺陷
2023/3/1 13:53
无优先级
src-openEuler/qla2xxx
Networking
https://gitee.com/open_euler/dashboard?issue_id=I6IPE2
21
I6JP1M
arm 架构 bpftrace 跟踪内核filp_close 函数显示未知错误
缺陷
2023/3/4 17:28
无优先级
src-openEuler/bpftrace
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I6JP1M
22
I6PZB8
【20.03 LTS SP1】【DWS】发送端创建100个连接会打印11信号自动断开
缺陷
2023/3/24 16:50
无优先级
src-openEuler/gazelle
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I6PZB8
23
I6UPXP
CC 编译错误及 undefined reference 修正
任务
2023/4/11 14:56
无优先级
src-openEuler/dietlibc
Virt
https://gitee.com/open_euler/dashboard?issue_id=I6UPXP
24
I6UUU5
CC 编译错误修正
任务
2023/4/11 20:03
无优先级
src-openEuler/zerofree
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I6UUU5
25
I6VLU3
在使用openEuler-20.03-LTS-SP2 最小化安装后再安装gnome桌面出现输入用户名密码之后卡住
缺陷
2023/4/14 10:16
无优先级
src-openEuler/gnome-desktop3
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I6VLU3
26
I6XBUH
源代码内指定 gcc 编译器导致 LLVM 下编译错误
任务
2023/4/20 14:45
无优先级
src-openEuler/tss2
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I6XBUH
27
I7I4U6
redis高并发场景,连接数越多,性能越差
任务
2023/7/4 9:24
无优先级
src-openEuler/gazelle
Virt
https://gitee.com/open_euler/dashboard?issue_id=I7I4U6
28
I7ITRW
freeipa-4.9.3版本执行ipa-server-install时存在报错,希望可以合入社区修复的补丁
缺陷
2023/7/6 9:37
无优先级
src-openEuler/freeipa
Desktop
https://gitee.com/open_euler/dashboard?issue_id=I7ITRW
29
I7U1TR
【openEuler-23.09】依赖的libbpf非来自openeuler
缺陷
2023/8/17 17:44
无优先级
src-openEuler/dwarves
Virt
https://gitee.com/open_euler/dashboard?issue_id=I7U1TR
30
I7UGHV
kmod-kvdo
缺陷
2023/8/19 16:52
无优先级
src-openEuler/kmod-kvdo
Computing
https://gitee.com/open_euler/dashboard?issue_id=I7UGHV
31
I7VXRH
gtest在master分支升级至1.14.0,导致dtkwidget构建失败
任务
2023/8/25 15:00
无优先级
src-openEuler/dtkwidget
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I7VXRH
32
I80JV0
增加软件包%check区段,启动软件包自测试
任务
2023/9/12 9:24
无优先级
src-openEuler/python-xyzservices
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I80JV0
33
I80K4D
需要增加软件包%check区段,启动软件包自测试
任务
2023/9/12 9:40
无优先级
src-openEuler/python-black
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I80K4D
34
I80ZT7
需要增加%check区段,启动软件包自测试
任务
2023/9/13 14:08
无优先级
src-openEuler/python-jaraco.test
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I80ZT7
35
I818KI
python-mock升级,导致python-jaeger-client编译check阶段失败,请修改
任务
2023/9/14 10:09
无优先级
src-openEuler/python-jaeger-client
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I818KI
36
I8SRJO
Upgrade to latest release [jboss-logmanager: 2.1.19 2022/10/06 -> 3.0.4 2023/12/20]
任务
2024/1/2 9:49
无优先级
src-openEuler/jboss-logmanager
Virt
https://gitee.com/open_euler/dashboard?issue_id=I8SRJO
37
I8SZ31
Upgrade to latest release [kcharselect: 23.04.3 2023/07/04 -> 24.01.85 2023/12/18]
任务
2024/1/2 16:21
无优先级
src-openEuler/kcharselect
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8SZ31
38
I8UNYM
Upgrade to latest release [nodejs-string-dot-prototype-dot-trim: 1.1.2 2016/02/06 -> 1.2.8 2023/09/07]
任务
2024/1/9 10:47
无优先级
src-openEuler/nodejs-string-dot-prototype-dot-trim
sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I8UNYM
39
I8UNYS
Upgrade to latest release [nodejs-faye-websocket: 0.7.2 2013/12/29 -> 0.11.4 2021/05/24]
任务
2024/1/9 10:47
无优先级
src-openEuler/nodejs-faye-websocket
sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I8UNYS
40
I8UUK8
Upgrade to latest release [nodejs-grunt-contrib-nodeunit: 0.4.1 2014/06/21 -> 5.0.0 2023/03/15]
任务
2024/1/9 17:52
无优先级
src-openEuler/nodejs-grunt-contrib-nodeunit
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8UUK8
41
I8UUL0
Upgrade to latest release [nodejs-es5-ext: 0.10.56 2022/03/07 -> 1.7.0 2022/08/31]
任务
2024/1/9 17:54
无优先级
src-openEuler/nodejs-es5-ext
Virt
https://gitee.com/open_euler/dashboard?issue_id=I8UUL0
42
I8UVBG
Upgrade to latest release [nodejs-form-data: 0.2.0 -/-/- -> 4.0.0 2021/02/15]
任务
2024/1/9 19:22
无优先级
src-openEuler/nodejs-form-data
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I8UVBG
43
I8YGDD
【22.03-LTS】【arm/x86】libpq-devel和postgresql-server-devel存在安装冲突
任务
2024/1/24 10:51
无优先级
src-openEuler/postgresql
DB
https://gitee.com/open_euler/dashboard?issue_id=I8YGDD
44
I949X2
Vim在eulermaker容器环境构建存在测试用例失败
任务
2024/2/28 9:17
无优先级
src-openEuler/vim
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I949X2
45
I94M5Q
rust 1.51 fails to build on X86_64 with llvm 10
缺陷
2024/2/29 10:36
无优先级
src-openEuler/rust
sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I94M5Q
46
I999T1
当前仓库与perl-DBIx-Class重复,可关闭
任务
2024/3/18 10:04
无优先级
src-openEuler/perl-DBIx-Class-Storage-Statistics
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I999T1
47
I99CPK
PXE部署过程中。TFTP下载镜像文件失败问题
任务
2024/3/18 12:08
无优先级
src-openEuler/anaconda
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I99CPK
48
I99EWY
Upgrade version 1.31->1.35
任务
2024/3/18 15:01
无优先级
src-openEuler/perl-Module-ScanDeps
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I99EWY
49
I99H04
初始化仓库
任务
2024/3/18 16:33
无优先级
src-openEuler/perl-Devel-Autoflush
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I99H04
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/master/%E7%A4%BE%E5%8C%BA%E7%89%88%E6%9…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
1
0
您好!
sig-release-management 邀请您参加 2024-04-26 10:00 召开的Tencent会议
会议主题:RM双周例会
会议链接:https://meeting.tencent.com/dm/hVAvSr8NroBE
会议纪要:https://etherpad.openeuler.org/p/sig-release-management-meetings
更多资讯尽在:https://www.openeuler.org/zh/
Hello!
sig-release-management invites you to attend the Tencent conference will be held at 2024-04-26 10:00,
The subject of the conference is RM双周例会,
You can join the meeting at https://meeting.tencent.com/dm/hVAvSr8NroBE.
Add topics at https://etherpad.openeuler.org/p/sig-release-management-meetings.
More information: https://www.openeuler.org/en/
1
0
各位openeuler社区的maintainer、 committer和contributor们好:
社区CICD sig基于release sig制定openeuler 24.03 LTS版本的release plan,将于4月24号12点创建快照,开始构建RC4版本,此时间点之后合入PR默认不带入版本!
From: xiasenlin
Sent: Friday, April 12, 2024 4:26 PM
To: dev <dev(a)openeuler.org>; release <release(a)openeuler.org>
Subject: openeuler 24.03 LTS RC3版本构建通知
各位openeuler社区的maintainer、 committer和contributor们好:
社区CICD sig基于release sig制定openeuler 24.03 LTS版本的release plan,将于4月14号18点创建快照,开始构建RC3版本,此时间点之后合入PR默认不带入版本!
From: xiasenlin [mailto:xiasenlin1@huawei.com]
Sent: Wednesday, April 3, 2024 9:37 PM
To: dev <dev(a)openeuler.org<mailto:dev@openeuler.org>>; release <release(a)openeuler.org<mailto:release@openeuler.org>>
Subject: openeuler 24.03 LTS RC2&Beta版本构建通知
各位openeuler社区的maintainer、 committer和contributor们好:
社区CICD sig基于release sig制定openeuler 24.03 LTS版本的release plan,将于4月7号12点创建快照,开始构建RC2&Beta版本,此时间点之后合入PR默认不带入版本!
________________________________
夏森林 Xia Senlin
Mobile:+86-50000041340<tel:+86-50000041340>(For Welink,eSpace Calls)
Email:xiasenlin1(a)huawei.com<mailto:xiasenlin1@huawei.com>
2
1
社区各位开发者好,
经过社区TC的线下会议交流,对openEuler LTS版本的生命周期的策略以及收编情况达成一致,现进行为期1月的公示与意见收集(4/24~5/24)
LTS收编策略:
建议以LTS收编到1个SP的方式进行演进,20.03以SP4版本为样板收编演进(暂不定维护周期上限),在4年以上扩展延长维护的版本可重新定位维护的范围与质量标准。
LTS停维执行方案:
计划将 20.03 LTS SP1,20.03 LTS SP3,22.03 LTS,22.03 LTS SP2 于2024/5/30停止维护。
生命周期公示:https://gitee.com/openeuler/release-management/issues/I52M1X?from=pr…
openEuler 社区版本
发布时间
计划维护时长
计划维护停止时间
实际维护停止时间
状态
openEuler 20.03 LTS SP1
2020/12/30
2年
2022/12/30
2024/5/30(待定)
正常
openEuler 20.03 LTS SP3
2021/12/30
2年
2023/12/30
2024/5/30(待定)
正常
openEuler 22.03 LTS
2022/3/30
2年
2024/3/30
2024/5/30(待定)
正常
openEuler 22.03 LTS SP2
2023/6/30
9个月
2024/3/30
2024/5/30(待定)
正常
openEuler 20.03 LTS SP4
2023/11/30
2年
2025/11/30
持续维护,暂不设上限
开发中
生命周期策略:
[cid:image001.jpg@01DA9652.359C95B0]
BR
范佳臣
1
0
社区各位开发者好,
经过社区TC的线下会议交流,对openEuler LTS版本的生命周期的策略以及收编情况达成一致,现进行为期1月的公示与意见收集(4/24~5/24)
LTS收编策略:
建议以LTS收编到1个SP的方式进行演进,20.03以SP4版本为样板收编演进(暂不定维护周期上限),在4年以上扩展延长维护的版本可重新定位维护的范围与质量标准。
LTS停维执行方案:
计划将 20.03 LTS SP1,20.03 LTS SP3,22.03 LTS,22.03 LTS SP2 于2024/5/30停止维护。
生命周期公示:https://gitee.com/openeuler/release-management/issues/I52M1X?from=pr…
openEuler 社区版本
发布时间
计划维护时长
计划维护停止时间
实际维护停止时间
状态
openEuler 20.03 LTS SP1
2020/12/30
2年
2022/12/30
2025/5/30(待定)
正常
openEuler 20.03 LTS SP3
2021/12/30
2年
2023/12/30
2025/5/30(待定)
正常
openEuler 22.03 LTS
2022/3/30
2年
2024/3/30
2025/5/30(待定)
正常
openEuler 22.03 LTS SP2
2023/6/30
9个月
2024/3/30
2025/5/30(待定)
正常
openEuler 20.03 LTS SP4
2023/11/30
2年
2025/11/30
持续维护,暂不设上限
开发中
生命周期策略:
[cid:image001.jpg@01DA9644.7B124B70]
BR
范佳臣
1
0
主题: openEuler update_20240417版本发布公告
Dear all,
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-22.03-LTS、openEuler-22.03-LTS-SP1、openEuler-22.03-LTS-SP2、openEuler-20.03-LTS-SP4及openEuler-22.03-LTS-SP3 update版本满足版本出口质量,现进行发布公示。
本公示分为九部分:
1、openEuler-20.03-LTS-SP1 Update 20240417发布情况及待修复缺陷
2、openEuler-22.03-LTS Update 20240417发布情况及待修复缺陷
3、openEuler-22.03-LTS-SP1 Update 20240417发布情况及待修复缺陷
4、openEuler-22.03-LTS-SP2 Update 20240417发布情况及待修复缺陷
5、openEuler-20.03-LTS-SP4 Update 20240417发布情况及待修复缺陷
6、openEuler-22.03-LTS-SP3 Update 20240417发布情况及待修复缺陷
7、openEuler 关键组件待修复CVE 清单
8、openEuler 关键组件待修复缺陷清单
9、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2024/04/26)提供 update_20240424 版本。
openEuler-20.03-LTS-SP1 Update 20240417
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题1个,已知漏洞79个。目前版本分支剩余待修复缺陷4个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9GKHN?from=project-i…
CVE修复:
CVE
仓库
score
#I91349:CVE-2020-36773<https://gitee.com/open_euler/dashboard?issue_id=I91349>
ghostscript
9.8
#I990AF:CVE-2021-47131<https://gitee.com/open_euler/dashboard?issue_id=I990AF>
kernel
7.8
#I9E2PR:CVE-2023-45288<https://gitee.com/open_euler/dashboard?issue_id=I9E2PR>
golang
7.5
#I94VO4:CVE-2021-47061<https://gitee.com/open_euler/dashboard?issue_id=I94VO4>
kernel
6.7
#I94VOL:CVE-2021-47063<https://gitee.com/open_euler/dashboard?issue_id=I94VOL>
kernel
6.7
#I94VOT:CVE-2021-47060<https://gitee.com/open_euler/dashboard?issue_id=I94VOT>
kernel
6.7
#I95ASM:CVE-2023-52510<https://gitee.com/open_euler/dashboard?issue_id=I95ASM>
kernel
6.7
#I9C342:CVE-2024-2398<https://gitee.com/open_euler/dashboard?issue_id=I9C342>
curl
6.5
#I94PA7:CVE-2023-52475<https://gitee.com/open_euler/dashboard?issue_id=I94PA7>
kernel
6.3
#I96DIN:CVE-2021-46984<https://gitee.com/open_euler/dashboard?issue_id=I96DIN>
kernel
6
#I9AYAQ:CVE-2023-48795<https://gitee.com/open_euler/dashboard?issue_id=I9AYAQ>
libssh2
5.9
#I9F9VB:CVE-2024-2511<https://gitee.com/open_euler/dashboard?issue_id=I9F9VB>
edk2
5.9
#I95B1K:CVE-2023-52507<https://gitee.com/open_euler/dashboard?issue_id=I95B1K>
kernel
5.7
#I949AL:CVE-2024-21742<https://gitee.com/open_euler/dashboard?issue_id=I949AL>
apache-mime4j
5.6
#I94VOZ:CVE-2021-47056<https://gitee.com/open_euler/dashboard?issue_id=I94VOZ>
kernel
5.5
#I956G7:CVE-2021-47074<https://gitee.com/open_euler/dashboard?issue_id=I956G7>
kernel
5.5
#I956GH:CVE-2021-47071<https://gitee.com/open_euler/dashboard?issue_id=I956GH>
kernel
5.5
#I956GS:CVE-2021-47077<https://gitee.com/open_euler/dashboard?issue_id=I956GS>
kernel
5.5
#I95AT0:CVE-2023-52504<https://gitee.com/open_euler/dashboard?issue_id=I95AT0>
kernel
5.5
#I95AT5:CVE-2023-52566<https://gitee.com/open_euler/dashboard?issue_id=I95AT5>
kernel
5.5
#I95ATV:CVE-2023-52578<https://gitee.com/open_euler/dashboard?issue_id=I95ATV>
kernel
5.5
#I95AWK:CVE-2023-52522<https://gitee.com/open_euler/dashboard?issue_id=I95AWK>
kernel
5.5
#I95B1O:CVE-2023-52515<https://gitee.com/open_euler/dashboard?issue_id=I95B1O>
kernel
5.5
#I96G7Q:CVE-2023-52598<https://gitee.com/open_euler/dashboard?issue_id=I96G7Q>
kernel
5.5
#I96G92:CVE-2023-52583<https://gitee.com/open_euler/dashboard?issue_id=I96G92>
kernel
5.5
#I9BGUB:CVE-2021-47142<https://gitee.com/open_euler/dashboard?issue_id=I9BGUB>
kernel
5.5
#I9BGMR:CVE-2021-47143<https://gitee.com/open_euler/dashboard?issue_id=I9BGMR>
kernel
5.5
#I9BGQL:CVE-2021-47145<https://gitee.com/open_euler/dashboard?issue_id=I9BGQL>
kernel
5.5
#I9BGUR:CVE-2021-47144<https://gitee.com/open_euler/dashboard?issue_id=I9BGUR>
kernel
5.5
#I9BGV4:CVE-2021-47146<https://gitee.com/open_euler/dashboard?issue_id=I9BGV4>
kernel
5.5
#I9BGWP:CVE-2021-47153<https://gitee.com/open_euler/dashboard?issue_id=I9BGWP>
kernel
5.5
#I9BHF9:CVE-2021-47162<https://gitee.com/open_euler/dashboard?issue_id=I9BHF9>
kernel
5.5
#I9BHG2:CVE-2021-47160<https://gitee.com/open_euler/dashboard?issue_id=I9BHG2>
kernel
5.5
#I9BHQL:CVE-2021-47170<https://gitee.com/open_euler/dashboard?issue_id=I9BHQL>
kernel
5.5
#I9BHRY:CVE-2021-47163<https://gitee.com/open_euler/dashboard?issue_id=I9BHRY>
kernel
5.5
#I9BHSG:CVE-2021-47159<https://gitee.com/open_euler/dashboard?issue_id=I9BHSG>
kernel
5.5
#I9BHN7:CVE-2021-47161<https://gitee.com/open_euler/dashboard?issue_id=I9BHN7>
kernel
5.5
#I9BHTI:CVE-2021-47167<https://gitee.com/open_euler/dashboard?issue_id=I9BHTI>
kernel
5.5
#I9BHNM:CVE-2021-47171<https://gitee.com/open_euler/dashboard?issue_id=I9BHNM>
kernel
5.5
#I9BHNX:CVE-2021-47173<https://gitee.com/open_euler/dashboard?issue_id=I9BHNX>
kernel
5.5
#I9BHQ7:CVE-2021-47180<https://gitee.com/open_euler/dashboard?issue_id=I9BHQ7>
kernel
5.5
#I956GP:CVE-2021-47078<https://gitee.com/open_euler/dashboard?issue_id=I956GP>
kernel
5.3
#I94JR1:CVE-2020-36783<https://gitee.com/open_euler/dashboard?issue_id=I94JR1>
kernel
4.7
#I96G7W:CVE-2023-52594<https://gitee.com/open_euler/dashboard?issue_id=I96G7W>
kernel
4.4
#I9BV4P:CVE-2023-52622<https://gitee.com/open_euler/dashboard?issue_id=I9BV4P>
kernel
4.4
#I95B2S:CVE-2023-52500<https://gitee.com/open_euler/dashboard?issue_id=I95B2S>
kernel
3.3
#I94VOR:CVE-2021-47054<https://gitee.com/open_euler/dashboard?issue_id=I94VOR>
kernel
2.3
#I9C0U4:CVE-2023-46049<https://gitee.com/open_euler/dashboard?issue_id=I9C0U4>
llvm
2
#I9FNG2:CVE-2021-47194<https://gitee.com/open_euler/dashboard?issue_id=I9FNG2>
kernel
1
#I9FNG0:CVE-2021-47201<https://gitee.com/open_euler/dashboard?issue_id=I9FNG0>
kernel
1
#I9DNGK:CVE-2023-52635<https://gitee.com/open_euler/dashboard?issue_id=I9DNGK>
kernel
1
#I9E2H0:CVE-2023-52637<https://gitee.com/open_euler/dashboard?issue_id=I9E2H0>
kernel
1
#I9E2GQ:CVE-2023-52639<https://gitee.com/open_euler/dashboard?issue_id=I9E2GQ>
kernel
1
#I9E2FP:CVE-2024-26685<https://gitee.com/open_euler/dashboard?issue_id=I9E2FP>
kernel
1
#I9E2EL:CVE-2024-26686<https://gitee.com/open_euler/dashboard?issue_id=I9E2EL>
kernel
1
#I9E2GS:CVE-2024-26687<https://gitee.com/open_euler/dashboard?issue_id=I9E2GS>
kernel
1
#I9E2EQ:CVE-2024-26696<https://gitee.com/open_euler/dashboard?issue_id=I9E2EQ>
kernel
1
#I9E2FH:CVE-2024-26697<https://gitee.com/open_euler/dashboard?issue_id=I9E2FH>
kernel
1
#I9E2F9:CVE-2024-26704<https://gitee.com/open_euler/dashboard?issue_id=I9E2F9>
kernel
1
#I9E2F7:CVE-2024-26726<https://gitee.com/open_euler/dashboard?issue_id=I9E2F7>
kernel
1
#I9E3E4:CVE-2024-26735<https://gitee.com/open_euler/dashboard?issue_id=I9E3E4>
kernel
1
#I9E2LZ:CVE-2024-26739<https://gitee.com/open_euler/dashboard?issue_id=I9E2LZ>
kernel
1
#I9E2LT:CVE-2024-26740<https://gitee.com/open_euler/dashboard?issue_id=I9E2LT>
kernel
1
#I9E2M7:CVE-2024-26743<https://gitee.com/open_euler/dashboard?issue_id=I9E2M7>
kernel
1
#I9E3EE:CVE-2024-26744<https://gitee.com/open_euler/dashboard?issue_id=I9E3EE>
kernel
1
#I9E2MH:CVE-2024-26754<https://gitee.com/open_euler/dashboard?issue_id=I9E2MH>
kernel
1
#I9E2M2:CVE-2024-26759<https://gitee.com/open_euler/dashboard?issue_id=I9E2M2>
kernel
1
#I9E2LW:CVE-2024-26763<https://gitee.com/open_euler/dashboard?issue_id=I9E2LW>
kernel
1
#I9E2MP:CVE-2024-26771<https://gitee.com/open_euler/dashboard?issue_id=I9E2MP>
kernel
1
#I9E2MF:CVE-2024-26772<https://gitee.com/open_euler/dashboard?issue_id=I9E2MF>
kernel
1
#I9E2M9:CVE-2024-26773<https://gitee.com/open_euler/dashboard?issue_id=I9E2M9>
kernel
1
#I9E2MG:CVE-2024-26777<https://gitee.com/open_euler/dashboard?issue_id=I9E2MG>
kernel
1
#I9E2Y8:CVE-2024-26778<https://gitee.com/open_euler/dashboard?issue_id=I9E2Y8>
kernel
1
#I9E2MI:CVE-2024-26779<https://gitee.com/open_euler/dashboard?issue_id=I9E2MI>
kernel
1
#I9E469:CVE-2024-26791<https://gitee.com/open_euler/dashboard?issue_id=I9E469>
kernel
1
#I9E47C:CVE-2024-26804<https://gitee.com/open_euler/dashboard?issue_id=I9E47C>
kernel
1
#I9E6TS:CVE-2024-26810<https://gitee.com/open_euler/dashboard?issue_id=I9E6TS>
kernel
1
#I9E6TE:CVE-2024-26812<https://gitee.com/open_euler/dashboard?issue_id=I9E6TE>
kernel
1
#I9E6TU:CVE-2024-27437<https://gitee.com/open_euler/dashboard?issue_id=I9E6TU>
kernel
1
Bugfix:
issue
仓库
#I97R4T:【20.03-LTS-SP1~SP4】4.19 kernel加载并卸载vkms模块即可导致系统崩溃重启<https://gitee.com/open_euler/dashboard?issue_id=I97R4T>
kernel
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/docker_img/update/
openEuler CVE 及安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高):
里程碑
任务ID
任务标题
优先级
sig组
关联仓库
任务路径
openEuler 20.03LTS SP1 update2103
I3E5C1
【20.03-SP1】【arm/x86】服务启动失败
主要
sig/bigdata
src-openEuler/hadoop
https://gitee.com/open_euler/dashboard?issue_id=I3E5C1
openEuler-20.03-LTS-SP1
I3QGU7
系统不支持GB18030
无优先级
sig/TC
openEuler/community
https://gitee.com/open_euler/dashboard?issue_id=I3QGU7
openEuler 20.03LTS SP1 update210926
I4CMSV
【20.03-LTS-SP1】【arm/x86】搭建Kubernetes 集群缺少包etcd
无优先级
sig/TC
openEuler/community
https://gitee.com/open_euler/dashboard?issue_id=I4CMSV
openEuler-20.03-LTS-SP1-dailybuild
I5Y99T
mate-desktop install problem in openEuler:20:03:LTS:SP1
无优先级
sig/sig-mate-desktop
src-openEuler/mate-desktop
https://gitee.com/open_euler/dashboard?issue_id=I5Y99T
openEuler-22.03-LTS Update 20240417
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题4个,已知漏洞44个。目前版本分支剩余待修复缺陷6个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9GLS7?from=project-i…
CVE修复:
CVE
仓库
score
I9E2PR:CVE-2023-45288<https://gitee.com/src-openeuler/golang/issues/I9E2PR>
golang
7.5
I95ASM:CVE-2023-52510<https://gitee.com/src-openeuler/kernel/issues/I95ASM>
kernel
6.7
I94PA7:CVE-2023-52475<https://gitee.com/src-openeuler/kernel/issues/I94PA7>
kernel
6.3
I9AYAQ:CVE-2023-48795<https://gitee.com/src-openeuler/libssh2/issues/I9AYAQ>
libssh2
5.9
I9A82U:CVE-2024-29018<https://gitee.com/src-openeuler/docker/issues/I9A82U>
docker
5.9
I9F9VB:CVE-2024-2511<https://gitee.com/src-openeuler/edk2/issues/I9F9VB>
edk2
5.9
I95B1K:CVE-2023-52507<https://gitee.com/src-openeuler/kernel/issues/I95B1K>
kernel
5.7
I95AT0:CVE-2023-52504<https://gitee.com/src-openeuler/kernel/issues/I95AT0>
kernel
5.5
I95AT5:CVE-2023-52566<https://gitee.com/src-openeuler/kernel/issues/I95AT5>
kernel
5.5
I95ATK:CVE-2023-52573<https://gitee.com/src-openeuler/kernel/issues/I95ATK>
kernel
5.5
I95ATV:CVE-2023-52578<https://gitee.com/src-openeuler/kernel/issues/I95ATV>
kernel
5.5
I95AWK:CVE-2023-52522<https://gitee.com/src-openeuler/kernel/issues/I95AWK>
kernel
5.5
I95B1O:CVE-2023-52515<https://gitee.com/src-openeuler/kernel/issues/I95B1O>
kernel
5.5
I96G7Q:CVE-2023-52598<https://gitee.com/src-openeuler/kernel/issues/I96G7Q>
kernel
5.5
I96G92:CVE-2023-52583<https://gitee.com/src-openeuler/kernel/issues/I96G92>
kernel
5.5
I93EBW:CVE-2023-52464<https://gitee.com/src-openeuler/kernel/issues/I93EBW>
kernel
5.5
I956G4:CVE-2021-47070<https://gitee.com/src-openeuler/kernel/issues/I956G4>
kernel
5.5
I95ASP:CVE-2023-52530<https://gitee.com/src-openeuler/kernel/issues/I95ASP>
kernel
5.5
I95ATF:CVE-2023-52561<https://gitee.com/src-openeuler/kernel/issues/I95ATF>
kernel
5.5
I95ATG:CVE-2023-52560<https://gitee.com/src-openeuler/kernel/issues/I95ATG>
kernel
5.5
I95ATZ:CVE-2023-52574<https://gitee.com/src-openeuler/kernel/issues/I95ATZ>
kernel
5.5
I95AXL:CVE-2023-52516<https://gitee.com/src-openeuler/kernel/issues/I95AXL>
kernel
5.5
I96G8W:CVE-2023-52587<https://gitee.com/src-openeuler/kernel/issues/I96G8W>
kernel
4.7
I96GPO:CVE-2023-52597<https://gitee.com/src-openeuler/kernel/issues/I96GPO>
kernel
4.7
I96G7W:CVE-2023-52594<https://gitee.com/src-openeuler/kernel/issues/I96G7W>
kernel
4.4
I9BV4P:CVE-2023-52622<https://gitee.com/src-openeuler/kernel/issues/I9BV4P>
kernel
4.4
I96GO9:CVE-2023-52595<https://gitee.com/src-openeuler/kernel/issues/I96GO9>
kernel
4.4
I95AUA:CVE-2023-52572<https://gitee.com/src-openeuler/kernel/issues/I95AUA>
kernel
4
I95RDW:CVE-2021-47101<https://gitee.com/src-openeuler/kernel/issues/I95RDW>
kernel
4
I95B2S:CVE-2023-52500<https://gitee.com/src-openeuler/kernel/issues/I95B2S>
kernel
3.3
I9C0U4:CVE-2023-46049<https://gitee.com/src-openeuler/llvm/issues/I9C0U4>
llvm
2
I9DO1Z:CVE-2024-26656<https://gitee.com/src-openeuler/kernel/issues/I9DO1Z>
kernel
1
I9E2FM:CVE-2024-26695<https://gitee.com/src-openeuler/kernel/issues/I9E2FM>
kernel
1
I9E2GU:CVE-2024-26698<https://gitee.com/src-openeuler/kernel/issues/I9E2GU>
kernel
1
I9E2M2:CVE-2024-26759<https://gitee.com/src-openeuler/kernel/issues/I9E2M2>
kernel
1
I9E2MF:CVE-2024-26772<https://gitee.com/src-openeuler/kernel/issues/I9E2MF>
kernel
1
I9E2MG:CVE-2024-26777<https://gitee.com/src-openeuler/kernel/issues/I9E2MG>
kernel
1
I9E2MP:CVE-2024-26771<https://gitee.com/src-openeuler/kernel/issues/I9E2MP>
kernel
1
I9E2O0:CVE-2024-26751<https://gitee.com/src-openeuler/kernel/issues/I9E2O0>
kernel
1
I9E2O5:CVE-2023-52640<https://gitee.com/src-openeuler/kernel/issues/I9E2O5>
kernel
1
I9E2Y8:CVE-2024-26778<https://gitee.com/src-openeuler/kernel/issues/I9E2Y8>
kernel
1
I9E3E9:CVE-2024-26736<https://gitee.com/src-openeuler/kernel/issues/I9E3E9>
kernel
1
I9E6TS:CVE-2024-26810<https://gitee.com/src-openeuler/kernel/issues/I9E6TS>
kernel
1
I9E6TU:CVE-2024-27437<https://gitee.com/src-openeuler/kernel/issues/I9E6TU>
kernel
1
Bugfix:
issue
仓库
#I9HBFR:修复wahtchdog、kdump失败问题,以及增加openssl 用例。:修复wahtchdog、kdump失败问题,以及增加openssl 用例。
oec-hardware
#I987V5:Backport 5.10.198 LTS patches from upstream:Backport 5.10.198 LTS patches from upstream
kernel
#I9AWJ5:Backport 5.10.199 LTS patches from upstream:Backport 5.10.199 LTS patches from upstream
kernel
#I9F351:修复CVE-2024-26598修复补丁修改错误:修复CVE-2024-26598修复补丁修改错误
kernel
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/docker_img/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/ob…
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-22.03-LTS Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高):
里程碑
任务ID
任务标题
优先级
sig组
关联仓库
任务路径
openEuler-22.03-LTS update20230726
I7ORCE
【22.03 LTS update20230726】【arm\x86】selinux-policy-base的版本不符合ceph子包的安装条件,ceph子包安装失败; cephadm卸载有异常打印
主要
sig/sig-SDS
src-openEuler/ceph
https://gitee.com/open_euler/dashboard?issue_id=I7ORCE
openEuler-22.03-LTS
I6VFRX
[22.03-LTS][x86/arm]mariadb授权给远程用户,远程连接服务失败
次要
sig/DB
src-openEuler/mariadb
https://gitee.com/open_euler/dashboard?issue_id=I6VFRX
openEuler-22.03-LTS
I72N5G
【22.03-lts】x86环境上同时安装php-fpm软件包和php-opcache软件包后会导致php-fpm.service服务启动失败
次要
sig/Base-service
src-openEuler/php
https://gitee.com/open_euler/dashboard?issue_id=I72N5G
openEuler-22.03-LTS-Dailybuild
I5RTUS
X86架构下无法对mysql8进行autobolt模式反馈编译,报错
无优先级
sig/Compiler,kind/feature
src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I5RTUS
openEuler-22.03-LTS-Dailybuild
I5XP8E
Bug in openEuler/gcc (10.3.0) ,22.03-LTS-performance 分支
无优先级
sig/Compiler
src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I5XP8E
openEuler-22.03-LTS-Dailybuild
I65UF9
aarch64架构boost icl模板库优化错误
无优先级
sig/Compiler
src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I65UF9
openEuler-22.03-LTS-SP1 Update 20240417
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS-SP1修复版本已知问题4个,已知漏洞49个。目前版本分支剩余待修复缺陷5个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9GLT4?from=project-i…
CVE修复:
CVE
仓库
score
I9E2PR:CVE-2023-45288<https://gitee.com/src-openeuler/golang/issues/I9E2PR>
golang
7.5
I95ASM:CVE-2023-52510<https://gitee.com/src-openeuler/kernel/issues/I95ASM>
kernel
6.7
I94PA7:CVE-2023-52475<https://gitee.com/src-openeuler/kernel/issues/I94PA7>
kernel
6.3
I9A82U:CVE-2024-29018<https://gitee.com/src-openeuler/docker/issues/I9A82U>
docker
5.9
I9AYAQ:CVE-2023-48795<https://gitee.com/src-openeuler/libssh2/issues/I9AYAQ>
libssh2
5.9
I9F9VB:CVE-2024-2511<https://gitee.com/src-openeuler/edk2/issues/I9F9VB>
edk2
5.9
I95B1K:CVE-2023-52507<https://gitee.com/src-openeuler/kernel/issues/I95B1K>
kernel
5.7
I949AL:CVE-2024-21742<https://gitee.com/src-openeuler/apache-mime4j/issues/I949AL>
apache-mime4j
5.6
I95AT0:CVE-2023-52504<https://gitee.com/src-openeuler/kernel/issues/I95AT0>
kernel
5.5
I95AT5:CVE-2023-52566<https://gitee.com/src-openeuler/kernel/issues/I95AT5>
kernel
5.5
I95ATK:CVE-2023-52573<https://gitee.com/src-openeuler/kernel/issues/I95ATK>
kernel
5.5
I95ATV:CVE-2023-52578<https://gitee.com/src-openeuler/kernel/issues/I95ATV>
kernel
5.5
I95AWK:CVE-2023-52522<https://gitee.com/src-openeuler/kernel/issues/I95AWK>
kernel
5.5
I95B1O:CVE-2023-52515<https://gitee.com/src-openeuler/kernel/issues/I95B1O>
kernel
5.5
I96G7Q:CVE-2023-52598<https://gitee.com/src-openeuler/kernel/issues/I96G7Q>
kernel
5.5
I96G92:CVE-2023-52583<https://gitee.com/src-openeuler/kernel/issues/I96G92>
kernel
5.5
I93EBW:CVE-2023-52464<https://gitee.com/src-openeuler/kernel/issues/I93EBW>
kernel
5.5
I956G4:CVE-2021-47070<https://gitee.com/src-openeuler/kernel/issues/I956G4>
kernel
5.5
I95ASP:CVE-2023-52530<https://gitee.com/src-openeuler/kernel/issues/I95ASP>
kernel
5.5
I95ATF:CVE-2023-52561<https://gitee.com/src-openeuler/kernel/issues/I95ATF>
kernel
5.5
I95ATG:CVE-2023-52560<https://gitee.com/src-openeuler/kernel/issues/I95ATG>
kernel
5.5
I95ATZ:CVE-2023-52574<https://gitee.com/src-openeuler/kernel/issues/I95ATZ>
kernel
5.5
I95AXL:CVE-2023-52516<https://gitee.com/src-openeuler/kernel/issues/I95AXL>
kernel
5.5
I96G8W:CVE-2023-52587<https://gitee.com/src-openeuler/kernel/issues/I96G8W>
kernel
4.7
I96GPO:CVE-2023-52597<https://gitee.com/src-openeuler/kernel/issues/I96GPO>
kernel
4.7
I96G7W:CVE-2023-52594<https://gitee.com/src-openeuler/kernel/issues/I96G7W>
kernel
4.4
I9BV4P:CVE-2023-52622<https://gitee.com/src-openeuler/kernel/issues/I9BV4P>
kernel
4.4
I96GO9:CVE-2023-52595<https://gitee.com/src-openeuler/kernel/issues/I96GO9>
kernel
4.4
I9AFM6:CVE-2024-28835<https://gitee.com/src-openeuler/gnutls/issues/I9AFM6>
gnutls
4.3
I9C55E:CVE-2024-28180<https://gitee.com/src-openeuler/cri-o/issues/I9C55E>
cri-o
4.3
I95ATJ:CVE-2023-52568<https://gitee.com/src-openeuler/kernel/issues/I95ATJ>
kernel
4.1
I95AUA:CVE-2023-52572<https://gitee.com/src-openeuler/kernel/issues/I95AUA>
kernel
4
I95RDW:CVE-2021-47101<https://gitee.com/src-openeuler/kernel/issues/I95RDW>
kernel
4
I95B2S:CVE-2023-52500<https://gitee.com/src-openeuler/kernel/issues/I95B2S>
kernel
3.3
I9A7Y2:CVE-2023-50967<https://gitee.com/src-openeuler/jose/issues/I9A7Y2>
jose
2.5
I9C0U4:CVE-2023-46049<https://gitee.com/src-openeuler/llvm/issues/I9C0U4>
llvm
2
I9DO1Z:CVE-2024-26656<https://gitee.com/src-openeuler/kernel/issues/I9DO1Z>
kernel
1
I9E2FM:CVE-2024-26695<https://gitee.com/src-openeuler/kernel/issues/I9E2FM>
kernel
1
I9E2GU:CVE-2024-26698<https://gitee.com/src-openeuler/kernel/issues/I9E2GU>
kernel
1
I9E2M2:CVE-2024-26759<https://gitee.com/src-openeuler/kernel/issues/I9E2M2>
kernel
1
I9E2MF:CVE-2024-26772<https://gitee.com/src-openeuler/kernel/issues/I9E2MF>
kernel
1
I9E2MG:CVE-2024-26777<https://gitee.com/src-openeuler/kernel/issues/I9E2MG>
kernel
1
I9E2MP:CVE-2024-26771<https://gitee.com/src-openeuler/kernel/issues/I9E2MP>
kernel
1
I9E2O0:CVE-2024-26751<https://gitee.com/src-openeuler/kernel/issues/I9E2O0>
kernel
1
I9E2O5:CVE-2023-52640<https://gitee.com/src-openeuler/kernel/issues/I9E2O5>
kernel
1
I9E2Y8:CVE-2024-26778<https://gitee.com/src-openeuler/kernel/issues/I9E2Y8>
kernel
1
I9E3E9:CVE-2024-26736<https://gitee.com/src-openeuler/kernel/issues/I9E3E9>
kernel
1
I9E6TS:CVE-2024-26810<https://gitee.com/src-openeuler/kernel/issues/I9E6TS>
kernel
1
I9E6TU:CVE-2024-27437<https://gitee.com/src-openeuler/kernel/issues/I9E6TU>
kernel
1
Bugfix:
issue
仓库
#I9HBFR:修复wahtchdog、kdump失败问题,以及增加openssl 用例。:修复wahtchdog、kdump失败问题,以及增加openssl 用例。
oec-hardware
#I987V5:Backport 5.10.198 LTS patches from upstream:Backport 5.10.198 LTS patches from upstream
kernel
#I9AWJ5:Backport 5.10.199 LTS patches from upstream:Backport 5.10.199 LTS patches from upstream
kernel
#I9F351:修复CVE-2024-26598修复补丁修改错误:修复CVE-2024-26598修复补丁修改错误
kernel
openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/docker_img/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/hotpatch_update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_versio…
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_versio…
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_versio…
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-22.03-LTS-SP1 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高):
里程碑
任务ID
任务标题
优先级
sig组
关联仓库
任务路径
openEuler 22.03-SP1
I6B4V1
【22.03 SP1 update 20230118】【arm】libhdfs在arm架构降级失败,x86正常
主要
sig/bigdata
src-openEuler/hadoop
https://gitee.com/open_euler/dashboard?issue_id=I6B4V1
openEuler-22.03-LTS-SP1 update20230726
I7OR2I
【22.03 LTS SP1 update20230726】【arm\x86】selinux-policy-base的版本不符合ceph子包的安装条件,ceph子包安装失败
主要
sig/sig-SDS
src-openEuler/ceph
https://gitee.com/open_euler/dashboard?issue_id=I7OR2I
openEuler-22.03-LTS-SP1
I6VFV6
[22.03 SP1] [x86/arm] mariadb授权给远程用户,远程连接服务失败
次要
sig/DB
src-openEuler/mariadb
https://gitee.com/open_euler/dashboard?issue_id=I6VFV6
openEuler-22.03-LTS-SP1
I73CKF
【22.03-lts-sp1】x86环境上同时安装php-fpm软件包和php-opcache软件包后会导致php-fpm.service服务启动失败
次要
sig/Base-service
src-openEuler/php
https://gitee.com/open_euler/dashboard?issue_id=I73CKF
openEuler-22.03-LTS-SP1
I84L9F
openEuler 22.03 LTS-SP1版本上编译node-v18.18.0的代码失败
无优先级
sig/Compiler
src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I84L9F
openEuler-22.03-LTS-SP2 Update 20240417
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS-SP2修复版本已知问题6个,已知漏洞50个,热补丁1个,目前版本分支剩余待修复缺陷4个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS-SP2 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9GLQ3?from=project-i…
CVE修复:
CVE
仓库
score
I9C6X1:CVE-2024-3019<https://gitee.com/src-openeuler/pcp/issues/I9C6X1>
pcp
8.8
I9AVYL:CVE-2022-48279<https://gitee.com/src-openeuler/mod_security/issues/I9AVYL>
mod_security
7.5
I9E2PR:CVE-2023-45288<https://gitee.com/src-openeuler/golang/issues/I9E2PR>
golang
7.5
I95ASM:CVE-2023-52510<https://gitee.com/src-openeuler/kernel/issues/I95ASM>
kernel
6.7
I94PA7:CVE-2023-52475<https://gitee.com/src-openeuler/kernel/issues/I94PA7>
kernel
6.3
I9AYAQ:CVE-2023-48795<https://gitee.com/src-openeuler/libssh2/issues/I9AYAQ>
libssh2
5.9
I9A82U:CVE-2024-29018<https://gitee.com/src-openeuler/docker/issues/I9A82U>
docker
5.9
I9F9VB:CVE-2024-2511<https://gitee.com/src-openeuler/edk2/issues/I9F9VB>
edk2
5.9
I95B1K:CVE-2023-52507<https://gitee.com/src-openeuler/kernel/issues/I95B1K>
kernel
5.7
I93HD9:CVE-2024-26601<https://gitee.com/src-openeuler/kernel/issues/I93HD9>
kernel
5.5
I95AT0:CVE-2023-52504<https://gitee.com/src-openeuler/kernel/issues/I95AT0>
kernel
5.5
I95AT5:CVE-2023-52566<https://gitee.com/src-openeuler/kernel/issues/I95AT5>
kernel
5.5
I95ATK:CVE-2023-52573<https://gitee.com/src-openeuler/kernel/issues/I95ATK>
kernel
5.5
I95ATV:CVE-2023-52578<https://gitee.com/src-openeuler/kernel/issues/I95ATV>
kernel
5.5
I95AWK:CVE-2023-52522<https://gitee.com/src-openeuler/kernel/issues/I95AWK>
kernel
5.5
I95B1O:CVE-2023-52515<https://gitee.com/src-openeuler/kernel/issues/I95B1O>
kernel
5.5
I96G7Q:CVE-2023-52598<https://gitee.com/src-openeuler/kernel/issues/I96G7Q>
kernel
5.5
I96G92:CVE-2023-52583<https://gitee.com/src-openeuler/kernel/issues/I96G92>
kernel
5.5
I93EBW:CVE-2023-52464<https://gitee.com/src-openeuler/kernel/issues/I93EBW>
kernel
5.5
I956G4:CVE-2021-47070<https://gitee.com/src-openeuler/kernel/issues/I956G4>
kernel
5.5
I95ASP:CVE-2023-52530<https://gitee.com/src-openeuler/kernel/issues/I95ASP>
kernel
5.5
I95AT9:CVE-2023-52575<https://gitee.com/src-openeuler/kernel/issues/I95AT9>
kernel
5.5
I95ATF:CVE-2023-52561<https://gitee.com/src-openeuler/kernel/issues/I95ATF>
kernel
5.5
I95ATG:CVE-2023-52560<https://gitee.com/src-openeuler/kernel/issues/I95ATG>
kernel
5.5
I95ATZ:CVE-2023-52574<https://gitee.com/src-openeuler/kernel/issues/I95ATZ>
kernel
5.5
I95AXL:CVE-2023-52516<https://gitee.com/src-openeuler/kernel/issues/I95AXL>
kernel
5.5
I96G8W:CVE-2023-52587<https://gitee.com/src-openeuler/kernel/issues/I96G8W>
kernel
4.7
I96GPO:CVE-2023-52597<https://gitee.com/src-openeuler/kernel/issues/I96GPO>
kernel
4.7
I96G7W:CVE-2023-52594<https://gitee.com/src-openeuler/kernel/issues/I96G7W>
kernel
4.4
I9BV4P:CVE-2023-52622<https://gitee.com/src-openeuler/kernel/issues/I9BV4P>
kernel
4.4
I96GO9:CVE-2023-52595<https://gitee.com/src-openeuler/kernel/issues/I96GO9>
kernel
4.4
I95ATJ:CVE-2023-52568<https://gitee.com/src-openeuler/kernel/issues/I95ATJ>
kernel
4.1
I95AUA:CVE-2023-52572<https://gitee.com/src-openeuler/kernel/issues/I95AUA>
kernel
4
I95RDW:CVE-2021-47101<https://gitee.com/src-openeuler/kernel/issues/I95RDW>
kernel
4
I95B2S:CVE-2023-52500<https://gitee.com/src-openeuler/kernel/issues/I95B2S>
kernel
3.3
I95ATO:CVE-2023-52567<https://gitee.com/src-openeuler/kernel/issues/I95ATO>
kernel
2.3
I9C0U4:CVE-2023-46049<https://gitee.com/src-openeuler/llvm/issues/I9C0U4>
llvm
2
I9DO1Z:CVE-2024-26656<https://gitee.com/src-openeuler/kernel/issues/I9DO1Z>
kernel
1
I9E2FM:CVE-2024-26695<https://gitee.com/src-openeuler/kernel/issues/I9E2FM>
kernel
1
I9E2GU:CVE-2024-26698<https://gitee.com/src-openeuler/kernel/issues/I9E2GU>
kernel
1
I9E2M2:CVE-2024-26759<https://gitee.com/src-openeuler/kernel/issues/I9E2M2>
kernel
1
I9E2MF:CVE-2024-26772<https://gitee.com/src-openeuler/kernel/issues/I9E2MF>
kernel
1
I9E2MG:CVE-2024-26777<https://gitee.com/src-openeuler/kernel/issues/I9E2MG>
kernel
1
I9E2MP:CVE-2024-26771<https://gitee.com/src-openeuler/kernel/issues/I9E2MP>
kernel
1
I9E2O0:CVE-2024-26751<https://gitee.com/src-openeuler/kernel/issues/I9E2O0>
kernel
1
I9E2O5:CVE-2023-52640<https://gitee.com/src-openeuler/kernel/issues/I9E2O5>
kernel
1
I9E2Y8:CVE-2024-26778<https://gitee.com/src-openeuler/kernel/issues/I9E2Y8>
kernel
1
I9E3E9:CVE-2024-26736<https://gitee.com/src-openeuler/kernel/issues/I9E3E9>
kernel
1
I9E6TS:CVE-2024-26810<https://gitee.com/src-openeuler/kernel/issues/I9E6TS>
kernel
1
I9E6TU:CVE-2024-27437<https://gitee.com/src-openeuler/kernel/issues/I9E6TU>
kernel
1
Bugfix:
issue
仓库
#I9HBFR:修复wahtchdog、kdump失败问题,以及增加openssl 用例。:修复wahtchdog、kdump失败问题,以及增加openssl 用例。
oec-hardware
#I987V5:Backport 5.10.198 LTS patches from upstream:Backport 5.10.198 LTS patches from upstream
kernel
#I9AWJ5:Backport 5.10.199 LTS patches from upstream:Backport 5.10.199 LTS patches from upstream
kernel
#I9BBFQ:【OLK-5.10】【SAS】跑FIO,概率触发watchdog的soft lockup,性能下降:【OLK-5.10】【SAS】跑FIO,概率触发watchdog的soft lockup,性能下降
kernel
#I9EEIG:smmu_v3 ecmdq代码逻辑存在问题:smmu_v3 ecmdq代码逻辑存在问题
kernel
#I9F351:修复CVE-2024-26598修复补丁修改错误:修复CVE-2024-26598修复补丁修改错误
kernel
热补丁:
仓库
CVE
score
kernel
CVE-2024-0841
7.8
openEuler-22.03-LTS SP2版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-22.03-LTS SP2 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/hotpatch_update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/docker_img/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/EPOL/update/multi_versio…
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/EPOL/update/multi_versio…
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
https://repo.openeuler.org/security/data/hotpatch_cvrf/
openEuler-22.03-LTS-SP2 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高):
里程碑
任务ID
任务标题
优先级
sig组
关联仓库
任务路径
openEuler-22.03-LTS-SP2-round-2
I795G3
【22.03-LTS-SP2 round2】本次转测源中出现多个版本的containers-common
主要
sig/sig-CloudNative
src-openEuler/skopeo
https://gitee.com/open_euler/dashboard?issue_id=I795G3
openEuler-22.03-LTS-SP2-SEC
I7AFIR
【22.03-LTS-SP2 round2】【x86/arm】libkae-1.2.10-6.oe2203sp2安全编译选项Rpath/Runpath不满足
主要
sig-AccLib
src-openEuler/libkae
https://gitee.com/open_euler/dashboard?issue_id=I7AFIR
openEuler-22.03-LTS-SP2-update20231018
I89NB0
22.03-LTS-SP2的ceph release版本低于22.03-LTS-SP1 release版本
次要
sig/sig-SDS
src-openEuler/ceph
https://gitee.com/open_euler/dashboard?issue_id=I89NB0
openEuler-22.03-LTS-SP2
I7B6X5
gcc-pie-arm64架构和操作手册结果不同
无优先级
sig/Compiler
src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I7B6X5
openEuler-20.03-LTS-SP4 Update 20240417
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP4修复版本已知问题2个,已知漏洞81个。目前版本分支剩余待修复缺陷7个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP4 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9GKHR?from=project-i…
CVE修复:
CVE
仓库
score
#I91349:CVE-2020-36773<https://gitee.com/open_euler/dashboard?issue_id=I91349>
ghostscript
9.8
#I990AF:CVE-2021-47131<https://gitee.com/open_euler/dashboard?issue_id=I990AF>
kernel
7.8
#I9E2PR:CVE-2023-45288<https://gitee.com/open_euler/dashboard?issue_id=I9E2PR>
golang
7.5
#I95AXP:CVE-2023-52502<https://gitee.com/open_euler/dashboard?issue_id=I95AXP>
kernel
7
#I94VO4:CVE-2021-47061<https://gitee.com/open_euler/dashboard?issue_id=I94VO4>
kernel
6.7
#I94VOL:CVE-2021-47063<https://gitee.com/open_euler/dashboard?issue_id=I94VOL>
kernel
6.7
#I94VOT:CVE-2021-47060<https://gitee.com/open_euler/dashboard?issue_id=I94VOT>
kernel
6.7
#I95ASM:CVE-2023-52510<https://gitee.com/open_euler/dashboard?issue_id=I95ASM>
kernel
6.7
#I94PA7:CVE-2023-52475<https://gitee.com/open_euler/dashboard?issue_id=I94PA7>
kernel
6.3
#I9AH6G:CVE-2024-2494<https://gitee.com/open_euler/dashboard?issue_id=I9AH6G>
libvirt
6.2
#I96DIN:CVE-2021-46984<https://gitee.com/open_euler/dashboard?issue_id=I96DIN>
kernel
6
#I9AYAQ:CVE-2023-48795<https://gitee.com/open_euler/dashboard?issue_id=I9AYAQ>
libssh2
5.9
#I9A82U:CVE-2024-29018<https://gitee.com/open_euler/dashboard?issue_id=I9A82U>
docker
5.9
#I9F9VB:CVE-2024-2511<https://gitee.com/open_euler/dashboard?issue_id=I9F9VB>
edk2
5.9
#I95B1K:CVE-2023-52507<https://gitee.com/open_euler/dashboard?issue_id=I95B1K>
kernel
5.7
#I97N53:CVE-2024-1441<https://gitee.com/open_euler/dashboard?issue_id=I97N53>
libvirt
5.5
#I94VOZ:CVE-2021-47056<https://gitee.com/open_euler/dashboard?issue_id=I94VOZ>
kernel
5.5
#I956G7:CVE-2021-47074<https://gitee.com/open_euler/dashboard?issue_id=I956G7>
kernel
5.5
#I956GH:CVE-2021-47071<https://gitee.com/open_euler/dashboard?issue_id=I956GH>
kernel
5.5
#I956GS:CVE-2021-47077<https://gitee.com/open_euler/dashboard?issue_id=I956GS>
kernel
5.5
#I95AT0:CVE-2023-52504<https://gitee.com/open_euler/dashboard?issue_id=I95AT0>
kernel
5.5
#I95AT5:CVE-2023-52566<https://gitee.com/open_euler/dashboard?issue_id=I95AT5>
kernel
5.5
#I95ATV:CVE-2023-52578<https://gitee.com/open_euler/dashboard?issue_id=I95ATV>
kernel
5.5
#I95AWK:CVE-2023-52522<https://gitee.com/open_euler/dashboard?issue_id=I95AWK>
kernel
5.5
#I95B1O:CVE-2023-52515<https://gitee.com/open_euler/dashboard?issue_id=I95B1O>
kernel
5.5
#I96G7Q:CVE-2023-52598<https://gitee.com/open_euler/dashboard?issue_id=I96G7Q>
kernel
5.5
#I96G92:CVE-2023-52583<https://gitee.com/open_euler/dashboard?issue_id=I96G92>
kernel
5.5
#I9BGUB:CVE-2021-47142<https://gitee.com/open_euler/dashboard?issue_id=I9BGUB>
kernel
5.5
#I9BGMR:CVE-2021-47143<https://gitee.com/open_euler/dashboard?issue_id=I9BGMR>
kernel
5.5
#I9BGQL:CVE-2021-47145<https://gitee.com/open_euler/dashboard?issue_id=I9BGQL>
kernel
5.5
#I9BGUR:CVE-2021-47144<https://gitee.com/open_euler/dashboard?issue_id=I9BGUR>
kernel
5.5
#I9BGV4:CVE-2021-47146<https://gitee.com/open_euler/dashboard?issue_id=I9BGV4>
kernel
5.5
#I9BGWP:CVE-2021-47153<https://gitee.com/open_euler/dashboard?issue_id=I9BGWP>
kernel
5.5
#I9BHF9:CVE-2021-47162<https://gitee.com/open_euler/dashboard?issue_id=I9BHF9>
kernel
5.5
#I9BHG2:CVE-2021-47160<https://gitee.com/open_euler/dashboard?issue_id=I9BHG2>
kernel
5.5
#I9BHQL:CVE-2021-47170<https://gitee.com/open_euler/dashboard?issue_id=I9BHQL>
kernel
5.5
#I9BHRY:CVE-2021-47163<https://gitee.com/open_euler/dashboard?issue_id=I9BHRY>
kernel
5.5
#I9BHSG:CVE-2021-47159<https://gitee.com/open_euler/dashboard?issue_id=I9BHSG>
kernel
5.5
#I9BHN7:CVE-2021-47161<https://gitee.com/open_euler/dashboard?issue_id=I9BHN7>
kernel
5.5
#I9BHTI:CVE-2021-47167<https://gitee.com/open_euler/dashboard?issue_id=I9BHTI>
kernel
5.5
#I9BHNM:CVE-2021-47171<https://gitee.com/open_euler/dashboard?issue_id=I9BHNM>
kernel
5.5
#I9BHNX:CVE-2021-47173<https://gitee.com/open_euler/dashboard?issue_id=I9BHNX>
kernel
5.5
#I9BHQ7:CVE-2021-47180<https://gitee.com/open_euler/dashboard?issue_id=I9BHQ7>
kernel
5.5
#I956GP:CVE-2021-47078<https://gitee.com/open_euler/dashboard?issue_id=I956GP>
kernel
5.3
#I94JR1:CVE-2020-36783<https://gitee.com/open_euler/dashboard?issue_id=I94JR1>
kernel
4.7
#I96G7W:CVE-2023-52594<https://gitee.com/open_euler/dashboard?issue_id=I96G7W>
kernel
4.4
#I9BV4P:CVE-2023-52622<https://gitee.com/open_euler/dashboard?issue_id=I9BV4P>
kernel
4.4
#I95B2S:CVE-2023-52500<https://gitee.com/open_euler/dashboard?issue_id=I95B2S>
kernel
3.3
#I94VOR:CVE-2021-47054<https://gitee.com/open_euler/dashboard?issue_id=I94VOR>
kernel
2.3
#I9C0U4:CVE-2023-46049<https://gitee.com/open_euler/dashboard?issue_id=I9C0U4>
llvm
2
#I9FNG2:CVE-2021-47194<https://gitee.com/open_euler/dashboard?issue_id=I9FNG2>
kernel
1
#I9FNG0:CVE-2021-47201<https://gitee.com/open_euler/dashboard?issue_id=I9FNG0>
kernel
1
#I9DNGK:CVE-2023-52635<https://gitee.com/open_euler/dashboard?issue_id=I9DNGK>
kernel
1
#I9E2H0:CVE-2023-52637<https://gitee.com/open_euler/dashboard?issue_id=I9E2H0>
kernel
1
#I9E2GQ:CVE-2023-52639<https://gitee.com/open_euler/dashboard?issue_id=I9E2GQ>
kernel
1
#I9E2FP:CVE-2024-26685<https://gitee.com/open_euler/dashboard?issue_id=I9E2FP>
kernel
1
#I9E2EL:CVE-2024-26686<https://gitee.com/open_euler/dashboard?issue_id=I9E2EL>
kernel
1
#I9E2GS:CVE-2024-26687<https://gitee.com/open_euler/dashboard?issue_id=I9E2GS>
kernel
1
#I9E2EQ:CVE-2024-26696<https://gitee.com/open_euler/dashboard?issue_id=I9E2EQ>
kernel
1
#I9E2FH:CVE-2024-26697<https://gitee.com/open_euler/dashboard?issue_id=I9E2FH>
kernel
1
#I9E2F9:CVE-2024-26704<https://gitee.com/open_euler/dashboard?issue_id=I9E2F9>
kernel
1
#I9E2F7:CVE-2024-26726<https://gitee.com/open_euler/dashboard?issue_id=I9E2F7>
kernel
1
#I9E3E4:CVE-2024-26735<https://gitee.com/open_euler/dashboard?issue_id=I9E3E4>
kernel
1
#I9E2LZ:CVE-2024-26739<https://gitee.com/open_euler/dashboard?issue_id=I9E2LZ>
kernel
1
#I9E2LT:CVE-2024-26740<https://gitee.com/open_euler/dashboard?issue_id=I9E2LT>
kernel
1
#I9E2M7:CVE-2024-26743<https://gitee.com/open_euler/dashboard?issue_id=I9E2M7>
kernel
1
#I9E3EE:CVE-2024-26744<https://gitee.com/open_euler/dashboard?issue_id=I9E3EE>
kernel
1
#I9E2MH:CVE-2024-26754<https://gitee.com/open_euler/dashboard?issue_id=I9E2MH>
kernel
1
#I9E2M2:CVE-2024-26759<https://gitee.com/open_euler/dashboard?issue_id=I9E2M2>
kernel
1
#I9E2LW:CVE-2024-26763<https://gitee.com/open_euler/dashboard?issue_id=I9E2LW>
kernel
1
#I9E2MP:CVE-2024-26771<https://gitee.com/open_euler/dashboard?issue_id=I9E2MP>
kernel
1
#I9E2MF:CVE-2024-26772<https://gitee.com/open_euler/dashboard?issue_id=I9E2MF>
kernel
1
#I9E2M9:CVE-2024-26773<https://gitee.com/open_euler/dashboard?issue_id=I9E2M9>
kernel
1
#I9E2MG:CVE-2024-26777<https://gitee.com/open_euler/dashboard?issue_id=I9E2MG>
kernel
1
#I9E2Y8:CVE-2024-26778<https://gitee.com/open_euler/dashboard?issue_id=I9E2Y8>
kernel
1
#I9E2MI:CVE-2024-26779<https://gitee.com/open_euler/dashboard?issue_id=I9E2MI>
kernel
1
#I9E469:CVE-2024-26791<https://gitee.com/open_euler/dashboard?issue_id=I9E469>
kernel
1
#I9E47C:CVE-2024-26804<https://gitee.com/open_euler/dashboard?issue_id=I9E47C>
kernel
1
#I9E6TS:CVE-2024-26810<https://gitee.com/open_euler/dashboard?issue_id=I9E6TS>
kernel
1
#I9E6TE:CVE-2024-26812<https://gitee.com/open_euler/dashboard?issue_id=I9E6TE>
kernel
1
#I9E6TU:CVE-2024-27437<https://gitee.com/open_euler/dashboard?issue_id=I9E6TU>
kernel
1
Bugfix:
issue
仓库
#I9HBFR:修复wahtchdog、kdump失败问题,以及增加openssl 用例。<https://gitee.com/open_euler/dashboard?issue_id=I9HBFR>
oec-hardware
#I97R4T:【20.03-LTS-SP1~SP4】4.19 kernel加载并卸载vkms模块即可导致系统崩溃重启<https://gitee.com/open_euler/dashboard?issue_id=I97R4T>
kernel
openEuler-20.03-LTS SP4版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-20.03-LTS SP4 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP4/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP4/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
https://repo.openeuler.org/security/data/hotpatch_cvrf/
openEuler-20.03-LTS-SP4 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高):
里程碑
任务ID
任务标题
优先级
标签
关联仓库
任务路径
openEuler-20.03-LTS-SP4-round-1
I8DT5M
【openEuler-20.03-LTS-SP4 rc1】redis-sentinel.service启动失败
主要
sig/bigdata
src-openEuler/redis6
https://gitee.com/open_euler/dashboard?issue_id=I8DT5M
openEuler-20.03-LTS-SP4-round-1
I8EKUI
【openEuler-20.03-LTS-SP4 rc1】strongswan-swanctl.service服务启动失败
主要
sig/sig-security-fac
src-openEuler/strongswan
https://gitee.com/open_euler/dashboard?issue_id=I8EKUI
openEuler-20.03-LTS-SP4-round-2
I8GDGR
【openEuler-20.03-LTS-SP4-RC2】【arm/x86】物理机安装gnome-*启用图形化界面重启之后卡住
主要
sig/GNOME
src-openEuler/gnome-desktop3
https://gitee.com/open_euler/dashboard?issue_id=I8GDGR
openEuler-20.03-LTS-SP4-alpha
I8B7XU
【openEuler-20.03-LTS-SP4 alpha】[arm/x86]vdsmd.service服务启动失败
主要
sig/oVirt
src-openEuler/vdsm
https://gitee.com/open_euler/dashboard?issue_id=I8B7XU
openEuler-20.03-LTS-SP4-round-2
I8G371
【20.03-SP4-rc2】【arm/x86】h2源码包本地自编译失败
次要
sig/DB
src-openEuler/h2
https://gitee.com/open_euler/dashboard?issue_id=I8G371
openEuler-20.03-LTS-SP4-dailybuild
I8GUMP
[EulerMaker] nagios-plugins build problem in openEuler-20.03-LTS-SP4:everything
不重要
sig/Networking
src-openEuler/nagios-plugins
https://gitee.com/open_euler/dashboard?issue_id=I8GUMP
openEuler-20.03-LTS-SP4-dailybuild
I8I8DQ
[EulerMaker] caja-extensions install problem in openEuler-20.03-LTS-SP4:epol
不重要
sig/sig-mate-desktop
src-openEuler/caja-extensions
https://gitee.com/open_euler/dashboard?issue_id=I8I8DQ
openEuler-22.03-LTS-SP3 Update 20240417
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS-SP3修复版本已知问题13个,已知漏洞70个。目前版本分支剩余待修复缺陷1个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9GKHG?from=project-i…
CVE修复:
CVE
仓库
score
#I9E2PR:CVE-2023-45288<https://gitee.com/open_euler/dashboard?issue_id=I9E2PR>
golang
7.5
#I95ASM:CVE-2023-52510<https://gitee.com/open_euler/dashboard?issue_id=I95ASM>
kernel
6.7
#I94PA7:CVE-2023-52475<https://gitee.com/open_euler/dashboard?issue_id=I94PA7>
kernel
6.3
#I9AYAQ:CVE-2023-48795<https://gitee.com/open_euler/dashboard?issue_id=I9AYAQ>
libssh2
5.9
#I9A82U:CVE-2024-29018<https://gitee.com/open_euler/dashboard?issue_id=I9A82U>
docker
5.9
#I95B1K:CVE-2023-52507<https://gitee.com/open_euler/dashboard?issue_id=I95B1K>
kernel
5.7
#I93HD9:CVE-2024-26601<https://gitee.com/open_euler/dashboard?issue_id=I93HD9>
kernel
5.5
#I947TK:CVE-2021-46926<https://gitee.com/open_euler/dashboard?issue_id=I947TK>
kernel
5.5
#I95AT5:CVE-2023-52566<https://gitee.com/open_euler/dashboard?issue_id=I95AT5>
kernel
5.5
#I95ATK:CVE-2023-52573<https://gitee.com/open_euler/dashboard?issue_id=I95ATK>
kernel
5.5
#I95ATV:CVE-2023-52578<https://gitee.com/open_euler/dashboard?issue_id=I95ATV>
kernel
5.5
#I95AWK:CVE-2023-52522<https://gitee.com/open_euler/dashboard?issue_id=I95AWK>
kernel
5.5
#I95B1O:CVE-2023-52515<https://gitee.com/open_euler/dashboard?issue_id=I95B1O>
kernel
5.5
#I96G7Q:CVE-2023-52598<https://gitee.com/open_euler/dashboard?issue_id=I96G7Q>
kernel
5.5
#I96G92:CVE-2023-52583<https://gitee.com/open_euler/dashboard?issue_id=I96G92>
kernel
5.5
#I93EBW:CVE-2023-52464<https://gitee.com/open_euler/dashboard?issue_id=I93EBW>
kernel
5.5
#I956G4:CVE-2021-47070<https://gitee.com/open_euler/dashboard?issue_id=I956G4>
kernel
5.5
#I95ATF:CVE-2023-52561<https://gitee.com/open_euler/dashboard?issue_id=I95ATF>
kernel
5.5
#I95ATG:CVE-2023-52560<https://gitee.com/open_euler/dashboard?issue_id=I95ATG>
kernel
5.5
#I96G8W:CVE-2023-52587<https://gitee.com/open_euler/dashboard?issue_id=I96G8W>
kernel
4.7
#I96G7W:CVE-2023-52594<https://gitee.com/open_euler/dashboard?issue_id=I96G7W>
kernel
4.4
#I9BV4P:CVE-2023-52622<https://gitee.com/open_euler/dashboard?issue_id=I9BV4P>
kernel
4.4
#I96GO9:CVE-2023-52595<https://gitee.com/open_euler/dashboard?issue_id=I96GO9>
kernel
4.4
#I95ATJ:CVE-2023-52568<https://gitee.com/open_euler/dashboard?issue_id=I95ATJ>
kernel
4.1
#I95AT6:CVE-2023-52577<https://gitee.com/open_euler/dashboard?issue_id=I95AT6>
kernel
4
#I95AXH:CVE-2023-52525<https://gitee.com/open_euler/dashboard?issue_id=I95AXH>
kernel
4
#I95AUA:CVE-2023-52572<https://gitee.com/open_euler/dashboard?issue_id=I95AUA>
kernel
4
#I95B2S:CVE-2023-52500<https://gitee.com/open_euler/dashboard?issue_id=I95B2S>
kernel
3.3
#I9C0U4:CVE-2023-46049<https://gitee.com/open_euler/dashboard?issue_id=I9C0U4>
llvm
2
#I9DNKF:CVE-2024-26669<https://gitee.com/open_euler/dashboard?issue_id=I9DNKF>
kernel
1
#I9DNVF:CVE-2024-26665<https://gitee.com/open_euler/dashboard?issue_id=I9DNVF>
kernel
1
#I9DNXE:CVE-2023-52631<https://gitee.com/open_euler/dashboard?issue_id=I9DNXE>
kernel
1
#I9DNZK:CVE-2024-26684<https://gitee.com/open_euler/dashboard?issue_id=I9DNZK>
kernel
1
#I9DO1Z:CVE-2024-26656<https://gitee.com/open_euler/dashboard?issue_id=I9DO1Z>
kernel
1
#I9E2EC:CVE-2024-26720<https://gitee.com/open_euler/dashboard?issue_id=I9E2EC>
kernel
1
#I9E2F7:CVE-2024-26726<https://gitee.com/open_euler/dashboard?issue_id=I9E2F7>
kernel
1
#I9E2F9:CVE-2024-26704<https://gitee.com/open_euler/dashboard?issue_id=I9E2F9>
kernel
1
#I9E2FH:CVE-2024-26697<https://gitee.com/open_euler/dashboard?issue_id=I9E2FH>
kernel
1
#I9E2FK:CVE-2024-26707<https://gitee.com/open_euler/dashboard?issue_id=I9E2FK>
kernel
1
#I9E2FM:CVE-2024-26695<https://gitee.com/open_euler/dashboard?issue_id=I9E2FM>
kernel
1
#I9E2FP:CVE-2024-26685<https://gitee.com/open_euler/dashboard?issue_id=I9E2FP>
kernel
1
#I9E2GN:CVE-2024-26689<https://gitee.com/open_euler/dashboard?issue_id=I9E2GN>
kernel
1
#I9E2GP:CVE-2024-26706<https://gitee.com/open_euler/dashboard?issue_id=I9E2GP>
kernel
1
#I9E2GQ:CVE-2023-52639<https://gitee.com/open_euler/dashboard?issue_id=I9E2GQ>
kernel
1
#I9E2GS:CVE-2024-26687<https://gitee.com/open_euler/dashboard?issue_id=I9E2GS>
kernel
1
#I9E2GU:CVE-2024-26698<https://gitee.com/open_euler/dashboard?issue_id=I9E2GU>
kernel
1
#I9E2LT:CVE-2024-26740<https://gitee.com/open_euler/dashboard?issue_id=I9E2LT>
kernel
1
#I9E2LW:CVE-2024-26763<https://gitee.com/open_euler/dashboard?issue_id=I9E2LW>
kernel
1
#I9E2M2:CVE-2024-26759<https://gitee.com/open_euler/dashboard?issue_id=I9E2M2>
kernel
1
#I9E2M7:CVE-2024-26743<https://gitee.com/open_euler/dashboard?issue_id=I9E2M7>
kernel
1
#I9E2M9:CVE-2024-26773<https://gitee.com/open_euler/dashboard?issue_id=I9E2M9>
kernel
1
#I9E2MF:CVE-2024-26772<https://gitee.com/open_euler/dashboard?issue_id=I9E2MF>
kernel
1
#I9E2MH:CVE-2024-26754<https://gitee.com/open_euler/dashboard?issue_id=I9E2MH>
kernel
1
#I9E2MI:CVE-2024-26779<https://gitee.com/open_euler/dashboard?issue_id=I9E2MI>
kernel
1
#I9E2MP:CVE-2024-26771<https://gitee.com/open_euler/dashboard?issue_id=I9E2MP>
kernel
1
#I9E2O0:CVE-2024-26751<https://gitee.com/open_euler/dashboard?issue_id=I9E2O0>
kernel
1
#I9E2O5:CVE-2023-52640<https://gitee.com/open_euler/dashboard?issue_id=I9E2O5>
kernel
1
#I9E2Y3:CVE-2024-26766<https://gitee.com/open_euler/dashboard?issue_id=I9E2Y3>
kernel
1
#I9E2Y8:CVE-2024-26778<https://gitee.com/open_euler/dashboard?issue_id=I9E2Y8>
kernel
1
#I9E3E4:CVE-2024-26735<https://gitee.com/open_euler/dashboard?issue_id=I9E3E4>
kernel
1
#I9E3E9:CVE-2024-26736<https://gitee.com/open_euler/dashboard?issue_id=I9E3E9>
kernel
1
#I9E3EE:CVE-2024-26744<https://gitee.com/open_euler/dashboard?issue_id=I9E3EE>
kernel
1
#I9E442:CVE-2024-26782<https://gitee.com/open_euler/dashboard?issue_id=I9E442>
kernel
1
#I9E461:CVE-2024-26787<https://gitee.com/open_euler/dashboard?issue_id=I9E461>
kernel
1
#I9E466:CVE-2024-26795<https://gitee.com/open_euler/dashboard?issue_id=I9E466>
kernel
1
#I9E469:CVE-2024-26791<https://gitee.com/open_euler/dashboard?issue_id=I9E469>
kernel
1
#I9E4AC:CVE-2024-26809<https://gitee.com/open_euler/dashboard?issue_id=I9E4AC>
kernel
1
#I9E6TE:CVE-2024-26812<https://gitee.com/open_euler/dashboard?issue_id=I9E6TE>
kernel
1
#I9E6TS:CVE-2024-26810<https://gitee.com/open_euler/dashboard?issue_id=I9E6TS>
kernel
1
#I9E6TU:CVE-2024-27437<https://gitee.com/open_euler/dashboard?issue_id=I9E6TU>
kernel
1
Bugfix:
issue
仓库
#I9GMBA:回合社区bugfix补丁<https://gitee.com/open_euler/dashboard?issue_id=I9GMBA>
libpsl
#I9H5S1:回合社区bugfix补丁<https://gitee.com/open_euler/dashboard?issue_id=I9H5S1>
abseil-cpp
#I9HBFR:修复wahtchdog、kdump失败问题,以及增加openssl 用例。<https://gitee.com/open_euler/dashboard?issue_id=I9HBFR>
oec-hardware
#I9HDFB:libdnf Modify loongarch64 patch use all arch<https://gitee.com/open_euler/dashboard?issue_id=I9HDFB>
libdnf
#I8SCSA: 例行分析dnf补丁,需要回合补丁<https://gitee.com/open_euler/dashboard?issue_id=I8SCSA>
dnf
#I8V1IQ:【OpenEuler22.03-LTS-SP3】HNS3 UDMA特性问题修复,代码优化<https://gitee.com/open_euler/dashboard?issue_id=I8V1IQ>
kernel
#I93S0P:【OpenEuler22.03-LTS-SP3】HNS3 UDMA特性性能优化<https://gitee.com/open_euler/dashboard?issue_id=I93S0P>
kernel
#I96RWV:support the AMD Zen5 Turin<https://gitee.com/open_euler/dashboard?issue_id=I96RWV>
kernel
#I9CK2X:【OLK-5.10】Add Chengdu BeiZhongWangXin Technology N5/N6 Series Network Card Driver<https://gitee.com/open_euler/dashboard?issue_id=I9CK2X>
kernel
#I9DZOS:Backport 5.10.202 LTS patches from upstream<https://gitee.com/open_euler/dashboard?issue_id=I9DZOS>
kernel
#I9F351:修复CVE-2024-26598修复补丁修改错误<https://gitee.com/open_euler/dashboard?issue_id=I9F351>
kernel
#I9FGRE:arm64架构支持ebpf trampoline特性<https://gitee.com/open_euler/dashboard?issue_id=I9FGRE>
kernel
#I9GXII:Backport 5.10.203 LTS patches from upstream<https://gitee.com/open_euler/dashboard?issue_id=I9GXII>
kernel
openEuler-22.03-LTS-SP3版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-22.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP3/EPOL/update/main/
openEuler CVE及安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-22.03-LTS-SP3 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高):
里程碑
任务ID
任务标题
优先级
标签
关联仓库
任务路径
openEuler-22.03-LTS-SP3
I96ID7
[22.03-LTS-SP3]-O3 -flto -flto-partition=one -fipa-prefetch选项编译hmmer报Segmentation fault:during GIMPLE pass: vrp
主要
sig/Compiler
src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I96ID7
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE(4.19日数据):
漏洞编号
Issue ID
剩余天数
CVSS评分
软件包
责任SIG
issue码云链接
CVE-2023-41419
I84A04
5.55
9.8
python-gevent
Programming-language
https://gitee.com/src-openeuler/python-gevent/issues/I84A04
CVE-2023-4584
I7WZ0C
1.14
8.8
firefox
Application
https://gitee.com/src-openeuler/firefox/issues/I7WZ0C
CVE-2023-51698
I9F7X1
4.31
8.8
evince
GNOME
https://gitee.com/src-openeuler/evince/issues/I9F7X1
CVE-2023-32215
I71R4G
6.64
8.8
firefox
Application
https://gitee.com/src-openeuler/firefox/issues/I71R4G
CVE-2023-32213
I71R3Y
6.64
8.8
firefox
Application
https://gitee.com/src-openeuler/firefox/issues/I71R3Y
CVE-2023-32207
I71R3W
6.64
8.8
firefox
Application
https://gitee.com/src-openeuler/firefox/issues/I71R3W
CVE-2023-29536
I6UVEI
6.64
8.8
firefox
Application
https://gitee.com/src-openeuler/firefox/issues/I6UVEI
CVE-2023-29541
I6UVDN
6.64
8.8
firefox
Application
https://gitee.com/src-openeuler/firefox/issues/I6UVDN
CVE-2023-29539
I6UVDJ
6.64
8.8
firefox
Application
https://gitee.com/src-openeuler/firefox/issues/I6UVDJ
CVE-2023-29550
I6UVCU
6.64
8.8
firefox
Application
https://gitee.com/src-openeuler/firefox/issues/I6UVCU
CVE-2024-3446
I9FBRQ
5.31
8.2
qemu
Virt
https://gitee.com/src-openeuler/qemu/issues/I9FBRQ
CVE-2024-31083
I9E4N6
0.31
7.8
xorg-x11-server-xwayland
Desktop
https://gitee.com/src-openeuler/xorg-x11-server-xwayland/issues/I9E4N6
CVE-2024-26256
I9FBQR
5.31
7.8
libarchive
Base-service
https://gitee.com/src-openeuler/libarchive/issues/I9FBQR
CVE-2022-40529
I9GAMR
8.31
7.8
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9GAMR
CVE-2023-33053
I9GAM0
8.31
7.8
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9GAM0
CVE-2023-52441
I92OOJ
13.31
7.8
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I92OOJ
CVE-2023-1999
I6VVSM
0.64
7.5
firefox
Application
https://gitee.com/src-openeuler/firefox/issues/I6VVSM
CVE-2024-31309
I9E2OB
2.56
7.5
trafficserver
Networking
https://gitee.com/src-openeuler/trafficserver/issues/I9E2OB
CVE-2022-34169
I9F7Q2
4.31
7.5
icedtea-web
Compiler
https://gitee.com/src-openeuler/icedtea-web/issues/I9F7Q2
CVE-2024-20932
I9F7I0
4.31
7.5
openjdk-17
Compiler
https://gitee.com/src-openeuler/openjdk-17/issues/I9F7I0
CVE-2024-24786
I9B1P2
4.9
7.5
cri-o
sig-CloudNative
https://gitee.com/src-openeuler/cri-o/issues/I9B1P2
CVE-2022-25731
I9GAL7
8.31
7.5
python-dns
Programming-language
https://gitee.com/src-openeuler/python-dns/issues/I9GAL7
CVE-2022-25732
I9GAJX
8.31
7.5
python-dns
Programming-language
https://gitee.com/src-openeuler/python-dns/issues/I9GAJX
CVE-2022-25728
I9GAJU
8.31
7.5
python-dns
Programming-language
https://gitee.com/src-openeuler/python-dns/issues/I9GAJU
CVE-2024-1135
I9H10B
11.31
7.5
python-gunicorn
sig-python-modules
https://gitee.com/src-openeuler/python-gunicorn/issues/I9H10B
CVE-2023-44488
I9HY69
13.58
7.5
firefox
Application
https://gitee.com/src-openeuler/firefox/issues/I9HY69
CVE-2024-20380
I9HX1I
13.65
7.5
clamav
Others
https://gitee.com/src-openeuler/clamav/issues/I9HX1I
CVE-2024-20918
I9F7K6
4.31
7.4
openjdk-17
Compiler
https://gitee.com/src-openeuler/openjdk-17/issues/I9F7K6
CVE-2024-20952
I9F7GS
4.31
7.4
openjdk-17
Compiler
https://gitee.com/src-openeuler/openjdk-17/issues/I9F7GS
CVE-2024-20697
I9FZ8M
7.31
7.3
libarchive
Base-service
https://gitee.com/src-openeuler/libarchive/issues/I9FZ8M
CVE-2021-47084
I95REJ
5.65
6.7
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95REJ
CVE-2022-2447
I9AQ5D
2.31
6.6
openstack-keystone
sig-openstack
https://gitee.com/src-openeuler/openstack-keystone/issues/I9AQ5D
CVE-2023-4575
I7WYY3
1.14
6.5
firefox
Application
https://gitee.com/src-openeuler/firefox/issues/I7WYY3
CVE-2024-0753
I8YE1P
1.31
6.5
firefox
Application
https://gitee.com/src-openeuler/firefox/issues/I8YE1P
CVE-2024-0747
I8YDZC
1.31
6.5
firefox
Application
https://gitee.com/src-openeuler/firefox/issues/I8YDZC
CVE-2024-0741
I8YDYI
1.31
6.5
firefox
Application
https://gitee.com/src-openeuler/firefox/issues/I8YDYI
CVE-2023-6865
I8PT2R
1.31
6.5
firefox
Application
https://gitee.com/src-openeuler/firefox/issues/I8PT2R
CVE-2023-6860
I8PT2K
1.31
6.5
firefox
Application
https://gitee.com/src-openeuler/firefox/issues/I8PT2K
CVE-2022-2553
I9AO7E
2.31
6.5
booth
sig-Ha
https://gitee.com/src-openeuler/booth/issues/I9AO7E
CVE-2022-47950
I9B1HJ
4.31
6.5
python-swiftclient
sig-openstack
https://gitee.com/src-openeuler/python-swiftclient/issues/I9B1HJ
CVE-2023-28100
I9AVQ9
10.14
6.5
flatpak
Programming-language
https://gitee.com/src-openeuler/flatpak/issues/I9AVQ9
CVE-2023-6867
I8PT2L
1.31
6.1
firefox
Application
https://gitee.com/src-openeuler/firefox/issues/I8PT2L
CVE-2023-52323
I9AZF2
3.31
5.9
fence-agents
sig-Ha
https://gitee.com/src-openeuler/fence-agents/issues/I9AZF2
CVE-2023-48795
I9AYAQ
3.31
5.9
libssh2
Networking
https://gitee.com/src-openeuler/libssh2/issues/I9AYAQ
CVE-2024-29018
I9AWX6
3.31
5.9
skopeo
sig-CloudNative
https://gitee.com/src-openeuler/skopeo/issues/I9AWX6
CVE-2024-29018
I9AWWE
3.31
5.9
podman
sig-CloudNative
https://gitee.com/src-openeuler/podman/issues/I9AWWE
CVE-2024-29018
I9AWLZ
3.31
5.9
cri-tools
sig-CloudNative
https://gitee.com/src-openeuler/cri-tools/issues/I9AWLZ
CVE-2024-27188
I9C1XR
7.31
5.9
plasma-breeze
sig-KDE
https://gitee.com/src-openeuler/plasma-breeze/issues/I9C1XR
CVE-2024-28867
I9CTY2
9.31
5.9
prometheus
sig-CloudNative
https://gitee.com/src-openeuler/prometheus/issues/I9CTY2
CVE-2023-48795
I9AYAU
11.14
5.9
cri-o
sig-CloudNative
https://gitee.com/src-openeuler/cri-o/issues/I9AYAU
CVE-2022-47951
I9AVCJ
2.31
5.7
openstack-glance
sig-openstack
https://gitee.com/src-openeuler/openstack-glance/issues/I9AVCJ
CVE-2022-47951
I9AVCG
2.31
5.7
openstack-nova
sig-openstack
https://gitee.com/src-openeuler/openstack-nova/issues/I9AVCG
CVE-2022-2806
I9AR03
2.31
5.5
sos
Base-service
https://gitee.com/src-openeuler/sos/issues/I9AR03
CVE-2022-1962
I9AN6B
2.31
5.5
skopeo
sig-CloudNative
https://gitee.com/src-openeuler/skopeo/issues/I9AN6B
CVE-2022-1962
I9AN5R
2.31
5.5
podman
sig-CloudNative
https://gitee.com/src-openeuler/podman/issues/I9AN5R
CVE-2022-1962
I9B0A3
3.31
5.5
libslirp
CloudNative
https://gitee.com/src-openeuler/libslirp/issues/I9B0A3
CVE-2022-1962
I9B08Y
3.31
5.5
fuse-overlayfs
CloudNative
https://gitee.com/src-openeuler/fuse-overlayfs/issues/I9B08Y
CVE-2022-1962
I9B08S
3.31
5.5
slirp4netns
CloudNative
https://gitee.com/src-openeuler/slirp4netns/issues/I9B08S
CVE-2022-1962
I9B08R
3.31
5.5
containers-common
sig-CloudNative
https://gitee.com/src-openeuler/containers-common/issues/I9B08R
CVE-2022-1962
I9AXMR
3.31
5.5
crun
sig-CloudNative
https://gitee.com/src-openeuler/crun/issues/I9AXMR
CVE-2022-1962
I9AXMJ
3.31
5.5
container-selinux
sig-CloudNative
https://gitee.com/src-openeuler/container-selinux/issues/I9AXMJ
CVE-2022-1962
I9B1QW
4.31
5.5
etcd
sig-CloudNative
https://gitee.com/src-openeuler/etcd/issues/I9B1QW
CVE-2023-52607
I96GP1
5.65
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I96GP1
CVE-2022-48629
I963KI
5.65
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I963KI
CVE-2021-47103
I95REP
5.65
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95REP
CVE-2021-47090
I95REF
5.65
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95REF
CVE-2023-52524
I95B1R
5.65
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B1R
CVE-2023-52501
I95B10
5.65
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B10
CVE-2023-52532
I95AXS
5.65
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AXS
CVE-2023-52521
I95AWP
5.65
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AWP
CVE-2023-52513
I95AWN
5.65
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AWN
CVE-2023-52574
I95ATZ
5.65
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATZ
CVE-2023-52581
I95ATS
5.65
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATS
CVE-2023-52575
I95AT9
5.65
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AT9
CVE-2023-52504
I95AT0
5.65
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AT0
CVE-2023-6857
I8PT2D
1.31
5.3
firefox
Application
https://gitee.com/src-openeuler/firefox/issues/I8PT2D
CVE-2022-4122
I9ATC3
2.31
5.3
podman
sig-CloudNative
https://gitee.com/src-openeuler/podman/issues/I9ATC3
CVE-2023-43490
I9AJ89
2.31
5.3
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9AJ89
CVE-2023-39326
I9AY6T
3.31
5.3
promu
sig-CloudNative
https://gitee.com/src-openeuler/promu/issues/I9AY6T
CVE-2023-3817
I9AWVX
3.31
5.3
edk2
Virt
https://gitee.com/src-openeuler/edk2/issues/I9AWVX
CVE-2023-39326
I9B1Q3
4.31
5.3
toolbox
CloudNative
https://gitee.com/src-openeuler/toolbox/issues/I9B1Q3
CVE-2023-22081
I88VNW
8.14
5.3
openjdk-latest
Compiler
https://gitee.com/src-openeuler/openjdk-latest/issues/I88VNW
CVE-2024-20978
I9B0DW
3.31
4.9
mariadb
DB
https://gitee.com/src-openeuler/mariadb/issues/I9B0DW
CVE-2024-20976
I9B0CE
3.31
4.9
mariadb
DB
https://gitee.com/src-openeuler/mariadb/issues/I9B0CE
CVE-2022-0207
I9AL0Y
2.31
4.7
vdsm
oVirt
https://gitee.com/src-openeuler/vdsm/issues/I9AL0Y
CVE-2023-52503
I95B3Q
5.65
4.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B3Q
CVE-2022-21595
I9AT7H
2.31
4.4
mariadb
DB
https://gitee.com/src-openeuler/mariadb/issues/I9AT7H
CVE-2021-47082
I95REN
5.65
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95REN
CVE-2021-47100
I95RE3
5.65
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RE3
CVE-2022-48627
I95ATI
5.65
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATI
CVE-2024-28835
I9AFM6
1.31
4.3
gnutls
sig-security-facility
https://gitee.com/src-openeuler/gnutls/issues/I9AFM6
CVE-2024-0749
I8YE00
1.31
4.3
firefox
Application
https://gitee.com/src-openeuler/firefox/issues/I8YE00
CVE-2024-0742
I8YDXO
1.31
4.3
firefox
Application
https://gitee.com/src-openeuler/firefox/issues/I8YDXO
CVE-2024-28180
I9C55E
7.31
4.3
cri-o
sig-CloudNative
https://gitee.com/src-openeuler/cri-o/issues/I9C55E
CVE-2023-28101
I9AVQ7
10.14
4.3
flatpak
Programming-language
https://gitee.com/src-openeuler/flatpak/issues/I9AVQ7
CVE-2023-45803
I9C54B
7.31
4.2
python-s3transfer
sig-python-modules
https://gitee.com/src-openeuler/python-s3transfer/issues/I9C54B
CVE-2023-45803
I9C543
7.31
4.2
fence-agents
sig-Ha
https://gitee.com/src-openeuler/fence-agents/issues/I9C543
CVE-2023-52592
I96GPQ
6.65
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I96GPQ
CVE-2021-47085
I95RET
6.65
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RET
CVE-2023-52608
I98BNA
11.6
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I98BNA
CVE-2024-26629
I98BN3
11.6
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I98BN3
CVE-2024-2193
I98BBP
11.6
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I98BBP
CVE-2023-52498
I97NIA
11.6
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NIA
CVE-2024-26610
I97NI6
11.6
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NI6
CVE-2023-52486
I97NI1
11.6
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NI1
CVE-2023-52490
I97NI0
11.6
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NI0
CVE-2024-26614
I97NHZ
11.6
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NHZ
CVE-2023-52492
I97NHW
11.6
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NHW
CVE-2024-26611
I97NHV
11.6
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NHV
CVE-2024-26613
I97NHU
11.6
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NHU
CVE-2024-26608
I97NHT
11.6
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NHT
CVE-2024-26615
I97NHS
11.6
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NHS
CVE-2023-52495
I97NHQ
11.6
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NHQ
CVE-2023-52487
I97NHO
11.6
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NHO
CVE-2024-26619
I97NHN
11.6
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NHN
CVE-2024-26609
I97NHM
11.6
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NHM
CVE-2024-26617
I97NHJ
11.6
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NHJ
CVE-2023-52494
I97NHG
11.6
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NHG
CVE-2024-26616
I97NHF
11.6
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NHF
CVE-2024-26612
I97NHE
11.6
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NHE
CVE-2023-52491
I97NHC
11.6
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NHC
CVE-2023-52493
I97NHA
11.6
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NHA
CVE-2024-26618
I97NH8
11.6
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NH8
CVE-2024-26620
I97NH7
11.6
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I97NH7
CVE-2024-21472
I9DFHM
12.31
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9DFHM
CVE-2023-22025
I88JFX
8.14
3.7
openjdk-latest
Compiler
https://gitee.com/src-openeuler/openjdk-latest/issues/I88JFX
CVE-2022-4123
I9ATB7
2.31
3.3
podman
sig-CloudNative
https://gitee.com/src-openeuler/podman/issues/I9ATB7
CVE-2023-52567
I95ATO
5.65
2.3
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATO
CVE-2021-47059
I94VOI
5.65
2.3
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOI
CVE-2024-24786
I9B1O7
3.5
0.0
ignition
K8sDistro
https://gitee.com/src-openeuler/ignition/issues/I9B1O7
CVE-2024-24784
I9B1O5
3.5
0.0
skopeo
sig-CloudNative
https://gitee.com/src-openeuler/skopeo/issues/I9B1O5
CVE-2024-24784
I9B1O4
3.5
0.0
cri-o
sig-CloudNative
https://gitee.com/src-openeuler/cri-o/issues/I9B1O4
CVE-2024-24784
I9B1NZ
3.5
0.0
podman
sig-CloudNative
https://gitee.com/src-openeuler/podman/issues/I9B1NZ
CVE-2024-24786
I9B1PV
3.51
0.0
skopeo
sig-CloudNative
https://gitee.com/src-openeuler/skopeo/issues/I9B1PV
CVE-2024-24786
I9B1P1
3.51
0.0
etcd
sig-CloudNative
https://gitee.com/src-openeuler/etcd/issues/I9B1P1
CVE-2024-24786
I9B1P0
3.51
0.0
podman
sig-CloudNative
https://gitee.com/src-openeuler/podman/issues/I9B1P0
CVE-2024-30161
I9B1Y5
3.58
0.0
qt
Runtime
https://gitee.com/src-openeuler/qt/issues/I9B1Y5
CVE-2024-25580
I9BYTK
6.65
0.0
qt
Runtime
https://gitee.com/src-openeuler/qt/issues/I9BYTK
CVE-2023-45935
I9BZX0
6.74
0.0
qt
Runtime
https://gitee.com/src-openeuler/qt/issues/I9BZX0
社区关键组件待修复缺陷:
openEuler社区存在无版本里程碑的缺陷,请各个SIG 关注涉及质量等级为L1-L2软件包的缺陷修复情况。
社区提单可参考社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/master/%E7%A4%BE%E5%8C%BA%E7%89%88%E6%9…
关键组件待修复缺陷清单(无版本里程碑):
序号
任务ID
任务标题
任务类型
创建时间
优先级
关联仓库
sig组
任务路径
1
I4V9K0
gcc 10.3.0 __libc_vfork符号丢失(i686架构)
任务
2022/2/25 14:24
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I4V9K0
2
I4YT2R
iscsi登录操作并发sysfs读操作概率导致空指针访问
任务
2022/3/21 15:36
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I4YT2R
3
I58CJR
删除iptable_filter.ko时出现空指针问题
任务
2022/5/19 20:36
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I58CJR
4
I5C33B
OLK-5.10 page owner功能增强
任务
2022/6/13 20:30
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5C33B
5
I5D9J8
Upgrade to latest release [kernel: 5.10.0 -> 5.17]
任务
2022/6/21 10:01
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5D9J8
6
I5G321
【openEuler-1.0-LTS】nbd 加载/卸载模组 和 alloc config并发导致 panic
任务
2022/7/8 9:05
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5G321
7
I5H311
修复CVE-2022-2380
任务
2022/7/14 15:27
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5H311
8
I5I2M8
x86: Improve testing false positive for tst-cpu-features-cpuinfo with bad hardware.
任务
2022/7/21 9:47
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5I2M8
9
I5OOLB
反复触发i40e网卡sriov增删vf后,iavf_remove触发BUG_ON at drivers/pci/msi.c:397
任务
2022/8/29 20:23
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5OOLB
10
I5PBRB
注入内存申请故障,i40iw_initialize_dev失败时出现oops复位
任务
2022/9/2 9:56
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5PBRB
11
I5RH8C
内存可靠性分级需求
任务
2022/9/16 16:16
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5RH8C
12
I5V92B
openEuler是否有开启CONFIG_AUXILIARY_BUS配置的计划
任务
2022/10/12 11:37
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5V92B
13
I5VCIJ
openEuler如何适配新硬件,请提供适配流程指导
任务
2022/10/12 17:14
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5VCIJ
14
I5WCP1
回合bpftool prog attach/detach命令
任务
2022/10/18 16:10
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5WCP1
15
I67IFE
建议sssd拆分出对应功能的子包
任务
2022/12/26 16:49
无优先级
src-openEuler/sssd
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I67IFE
16
I6FZWY
主线回合scsi: iscsi_tcp: Fix UAF during logout and login
任务
2023/2/18 11:10
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6FZWY
17
I6HXB9
kernel.spec中是否会新增打包intel-sst工具
任务
2023/2/27 10:06
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6HXB9
18
I6MJB4
openssl 3.0 支持TLCP特性
任务
2023/3/13 11:35
无优先级
src-openEuler/openssl
sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I6MJB4
19
I6N49D
【openeuler-22.03-LTS-SP】
任务
2023/3/14 20:12
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6N49D
20
I6PA84
神威架构,虚拟化启动失败
任务
2023/3/22 17:20
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I6PA84
21
I6TQ8W
curl命令向hadoop3.2.1 webhdfs put文件失败
任务
2023/4/7 18:02
严重
src-openEuler/curl
Networking
https://gitee.com/open_euler/dashboard?issue_id=I6TQ8W
22
I6UDV8
Bug in openEuler/gcc (10.3.0) support for ARM SVE openmp
任务
2023/4/10 16:14
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I6UDV8
23
I6VWNS
主线补丁:udp: skip L4 aggregation for UDP tunnel packets分析
任务
2023/4/15 10:37
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6VWNS
24
I70VML
指针压缩选项的错误提示内容有误。
缺陷
2023/5/6 16:45
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I70VML
25
I71KX8
python3.spec文件中,无效的ifarch语句
任务
2023/5/9 15:00
无优先级
src-openEuler/python3
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I71KX8
26
I7A5FW
Fixed CPU topology issues and add lbt support for kvm.
任务
2023/6/1 17:18
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I7A5FW
27
I7B6KR
kerberos安装缺少krb5-auth-dialog 和 krb5-workstation
任务
2023/6/6 9:51
无优先级
src-openEuler/krb5
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I7B6KR
28
I7CKVY
peneuler 20.03 LTS arrch64 上安装 libreoffice 7.4.7.2 报错
缺陷
2023/6/11 22:45
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I7CKVY
29
I7CWOS
Bug in openEuler/gcc (10.3.1) support for ARM SVE under O0 compiler level
任务
2023/6/12 20:51
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I7CWOS
30
I7EZAZ
无法在sw_64下编译nodejs
任务
2023/6/20 16:50
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I7EZAZ
31
I7L968
Upgrade to latest release [qemu: 6.2.0 2021/12/14 -> 8.0.3 2023/07/09]
任务
2023/7/14 17:09
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I7L968
32
I7LSWG
Upgrade to latest release [gtk2: 2.24.33 2020/12/20 -> 4.11.4 2023/07/03]
任务
2023/7/17 20:50
无优先级
src-openEuler/gtk2
Desktop
https://gitee.com/open_euler/dashboard?issue_id=I7LSWG
33
I8790J
need EPYC-Genoa model support
任务
2023/10/11 16:53
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I8790J
34
I8A77R
Upgrade to latest release [alsa-lib: 1.2.9 2023/05/04 -> 1.2.10 2023/09/01]
任务
2023/10/23 16:22
无优先级
src-openEuler/alsa-lib
Computing
https://gitee.com/open_euler/dashboard?issue_id=I8A77R
35
I8KAVR
dnf reinstall kernel 导致grub.conf 本内核项被删除
任务
2023/11/29 10:30
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8KAVR
36
I8ON5A
Upgrade to latest release [cronie: 1.6.1 2022/04/25 -> 1.7.0 2023/10/13]
任务
2023/12/15 11:04
无优先级
src-openEuler/cronie
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I8ON5A
37
I8ON6X
Upgrade to latest release [dbus: 1.14.8 2023/06/06 -> 1.15.8 2023/08/21]
任务
2023/12/15 11:06
无优先级
src-openEuler/dbus
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I8ON6X
38
I8OOF1
Upgrade to latest release [krb5: 1.21.1 2023/07/10 -> 1.21.2 2023/08/14]
任务
2023/12/15 12:29
无优先级
src-openEuler/krb5
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I8OOF1
39
I8OOF5
Upgrade to latest release [libarchive: 3.7.1 2023/07/29 -> 3.7.2 2023/09/11]
任务
2023/12/15 12:31
无优先级
src-openEuler/libarchive
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I8OOF5
40
I8PL8Q
Upgrade to latest release [gcc: 12.3.1 -/-/- -> 14 2023/04/17]
任务
2023/12/19 11:22
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I8PL8Q
41
I8SZWW
qemu 4.1 虚拟机热迁移到qemu 6.2失败
任务
2024/1/2 17:01
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I8SZWW
42
I8UCFC
鲲鹏920服务器多次重启后系统盘盘符跳变
任务
2024/1/8 11:18
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8UCFC
43
I8VIRN
Upgrade to latest release [libcap: 2.69 2023/05/14 -> 20071031 2007/10/31]
任务
2024/1/12 9:17
无优先级
src-openEuler/libcap
sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I8VIRN
44
I8VIRQ
Upgrade to latest release [libselinux: 3.5 2023/02/23 -> 3.6 2023/12/13]
任务
2024/1/12 9:17
无优先级
src-openEuler/libselinux
sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I8VIRQ
45
I8XTDI
rpm宏用$引用可能会出现空值
缺陷
2024/1/21 22:27
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8XTDI
46
I8ZJG1
欧拉系统virt-install 创建虚拟机video类型默认使用qxl
任务
2024/1/29 10:44
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I8ZJG1
47
I930G8
【24.03 LTS】软件包选型
任务
2024/2/22 19:34
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I930G8
48
I931BJ
【24.03 LTS】软件包选型
任务
2024/2/22 20:36
无优先级
src-openEuler/sqlite
DB
https://gitee.com/open_euler/dashboard?issue_id=I931BJ
49
I93C47
【24.03 LTS】软件包选型
任务
2024/2/23 17:46
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I93C47
50
I95DT3
openEuler-22.03-LTS-SP3的6.2.0-88版本何时发布?
任务
2024/3/4 0:39
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I95DT3
51
I96B4W
systemd中缺少文件
任务
2024/3/6 14:53
无优先级
src-openEuler/systemd
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I96B4W
52
I96BZU
逻辑卷组修复
任务
2024/3/6 15:36
无优先级
src-openEuler/lvm2
Storage
https://gitee.com/open_euler/dashboard?issue_id=I96BZU
53
I97V59
preempt-RT补丁中存在bug,运行2天以上的igh-ethercat时系统高概率死机
缺陷
2024/3/12 16:09
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I97V59
54
I9BNUP
使用clang时缺少gnu/stubs-32.h文件
任务
2024/3/26 13:43
无优先级
src-openEuler/glibc
Computing
https://gitee.com/open_euler/dashboard?issue_id=I9BNUP
55
I9C507
gcc在2203版本默认关闭-fcommon选项导致Intel SPR芯片上UnixBench多核整形得分劣化
缺陷
2024/3/27 18:22
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I9C507
56
I9COZE
【B/Y KV190 -BMC 系统测试】【长稳测试】【uniscan】DC第19次,OS进入紧急模式
缺陷
2024/3/29 15:27
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9COZE
57
I9CQSL
openEuler-22.03-LTS-SP1中自带的i40e网卡驱动,无法虚拟网卡
缺陷
2024/3/29 16:57
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9CQSL
58
I9CXWG
当mount挂载点多的时候,systemd-hostnamd服务启动时间太长
任务
2024/3/30 18:58
无优先级
src-openEuler/systemd
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9CXWG
59
I9DV2U
spec文件不同架构分支存在相同构建方式
任务
2024/4/3 11:24
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I9DV2U
60
I9EHLX
openEuler22.03 sp1设置成gb18030编码以后,timedatectl 报Eaile to print table:Invalid argument
任务
2024/4/7 14:55
无优先级
src-openEuler/systemd
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9EHLX
61
I9EU9I
openEuler 24.03 RISC-V中,切换至新建的用户的umask权限没有改变
缺陷
2024/4/8 15:14
无优先级
src-openEuler/bash
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9EU9I
62
I9FI38
【obs】glib2在openEuler:22.03:LTS构建失败
缺陷
2024/4/10 15:34
无优先级
src-openEuler/glib2
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9FI38
63
I9FU1M
[openEuler-22.03-LTS] libvirt install failed
任务
2024/4/11 15:44
无优先级
src-openEuler/libvirt
Virt
https://gitee.com/open_euler/dashboard?issue_id=I9FU1M
64
I9FVI3
22.03-LTS-Next分支与22.03-LTS-SP3分支不同步,需要手动同步
任务
2024/4/11 16:57
无优先级
src-openEuler/e2fsprogs
Storage
https://gitee.com/open_euler/dashboard?issue_id=I9FVI3
65
I9G205
【误解提示】救援模式下,提示用户输入root密码
缺陷
2024/4/12 11:06
无优先级
src-openEuler/util-linux
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9G205
66
I9G2PH
测试!!!软件市场精品应用curl-null镜像自动更新,8.4.0->8.4.1
任务
2024/4/12 11:45
无优先级
src-openEuler/curl
Networking
https://gitee.com/open_euler/dashboard?issue_id=I9G2PH
67
I9GR88
回合上游社区补丁,补丁数量:3
缺陷
2024/4/15 15:50
无优先级
src-openEuler/iputils
Networking
https://gitee.com/open_euler/dashboard?issue_id=I9GR88
68
I9GR89
回合上游社区补丁,补丁数量:3
缺陷
2024/4/15 15:50
无优先级
src-openEuler/iproute
Networking
https://gitee.com/open_euler/dashboard?issue_id=I9GR89
69
I9GUR2
libnl3合入开源补丁
缺陷
2024/4/15 19:20
无优先级
src-openEuler/libnl3
Networking
https://gitee.com/open_euler/dashboard?issue_id=I9GUR2
70
I9GURR
NetworkManager社区补丁分析回合
缺陷
2024/4/15 19:21
无优先级
src-openEuler/NetworkManager
Networking
https://gitee.com/open_euler/dashboard?issue_id=I9GURR
71
I9GURW
iproute社区补丁分析回合
缺陷
2024/4/15 19:21
无优先级
src-openEuler/iproute
Networking
https://gitee.com/open_euler/dashboard?issue_id=I9GURW
72
I9GURZ
libnl3社区补丁分析回合
缺陷
2024/4/15 19:21
无优先级
src-openEuler/libnl3
Networking
https://gitee.com/open_euler/dashboard?issue_id=I9GURZ
73
I9GUS0
iputils社区补丁分析回合
缺陷
2024/4/15 19:21
无优先级
src-openEuler/iputils
Networking
https://gitee.com/open_euler/dashboard?issue_id=I9GUS0
74
I9GUS1
glibc社区补丁分析回合
缺陷
2024/4/15 19:21
无优先级
src-openEuler/glibc
Computing
https://gitee.com/open_euler/dashboard?issue_id=I9GUS1
75
I9GUS2
libnl3自研用例存在内存泄漏
缺陷
2024/4/15 19:21
无优先级
src-openEuler/libnl3
Networking
https://gitee.com/open_euler/dashboard?issue_id=I9GUS2
76
I9GV9V
qemu-8.2.0-6.oe2403.x86_64.src.rpm 在编译的check阶段执行tests/qtest/bios-tables-test是测试失败
缺陷
2024/4/15 20:30
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I9GV9V
77
I9H2MR
【误解提示】救援模式下,提示用户输入root密码
缺陷
2024/4/16 14:39
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9H2MR
78
I9H3O6
【kernel-rt】x86的rt版本,启动后看不到内核日志
缺陷
2024/4/16 15:04
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9H3O6
79
I9H736
Upgrade to latest release [libiscsi: 1.19.0 -> 1.20.0]
任务
2024/4/16 17:40
无优先级
src-openEuler/libiscsi
Storage
https://gitee.com/open_euler/dashboard?issue_id=I9H736
80
I9HBPH
mock编译aarch64架构qemu提示ERROR:Include dir /usr/include/openssl does not exist
缺陷
2024/4/17 10:23
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I9HBPH
81
I9HH3W
ip vrf exec vrf1执行报错setexecfilecon for "xxx" failed
缺陷
2024/4/17 16:10
无优先级
src-openEuler/iproute
Networking
https://gitee.com/open_euler/dashboard?issue_id=I9HH3W
82
I9HI69
ssh软链接后门
缺陷
2024/4/17 17:13
无优先级
src-openEuler/openssh
Networking
https://gitee.com/open_euler/dashboard?issue_id=I9HI69
83
I9HICZ
安装gcc_secure后,rpmbuild -ba coreutils.spec失败
缺陷
2024/4/17 17:25
无优先级
src-openEuler/coreutils
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9HICZ
84
I9HSY5
操作系统支持GM/T 0003测试SM2私钥签名报错
缺陷
2024/4/18 16:21
无优先级
src-openEuler/openssl
sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I9HSY5
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/master/%E7%A4%BE%E5%8C%BA%E7%89%88%E6%9…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
1
0
Dear all,
openEuler 24.03 LTS RC3&beta发布,RC3版本同步发布多架构RPM包供开发者使用。RC3版本每日构建可全量完整构建通过,每日AT验证无阻塞问题验证通过。社区各sig组及用户可基于该版本开展功能验证、体验,QA sig组请基于该版本开展软件包验证适配。 本次RC3版本继续由EulerMaker构建系统统一编译构建,社区开发者可继续按需使用。 各个SIG组可基于该版本开展组件自验证及试用,社区一起协作支撑openEuler 24.03 LTS版本issue发现和定位修复,您发现和定位修复每一个issue不仅可以解决您使用openEuler LTS版本的问题点,更可以帮助社区一起持续优化用户的体验!
l openEuler 24.03 LTS 版本release plan&特性清单公示链接:https://gitee.com/openeuler/release-management/blob/master/op…
l openEuler 24.03 LTS RC3版本下载链接:
x86&arm:http://121.36.84.172/dailybuild/EBS-openEuler-24.03-LTS/rc3_openeuler-2024-04-16-08-55-15/
risc-v :https://eulermaker.compass-ci.openeuler.openatom.cn/api/ems2/repositories/openEuler-24.03-LTS-Baseos:risc-v/
ppc:https://eulermaker.compass-ci.openeuler.openatom.cn/api/ems2/repositories/openEuler-24.03-LTS-Baseos:ppc64le/
LoongArch : https://eulermaker.compass-ci.openeuler.openatom.cn/api/ems2/repositories/o…
l openEuler 版本缺陷管理规范链接:https://gitee.com/openeuler/QA/blob/master/%E7%A4%BE%E5%8C%BA%E7…
l openEuler EulerMaker构建系统:https://eulermaker.compass-ci.openeuler.openatom.cn/
l openEuler 24.03 LTS RC2版本自验证进展与质量结果同步方式: 建议各sig组及社区用户均可以在QA-sig下以ISSUE方式同步自验证进展和自验证结果,您的自验证结果将是release版本质量评估的充分信息依据;
Stage Name
Begin Time
End Time
Days
Note
Collect key features
2023/12/8
2024/1/30
54
版本需求收集
Change Review 1
2024/1/16
2024/2/10
25
Review 软件包变更(升级/退役/淘汰)
Herited features
2024/1/30
2024/2/29
30
继承特性合入
Develop
2023/12/1
2024/2/29
90
新特性开发,合入master;KABI预留,白名单制定及公示
Kernel freezing
2024/3/1
2024/3/10
10
内核冻结
Branch 24.03 LTS
2024/3/11
2024/3/20
10
master 拉取24.03 LTS Next及24.03 LTS分支
Branch 24.03 LTS mass rebuild
2024/3/21
2024/3/26
6
新分支大规模构建
Build & Alpha
2024/3/27
2024/4/2
7
新开发特性合入,Alpha版本发布
Test round 1
2024/4/3
2024/4/9
7
24.03 LTS 启动集成测试
Change Review 2 时间不变与RC3合并
2024/4/10
2024/4/12
3
发起软件包淘汰评审
Beta version release时间不变与RC3合并
2024/4/13
2024/4/19
7
24.03 LTS Beta版本发布
Test round 2
2024/4/20
2024/4/26
7
全量验证
Change Review 3
2024/4/27
2024/4/29
3
分支启动冻结,只允许bug fix
Test round 3(NOW☺)
2024/4/30
2024/5/6
7
分支冻结,只允许bug fix
Test round 4
2024/5/7
2024/5/13
7
回归测试
Test round 5
2024/5/14
2024/5/20
7
回归测试
Release Review
2024/5/21
2024/5/23
3
版本发布决策/ Go or No Go
Release preparation
2024/5/24
2024/5/30
7
发布前准备阶段,发布件系统梳理
Release
2024/5/31
2024/5/31
1
社区Release评审通过正式发布
已知镜像主要问题如下(规避措施详见issue):
https://gitee.com/src-openeuler/qemu/issues/I9GVE3?from=project-issue
https://gitee.com/src-openeuler/qemu/issues/I9GVDZ?from=project-issue
BR
范佳臣
1
0
主题: openEuler update_20240410版本发布公告
Dear all,
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-22.03-LTS、openEuler-22.03-LTS-SP1、openEuler-22.03-LTS-SP2、openEuler-20.03-LTS-SP4及openEuler-22.03-LTS-SP3 update版本满足版本出口质量,现进行发布公示。
本公示分为九部分:
1、openEuler-20.03-LTS-SP1 Update 20240410发布情况及待修复缺陷
2、openEuler-22.03-LTS Update 20240410发布情况及待修复缺陷
3、openEuler-22.03-LTS-SP1 Update 20240410发布情况及待修复缺陷
4、openEuler-22.03-LTS-SP2 Update 20240410发布情况及待修复缺陷
5、openEuler-20.03-LTS-SP4 Update 20240410发布情况及待修复缺陷
6、openEuler-22.03-LTS-SP3 Update 20240410发布情况及待修复缺陷
7、openEuler 关键组件待修复CVE 清单
8、openEuler 关键组件待修复缺陷清单
9、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2024/04/19)提供 update_20240417 版本。
openEuler-20.03-LTS-SP1 Update 20240410
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题13个,已知漏洞106个。目前版本分支剩余待修复缺陷4个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9EP1X?from=project-i…
CVE修复:
CVE
仓库
score
#I58YVD:CVE-2022-1802<https://gitee.com/open_euler/dashboard?issue_id=I58YVD>
firefox
8.8
#I9AO3J:CVE-2022-31163<https://gitee.com/open_euler/dashboard?issue_id=I9AO3J>
rubygem-tzinfo
8.1
#I9ATGS:CVE-2022-2469<https://gitee.com/open_euler/dashboard?issue_id=I9ATGS>
libgsasl
8.1
#I9AURJ:CVE-2022-2639<https://gitee.com/open_euler/dashboard?issue_id=I9AURJ>
openvswitch
7.8
#I9AVQD:CVE-2021-32142<https://gitee.com/open_euler/dashboard?issue_id=I9AVQD>
LibRaw
7.8
#I9E4NC:CVE-2024-31083<https://gitee.com/open_euler/dashboard?issue_id=I9E4NC>
xorg-x11-server
7.8
#I8YV0T:CVE-2024-23307<https://gitee.com/open_euler/dashboard?issue_id=I8YV0T>
kernel
7.8
#I95LPF:CVE-2024-26622<https://gitee.com/open_euler/dashboard?issue_id=I95LPF>
kernel
7.8
#I96G7N:CVE-2023-52600<https://gitee.com/open_euler/dashboard?issue_id=I96G7N>
kernel
7.8
#I96GXM:CVE-2024-26625<https://gitee.com/open_euler/dashboard?issue_id=I96GXM>
kernel
7.8
#I990AF:CVE-2021-47131<https://gitee.com/open_euler/dashboard?issue_id=I990AF>
kernel
7.8
#I9B1Y1:CVE-2024-30156<https://gitee.com/open_euler/dashboard?issue_id=I9B1Y1>
varnish
7.5
#I977K3:CVE-2024-28757<https://gitee.com/open_euler/dashboard?issue_id=I977K3>
expat
7.5
#I9AUYL:CVE-2022-24999<https://gitee.com/open_euler/dashboard?issue_id=I9AUYL>
nodejs-qs
7.5
#I9AVYL:CVE-2022-48279<https://gitee.com/open_euler/dashboard?issue_id=I9AVYL>
mod_security
7.5
#I9E2PZ:CVE-2024-27316<https://gitee.com/open_euler/dashboard?issue_id=I9E2PZ>
mod_http2
7.5
#I9B1O1:CVE-2024-24784<https://gitee.com/open_euler/dashboard?issue_id=I9B1O1>
golang
7.5
#I9AWCO:CVE-2022-39028<https://gitee.com/open_euler/dashboard?issue_id=I9AWCO>
telnet
7.5
#I9ASUL:CVE-2022-2309<https://gitee.com/open_euler/dashboard?issue_id=I9ASUL>
libxml2
7.5
#I9ACE0:CVE-2024-2002<https://gitee.com/open_euler/dashboard?issue_id=I9ACE0>
libdwarf
7.5
#I9E4AM:CVE-2024-31082<https://gitee.com/open_euler/dashboard?issue_id=I9E4AM>
xorg-x11-server
7.3
#I9E4N0:CVE-2024-31081<https://gitee.com/open_euler/dashboard?issue_id=I9E4N0>
xorg-x11-server
7.3
#I9E4N4:CVE-2024-31080<https://gitee.com/open_euler/dashboard?issue_id=I9E4N4>
xorg-x11-server
7.3
#I9DS2T:CVE-2024-3205<https://gitee.com/open_euler/dashboard?issue_id=I9DS2T>
libyaml
7.3
#I99JOA:CVE-2024-1013<https://gitee.com/open_euler/dashboard?issue_id=I99JOA>
unixODBC
7.1
#I949C5:CVE-2021-46952<https://gitee.com/open_euler/dashboard?issue_id=I949C5>
kernel
7.1
#I96G7F:CVE-2023-52599<https://gitee.com/open_euler/dashboard?issue_id=I96G7F>
kernel
7.1
#I96G8Y:CVE-2023-52602<https://gitee.com/open_euler/dashboard?issue_id=I96G8Y>
kernel
7.1
#I96G93:CVE-2023-52603<https://gitee.com/open_euler/dashboard?issue_id=I96G93>
kernel
7.1
#I96GQ3:CVE-2023-52601<https://gitee.com/open_euler/dashboard?issue_id=I96GQ3>
kernel
7.1
#I95AXP:CVE-2023-52502<https://gitee.com/open_euler/dashboard?issue_id=I95AXP>
kernel
7
#I9DGZJ:CVE-2024-28219<https://gitee.com/open_euler/dashboard?issue_id=I9DGZJ>
python-pillow
6.7
#I9C342:CVE-2024-2398<https://gitee.com/open_euler/dashboard?issue_id=I9C342>
curl
6.5
#I94K6R:CVE-2023-23601<https://gitee.com/open_euler/dashboard?issue_id=I94K6R>
mozjs78
6.5
#I94K6T:CVE-2023-23599<https://gitee.com/open_euler/dashboard?issue_id=I94K6T>
mozjs78
6.5
#I9AMRI:CVE-2022-32325<https://gitee.com/open_euler/dashboard?issue_id=I9AMRI>
jpegoptim
6.5
#I9AW6M:CVE-2023-0666<https://gitee.com/open_euler/dashboard?issue_id=I9AW6M>
wireshark
6.5
#I9AH6G:CVE-2024-2494<https://gitee.com/open_euler/dashboard?issue_id=I9AH6G>
libvirt
6.2
#I99JV2:CVE-2024-26641<https://gitee.com/open_euler/dashboard?issue_id=I99JV2>
kernel
6.1
#I95RDW:CVE-2021-47101<https://gitee.com/open_euler/dashboard?issue_id=I95RDW>
kernel
6
#I96G8W:CVE-2023-52587<https://gitee.com/open_euler/dashboard?issue_id=I96G8W>
kernel
6
#I9A82U:CVE-2024-29018<https://gitee.com/open_euler/dashboard?issue_id=I9A82U>
docker
5.9
#I9138X:CVE-2023-52426<https://gitee.com/open_euler/dashboard?issue_id=I9138X>
expat
5.5
#I8OJ8L:CVE-2023-37328<https://gitee.com/open_euler/dashboard?issue_id=I8OJ8L>
gstreamer1-plugins-base
5.5
#I932W7:CVE-2023-52443<https://gitee.com/open_euler/dashboard?issue_id=I932W7>
kernel
5.5
#I93HCX:CVE-2024-26600<https://gitee.com/open_euler/dashboard?issue_id=I93HCX>
kernel
5.5
#I93LMH:CVE-2021-46904<https://gitee.com/open_euler/dashboard?issue_id=I93LMH>
kernel
5.5
#I94JCO:CVE-2021-46989<https://gitee.com/open_euler/dashboard?issue_id=I94JCO>
kernel
5.5
#I94JH2:CVE-2020-36780<https://gitee.com/open_euler/dashboard?issue_id=I94JH2>
kernel
5.5
#I95B1F:CVE-2023-52509<https://gitee.com/open_euler/dashboard?issue_id=I95B1F>
kernel
5.5
#I9909R:CVE-2021-47113<https://gitee.com/open_euler/dashboard?issue_id=I9909R>
kernel
5.5
#I9909V:CVE-2021-47114<https://gitee.com/open_euler/dashboard?issue_id=I9909V>
kernel
5.5
#I990A7:CVE-2021-47122<https://gitee.com/open_euler/dashboard?issue_id=I990A7>
kernel
5.5
#I95REH:CVE-2021-47091<https://gitee.com/open_euler/dashboard?issue_id=I95REH>
kernel
5.5
#I99K08:CVE-2024-26633<https://gitee.com/open_euler/dashboard?issue_id=I99K08>
kernel
5.5
#I9AH1K:CVE-2024-28834<https://gitee.com/open_euler/dashboard?issue_id=I9AH1K>
gnutls
5.3
#I9E2PU:CVE-2024-28182<https://gitee.com/open_euler/dashboard?issue_id=I9E2PU>
nghttp2
5.3
#I9DFPV:CVE-2023-7250<https://gitee.com/open_euler/dashboard?issue_id=I9DFPV>
iperf3
5.3
#I9E8PU:CVE-2024-21506<https://gitee.com/open_euler/dashboard?issue_id=I9E8PU>
python-pymongo
5.2
#I9BJ5S:CVE-2024-30204<https://gitee.com/open_euler/dashboard?issue_id=I9BJ5S>
emacs
5
#I9BJ5X:CVE-2024-30205<https://gitee.com/open_euler/dashboard?issue_id=I9BJ5X>
emacs
5
#I917LZ:CVE-2024-24855<https://gitee.com/open_euler/dashboard?issue_id=I917LZ>
kernel
4.7
#I9AJ87:CVE-2024-27281<https://gitee.com/open_euler/dashboard?issue_id=I9AJ87>
ruby
4.5
#I93L72:CVE-2023-52469<https://gitee.com/open_euler/dashboard?issue_id=I93L72>
kernel
4.4
#I93X0G:CVE-2024-26606<https://gitee.com/open_euler/dashboard?issue_id=I93X0G>
kernel
4.4
#I947PH:CVE-2021-46928<https://gitee.com/open_euler/dashboard?issue_id=I947PH>
kernel
4.4
#I947U7:CVE-2021-46935<https://gitee.com/open_euler/dashboard?issue_id=I947U7>
kernel
4.4
#I947OW:CVE-2021-46924<https://gitee.com/open_euler/dashboard?issue_id=I947OW>
kernel
4.3
#I95RE9:CVE-2021-47086<https://gitee.com/open_euler/dashboard?issue_id=I95RE9>
kernel
4
#I93EDF:CVE-2024-26597<https://gitee.com/open_euler/dashboard?issue_id=I93EDF>
kernel
3.3
#I947SE:CVE-2021-46934<https://gitee.com/open_euler/dashboard?issue_id=I947SE>
kernel
3.3
#I949D9:CVE-2020-36777<https://gitee.com/open_euler/dashboard?issue_id=I949D9>
kernel
3.3
#I94JHY:CVE-2020-36784<https://gitee.com/open_euler/dashboard?issue_id=I94JHY>
kernel
3.3
#I990AA:CVE-2021-47112<https://gitee.com/open_euler/dashboard?issue_id=I990AA>
kernel
3.3
#I9AJ8A:CVE-2024-27280<https://gitee.com/open_euler/dashboard?issue_id=I9AJ8A>
ruby
3.1
#I9A7Y2:CVE-2023-50967<https://gitee.com/open_euler/dashboard?issue_id=I9A7Y2>
jose
2.5
#I947TK:CVE-2021-46926<https://gitee.com/open_euler/dashboard?issue_id=I947TK>
kernel
2.3
#I9BGUB:CVE-2021-47142<https://gitee.com/open_euler/dashboard?issue_id=I9BGUB>
kernel
1
#I9BGMR:CVE-2021-47143<https://gitee.com/open_euler/dashboard?issue_id=I9BGMR>
kernel
1
#I9BGUR:CVE-2021-47144<https://gitee.com/open_euler/dashboard?issue_id=I9BGUR>
kernel
1
#I9BGQL:CVE-2021-47145<https://gitee.com/open_euler/dashboard?issue_id=I9BGQL>
kernel
1
#I9BGV4:CVE-2021-47146<https://gitee.com/open_euler/dashboard?issue_id=I9BGV4>
kernel
1
#I9BGKK:CVE-2021-47149<https://gitee.com/open_euler/dashboard?issue_id=I9BGKK>
kernel
1
#I9BGVY:CVE-2021-47150<https://gitee.com/open_euler/dashboard?issue_id=I9BGVY>
kernel
1
#I9BGWP:CVE-2021-47153<https://gitee.com/open_euler/dashboard?issue_id=I9BGWP>
kernel
1
#I9BHSG:CVE-2021-47159<https://gitee.com/open_euler/dashboard?issue_id=I9BHSG>
kernel
1
#I9BHG2:CVE-2021-47160<https://gitee.com/open_euler/dashboard?issue_id=I9BHG2>
kernel
1
#I9BHF9:CVE-2021-47162<https://gitee.com/open_euler/dashboard?issue_id=I9BHF9>
kernel
1
#I9BHRY:CVE-2021-47163<https://gitee.com/open_euler/dashboard?issue_id=I9BHRY>
kernel
1
#I9BHTI:CVE-2021-47167<https://gitee.com/open_euler/dashboard?issue_id=I9BHTI>
kernel
1
#I9BHLP:CVE-2021-47169<https://gitee.com/open_euler/dashboard?issue_id=I9BHLP>
kernel
1
#I9BHQL:CVE-2021-47170<https://gitee.com/open_euler/dashboard?issue_id=I9BHQL>
kernel
1
#I9BHNM:CVE-2021-47171<https://gitee.com/open_euler/dashboard?issue_id=I9BHNM>
kernel
1
#I9BHNX:CVE-2021-47173<https://gitee.com/open_euler/dashboard?issue_id=I9BHNX>
kernel
1
#I9BHQ7:CVE-2021-47180<https://gitee.com/open_euler/dashboard?issue_id=I9BHQ7>
kernel
1
#I9AK6C:CVE-2023-52620<https://gitee.com/open_euler/dashboard?issue_id=I9AK6C>
kernel
1
#I9BV4P:CVE-2023-52622<https://gitee.com/open_euler/dashboard?issue_id=I9BV4P>
kernel
1
#I9CTGE:CVE-2023-52629<https://gitee.com/open_euler/dashboard?issue_id=I9CTGE>
kernel
1
#I9AK56:CVE-2024-26642<https://gitee.com/open_euler/dashboard?issue_id=I9AK56>
kernel
1
#I9BV23:CVE-2024-26644<https://gitee.com/open_euler/dashboard?issue_id=I9BV23>
kernel
1
#I9BV24:CVE-2024-26645<https://gitee.com/open_euler/dashboard?issue_id=I9BV24>
kernel
1
#I9C6FA:CVE-2024-26651<https://gitee.com/open_euler/dashboard?issue_id=I9C6FA>
kernel
1
#I9DD86:CVE-2024-26654<https://gitee.com/open_euler/dashboard?issue_id=I9DD86>
kernel
1
#I9DNPD:CVE-2024-26668<https://gitee.com/open_euler/dashboard?issue_id=I9DNPD>
kernel
1
#I9E2O0:CVE-2024-26751<https://gitee.com/open_euler/dashboard?issue_id=I9E2O0>
kernel
1
#I9C6WS:CVE-2024-28085<https://gitee.com/open_euler/dashboard?issue_id=I9C6WS>
util-linux
0
Bugfix:
issue
仓库
#I9C04M:gssproxy服务停止时释放资源调用LIST_DEL宏参数错误可能导致进程崩溃<https://gitee.com/open_euler/dashboard?issue_id=I9C04M>
gssproxy
#I8Z2JH:openEuler 20.03 LTS SP3对盘通知式下电后,盘又被系统接管<https://gitee.com/open_euler/dashboard?issue_id=I8Z2JH>
kernel
#I9355O:keys: safe concurrent user->{session,uid}_keyring access<https://gitee.com/open_euler/dashboard?issue_id=I9355O>
kernel
#I97HJA:ext4: ext4_mb_use_inode_pa: Don't BUG_ON when 'pa->pa_free < len' in continue mode<https://gitee.com/open_euler/dashboard?issue_id=I97HJA>
kernel
#I991GQ:crypto: algif_aead - fix uninitialized ctx->init<https://gitee.com/open_euler/dashboard?issue_id=I991GQ>
kernel
#I992IL: crypto: algif_aead - Only wake up when ctx->more is zero<https://gitee.com/open_euler/dashboard?issue_id=I992IL>
kernel
#I9ARW6:【OLK-5.10】启动31台带内存带宽Qos的虚拟机,前端查看有2台虚拟机schemata值不符合预期设置的Qos值<https://gitee.com/open_euler/dashboard?issue_id=I9ARW6>
kernel
#I9AZFU:【OLK-5.10】 修复MPAM重复使能问题<https://gitee.com/open_euler/dashboard?issue_id=I9AZFU>
kernel
#I9BD67:【OLK-5.10】iostat以及/proc/diskstats显示异常大,会产生跳变,统计不准。<https://gitee.com/open_euler/dashboard?issue_id=I9BD67>
kernel
#I9BWES:mm: ksm: fix use-after-free kasan report in ksm_might_need_to_copy<https://gitee.com/open_euler/dashboard?issue_id=I9BWES>
kernel
#I9C0QZ:mlock 溢出没有返回失败<https://gitee.com/open_euler/dashboard?issue_id=I9C0QZ>
kernel
#I9D6UN:【openEuler-1.0-LTS/OLK-5.10/OLK-6.6】hns3网卡驱动在动态vlan模式下,可能出现VF无法收到带vlan报文的问题。<https://gitee.com/open_euler/dashboard?issue_id=I9D6UN>
kernel
#I9DOVK:盘被锁后芯片默认超时时间偏小引发IO异常完成<https://gitee.com/open_euler/dashboard?issue_id=I9DOVK>
kernel
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/docker_img/update/
openEuler CVE 及安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高):
里程碑
任务ID
任务标题
优先级
sig组
关联仓库
任务路径
openEuler 20.03LTS SP1 update2103
I3E5C1
【20.03-SP1】【arm/x86】服务启动失败
主要
sig/bigdata
src-openEuler/hadoop
https://gitee.com/open_euler/dashboard?issue_id=I3E5C1
openEuler-20.03-LTS-SP1
I3QGU7
系统不支持GB18030
无优先级
sig/TC
openEuler/community
https://gitee.com/open_euler/dashboard?issue_id=I3QGU7
openEuler 20.03LTS SP1 update210926
I4CMSV
【20.03-LTS-SP1】【arm/x86】搭建Kubernetes 集群缺少包etcd
无优先级
sig/TC
openEuler/community
https://gitee.com/open_euler/dashboard?issue_id=I4CMSV
openEuler-20.03-LTS-SP1-dailybuild
I5Y99T
mate-desktop install problem in openEuler:20:03:LTS:SP1
无优先级
sig/sig-mate-desktop
src-openEuler/mate-desktop
https://gitee.com/open_euler/dashboard?issue_id=I5Y99T
openEuler-22.03-LTS Update 20240410
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题4个,已知漏洞54个。目前版本分支剩余待修复缺陷6个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9EP1Z?from=project-i…
CVE修复:
CVE
仓库
score
#I9C6X1:CVE-2024-3019<https://gitee.com/open_euler/dashboard?issue_id=I9C6X1>
pcp
8.8
#I92HWD:CVE-2024-24474<https://gitee.com/open_euler/dashboard?issue_id=I92HWD>
qemu
8.2
#I9ATGS:CVE-2022-2469<https://gitee.com/open_euler/dashboard?issue_id=I9ATGS>
libgsasl
8.1
#I4BI7U:CVE-2019-25051<https://gitee.com/open_euler/dashboard?issue_id=I4BI7U>
aspell
7.8
#I9E4NC:CVE-2024-31083<https://gitee.com/open_euler/dashboard?issue_id=I9E4NC>
xorg-x11-server
7.8
#I9AURJ:CVE-2022-2639<https://gitee.com/open_euler/dashboard?issue_id=I9AURJ>
openvswitch
7.8
#I9AVQD:CVE-2021-32142<https://gitee.com/open_euler/dashboard?issue_id=I9AVQD>
LibRaw
7.8
#I932VH:CVE-2024-26589<https://gitee.com/open_euler/dashboard?issue_id=I932VH>
kernel
7.8
#I9AWCO:CVE-2022-39028<https://gitee.com/open_euler/dashboard?issue_id=I9AWCO>
telnet
7.5
#I9E2PZ:CVE-2024-27316<https://gitee.com/open_euler/dashboard?issue_id=I9E2PZ>
mod_http2
7.5
#I977K3:CVE-2024-28757<https://gitee.com/open_euler/dashboard?issue_id=I977K3>
expat
7.5
#I9B1Y1:CVE-2024-30156<https://gitee.com/open_euler/dashboard?issue_id=I9B1Y1>
varnish
7.5
#I9B1O1:CVE-2024-24784<https://gitee.com/open_euler/dashboard?issue_id=I9B1O1>
golang
7.5
#I9AUYL:CVE-2022-24999<https://gitee.com/open_euler/dashboard?issue_id=I9AUYL>
nodejs-qs
7.5
#I9AVYL:CVE-2022-48279<https://gitee.com/open_euler/dashboard?issue_id=I9AVYL>
mod_security
7.5
#I9ACE0:CVE-2024-2002<https://gitee.com/open_euler/dashboard?issue_id=I9ACE0>
libdwarf
7.5
#I9E4AM:CVE-2024-31082<https://gitee.com/open_euler/dashboard?issue_id=I9E4AM>
xorg-x11-server
7.3
#I9E4N0:CVE-2024-31081<https://gitee.com/open_euler/dashboard?issue_id=I9E4N0>
xorg-x11-server
7.3
#I9E4N4:CVE-2024-31080<https://gitee.com/open_euler/dashboard?issue_id=I9E4N4>
xorg-x11-server
7.3
#I99JOA:CVE-2024-1013<https://gitee.com/open_euler/dashboard?issue_id=I99JOA>
unixODBC
7.1
#I9DGZJ:CVE-2024-28219<https://gitee.com/open_euler/dashboard?issue_id=I9DGZJ>
python-pillow
6.7
#I9AMRI:CVE-2022-32325<https://gitee.com/open_euler/dashboard?issue_id=I9AMRI>
jpegoptim
6.5
#I9C342:CVE-2024-2398<https://gitee.com/open_euler/dashboard?issue_id=I9C342>
curl
6.5
#I9AVQ9:CVE-2023-28100<https://gitee.com/open_euler/dashboard?issue_id=I9AVQ9>
flatpak
6.5
#I94K6R:CVE-2023-23601<https://gitee.com/open_euler/dashboard?issue_id=I94K6R>
mozjs78
6.5
#I94K6T:CVE-2023-23599<https://gitee.com/open_euler/dashboard?issue_id=I94K6T>
mozjs78
6.5
#I9AW6M:CVE-2023-0666<https://gitee.com/open_euler/dashboard?issue_id=I9AW6M>
wireshark
6.5
#I93ED1:CVE-2023-52454<https://gitee.com/open_euler/dashboard?issue_id=I93ED1>
kernel
6.5
#I9AH6G:CVE-2024-2494<https://gitee.com/open_euler/dashboard?issue_id=I9AH6G>
libvirt
6.2
#I9138X:CVE-2023-52426<https://gitee.com/open_euler/dashboard?issue_id=I9138X>
expat
5.5
#I8OJ8L:CVE-2023-37328<https://gitee.com/open_euler/dashboard?issue_id=I8OJ8L>
gstreamer1-plugins-base
5.5
#I932W7:CVE-2023-52443<https://gitee.com/open_euler/dashboard?issue_id=I932W7>
kernel
5.5
#I93HCX:CVE-2024-2660<https://gitee.com/open_euler/dashboard?issue_id=I93HCX>
kernel
5.5
#I97N53:CVE-2024-1441<https://gitee.com/open_euler/dashboard?issue_id=I97N53>
libvirt
5.5
#I9DFPV:CVE-2023-7250<https://gitee.com/open_euler/dashboard?issue_id=I9DFPV>
iperf3
5.3
#I9E2PU:CVE-2024-28182<https://gitee.com/open_euler/dashboard?issue_id=I9E2PU>
nghttp2
5.3
#I9AH1K:CVE-2024-28834<https://gitee.com/open_euler/dashboard?issue_id=I9AH1K>
gnutls
5.3
#I93X74:CVE-2024-26144<https://gitee.com/open_euler/dashboard?issue_id=I93X74>
rubygem-activestorage
5.3
#I9E8PU:CVE-2024-21506<https://gitee.com/open_euler/dashboard?issue_id=I9E8PU>
python-pymongo
5.2
#I9BJ5S:CVE-2024-30204<https://gitee.com/open_euler/dashboard?issue_id=I9BJ5S>
emacs
5
#I9BJ5X:CVE-2024-30205<https://gitee.com/open_euler/dashboard?issue_id=I9BJ5X>
emacs
5
#I92REM:CVE-2024-26585<https://gitee.com/open_euler/dashboard?issue_id=I92REM>
kernel
4.7
#I93ELY:CVE-2024-26593<https://gitee.com/open_euler/dashboard?issue_id=I93ELY>
kernel
4.7
#I9AJ87:CVE-2024-27281<https://gitee.com/open_euler/dashboard?issue_id=I9AJ87>
ruby
4.5
#I93L72:CVE-2023-52469<https://gitee.com/open_euler/dashboard?issue_id=I93L72>
kernel
4.4
#I93L7E:CVE-2023-52467<https://gitee.com/open_euler/dashboard?issue_id=I93L7E>
kernel
4.4
#I93X0G:CVE-2024-26606<https://gitee.com/open_euler/dashboard?issue_id=I93X0G>
kernel
4.4
#I94K5J:CVE-2021-47037<https://gitee.com/open_euler/dashboard?issue_id=I94K5J>
kernel
4.4
#I9AVQ7:CVE-2023-28101<https://gitee.com/open_euler/dashboard?issue_id=I9AVQ7>
flatpak
4.3
#I93EEE:CVE-2023-52456<https://gitee.com/open_euler/dashboard?issue_id=I93EEE>
kernel
4
#I93EDF:CVE-2024-26597<https://gitee.com/open_euler/dashboard?issue_id=I93EDF>
kernel
3.3
#I9AJ8A:CVE-2024-27280<https://gitee.com/open_euler/dashboard?issue_id=I9AJ8A>
ruby
3.1
#I9A7Y2:CVE-2023-50967<https://gitee.com/open_euler/dashboard?issue_id=I9A7Y2>
jose
2.5
#I947TK:CVE-2021-46926<https://gitee.com/open_euler/dashboard?issue_id=I947TK>
kernel
2.3
Bugfix:
issue
仓库
#I9C04M:gssproxy服务停止时释放资源调用LIST_DEL宏参数错误可能导致进程崩溃<https://gitee.com/open_euler/dashboard?issue_id=I9C04M>
gssproxy
#I9EWHR:tbl访问未初始化的内存<https://gitee.com/src-openeuler/groff/issues/I9EWHR>
groff
#I90ZB5:在centos7 4.18与openeuler 5.10.0-136.14.2.90.oe2203sp1.x86_64测试nvme fio write时候,使用ext4文件系统存在性能差异<https://gitee.com/openeuler/kernel/issues/I90ZB5>
kernel
#I97HJA:ext4: ext4_mb_use_inode_pa: Don't BUG_ON when 'pa->pa_free < len' in continue mode<https://gitee.com/openeuler/kernel/issues/I97HJA>
kernel
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/docker_img/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/ob…
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-22.03-LTS Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高):
里程碑
任务ID
任务标题
优先级
sig组
关联仓库
任务路径
openEuler-22.03-LTS update20230726
I7ORCE
【22.03 LTS update20230726】【arm\x86】selinux-policy-base的版本不符合ceph子包的安装条件,ceph子包安装失败; cephadm卸载有异常打印
主要
sig/sig-SDS
src-openEuler/ceph
https://gitee.com/open_euler/dashboard?issue_id=I7ORCE
openEuler-22.03-LTS
I6VFRX
[22.03-LTS][x86/arm]mariadb授权给远程用户,远程连接服务失败
次要
sig/DB
src-openEuler/mariadb
https://gitee.com/open_euler/dashboard?issue_id=I6VFRX
openEuler-22.03-LTS
I72N5G
【22.03-lts】x86环境上同时安装php-fpm软件包和php-opcache软件包后会导致php-fpm.service服务启动失败
次要
sig/Base-service
src-openEuler/php
https://gitee.com/open_euler/dashboard?issue_id=I72N5G
openEuler-22.03-LTS-Dailybuild
I5RTUS
X86架构下无法对mysql8进行autobolt模式反馈编译,报错
无优先级
sig/Compiler,kind/feature
src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I5RTUS
openEuler-22.03-LTS-Dailybuild
I5XP8E
Bug in openEuler/gcc (10.3.0) ,22.03-LTS-performance 分支
无优先级
sig/Compiler
src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I5XP8E
openEuler-22.03-LTS-Dailybuild
I65UF9
aarch64架构boost icl模板库优化错误
无优先级
sig/Compiler
src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I65UF9
openEuler-22.03-LTS-SP1 Update 20240410
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS-SP1修复版本已知问题4个,已知漏洞69个,热补丁1个。目前版本分支剩余待修复缺陷5个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9EP1W?from=project-i…
CVE修复:
CVE
仓库
score
#I9C6X1:CVE-2024-3019<https://gitee.com/open_euler/dashboard?issue_id=I9C6X1>
pcp
8.8
#I92HWD:CVE-2024-24474<https://gitee.com/open_euler/dashboard?issue_id=I92HWD>
qemu
8.2
#I9ATGS:CVE-2022-2469<https://gitee.com/open_euler/dashboard?issue_id=I9ATGS>
libgsasl
8.1
#I4BI7U:CVE-2019-25051<https://gitee.com/open_euler/dashboard?issue_id=I4BI7U>
aspell
7.8
#I9E4NC:CVE-2024-31083<https://gitee.com/open_euler/dashboard?issue_id=I9E4NC>
xorg-x11-server
7.8
#I9AVQD:CVE-2021-32142<https://gitee.com/open_euler/dashboard?issue_id=I9AVQD>
LibRaw
7.8
#I9AURJ:CVE-2022-2639<https://gitee.com/open_euler/dashboard?issue_id=I9AURJ>
openvswitch
7.8
#I932VH:CVE-2024-26589<https://gitee.com/open_euler/dashboard?issue_id=I932VH>
kernel
7.8
#I9AUYL:CVE-2022-24999<https://gitee.com/open_euler/dashboard?issue_id=I9AUYL>
nodejs-qs
7.5
#I9B1Y1:CVE-2024-30156<https://gitee.com/open_euler/dashboard?issue_id=I9B1Y1>
varnish
7.5
#I9AVYL:CVE-2022-48279<https://gitee.com/open_euler/dashboard?issue_id=I9AVYL>
mod_security
7.5
#I9E2PZ:CVE-2024-27316<https://gitee.com/open_euler/dashboard?issue_id=I9E2PZ>
mod_http2
7.5
#I9ACE0:CVE-2024-2002<https://gitee.com/open_euler/dashboard?issue_id=I9ACE0>
libdwarf
7.5
#I8X4FY:CVE-2023-39325<https://gitee.com/open_euler/dashboard?issue_id=I8X4FY>
ignition
7.5
#I90BQQ:CVE-2022-41723<https://gitee.com/open_euler/dashboard?issue_id=I90BQQ>
cri-tools
7.5
#I8X4G2:CVE-2023-39325<https://gitee.com/open_euler/dashboard?issue_id=I8X4G2>
cri-tools
7.5
#I9B1P4:CVE-2024-24786<https://gitee.com/open_euler/dashboard?issue_id=I9B1P4>
cri-tools
7.5
#I90BSM:CVE-2022-41723<https://gitee.com/open_euler/dashboard?issue_id=I90BSM>
cri-o
7.5
#I8X4FZ:CVE-2023-39325<https://gitee.com/open_euler/dashboard?issue_id=I8X4FZ>
cri-o
7.5
#I977K3:CVE-2024-28757<https://gitee.com/open_euler/dashboard?issue_id=I977K3>
expat
7.5
#I9B1O1:CVE-2024-24784<https://gitee.com/open_euler/dashboard?issue_id=I9B1O1>
golang
7.5
#I9E4AM:CVE-2024-31082<https://gitee.com/open_euler/dashboard?issue_id=I9E4AM>
xorg-x11-server
7.3
#I9E4N0:CVE-2024-31081<https://gitee.com/open_euler/dashboard?issue_id=I9E4N0>
xorg-x11-server
7.3
#I9E4N4:CVE-2024-31080<https://gitee.com/open_euler/dashboard?issue_id=I9E4N4>
xorg-x11-server
7.3
#I99JOA:CVE-2024-1013<https://gitee.com/open_euler/dashboard?issue_id=I99JOA>
unixODBC
7.1
#I9DGZJ:CVE-2024-28219<https://gitee.com/open_euler/dashboard?issue_id=I9DGZJ>
python-pillow
6.7
#I9AMRI:CVE-2022-32325<https://gitee.com/open_euler/dashboard?issue_id=I9AMRI>
jpegoptim
6.5
#I94K6R:CVE-2023-23601<https://gitee.com/open_euler/dashboard?issue_id=I94K6R>
mozjs78
6.5
#I94K6T:CVE-2023-23599<https://gitee.com/open_euler/dashboard?issue_id=I94K6T>
mozjs78
6.5
#I9AW6M:CVE-2023-0666<https://gitee.com/open_euler/dashboard?issue_id=I9AW6M>
wireshark
6.5
#I9C342:CVE-2024-2398<https://gitee.com/open_euler/dashboard?issue_id=I9C342>
curl
6.5
#I9AVQ9:CVE-2023-28100<https://gitee.com/open_euler/dashboard?issue_id=I9AVQ9>
flatpak
6.5
#I93ED1:CVE-2023-52454<https://gitee.com/open_euler/dashboard?issue_id=I93ED1>
kernel
6.5
#I94PA7:CVE-2023-52475<https://gitee.com/open_euler/dashboard?issue_id=I94PA7>
kernel
6.3
#I9AH6G:CVE-2024-2494<https://gitee.com/open_euler/dashboard?issue_id=I9AH6G>
libvirt
6.2
#I675RB:CVE-2022-4318<https://gitee.com/src-openeuler/cri-o/issues/I675RB>
cri-o
6.1
#I9AYAU:CVE-2023-48795<https://gitee.com/open_euler/dashboard?issue_id=I9AYAU>
cri-o
5.9
#I8OJ8L:CVE-2023-37328<https://gitee.com/open_euler/dashboard?issue_id=I8OJ8L>
gstreamer1-plugins-base
5.5
#I97N53:CVE-2024-1441<https://gitee.com/open_euler/dashboard?issue_id=I97N53>
libvirt
5.5
#I9138X:CVE-2023-52426<https://gitee.com/open_euler/dashboard?issue_id=I9138X>
expat
5.5
#I932W7:CVE-2023-52443<https://gitee.com/open_euler/dashboard?issue_id=I932W7>
kernel
5.5
#I93HCX:CVE-2024-2660<https://gitee.com/open_euler/dashboard?issue_id=I93HCX>
kernel
5.5
#I94OZS:CVE-2023-52484<https://gitee.com/open_euler/dashboard?issue_id=I94OZS>
kernel
5.5
#I94P2I:CVE-2023-52479<https://gitee.com/open_euler/dashboard?issue_id=I94P2I>
kernel
5.5
#I93HD8:CVE-2024-26603<https://gitee.com/open_euler/dashboard?issue_id=I93HD8>
kernel
5.5
#I9DFPV:CVE-2023-7250<https://gitee.com/open_euler/dashboard?issue_id=I9DFPV>
iperf3
5.3
#I9AH1K:CVE-2024-28834<https://gitee.com/open_euler/dashboard?issue_id=I9AH1K>
gnutls
5.3
#I93X74:CVE-2024-26144<https://gitee.com/open_euler/dashboard?issue_id=I93X74>
rubygem-activestorage
5.3
#I9E2PU:CVE-2024-28182<https://gitee.com/open_euler/dashboard?issue_id=I9E2PU>
nghttp2
5.3
#I9E8PU:CVE-2024-21506<https://gitee.com/open_euler/dashboard?issue_id=I9E8PU>
python-pymongo
5.2
#I9BJ5S:CVE-2024-30204<https://gitee.com/open_euler/dashboard?issue_id=I9BJ5S>
emacs
5
#I9BJ5X:CVE-2024-30205<https://gitee.com/open_euler/dashboard?issue_id=I9BJ5X>
emacs
5
#I92REM:CVE-2024-26585<https://gitee.com/open_euler/dashboard?issue_id=I92REM>
kernel
4.7
#I93ELY:CVE-2024-26593<https://gitee.com/open_euler/dashboard?issue_id=I93ELY>
kernel
4.7
#I94P3R:CVE-2023-52476<https://gitee.com/open_euler/dashboard?issue_id=I94P3R>
kernel
4.7
#I94UOT:CVE-2024-26607<https://gitee.com/open_euler/dashboard?issue_id=I94UOT>
kernel
4.7
#I9AJ87:CVE-2024-27281<https://gitee.com/open_euler/dashboard?issue_id=I9AJ87>
ruby
4.5
#I93L72:CVE-2023-52469<https://gitee.com/open_euler/dashboard?issue_id=I93L72>
kernel
4.4
#I93L7E:CVE-2023-52467<https://gitee.com/open_euler/dashboard?issue_id=I93L7E>
kernel
4.4
#I93X0G:CVE-2024-26606<https://gitee.com/open_euler/dashboard?issue_id=I93X0G>
kernel
4.4
#I94K5J:CVE-2021-47037<https://gitee.com/open_euler/dashboard?issue_id=I94K5J>
kernel
4.4
#I94P5J:CVE-2023-52477<https://gitee.com/open_euler/dashboard?issue_id=I94P5J>
kernel
4.4
#I9AVQ7:CVE-2023-28101<https://gitee.com/open_euler/dashboard?issue_id=I9AVQ7>
flatpak
4.3
#I93EEE:CVE-2023-52456<https://gitee.com/open_euler/dashboard?issue_id=I93EEE>
kernel
4
#I97NHT:CVE-2024-26608<https://gitee.com/open_euler/dashboard?issue_id=I97NHT>
kernel
4
#I97NIJ:CVE-2024-2357<https://gitee.com/open_euler/dashboard?issue_id=I97NIJ>
libreswan
3.5
#I93EDF:CVE-2024-26597<https://gitee.com/open_euler/dashboard?issue_id=I93EDF>
kernel
3.3
#I9AJ8A:CVE-2024-27280<https://gitee.com/open_euler/dashboard?issue_id=I9AJ8A>
ruby
3.1
#I947TK:CVE-2021-46926<https://gitee.com/open_euler/dashboard?issue_id=I947TK>
kernel
2.3
Bugfix:
issue
仓库
#I9C04M:gssproxy服务停止时释放资源调用LIST_DEL宏参数错误可能导致进程崩溃<https://gitee.com/open_euler/dashboard?issue_id=I9C04M>
gssproxy
#I9EWHR:tbl访问未初始化的内存<https://gitee.com/src-openeuler/groff/issues/I9EWHR>
groff
#I90ZB5:在centos7 4.18与openeuler 5.10.0-136.14.2.90.oe2203sp1.x86_64测试nvme fio write时候,使用ext4文件系统存在性能差异<https://gitee.com/openeuler/kernel/issues/I90ZB5>
kernel
#I97HJA:ext4: ext4_mb_use_inode_pa: Don't BUG_ON when 'pa->pa_free < len' in continue mode<https://gitee.com/openeuler/kernel/issues/I97HJA>
kernel
热补丁:
仓库
CVE
score
kernel
CVE-2024-0841
7.8
openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/docker_img/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/hotpatch_update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_versio…
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_versio…
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_versio…
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-22.03-LTS-SP1 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高):
里程碑
任务ID
任务标题
优先级
sig组
关联仓库
任务路径
openEuler 22.03-SP1
I6B4V1
【22.03 SP1 update 20230118】【arm】libhdfs在arm架构降级失败,x86正常
主要
sig/bigdata
src-openEuler/hadoop
https://gitee.com/open_euler/dashboard?issue_id=I6B4V1
openEuler-22.03-LTS-SP1 update20230726
I7OR2I
【22.03 LTS SP1 update20230726】【arm\x86】selinux-policy-base的版本不符合ceph子包的安装条件,ceph子包安装失败
主要
sig/sig-SDS
src-openEuler/ceph
https://gitee.com/open_euler/dashboard?issue_id=I7OR2I
openEuler-22.03-LTS-SP1
I6VFV6
[22.03 SP1] [x86/arm] mariadb授权给远程用户,远程连接服务失败
次要
sig/DB
src-openEuler/mariadb
https://gitee.com/open_euler/dashboard?issue_id=I6VFV6
openEuler-22.03-LTS-SP1
I73CKF
【22.03-lts-sp1】x86环境上同时安装php-fpm软件包和php-opcache软件包后会导致php-fpm.service服务启动失败
次要
sig/Base-service
src-openEuler/php
https://gitee.com/open_euler/dashboard?issue_id=I73CKF
openEuler-22.03-LTS-SP1
I84L9F
openEuler 22.03 LTS-SP1版本上编译node-v18.18.0的代码失败
无优先级
sig/Compiler
src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I84L9F
openEuler-22.03-LTS-SP2 Update 20240410
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS-SP2修复版本已知问题5个,已知漏洞75个,热补丁1个,目前版本分支剩余待修复缺陷4个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS-SP2 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9EP1V?from=project-i…
CVE修复:
CVE
仓库
score
#I92HWD:CVE-2024-24474<https://gitee.com/open_euler/dashboard?issue_id=I92HWD>
qemu
8.2
#I9ATGS:CVE-2022-2469<https://gitee.com/open_euler/dashboard?issue_id=I9ATGS>
libgsasl
8.1
#I4BI7U:CVE-2019-25051<https://gitee.com/open_euler/dashboard?issue_id=I4BI7U>
aspell
7.8
#I89S5X:CVE-2023-45675<https://gitee.com/open_euler/dashboard?issue_id=I89S5X>
stb
7.8
#I9AURJ:CVE-2022-2639<https://gitee.com/open_euler/dashboard?issue_id=I9AURJ>
openvswitch
7.8
#I9AVQD:CVE-2021-32142<https://gitee.com/open_euler/dashboard?issue_id=I9AVQD>
LibRaw
7.8
#I9E4NC:CVE-2024-31083<https://gitee.com/open_euler/dashboard?issue_id=I9E4NC>
xorg-x11-server
7.8
#I932VH:CVE-2024-26589<https://gitee.com/open_euler/dashboard?issue_id=I932VH>
kernel
7.8
#I9AUYL:CVE-2022-24999<https://gitee.com/open_euler/dashboard?issue_id=I9AUYL>
nodejs-qs
7.5
#I8X4FY:CVE-2023-39325<https://gitee.com/open_euler/dashboard?issue_id=I8X4FY>
ignition
7.5
#I9E2PZ:CVE-2024-27316<https://gitee.com/open_euler/dashboard?issue_id=I9E2PZ>
mod_http2
7.5
#I9ACE0:CVE-2024-2002<https://gitee.com/open_euler/dashboard?issue_id=I9ACE0>
libdwarf
7.5
#I90BQQ:CVE-2022-41723<https://gitee.com/open_euler/dashboard?issue_id=I90BQQ>
cri-tools
7.5
#I8X4G2:CVE-2023-39325<https://gitee.com/open_euler/dashboard?issue_id=I8X4G2>
cri-tools
7.5
#I9B1P4:CVE-2024-24786<https://gitee.com/open_euler/dashboard?issue_id=I9B1P4>
cri-tools
7.5
#I90BSM:CVE-2022-41723<https://gitee.com/open_euler/dashboard?issue_id=I90BSM>
cri-o
7.5
#I8X4FZ:CVE-2023-39325<https://gitee.com/open_euler/dashboard?issue_id=I8X4FZ>
cri-o
7.5
#I977K3:CVE-2024-28757<https://gitee.com/open_euler/dashboard?issue_id=I977K3>
expat
7.5
#I9B1O1:CVE-2024-24784<https://gitee.com/open_euler/dashboard?issue_id=I9B1O1>
golang
7.5
#I9B1Y1:CVE-2024-30156<https://gitee.com/open_euler/dashboard?issue_id=I9B1Y1>
varnish
7.5
#I9AWCO:CVE-2022-39028<https://gitee.com/open_euler/dashboard?issue_id=I9AWCO>
telnet
7.5
#I9E4AM:CVE-2024-31082<https://gitee.com/open_euler/dashboard?issue_id=I9E4AM>
xorg-x11-server
7.3
#I9E4N0:CVE-2024-31081<https://gitee.com/open_euler/dashboard?issue_id=I9E4N0>
xorg-x11-server
7.3
#I9E4N4:CVE-2024-31080<https://gitee.com/open_euler/dashboard?issue_id=I9E4N4>
xorg-x11-server
7.3
#I99JOA:CVE-2024-1013<https://gitee.com/open_euler/dashboard?issue_id=I99JOA>
unixODBC
7.1
#I9DGZJ:CVE-2024-28219<https://gitee.com/open_euler/dashboard?issue_id=I9DGZJ>
python-pillow
6.7
#I9AMRI:CVE-2022-32325<https://gitee.com/open_euler/dashboard?issue_id=I9AMRI>
jpegoptim
6.5
#I94K6R:CVE-2023-23601<https://gitee.com/open_euler/dashboard?issue_id=I94K6R>
mozjs78
6.5
#I94K6T:CVE-2023-23599<https://gitee.com/open_euler/dashboard?issue_id=I94K6T>
mozjs78
6.5
#I9C342:CVE-2024-2398<https://gitee.com/open_euler/dashboard?issue_id=I9C342>
curl
6.5
#I9AW6M:CVE-2023-0666<https://gitee.com/open_euler/dashboard?issue_id=I9AW6M>
wireshark
6.5
#I9AVQ9:CVE-2023-28100<https://gitee.com/open_euler/dashboard?issue_id=I9AVQ9>
flatpak
6.5
#I93ED1:CVE-2023-52454<https://gitee.com/open_euler/dashboard?issue_id=I93ED1>
kernel
6.5
#I94PA7:CVE-2023-52475<https://gitee.com/open_euler/dashboard?issue_id=I94PA7>
kernel
6.3
#I9AH6G:CVE-2024-2494<https://gitee.com/open_euler/dashboard?issue_id=I9AH6G>
libvirt
6.2
#I9AYAU:CVE-2023-48795<https://gitee.com/open_euler/dashboard?issue_id=I9AYAU>
cri-o
5.9
#I97N53:CVE-2024-1441<https://gitee.com/open_euler/dashboard?issue_id=I97N53>
libvirt
5.5
#I8OJ8L:CVE-2023-37328<https://gitee.com/open_euler/dashboard?issue_id=I8OJ8L>
gstreamer1-plugins-base
5.5
#I9138X:CVE-2023-52426<https://gitee.com/open_euler/dashboard?issue_id=I9138X>
expat
5.5
#I932W7:CVE-2023-52443<https://gitee.com/open_euler/dashboard?issue_id=I932W7>
kernel
5.5
#I93HCX:CVE-2024-26600<https://gitee.com/open_euler/dashboard?issue_id=I93HCX>
kernel
5.5
#I93HD8:CVE-2024-26603<https://gitee.com/open_euler/dashboard?issue_id=I93HD8>
kernel
5.5
#I94OZS:CVE-2023-52484<https://gitee.com/open_euler/dashboard?issue_id=I94OZS>
kernel
5.5
#I94P2I:CVE-2023-52479<https://gitee.com/open_euler/dashboard?issue_id=I94P2I>
kernel
5.5
#I93X74:CVE-2024-26144<https://gitee.com/open_euler/dashboard?issue_id=I93X74>
rubygem-activestorage
5.3
#I9DFPV:CVE-2023-7250<https://gitee.com/open_euler/dashboard?issue_id=I9DFPV>
iperf3
5.3
#I9E2PU:CVE-2024-28182<https://gitee.com/open_euler/dashboard?issue_id=I9E2PU>
nghttp2
5.3
#I9AH1K:CVE-2024-28834<https://gitee.com/open_euler/dashboard?issue_id=I9AH1K>
gnutls
5.3
#I9E8PU:CVE-2024-21506<https://gitee.com/open_euler/dashboard?issue_id=I9E8PU>
python-pymongo
5.2
#I9BJ5S:CVE-2024-30204<https://gitee.com/open_euler/dashboard?issue_id=I9BJ5S>
emacs
5
#I9BJ5X:CVE-2024-30205<https://gitee.com/open_euler/dashboard?issue_id=I9BJ5X>
emacs
5
#I92REM:CVE-2024-26585<https://gitee.com/open_euler/dashboard?issue_id=I92REM>
kernel
4.7
#I93ELY:CVE-2024-26593<https://gitee.com/open_euler/dashboard?issue_id=I93ELY>
kernel
4.7
#I94P3R:CVE-2023-52476<https://gitee.com/open_euler/dashboard?issue_id=I94P3R>
kernel
4.7
#I94UOT:CVE-2024-26607<https://gitee.com/open_euler/dashboard?issue_id=I94UOT>
kernel
4.7
#I9AJ87:CVE-2024-27281<https://gitee.com/open_euler/dashboard?issue_id=I9AJ87>
ruby
4.5
#I93L72:CVE-2023-52469<https://gitee.com/open_euler/dashboard?issue_id=I93L72>
kernel
4.4
#I93L7E:CVE-2023-52467<https://gitee.com/open_euler/dashboard?issue_id=I93L7E>
kernel
4.4
#I93X0G:CVE-2024-26606<https://gitee.com/open_euler/dashboard?issue_id=I93X0G>
kernel
4.4
#I94K5J:CVE-2021-47037<https://gitee.com/open_euler/dashboard?issue_id=I94K5J>
kernel
4.4
#I93ED4:CVE-2023-52462<https://gitee.com/open_euler/dashboard?issue_id=I93ED4>
kernel
4.4
#I94P5J:CVE-2023-52477<https://gitee.com/open_euler/dashboard?issue_id=I94P5J>
kernel
4.4
#I9AVQ7:CVE-2023-28101<https://gitee.com/open_euler/dashboard?issue_id=I9AVQ7>
flatpak
4.3
#I93EDC:CVE-2023-52457<https://gitee.com/open_euler/dashboard?issue_id=I93EDC>
kernel
4.2
#I93EEE:CVE-2023-52456<https://gitee.com/open_euler/dashboard?issue_id=I93EEE>
kernel
4
#I97NHT:CVE-2024-26608<https://gitee.com/open_euler/dashboard?issue_id=I97NHT>
kernel
4
#I93EDF:CVE-2024-26597<https://gitee.com/open_euler/dashboard?issue_id=I93EDF>
kernel
3.3
#I9AJ8A:CVE-2024-27280<https://gitee.com/open_euler/dashboard?issue_id=I9AJ8A>
ruby
3.1
#I9A7Y2:CVE-2023-50967<https://gitee.com/open_euler/dashboard?issue_id=I9A7Y2>
jose
2.5
#I947TK:CVE-2021-46926<https://gitee.com/open_euler/dashboard?issue_id=I947TK>
kernel
2.3
#I9BV23:CVE-2024-26644<https://gitee.com/open_euler/dashboard?issue_id=I9BV23>
kernel
1
#I9DD86:CVE-2024-26654<https://gitee.com/open_euler/dashboard?issue_id=I9DD86>
kernel
1
#I9E2EQ:CVE-2024-26696<https://gitee.com/open_euler/dashboard?issue_id=I9E2EQ>
kernel
1
#I9E2M9:CVE-2024-26773<https://gitee.com/open_euler/dashboard?issue_id=I9E2M9>
kernel
1
#I9E46I:CVE-2024-26788<https://gitee.com/open_euler/dashboard?issue_id=I9E46I>
kernel
1
Bugfix:
issue
仓库
#I9C04M:gssproxy服务停止时释放资源调用LIST_DEL宏参数错误可能导致进程崩溃<https://gitee.com/open_euler/dashboard?issue_id=I9C04M>
gssproxy
#I9EWHR:tbl访问未初始化的内存<https://gitee.com/open_euler/dashboard?issue_id=I9EWHR>
groff
#I90ZB5:在centos7 4.18与openeuler 5.10.0-136.14.2.90.oe2203sp1.x86_64测试nvme fio write时候,使用ext4文件系统存在性能差异<https://gitee.com/open_euler/dashboard?issue_id=I90ZB5>
kernel
#I92AK4:支持获取minor版本号,以便支持mpam v0.1版本<https://gitee.com/open_euler/dashboard?issue_id=I92AK4>
kernel
#I97HJA:ext4: ext4_mb_use_inode_pa: Don't BUG_ON when 'pa->pa_free < len' in continue mode<https://gitee.com/open_euler/dashboard?issue_id=I97HJA>
kernel
热补丁:
仓库
CVE
score
kernel
CVE-2024-1086
7.8
openEuler-22.03-LTS SP2版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-22.03-LTS SP2 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/hotpatch_update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/docker_img/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/EPOL/update/multi_versio…
https://repo.openeuler.org/openEuler-22.03-LTS-SP2/EPOL/update/multi_versio…
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
https://repo.openeuler.org/security/data/hotpatch_cvrf/
openEuler-22.03-LTS-SP2 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高):
里程碑
任务ID
任务标题
优先级
sig组
关联仓库
任务路径
openEuler-22.03-LTS-SP2-round-2
I795G3
【22.03-LTS-SP2 round2】本次转测源中出现多个版本的containers-common
主要
sig/sig-CloudNative
src-openEuler/skopeo
https://gitee.com/open_euler/dashboard?issue_id=I795G3
openEuler-22.03-LTS-SP2-SEC
I7AFIR
【22.03-LTS-SP2 round2】【x86/arm】libkae-1.2.10-6.oe2203sp2安全编译选项Rpath/Runpath不满足
主要
sig-AccLib
src-openEuler/libkae
https://gitee.com/open_euler/dashboard?issue_id=I7AFIR
openEuler-22.03-LTS-SP2-update20231018
I89NB0
22.03-LTS-SP2的ceph release版本低于22.03-LTS-SP1 release版本
次要
sig/sig-SDS
src-openEuler/ceph
https://gitee.com/open_euler/dashboard?issue_id=I89NB0
openEuler-22.03-LTS-SP2
I7B6X5
gcc-pie-arm64架构和操作手册结果不同
无优先级
sig/Compiler
src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I7B6X5
openEuler-20.03-LTS-SP4 Update 20240410
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP4修复版本已知问题13个,已知漏洞99个。目前版本分支剩余待修复缺陷7个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP4 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9EP1Y?from=project-i…
CVE修复:
CVE
仓库
score
#I58YVD:CVE-2022-1802<https://gitee.com/open_euler/dashboard?issue_id=I58YVD>
firefox
8.8
#I9AO3J:CVE-2022-31163<https://gitee.com/open_euler/dashboard?issue_id=I9AO3J>
rubygem-tzinfo
8.1
#I9ATGS:CVE-2022-2469<https://gitee.com/open_euler/dashboard?issue_id=I9ATGS>
libgsasl
8.1
#I9AURJ:CVE-2022-2639<https://gitee.com/open_euler/dashboard?issue_id=I9AURJ>
openvswitch
7.8
#I9E4NC:CVE-2024-31083<https://gitee.com/open_euler/dashboard?issue_id=I9E4NC>
xorg-x11-server
7.8
#I9AVQD:CVE-2021-32142<https://gitee.com/open_euler/dashboard?issue_id=I9AVQD>
LibRaw
7.8
#I8YV0T:CVE-2024-23307<https://gitee.com/open_euler/dashboard?issue_id=I8YV0T>
kernel
7.8
#I95LPF:CVE-2024-26622<https://gitee.com/open_euler/dashboard?issue_id=I95LPF>
kernel
7.8
#I96G7N:CVE-2023-52600<https://gitee.com/open_euler/dashboard?issue_id=I96G7N>
kernel
7.8
#I96GXM:CVE-2024-26625<https://gitee.com/open_euler/dashboard?issue_id=I96GXM>
kernel
7.8
#I990AF:CVE-2021-47131<https://gitee.com/open_euler/dashboard?issue_id=I990AF>
kernel
7.8
#I9AUYL:CVE-2022-24999<https://gitee.com/open_euler/dashboard?issue_id=I9AUYL>
nodejs-qs
7.5
#I9ACE0:CVE-2024-2002<https://gitee.com/open_euler/dashboard?issue_id=I9ACE0>
libdwarf
7.5
#I9ASUL:CVE-2022-2309<https://gitee.com/open_euler/dashboard?issue_id=I9ASUL>
libxml2
7.5
#I9AVYL:CVE-2022-48279<https://gitee.com/open_euler/dashboard?issue_id=I9AVYL>
mod_security
7.5
#I9AWCO:CVE-2022-39028<https://gitee.com/open_euler/dashboard?issue_id=I9AWCO>
telnet
7.5
#I9E2PZ:CVE-2024-27316<https://gitee.com/open_euler/dashboard?issue_id=I9E2PZ>
mod_http2
7.5
#I977K3:CVE-2024-28757<https://gitee.com/open_euler/dashboard?issue_id=I977K3>
expat
7.5
#I9B1O1:CVE-2024-24784<https://gitee.com/open_euler/dashboard?issue_id=I9B1O1>
golang
7.5
#I9B1Y1:CVE-2024-30156<https://gitee.com/open_euler/dashboard?issue_id=I9B1Y1>
varnish
7.5
#I9E4AM:CVE-2024-31082<https://gitee.com/open_euler/dashboard?issue_id=I9E4AM>
xorg-x11-server
7.3
#I9E4N0:CVE-2024-31081<https://gitee.com/open_euler/dashboard?issue_id=I9E4N0>
xorg-x11-server
7.3
#I9E4N4:CVE-2024-31080<https://gitee.com/open_euler/dashboard?issue_id=I9E4N4>
xorg-x11-server
7.3
#I99JOA:CVE-2024-1013<https://gitee.com/open_euler/dashboard?issue_id=I99JOA>
unixODBC
7.1
#I949C5:CVE-2021-46952<https://gitee.com/open_euler/dashboard?issue_id=I949C5>
kernel
7.1
#I96G7F:CVE-2023-52599<https://gitee.com/open_euler/dashboard?issue_id=I96G7F>
kernel
7.1
#I96GQ3:CVE-2023-52601<https://gitee.com/open_euler/dashboard?issue_id=I96GQ3>
kernel
7.1
#I95AXP:CVE-2023-52502<https://gitee.com/open_euler/dashboard?issue_id=I95AXP>
kernel
7
#I9DGZJ:CVE-2024-28219<https://gitee.com/open_euler/dashboard?issue_id=I9DGZJ>
python-pillow
6.7
#I9AMRI:CVE-2022-32325<https://gitee.com/open_euler/dashboard?issue_id=I9AMRI>
jpegoptim
6.5
#I94K6R:CVE-2023-23601<https://gitee.com/open_euler/dashboard?issue_id=I94K6R>
mozjs78
6.5
#I94K6T:CVE-2023-23599<https://gitee.com/open_euler/dashboard?issue_id=I94K6T>
mozjs78
6.5
#I9AW6M:CVE-2023-0666<https://gitee.com/open_euler/dashboard?issue_id=I9AW6M>
wireshark
6.5
#I9C342:CVE-2024-2398<https://gitee.com/open_euler/dashboard?issue_id=I9C342>
curl
6.5
#I99JV2:CVE-2024-26641<https://gitee.com/open_euler/dashboard?issue_id=I99JV2>
kernel
6.1
#I95RDW:CVE-2021-47101<https://gitee.com/open_euler/dashboard?issue_id=I95RDW>
kernel
6
#I96G8W:CVE-2023-52587<https://gitee.com/open_euler/dashboard?issue_id=I96G8W>
kernel
6
#I8OJ8L:CVE-2023-37328<https://gitee.com/open_euler/dashboard?issue_id=I8OJ8L>
gstreamer1-plugins-base
5.5
#I9138X:CVE-2023-52426<https://gitee.com/open_euler/dashboard?issue_id=I9138X>
expat
5.5
#I932W7:CVE-2023-52443<https://gitee.com/open_euler/dashboard?issue_id=I932W7>
kernel
5.5
#I93HCX:CVE-2024-26600<https://gitee.com/open_euler/dashboard?issue_id=I93HCX>
kernel
5.5
#I93LMH:CVE-2021-46904<https://gitee.com/open_euler/dashboard?issue_id=I93LMH>
kernel
5.5
#I94JCO:CVE-2021-46989<https://gitee.com/open_euler/dashboard?issue_id=I94JCO>
kernel
5.5
#I94JH2:CVE-2020-36780<https://gitee.com/open_euler/dashboard?issue_id=I94JH2>
kernel
5.5
#I95B1F:CVE-2023-52509<https://gitee.com/open_euler/dashboard?issue_id=I95B1F>
kernel
5.5
#I9909R:CVE-2021-47113<https://gitee.com/open_euler/dashboard?issue_id=I9909R>
kernel
5.5
#I9909V:CVE-2021-47114<https://gitee.com/open_euler/dashboard?issue_id=I9909V>
kernel
5.5
#I990A7:CVE-2021-47122<https://gitee.com/open_euler/dashboard?issue_id=I990A7>
kernel
5.5
#I95REH:CVE-2021-47091<https://gitee.com/open_euler/dashboard?issue_id=I95REH>
kernel
5.5
#I99K08:CVE-2024-26633<https://gitee.com/open_euler/dashboard?issue_id=I99K08>
kernel
5.5
#I9DFPV:CVE-2023-7250<https://gitee.com/open_euler/dashboard?issue_id=I9DFPV>
iperf3
5.3
#I9E2PU:CVE-2024-28182<https://gitee.com/open_euler/dashboard?issue_id=I9E2PU>
nghttp2
5.3
#I9AH1K:CVE-2024-28834<https://gitee.com/open_euler/dashboard?issue_id=I9AH1K>
gnutls
5.3
#I9E8PU:CVE-2024-21506<https://gitee.com/open_euler/dashboard?issue_id=I9E8PU>
python-pymongo
5.2
#I9BJ5S:CVE-2024-30204<https://gitee.com/open_euler/dashboard?issue_id=I9BJ5S>
emacs
5
#I9AJ87:CVE-2024-27281<https://gitee.com/open_euler/dashboard?issue_id=I9AJ87>
ruby
4.5
#I93L72:CVE-2023-52469<https://gitee.com/open_euler/dashboard?issue_id=I93L72>
kernel
4.4
#I93X0G:CVE-2024-26606<https://gitee.com/open_euler/dashboard?issue_id=I93X0G>
kernel
4.4
#I947PH:CVE-2021-46928<https://gitee.com/open_euler/dashboard?issue_id=I947PH>
kernel
4.4
#I947U7:CVE-2021-46935<https://gitee.com/open_euler/dashboard?issue_id=I947U7>
kernel
4.4
#I947OW:CVE-2021-46924<https://gitee.com/open_euler/dashboard?issue_id=I947OW>
kernel
4.3
#I93EDF:CVE-2024-26597<https://gitee.com/open_euler/dashboard?issue_id=I93EDF>
kernel
3.3
#I947SE:CVE-2021-46934<https://gitee.com/open_euler/dashboard?issue_id=I947SE>
kernel
3.3
#I949D9:CVE-2020-36777<https://gitee.com/open_euler/dashboard?issue_id=I949D9>
kernel
3.3
#I94JHY:CVE-2020-36784<https://gitee.com/open_euler/dashboard?issue_id=I94JHY>
kernel
3.3
#I990AA:CVE-2021-47112<https://gitee.com/open_euler/dashboard?issue_id=I990AA>
kernel
3.3
#I9AJ8A:CVE-2024-27280<https://gitee.com/open_euler/dashboard?issue_id=I9AJ8A>
ruby
3.1
#I9A7Y2:CVE-2023-50967<https://gitee.com/open_euler/dashboard?issue_id=I9A7Y2>
jose
2.5
#I947TK:CVE-2021-46926<https://gitee.com/open_euler/dashboard?issue_id=I947TK>
kernel
2.3
#I9BGUB:CVE-2021-47142<https://gitee.com/open_euler/dashboard?issue_id=I9BGUB>
kernel
1
#I9BGMR:CVE-2021-47143<https://gitee.com/open_euler/dashboard?issue_id=I9BGMR>
kernel
1
#I9BGUR:CVE-2021-47144<https://gitee.com/open_euler/dashboard?issue_id=I9BGUR>
kernel
1
#I9BGQL:CVE-2021-47145<https://gitee.com/open_euler/dashboard?issue_id=I9BGQL>
kernel
1
#I9BGV4:CVE-2021-47146<https://gitee.com/open_euler/dashboard?issue_id=I9BGV4>
kernel
1
#I9BGKK:CVE-2021-47149<https://gitee.com/open_euler/dashboard?issue_id=I9BGKK>
kernel
1
#I9BGVY:CVE-2021-47150<https://gitee.com/open_euler/dashboard?issue_id=I9BGVY>
kernel
1
#I9BGWP:CVE-2021-47153<https://gitee.com/open_euler/dashboard?issue_id=I9BGWP>
kernel
1
#I9BHSG:CVE-2021-47159<https://gitee.com/open_euler/dashboard?issue_id=I9BHSG>
kernel
1
#I9BHG2:CVE-2021-47160<https://gitee.com/open_euler/dashboard?issue_id=I9BHG2>
kernel
1
#I9BHF9:CVE-2021-47162<https://gitee.com/open_euler/dashboard?issue_id=I9BHF9>
kernel
1
#I9BHRY:CVE-2021-47163<https://gitee.com/open_euler/dashboard?issue_id=I9BHRY>
kernel
1
#I9BHTI:CVE-2021-47167<https://gitee.com/open_euler/dashboard?issue_id=I9BHTI>
kernel
1
#I9BHLP:CVE-2021-47169<https://gitee.com/open_euler/dashboard?issue_id=I9BHLP>
kernel
1
#I9BHQL:CVE-2021-47170<https://gitee.com/open_euler/dashboard?issue_id=I9BHQL>
kernel
1
#I9BHNM:CVE-2021-47171<https://gitee.com/open_euler/dashboard?issue_id=I9BHNM>
kernel
1
#I9BHNX:CVE-2021-47173<https://gitee.com/open_euler/dashboard?issue_id=I9BHNX>
kernel
1
#I9BHQ7:CVE-2021-47180<https://gitee.com/open_euler/dashboard?issue_id=I9BHQ7>
kernel
1
#I9AK6C:CVE-2023-52620<https://gitee.com/open_euler/dashboard?issue_id=I9AK6C>
kernel
1
#I9BV4P:CVE-2023-52622<https://gitee.com/open_euler/dashboard?issue_id=I9BV4P>
kernel
1
#I9CTGE:CVE-2023-52629<https://gitee.com/open_euler/dashboard?issue_id=I9CTGE>
kernel
1
#I9AK56:CVE-2024-26642<https://gitee.com/open_euler/dashboard?issue_id=I9AK56>
kernel
1
#I9BV23:CVE-2024-26644<https://gitee.com/open_euler/dashboard?issue_id=I9BV23>
kernel
1
#I9BV24:CVE-2024-26645<https://gitee.com/open_euler/dashboard?issue_id=I9BV24>
kernel
1
#I9C6FA:CVE-2024-26651<https://gitee.com/open_euler/dashboard?issue_id=I9C6FA>
kernel
1
#I9DD86:CVE-2024-26654<https://gitee.com/open_euler/dashboard?issue_id=I9DD86>
kernel
1
#I9DNPD:CVE-2024-26668<https://gitee.com/open_euler/dashboard?issue_id=I9DNPD>
kernel
1
#I9E2O0:CVE-2024-26751<https://gitee.com/open_euler/dashboard?issue_id=I9E2O0>
kernel
1
Bugfix:
issue
仓库
#I9C04M:gssproxy服务停止时释放资源调用LIST_DEL宏参数错误可能导致进程崩溃<https://gitee.com/open_euler/dashboard?issue_id=I9C04M>
gssproxy
#I8Z2JH:openEuler 20.03 LTS SP3对盘通知式下电后,盘又被系统接管<https://gitee.com/open_euler/dashboard?issue_id=I8Z2JH>
kernel
#I9355O:keys: safe concurrent user->{session,uid}_keyring access<https://gitee.com/open_euler/dashboard?issue_id=I9355O>
kernel
#I97HJA:ext4: ext4_mb_use_inode_pa: Don't BUG_ON when 'pa->pa_free < len' in continue mode<https://gitee.com/open_euler/dashboard?issue_id=I97HJA>
kernel
#I991GQ:crypto: algif_aead - fix uninitialized ctx->init<https://gitee.com/open_euler/dashboard?issue_id=I991GQ>
kernel
#I992IL: crypto: algif_aead - Only wake up when ctx->more is zero<https://gitee.com/open_euler/dashboard?issue_id=I992IL>
kernel
#I9ARW6:【OLK-5.10】启动31台带内存带宽Qos的虚拟机,前端查看有2台虚拟机schemata值不符合预期设置的Qos值<https://gitee.com/open_euler/dashboard?issue_id=I9ARW6>
kernel
#I9AZFU:【OLK-5.10】 修复MPAM重复使能问题<https://gitee.com/open_euler/dashboard?issue_id=I9AZFU>
kernel
#I9BD67:【OLK-5.10】iostat以及/proc/diskstats显示异常大,会产生跳变,统计不准。<https://gitee.com/open_euler/dashboard?issue_id=I9BD67>
kernel
#I9BWES:mm: ksm: fix use-after-free kasan report in ksm_might_need_to_copy<https://gitee.com/open_euler/dashboard?issue_id=I9BWES>
kernel
#I9C0QZ:mlock 溢出没有返回失败<https://gitee.com/open_euler/dashboard?issue_id=I9C0QZ>
kernel
#I9D6UN:【openEuler-1.0-LTS/OLK-5.10/OLK-6.6】hns3网卡驱动在动态vlan模式下,可能出现VF无法收到带vlan报文的问题。<https://gitee.com/open_euler/dashboard?issue_id=I9D6UN>
kernel
#I9DOVK:盘被锁后芯片默认超时时间偏小引发IO异常完成<https://gitee.com/open_euler/dashboard?issue_id=I9DOVK>
kernel
openEuler-20.03-LTS SP4版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-20.03-LTS SP4 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP4/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP4/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
https://repo.openeuler.org/security/data/hotpatch_cvrf/
openEuler-20.03-LTS-SP4 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高):
里程碑
任务ID
任务标题
优先级
标签
关联仓库
任务路径
openEuler-20.03-LTS-SP4-round-1
I8DT5M
【openEuler-20.03-LTS-SP4 rc1】redis-sentinel.service启动失败
主要
sig/bigdata
src-openEuler/redis6
https://gitee.com/open_euler/dashboard?issue_id=I8DT5M
openEuler-20.03-LTS-SP4-round-1
I8EKUI
【openEuler-20.03-LTS-SP4 rc1】strongswan-swanctl.service服务启动失败
主要
sig/sig-security-fac
src-openEuler/strongswan
https://gitee.com/open_euler/dashboard?issue_id=I8EKUI
openEuler-20.03-LTS-SP4-round-2
I8GDGR
【openEuler-20.03-LTS-SP4-RC2】【arm/x86】物理机安装gnome-*启用图形化界面重启之后卡住
主要
sig/GNOME
src-openEuler/gnome-desktop3
https://gitee.com/open_euler/dashboard?issue_id=I8GDGR
openEuler-20.03-LTS-SP4-alpha
I8B7XU
【openEuler-20.03-LTS-SP4 alpha】[arm/x86]vdsmd.service服务启动失败
主要
sig/oVirt
src-openEuler/vdsm
https://gitee.com/open_euler/dashboard?issue_id=I8B7XU
openEuler-20.03-LTS-SP4-round-2
I8G371
【20.03-SP4-rc2】【arm/x86】h2源码包本地自编译失败
次要
sig/DB
src-openEuler/h2
https://gitee.com/open_euler/dashboard?issue_id=I8G371
openEuler-20.03-LTS-SP4-dailybuild
I8GUMP
[EulerMaker] nagios-plugins build problem in openEuler-20.03-LTS-SP4:everything
不重要
sig/Networking
src-openEuler/nagios-plugins
https://gitee.com/open_euler/dashboard?issue_id=I8GUMP
openEuler-20.03-LTS-SP4-dailybuild
I8I8DQ
[EulerMaker] caja-extensions install problem in openEuler-20.03-LTS-SP4:epol
不重要
sig/sig-mate-desktop
src-openEuler/caja-extensions
https://gitee.com/open_euler/dashboard?issue_id=I8I8DQ
openEuler-22.03-LTS-SP3 Update 20240410
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS-SP3修复版本已知问题20个,已知漏洞75个。目前版本分支剩余待修复缺陷1个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I9EP1T?from=project-i…
CVE修复:
CVE
仓库
score
#I9C6X1:CVE-2024-3019<https://gitee.com/open_euler/dashboard?issue_id=I9C6X1>
pcp
8.8
#I92HWD:CVE-2024-24474<https://gitee.com/open_euler/dashboard?issue_id=I92HWD>
qemu
8.2
#I9ATGS:CVE-2022-2469<https://gitee.com/open_euler/dashboard?issue_id=I9ATGS>
libgsasl
8.1
#I4BI7U:CVE-2019-25051<https://gitee.com/open_euler/dashboard?issue_id=I4BI7U>
aspell
7.8
#I9AURJ:CVE-2022-2639<https://gitee.com/open_euler/dashboard?issue_id=I9AURJ>
openvswitch
7.8
#I9E4NC:CVE-2024-31083<https://gitee.com/open_euler/dashboard?issue_id=I9E4NC>
xorg-x11-server
7.8
#I932VH:CVE-2024-26589<https://gitee.com/open_euler/dashboard?issue_id=I932VH>
kernel
7.8
#I89S5X:CVE-2023-45675<https://gitee.com/open_euler/dashboard?issue_id=I89S5X>
stb
7.8
#I9AWCO:CVE-2022-39028<https://gitee.com/open_euler/dashboard?issue_id=I9AWCO>
telnet
7.5
#I8X4FZ:CVE-2023-39325<https://gitee.com/open_euler/dashboard?issue_id=I8X4FZ>
cri-o
7.5
#I977K3:CVE-2024-28757<https://gitee.com/open_euler/dashboard?issue_id=I977K3>
expat
7.5
#I9B1O1:CVE-2024-24784<https://gitee.com/open_euler/dashboard?issue_id=I9B1O1>
golang
7.5
#I9B1Y1:CVE-2024-30156<https://gitee.com/open_euler/dashboard?issue_id=I9B1Y1>
varnish
7.5
#I8X4FY:CVE-2023-39325<https://gitee.com/open_euler/dashboard?issue_id=I8X4FY>
ignition
7.5
#I9E2PZ:CVE-2024-27316<https://gitee.com/open_euler/dashboard?issue_id=I9E2PZ>
mod_http2
7.5
#I8X4G2:CVE-2023-39325<https://gitee.com/open_euler/dashboard?issue_id=I8X4G2>
cri-tools
7.5
#I9B1P4:CVE-2024-24786<https://gitee.com/open_euler/dashboard?issue_id=I9B1P4>
cri-tools
7.5
#I9E4AM:CVE-2024-31082<https://gitee.com/open_euler/dashboard?issue_id=I9E4AM>
xorg-x11-server
7.3
#I9E4N0:CVE-2024-31081<https://gitee.com/open_euler/dashboard?issue_id=I9E4N0>
xorg-x11-server
7.3
#I9E4N4:CVE-2024-31080<https://gitee.com/open_euler/dashboard?issue_id=I9E4N4>
xorg-x11-server
7.3
#I96GQ3:CVE-2023-52601<https://gitee.com/open_euler/dashboard?issue_id=I96GQ3>
kernel
7.1
#I9DGZJ:CVE-2024-28219<https://gitee.com/open_euler/dashboard?issue_id=I9DGZJ>
python-pillow
6.7
#I94K6R:CVE-2023-23601<https://gitee.com/open_euler/dashboard?issue_id=I94K6R>
mozjs78
6.5
#I94K6T:CVE-2023-23599<https://gitee.com/open_euler/dashboard?issue_id=I94K6T>
mozjs78
6.5
#I9C342:CVE-2024-2398<https://gitee.com/open_euler/dashboard?issue_id=I9C342>
curl
6.5
#I9AVQ9:CVE-2023-28100<https://gitee.com/open_euler/dashboard?issue_id=I9AVQ9>
flatpak
6.5
#I93ED1:CVE-2023-52454<https://gitee.com/open_euler/dashboard?issue_id=I93ED1>
kernel
6.5
#I9AMRI:CVE-2022-32325<https://gitee.com/open_euler/dashboard?issue_id=I9AMRI>
jpegoptim
6.5
#I9AH6G:CVE-2024-2494<https://gitee.com/open_euler/dashboard?issue_id=I9AH6G>
libvirt
6.2
#I99JV2:CVE-2024-26641<https://gitee.com/open_euler/dashboard?issue_id=I99JV2>
kernel
6.1
#I95RDW:CVE-2021-47101<https://gitee.com/open_euler/dashboard?issue_id=I95RDW>
kernel
6
#I9AYAU:CVE-2023-48795<https://gitee.com/open_euler/dashboard?issue_id=I9AYAU>
cri-o
5.9
#I9138X:CVE-2023-52426<https://gitee.com/open_euler/dashboard?issue_id=I9138X>
expat
5.5
#I932W7:CVE-2023-52443<https://gitee.com/open_euler/dashboard?issue_id=I932W7>
kernel
5.5
#I93HCX:CVE-2024-2660<https://gitee.com/open_euler/dashboard?issue_id=I93HCX>
kernel
5.5
#I94OZS:CVE-2023-52484<https://gitee.com/open_euler/dashboard?issue_id=I94OZS>
kernel
5.5
#I94P2I:CVE-2023-52479<https://gitee.com/open_euler/dashboard?issue_id=I94P2I>
kernel
5.5
#I99K08:CVE-2024-26633<https://gitee.com/open_euler/dashboard?issue_id=I99K08>
kernel
5.5
#I97N53:CVE-2024-1441<https://gitee.com/open_euler/dashboard?issue_id=I97N53>
libvirt
5.5
#I93X74:CVE-2024-26144<https://gitee.com/open_euler/dashboard?issue_id=I93X74>
rubygem-activestorage
5.3
#I9DFPV:CVE-2023-7250<https://gitee.com/open_euler/dashboard?issue_id=I9DFPV>
iperf3
5.3
#I9E2PU:CVE-2024-28182<https://gitee.com/open_euler/dashboard?issue_id=I9E2PU>
nghttp2
5.3
#I9AH1K:CVE-2024-28834<https://gitee.com/open_euler/dashboard?issue_id=I9AH1K>
gnutls
5.3
#I9E8PU:CVE-2024-21506<https://gitee.com/open_euler/dashboard?issue_id=I9E8PU>
python-pymongo
5.2
#I9BJ5S:CVE-2024-30204<https://gitee.com/open_euler/dashboard?issue_id=I9BJ5S>
emacs
5
#I9BJ5X:CVE-2024-30205<https://gitee.com/open_euler/dashboard?issue_id=I9BJ5X>
emacs
5
#I92REM:CVE-2024-26585<https://gitee.com/open_euler/dashboard?issue_id=I92REM>
kernel
4.7
#I93ELY:CVE-2024-26593<https://gitee.com/open_euler/dashboard?issue_id=I93ELY>
kernel
4.7
#I94P3R:CVE-2023-52476<https://gitee.com/open_euler/dashboard?issue_id=I94P3R>
kernel
4.7
#I9AJ87:CVE-2024-27281<https://gitee.com/open_euler/dashboard?issue_id=I9AJ87>
ruby
4.5
#I93L72:CVE-2023-52469<https://gitee.com/open_euler/dashboard?issue_id=I93L72>
kernel
4.4
#I93L7E:CVE-2023-52467<https://gitee.com/open_euler/dashboard?issue_id=I93L7E>
kernel
4.4
#I93X0G:CVE-2024-26606<https://gitee.com/open_euler/dashboard?issue_id=I93X0G>
kernel
4.4
#I94K5J:CVE-2021-47037<https://gitee.com/open_euler/dashboard?issue_id=I94K5J>
kernel
4.4
#I93ED4:CVE-2023-52462<https://gitee.com/open_euler/dashboard?issue_id=I93ED4>
kernel
4.4
#I99JXH:CVE-2023-52617<https://gitee.com/open_euler/dashboard?issue_id=I99JXH>
kernel
4.4
#I9AVQ7:CVE-2023-28101<https://gitee.com/open_euler/dashboard?issue_id=I9AVQ7>
flatpak
4.3
#I93EDC:CVE-2023-52457<https://gitee.com/open_euler/dashboard?issue_id=I93EDC>
kernel
4.2
#I93EEE:CVE-2023-52456<https://gitee.com/open_euler/dashboard?issue_id=I93EEE>
kernel
4
#I97NHT:CVE-2024-26608<https://gitee.com/open_euler/dashboard?issue_id=I97NHT>
kernel
4
#I98BNA:CVE-2023-52608<https://gitee.com/open_euler/dashboard?issue_id=I98BNA>
kernel
4
#I93EDF:CVE-2024-26597<https://gitee.com/open_euler/dashboard?issue_id=I93EDF>
kernel
3.3
#I9AJ8A:CVE-2024-27280<https://gitee.com/open_euler/dashboard?issue_id=I9AJ8A>
ruby
3.1
#I9A7Y2:CVE-2023-50967<https://gitee.com/open_euler/dashboard?issue_id=I9A7Y2>
jose
2.5
#I947TK:CVE-2021-46926<https://gitee.com/open_euler/dashboard?issue_id=I947TK>
kernel
2.3
#I9BV23:CVE-2024-26644<https://gitee.com/open_euler/dashboard?issue_id=I9BV23>
kernel
1
#I9C6FA:CVE-2024-26651<https://gitee.com/open_euler/dashboard?issue_id=I9C6FA>
kernel
1
#I9DD86:CVE-2024-26654<https://gitee.com/open_euler/dashboard?issue_id=I9DD86>
kernel
1
#I9DNMI:CVE-2024-26680<https://gitee.com/open_euler/dashboard?issue_id=I9DNMI>
kernel
1
#I9DNPD:CVE-2024-26668<https://gitee.com/open_euler/dashboard?issue_id=I9DNPD>
kernel
1
#I9DNRC:CVE-2024-26679<https://gitee.com/open_euler/dashboard?issue_id=I9DNRC>
kernel
1
#I9DNRR:CVE-2023-52633<https://gitee.com/open_euler/dashboard?issue_id=I9DNRR>
kernel
1
#I9E2EQ:CVE-2024-26696<https://gitee.com/open_euler/dashboard?issue_id=I9E2EQ>
kernel
1
#I9E2MG:CVE-2024-26777<https://gitee.com/open_euler/dashboard?issue_id=I9E2MG>
kernel
1
#I9E46I:CVE-2024-26788<https://gitee.com/open_euler/dashboard?issue_id=I9E46I>
kernel
1
Bugfix:
issue
仓库
#I9C04M:gssproxy服务停止时释放资源调用LIST_DEL宏参数错误可能导致进程崩溃<https://gitee.com/open_euler/dashboard?issue_id=I9C04M>
gssproxy
#I9EQWC:gcc for openEuler 支持SME ACLE intrinsic 指令及操作系统提供的ABI<https://gitee.com/open_euler/dashboard?issue_id=I9EQWC>
gcc-12
#I9EQYZ:binutils 支持aarch64 SME指令<https://gitee.com/open_euler/dashboard?issue_id=I9EQYZ>
binutils
#I9ESZG:添加hip11 CPU流水线调度<https://gitee.com/open_euler/dashboard?issue_id=I9ESZG>
gcc
#I9EWHR:tbl访问未初始化的内存<https://gitee.com/open_euler/dashboard?issue_id=I9EWHR>
groff
#I9F66J:poissonsearch-oss从epol挪到everything<https://gitee.com/open_euler/dashboard?issue_id=I9F66J>
poissonsearch-oss
#I9F69C:poissonsearch-py从epol挪到everything<https://gitee.com/open_euler/dashboard?issue_id=I9F69C>
poissonsearch-py
#I9DE8T:[22.03 SP3][codedb]-march=armv8.5-a+sme选项导致POM_POM2K编译ICE: in compute_live_loop_exits, at tree-ssa-loop-manip.cc:247<https://gitee.com/open_euler/dashboard?issue_id=I9DE8T>
gcc-12
#I9D2TO:CPU核数超过248时,PWR_CPU_GetFreq接口会导致服务端coredump<https://gitee.com/open_euler/dashboard?issue_id=I9D2TO>
powerapi
#I9DR1P:powerapi中使用ipmitool,但是不在requires中<https://gitee.com/open_euler/dashboard?issue_id=I9DR1P>
powerapi
#I90ZB5:在centos7 4.18与openeuler 5.10.0-136.14.2.90.oe2203sp1.x86_64测试nvme fio write时候,使用ext4文件系统存在性能差异<https://gitee.com/open_euler/dashboard?issue_id=I90ZB5>
kernel
#I97HJA:ext4: ext4_mb_use_inode_pa: Don't BUG_ON when 'pa->pa_free < len' in continue mode<https://gitee.com/open_euler/dashboard?issue_id=I97HJA>
kernel
#I98AT9:【OLK-5.10】打开vhost-vdpa设备异常时,没有判断返回值,直接推出,导致vhost_vdpa设备不能再次使用,也不能卸载驱动<https://gitee.com/open_euler/dashboard?issue_id=I98AT9>
kernel
#I9ARW6:【OLK-5.10】启动31台带内存带宽Qos的虚拟机,前端查看有2台虚拟机schemata值不符合预期设置的Qos值<https://gitee.com/open_euler/dashboard?issue_id=I9ARW6>
kernel
#I9BBFQ:【OLK-5.10】【SAS】跑FIO,概率触发watchdog的soft lockup,性能下降<https://gitee.com/open_euler/dashboard?issue_id=I9BBFQ>
kernel
#I9COT9:cpuinfo_cur_freq 在高访存压力下,出现获取频率值误差过大,导致结果错误<https://gitee.com/open_euler/dashboard?issue_id=I9COT9>
kernel
#I9D6UN:【openEuler-1.0-LTS/OLK-5.10/OLK-6.6】hns3网卡驱动在动态vlan模式下,可能出现VF无法收到带vlan报文的问题。<https://gitee.com/open_euler/dashboard?issue_id=I9D6UN>
kernel
#I9DFT4:Backport 5.10.201 LTS patches from upstream<https://gitee.com/open_euler/dashboard?issue_id=I9DFT4>
kernel
#I9EEIG:smmu_v3 ecmdq代码逻辑存在问题<https://gitee.com/open_euler/dashboard?issue_id=I9EEIG>
kernel
#I9EMR9:[OLK 5.10] NIC 补丁回合<https://gitee.com/open_euler/dashboard?issue_id=I9EMR9>
kernel
openEuler-22.03-LTS-SP3版本编译构建信息查询链接:
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
https://eulermaker.compass-ci.openeuler.openatom.cn/project/overview?osProj…
openEuler-22.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP3/EPOL/update/main/
openEuler CVE及安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-22.03-LTS-SP3 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高):
里程碑
任务ID
任务标题
优先级
标签
关联仓库
任务路径
openEuler-22.03-LTS-SP3
I96ID7
[22.03-LTS-SP3]-O3 -flto -flto-partition=one -fipa-prefetch选项编译hmmer报Segmentation fault:during GIMPLE pass: vrp
主要
sig/Compiler
src-openEuler/gcc
https://gitee.com/open_euler/dashboard?issue_id=I96ID7
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE(4.12日数据):
漏洞编号
Issue ID
剩余天数
CVSS评分
软件包
责任SIG
issue码云链接
CVE-2024-24576
I9FBQX
5.23
10.0
rust
sig-Rust
https://gitee.com/src-openeuler/rust/issues/I9FBQX
CVE-2023-41419
I84A04
5.55
9.8
python-gevent
Programming-language
https://gitee.com/src-openeuler/python-gevent/issues/I84A04
CVE-2023-51698
I9F7X1
11.23
8.8
evince
GNOME
https://gitee.com/src-openeuler/evince/issues/I9F7X1
CVE-2024-3446
I9FBRQ
12.23
8.2
qemu
Virt
https://gitee.com/src-openeuler/qemu/issues/I9FBRQ
CVE-2024-31083
I9E4N6
7.23
7.8
xorg-x11-server-xwayland
Desktop
https://gitee.com/src-openeuler/xorg-x11-server-xwayland/issues/I9E4N6
CVE-2021-47131
I990AF
9.57
7.8
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I990AF
CVE-2024-26256
I9FBQR
12.23
7.8
libarchive
Base-service
https://gitee.com/src-openeuler/libarchive/issues/I9FBQR
CVE-2023-50868
I9B0OI
0.65
7.5
dhcp
Networking
https://gitee.com/src-openeuler/dhcp/issues/I9B0OI
CVE-2024-31309
I9E2OB
9.48
7.5
trafficserver
Networking
https://gitee.com/src-openeuler/trafficserver/issues/I9E2OB
CVE-2023-45288
I9E2PR
10.82
7.5
golang
sig-golang
https://gitee.com/src-openeuler/golang/issues/I9E2PR
CVE-2022-34169
I9F7Q2
11.23
7.5
icedtea-web
Compiler
https://gitee.com/src-openeuler/icedtea-web/issues/I9F7Q2
CVE-2023-50387
I9F7ML
11.23
7.5
systemd
Base-service
https://gitee.com/src-openeuler/systemd/issues/I9F7ML
CVE-2024-20932
I9F7I0
11.23
7.5
openjdk-17
Compiler
https://gitee.com/src-openeuler/openjdk-17/issues/I9F7I0
CVE-2024-24786
I9B1P2
11.82
7.5
cri-o
sig-CloudNative
https://gitee.com/src-openeuler/cri-o/issues/I9B1P2
CVE-2024-20918
I9F7K6
11.23
7.4
openjdk-17
Compiler
https://gitee.com/src-openeuler/openjdk-17/issues/I9F7K6
CVE-2024-20952
I9F7GS
11.23
7.4
openjdk-17
Compiler
https://gitee.com/src-openeuler/openjdk-17/issues/I9F7GS
CVE-2024-31080
I9E4NE
6.23
7.3
xorg-x11-server-xwayland
Desktop
https://gitee.com/src-openeuler/xorg-x11-server-xwayland/issues/I9E4NE
CVE-2024-31081
I9E4N7
6.23
7.3
xorg-x11-server-xwayland
Desktop
https://gitee.com/src-openeuler/xorg-x11-server-xwayland/issues/I9E4N7
CVE-2021-47084
I95REJ
12.57
6.7
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95REJ
CVE-2023-52524
I95B1R
12.57
6.7
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B1R
CVE-2021-46959
I94VP1
12.57
6.7
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VP1
CVE-2021-47063
I94VOL
12.57
6.7
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOL
CVE-2022-2447
I9AQ5D
9.23
6.6
openstack-keystone
sig-openstack
https://gitee.com/src-openeuler/openstack-keystone/issues/I9AQ5D
CVE-2023-28100
I9AVQ9
9.23
6.5
flatpak
Programming-language
https://gitee.com/src-openeuler/flatpak/issues/I9AVQ9
CVE-2022-2553
I9AO7E
9.23
6.5
booth
sig-Ha
https://gitee.com/src-openeuler/booth/issues/I9AO7E
CVE-2023-28746
I9AJ86
9.23
6.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9AJ86
CVE-2023-39368
I9B1R3
11.23
6.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9B1R3
CVE-2022-47950
I9B1HJ
11.23
6.5
python-swiftclient
sig-openstack
https://gitee.com/src-openeuler/python-swiftclient/issues/I9B1HJ
CVE-2019-25162
I93XA4
5.82
6.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I93XA4
CVE-2021-47083
I95RE4
12.57
6.1
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RE4
CVE-2023-52587
I96G8W
12.57
6.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I96G8W
CVE-2023-52598
I96G7Q
12.57
6.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I96G7Q
CVE-2021-46984
I96DIN
12.57
6.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I96DIN
CVE-2021-47105
I95RGH
12.57
6.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RGH
CVE-2021-47098
I95RFQ
12.57
6.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RFQ
CVE-2021-47095
I95REK
12.57
6.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95REK
CVE-2021-47099
I95RE7
12.57
6.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RE7
CVE-2021-47097
I95RDY
12.57
6.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RDY
CVE-2021-47101
I95RDW
12.57
6.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RDW
CVE-2023-52529
I95AVL
12.57
6.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AVL
CVE-2023-52519
I95ASU
12.57
6.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ASU
CVE-2023-52510
I95ASM
12.57
6.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ASM
CVE-2024-29018
I9A82U
8.23
5.9
docker
sig-CloudNative
https://gitee.com/src-openeuler/docker/issues/I9A82U
CVE-2023-52323
I9AZF2
10.23
5.9
fence-agents
sig-Ha
https://gitee.com/src-openeuler/fence-agents/issues/I9AZF2
CVE-2023-48795
I9AYAU
10.23
5.9
cri-o
sig-CloudNative
https://gitee.com/src-openeuler/cri-o/issues/I9AYAU
CVE-2023-48795
I9AYAQ
10.23
5.9
libssh2
Networking
https://gitee.com/src-openeuler/libssh2/issues/I9AYAQ
CVE-2024-29018
I9AWX6
10.23
5.9
skopeo
sig-CloudNative
https://gitee.com/src-openeuler/skopeo/issues/I9AWX6
CVE-2024-29018
I9AWWE
10.23
5.9
podman
sig-CloudNative
https://gitee.com/src-openeuler/podman/issues/I9AWWE
CVE-2024-29018
I9AWLZ
10.23
5.9
cri-tools
sig-CloudNative
https://gitee.com/src-openeuler/cri-tools/issues/I9AWLZ
CVE-2022-47951
I9AVCJ
9.23
5.7
openstack-glance
sig-openstack
https://gitee.com/src-openeuler/openstack-glance/issues/I9AVCJ
CVE-2022-47951
I9AVCG
9.23
5.7
openstack-nova
sig-openstack
https://gitee.com/src-openeuler/openstack-nova/issues/I9AVCG
CVE-2023-52507
I95B1K
12.57
5.7
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B1K
CVE-2021-47055
I94VON
12.57
5.7
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VON
CVE-2023-52575
I95AT9
12.57
5.6
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AT9
CVE-2021-46991
I94K17
5.82
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94K17
CVE-2021-46945
I949C7
5.82
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I949C7
CVE-2021-46963
I949BI
5.82
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I949BI
CVE-2021-46917
I944GE
5.82
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I944GE
CVE-2023-52464
I93EBW
5.82
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I93EBW
CVE-2022-2806
I9AR03
9.23
5.5
sos
Base-service
https://gitee.com/src-openeuler/sos/issues/I9AR03
CVE-2022-1962
I9AN6B
9.23
5.5
skopeo
sig-CloudNative
https://gitee.com/src-openeuler/skopeo/issues/I9AN6B
CVE-2022-1962
I9AN5R
9.23
5.5
podman
sig-CloudNative
https://gitee.com/src-openeuler/podman/issues/I9AN5R
CVE-2022-1962
I9B0A3
10.23
5.5
libslirp
CloudNative
https://gitee.com/src-openeuler/libslirp/issues/I9B0A3
CVE-2022-1962
I9B08Y
10.23
5.5
fuse-overlayfs
CloudNative
https://gitee.com/src-openeuler/fuse-overlayfs/issues/I9B08Y
CVE-2022-1962
I9B08S
10.23
5.5
slirp4netns
CloudNative
https://gitee.com/src-openeuler/slirp4netns/issues/I9B08S
CVE-2022-1962
I9B08R
10.23
5.5
containers-common
sig-CloudNative
https://gitee.com/src-openeuler/containers-common/issues/I9B08R
CVE-2022-1962
I9AXMR
10.23
5.5
crun
sig-CloudNative
https://gitee.com/src-openeuler/crun/issues/I9AXMR
CVE-2022-1962
I9AXMJ
10.23
5.5
container-selinux
sig-CloudNative
https://gitee.com/src-openeuler/container-selinux/issues/I9AXMJ
CVE-2023-38575
I9B1R5
11.23
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9B1R5
CVE-2022-1962
I9B1QW
11.23
5.5
etcd
sig-CloudNative
https://gitee.com/src-openeuler/etcd/issues/I9B1QW
CVE-2023-52607
I96GP1
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I96GP1
CVE-2023-52583
I96G92
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I96G92
CVE-2022-48629
I963KI
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I963KI
CVE-2021-47104
I95RGF
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RGF
CVE-2021-47106
I95RG2
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RG2
CVE-2021-47103
I95REP
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95REP
CVE-2021-47090
I95REF
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95REF
CVE-2021-47092
I95REC
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95REC
CVE-2021-47096
I95RE2
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RE2
CVE-2023-52503
I95B3Q
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B3Q
CVE-2023-52520
I95B2M
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B2M
CVE-2023-52501
I95B10
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B10
CVE-2024-26621
I95B0Y
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B0Y
CVE-2023-52532
I95AXS
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AXS
CVE-2023-52516
I95AXL
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AXL
CVE-2023-52521
I95AWP
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AWP
CVE-2023-52522
I95AWK
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AWK
CVE-2023-52574
I95ATZ
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATZ
CVE-2023-52578
I95ATV
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATV
CVE-2023-52581
I95ATS
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATS
CVE-2023-52562
I95ATR
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATR
CVE-2023-52564
I95ATP
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATP
CVE-2023-52559
I95ATH
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATH
CVE-2023-52580
I95ATC
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATC
CVE-2023-52576
I95AT8
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AT8
CVE-2023-52566
I95AT5
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AT5
CVE-2023-52569
I95AT1
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AT1
CVE-2023-52504
I95AT0
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AT0
CVE-2023-52523
I95ASW
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ASW
CVE-2023-52530
I95ASP
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ASP
CVE-2021-47077
I956GS
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I956GS
CVE-2021-47056
I94VOZ
12.57
5.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOZ
CVE-2023-22081
I88VNW
8.14
5.3
openjdk-latest
Compiler
https://gitee.com/src-openeuler/openjdk-latest/issues/I88VNW
CVE-2022-4122
I9ATC3
9.23
5.3
podman
sig-CloudNative
https://gitee.com/src-openeuler/podman/issues/I9ATC3
CVE-2023-43490
I9AJ89
9.23
5.3
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9AJ89
CVE-2023-39326
I9AY6T
10.23
5.3
promu
sig-CloudNative
https://gitee.com/src-openeuler/promu/issues/I9AY6T
CVE-2023-3817
I9AWVX
10.23
5.3
edk2
Virt
https://gitee.com/src-openeuler/edk2/issues/I9AWVX
CVE-2023-39326
I9B1Q3
11.23
5.3
toolbox
CloudNative
https://gitee.com/src-openeuler/toolbox/issues/I9B1Q3
CVE-2021-47078
I956GP
12.57
5.3
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I956GP
CVE-2024-20978
I9B0DW
10.23
4.9
mariadb
DB
https://gitee.com/src-openeuler/mariadb/issues/I9B0DW
CVE-2024-20976
I9B0CE
10.23
4.9
mariadb
DB
https://gitee.com/src-openeuler/mariadb/issues/I9B0CE
CVE-2022-0207
I9AL0Y
9.23
4.7
vdsm
oVirt
https://gitee.com/src-openeuler/vdsm/issues/I9AL0Y
CVE-2023-52597
I96GPO
12.57
4.7
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I96GPO
CVE-2021-47069
I956FU
12.57
4.7
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I956FU
CVE-2021-46972
I949C0
5.82
4.6
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I949C0
CVE-2023-52477
I94P5J
5.82
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94P5J
CVE-2022-48626
I93LMF
5.82
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I93LMF
CVE-2022-21595
I9AT7H
9.23
4.4
mariadb
DB
https://gitee.com/src-openeuler/mariadb/issues/I9AT7H
CVE-2023-52595
I96GO9
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I96GO9
CVE-2023-52589
I96GNU
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I96GNU
CVE-2023-52605
I96G8V
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I96G8V
CVE-2023-52585
I96G80
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I96G80
CVE-2023-52594
I96G7W
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I96G7W
CVE-2021-47082
I95REN
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95REN
CVE-2021-47100
I95RE3
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RE3
CVE-2023-52513
I95AWN
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AWN
CVE-2022-48627
I95ATI
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATI
CVE-2022-48628
I95ASY
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ASY
CVE-2023-52508
I95ASN
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ASN
CVE-2021-47079
I956GR
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I956GR
CVE-2021-47071
I956GH
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I956GH
CVE-2021-47081
I956GE
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I956GE
CVE-2021-47074
I956G7
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I956G7
CVE-2021-47070
I956G4
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I956G4
CVE-2021-47075
I956G0
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I956G0
CVE-2021-47080
I956FR
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I956FR
CVE-2021-47062
I94VOY
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOY
CVE-2021-47065
I94VOU
12.57
4.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOU
CVE-2023-28101
I9AVQ7
9.23
4.3
flatpak
Programming-language
https://gitee.com/src-openeuler/flatpak/issues/I9AVQ7
CVE-2023-52567
I95ATO
12.57
4.1
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATO
CVE-2023-52573
I95ATK
12.57
4.1
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATK
CVE-2023-52568
I95ATJ
12.57
4.1
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATJ
CVE-2023-52570
I95AT2
12.57
4.1
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AT2
CVE-2021-46905
I93LMJ
5.82
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I93LMJ
CVE-2021-46994
I94JCA
12.82
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94JCA
CVE-2023-52592
I96GPQ
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I96GPQ
CVE-2023-52590
I96GNO
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I96GNO
CVE-2024-26623
I96G9F
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I96G9F
CVE-2023-52596
I96G7I
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I96G7I
CVE-2021-47108
I95RG5
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RG5
CVE-2021-47085
I95RET
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95RET
CVE-2021-47093
I95REL
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95REL
CVE-2021-47087
I95REA
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95REA
CVE-2023-52500
I95B2S
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B2S
CVE-2023-52512
I95B2K
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B2K
CVE-2023-52515
I95B1O
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B1O
CVE-2023-52511
I95B18
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95B18
CVE-2023-52526
I95AXJ
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AXJ
CVE-2023-52525
I95AXH
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AXH
CVE-2023-52531
I95AWI
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AWI
CVE-2023-52572
I95AUA
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AUA
CVE-2023-52563
I95ATY
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATY
CVE-2023-52579
I95ATT
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATT
CVE-2023-52506
I95ATE
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATE
CVE-2023-52582
I95ATA
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATA
CVE-2023-52577
I95AT6
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AT6
CVE-2023-52505
I95AST
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AST
CVE-2023-52499
I95ASQ
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ASQ
CVE-2021-47072
I956GA
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I956GA
CVE-2021-47016
I94VOW
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOW
CVE-2021-47060
I94VOT
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOT
CVE-2021-47057
I94VOS
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOS
CVE-2021-47067
I94VOA
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOA
CVE-2021-47061
I94VO4
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VO4
CVE-2023-52485
I94VEN
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VEN
CVE-2023-52483
I94P64
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94P64
CVE-2021-47021
I94K5X
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94K5X
CVE-2021-47039
I94K5U
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94K5U
CVE-2021-47048
I94K5S
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94K5S
CVE-2020-36783
I94JR1
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94JR1
CVE-2021-47047
I94JOG
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94JOG
CVE-2021-46986
I94JH6
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94JH6
CVE-2020-36779
I94JCR
13.57
4.0
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94JCR
CVE-2023-22025
I88JFX
8.14
3.7
openjdk-latest
Compiler
https://gitee.com/src-openeuler/openjdk-latest/issues/I88JFX
CVE-2024-23944
I98QK9
2.23
3.5
zookeeper
sig-bigdata
https://gitee.com/src-openeuler/zookeeper/issues/I98QK9
CVE-2023-52571
I95ATW
12.57
3.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATW
CVE-2021-47046
I94K52
12.57
3.5
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94K52
CVE-2021-47058
I94VOQ
12.57
3.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOQ
CVE-2021-47066
I94VOC
12.57
3.4
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOC
CVE-2022-4123
I9ATB7
9.23
3.3
podman
sig-CloudNative
https://gitee.com/src-openeuler/podman/issues/I9ATB7
CVE-2023-52565
I95AU4
12.57
3.3
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95AU4
CVE-2023-52560
I95ATG
12.57
3.3
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATG
CVE-2023-52561
I95ATF
12.57
3.3
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I95ATF
CVE-2021-46926
I947TK
5.82
2.3
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I947TK
CVE-2021-46918
I9453G
5.82
2.3
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I9453G
CVE-2021-47054
I94VOR
12.57
2.3
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOR
CVE-2021-47059
I94VOI
12.57
2.3
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VOI
CVE-2021-47064
I94VO6
12.57
2.3
kernel
Kernel
https://gitee.com/src-openeuler/kernel/issues/I94VO6
社区关键组件待修复缺陷:
openEuler社区存在无版本里程碑的缺陷,请各个SIG 关注涉及质量等级为L1-L2软件包的缺陷修复情况。
社区提单可参考社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/master/%E7%A4%BE%E5%8C%BA%E7%89%88%E6%9…
关键组件待修复缺陷清单(无版本里程碑):
序号
任务ID
任务标题
任务类型
创建时间
优先级
关联仓库
sig组
任务路径
1
I4V9K0
gcc 10.3.0 __libc_vfork符号丢失(i686架构)
任务
2022/2/25 14:24
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I4V9K0
2
I4YT2R
iscsi登录操作并发sysfs读操作概率导致空指针访问
任务
2022/3/21 15:36
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I4YT2R
3
I58CJR
删除iptable_filter.ko时出现空指针问题
任务
2022/5/19 20:36
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I58CJR
4
I5C33B
OLK-5.10 page owner功能增强
任务
2022/6/13 20:30
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5C33B
5
I5D9J8
Upgrade to latest release [kernel: 5.10.0 -> 5.17]
任务
2022/6/21 10:01
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5D9J8
6
I5G321
【openEuler-1.0-LTS】nbd 加载/卸载模组 和 alloc config并发导致 panic
任务
2022/7/8 9:05
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5G321
7
I5H311
修复CVE-2022-2380
任务
2022/7/14 15:27
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5H311
8
I5I2M8
x86: Improve testing false positive for tst-cpu-features-cpuinfo with bad hardware.
任务
2022/7/21 9:47
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5I2M8
9
I5OOLB
反复触发i40e网卡sriov增删vf后,iavf_remove触发BUG_ON at drivers/pci/msi.c:397
任务
2022/8/29 20:23
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5OOLB
10
I5PBRB
注入内存申请故障,i40iw_initialize_dev失败时出现oops复位
任务
2022/9/2 9:56
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5PBRB
11
I5RH8C
内存可靠性分级需求
任务
2022/9/16 16:16
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5RH8C
12
I5V92B
openEuler是否有开启CONFIG_AUXILIARY_BUS配置的计划
任务
2022/10/12 11:37
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5V92B
13
I5VCIJ
openEuler如何适配新硬件,请提供适配流程指导
任务
2022/10/12 17:14
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5VCIJ
14
I5WCP1
回合bpftool prog attach/detach命令
任务
2022/10/18 16:10
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I5WCP1
15
I67IFE
建议sssd拆分出对应功能的子包
任务
2022/12/26 16:49
无优先级
src-openEuler/sssd
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I67IFE
16
I6FZWY
主线回合scsi: iscsi_tcp: Fix UAF during logout and login
任务
2023/2/18 11:10
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6FZWY
17
I6HXB9
kernel.spec中是否会新增打包intel-sst工具
任务
2023/2/27 10:06
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6HXB9
18
I6MJB4
openssl 3.0 支持TLCP特性
任务
2023/3/13 11:35
无优先级
src-openEuler/openssl
sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I6MJB4
19
I6N49D
【openeuler-22.03-LTS-SP】
任务
2023/3/14 20:12
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6N49D
20
I6PA84
神威架构,虚拟化启动失败
任务
2023/3/22 17:20
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I6PA84
21
I6TQ8W
curl命令向hadoop3.2.1 webhdfs put文件失败
任务
2023/4/7 18:02
严重
src-openEuler/curl
Networking
https://gitee.com/open_euler/dashboard?issue_id=I6TQ8W
22
I6UDV8
Bug in openEuler/gcc (10.3.0) support for ARM SVE openmp
任务
2023/4/10 16:14
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I6UDV8
23
I6VWNS
主线补丁:udp: skip L4 aggregation for UDP tunnel packets分析
任务
2023/4/15 10:37
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I6VWNS
24
I70VML
指针压缩选项的错误提示内容有误。
缺陷
2023/5/6 16:45
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I70VML
25
I71KX8
python3.spec文件中,无效的ifarch语句
任务
2023/5/9 15:00
无优先级
src-openEuler/python3
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I71KX8
26
I7A5FW
Fixed CPU topology issues and add lbt support for kvm.
任务
2023/6/1 17:18
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I7A5FW
27
I7B6KR
kerberos安装缺少krb5-auth-dialog 和 krb5-workstation
任务
2023/6/6 9:51
无优先级
src-openEuler/krb5
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I7B6KR
28
I7CKVY
peneuler 20.03 LTS arrch64 上安装 libreoffice 7.4.7.2 报错
缺陷
2023/6/11 22:45
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I7CKVY
29
I7CWOS
Bug in openEuler/gcc (10.3.1) support for ARM SVE under O0 compiler level
任务
2023/6/12 20:51
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I7CWOS
30
I7EZAZ
无法在sw_64下编译nodejs
任务
2023/6/20 16:50
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I7EZAZ
31
I7L968
Upgrade to latest release [qemu: 6.2.0 2021/12/14 -> 8.0.3 2023/07/09]
任务
2023/7/14 17:09
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I7L968
32
I7LSWG
Upgrade to latest release [gtk2: 2.24.33 2020/12/20 -> 4.11.4 2023/07/03]
任务
2023/7/17 20:50
无优先级
src-openEuler/gtk2
Desktop
https://gitee.com/open_euler/dashboard?issue_id=I7LSWG
33
I8790J
need EPYC-Genoa model support
任务
2023/10/11 16:53
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I8790J
34
I8A77R
Upgrade to latest release [alsa-lib: 1.2.9 2023/05/04 -> 1.2.10 2023/09/01]
任务
2023/10/23 16:22
无优先级
src-openEuler/alsa-lib
Computing
https://gitee.com/open_euler/dashboard?issue_id=I8A77R
35
I8KAVR
dnf reinstall kernel 导致grub.conf 本内核项被删除
任务
2023/11/29 10:30
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8KAVR
36
I8ON5A
Upgrade to latest release [cronie: 1.6.1 2022/04/25 -> 1.7.0 2023/10/13]
任务
2023/12/15 11:04
无优先级
src-openEuler/cronie
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I8ON5A
37
I8ON6X
Upgrade to latest release [dbus: 1.14.8 2023/06/06 -> 1.15.8 2023/08/21]
任务
2023/12/15 11:06
无优先级
src-openEuler/dbus
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I8ON6X
38
I8OOF1
Upgrade to latest release [krb5: 1.21.1 2023/07/10 -> 1.21.2 2023/08/14]
任务
2023/12/15 12:29
无优先级
src-openEuler/krb5
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I8OOF1
39
I8OOF5
Upgrade to latest release [libarchive: 3.7.1 2023/07/29 -> 3.7.2 2023/09/11]
任务
2023/12/15 12:31
无优先级
src-openEuler/libarchive
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I8OOF5
40
I8PL8Q
Upgrade to latest release [gcc: 12.3.1 -/-/- -> 14 2023/04/17]
任务
2023/12/19 11:22
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I8PL8Q
41
I8SZWW
qemu 4.1 虚拟机热迁移到qemu 6.2失败
任务
2024/1/2 17:01
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I8SZWW
42
I8UCFC
鲲鹏920服务器多次重启后系统盘盘符跳变
任务
2024/1/8 11:18
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8UCFC
43
I8VIRN
Upgrade to latest release [libcap: 2.69 2023/05/14 -> 20071031 2007/10/31]
任务
2024/1/12 9:17
无优先级
src-openEuler/libcap
sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I8VIRN
44
I8VIRQ
Upgrade to latest release [libselinux: 3.5 2023/02/23 -> 3.6 2023/12/13]
任务
2024/1/12 9:17
无优先级
src-openEuler/libselinux
sig-security-facility
https://gitee.com/open_euler/dashboard?issue_id=I8VIRQ
45
I8XTDI
rpm宏用$引用可能会出现空值
缺陷
2024/1/21 22:27
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8XTDI
46
I8ZBUC
主线补丁:crypto: scomp - fix req->dst buffer overflow
任务
2024/1/27 11:36
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I8ZBUC
47
I8ZJG1
欧拉系统virt-install 创建虚拟机video类型默认使用qxl
任务
2024/1/29 10:44
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I8ZJG1
48
I95DT3
openEuler-22.03-LTS-SP3的6.2.0-88版本何时发布?
任务
2024/3/4 0:39
无优先级
src-openEuler/qemu
Virt
https://gitee.com/open_euler/dashboard?issue_id=I95DT3
49
I96B4W
systemd中缺少文件
任务
2024/3/6 14:53
无优先级
src-openEuler/systemd
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I96B4W
50
I96BZU
逻辑卷组修复
任务
2024/3/6 15:36
无优先级
src-openEuler/lvm2
Storage
https://gitee.com/open_euler/dashboard?issue_id=I96BZU
51
I97R4T
【20.03-LTS-SP1~SP4】4.19 kernel加载并卸载vkms模块即可导致系统崩溃重启
缺陷
2024/3/12 11:36
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I97R4T
52
I97V59
preempt-RT补丁中存在bug,运行2天以上的igh-ethercat时系统高概率死机
缺陷
2024/3/12 16:09
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I97V59
53
I9BJX9
glib2-2.72.2-14 导致gnome 桌面崩溃
缺陷
2024/3/26 9:15
无优先级
src-openEuler/glib2
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9BJX9
54
I9BNUP
使用clang时缺少gnu/stubs-32.h文件
任务
2024/3/26 13:43
无优先级
src-openEuler/glibc
Computing
https://gitee.com/open_euler/dashboard?issue_id=I9BNUP
55
I9C507
gcc在2203版本默认关闭-fcommon选项导致Intel SPR芯片上UnixBench多核整形得分劣化
缺陷
2024/3/27 18:22
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I9C507
56
I9COZE
【B/Y KV190 -BMC 系统测试】【长稳测试】【uniscan】DC第19次,OS进入紧急模式
缺陷
2024/3/29 15:27
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9COZE
57
I9CQSL
openEuler-22.03-LTS-SP1中自带的i40e网卡驱动,无法虚拟网卡
缺陷
2024/3/29 16:57
无优先级
src-openEuler/kernel
Kernel
https://gitee.com/open_euler/dashboard?issue_id=I9CQSL
58
I9CXWG
当mount挂载点多的时候,systemd-hostnamd服务启动时间太长
任务
2024/3/30 18:58
无优先级
src-openEuler/systemd
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9CXWG
59
I9DV2U
spec文件不同架构分支存在相同构建方式
任务
2024/4/3 11:24
无优先级
src-openEuler/gcc
Compiler
https://gitee.com/open_euler/dashboard?issue_id=I9DV2U
60
I9EDEH
【22.03 LTS SP1】glib2自编译check阶段用例失败
缺陷
2024/4/7 10:26
无优先级
src-openEuler/glib2
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9EDEH
61
I9EDQG
udev事件接收到磁盘被拔出后,调用umount /home/test卸载磁盘,mount信息中有残留磁盘挂载信息。
缺陷
2024/4/7 10:41
无优先级
src-openEuler/systemd
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9EDQG
62
I9EHLX
openEuler22.03 sp1设置成gb18030编码以后,timedatectl 报Eaile to print table:Invalid argument
任务
2024/4/7 14:55
无优先级
src-openEuler/systemd
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9EHLX
63
I9EU9I
openEuler 24.03 RISC-V中,切换至新建的用户的umask权限没有改变
缺陷
2024/4/8 15:14
无优先级
src-openEuler/bash
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9EU9I
64
I9FI38
【obs】glib2在openEuler:22.03:LTS构建失败
缺陷
2024/4/10 15:34
无优先级
src-openEuler/glib2
Base-service
https://gitee.com/open_euler/dashboard?issue_id=I9FI38
65
I9FU1M
[openEuler-22.03-LTS] libvirt install failed
任务
2024/4/11 15:44
无优先级
src-openEuler/libvirt
Virt
https://gitee.com/open_euler/dashboard?issue_id=I9FU1M
66
I9FVI3
22.03-LTS-Next分支与22.03-LTS-SP3分支不同步,需要手动同步
任务
2024/4/11 16:57
无优先级
src-openEuler/e2fsprogs
Storage
https://gitee.com/open_euler/dashboard?issue_id=I9FVI3
67
I9FYER
libcgroup-3.1.0.tar.gz无法正常解压
任务
2024/4/11 21:49
无优先级
src-openEuler/libcgroup
sig-CloudNative
https://gitee.com/open_euler/dashboard?issue_id=I9FYER
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/master/%E7%A4%BE%E5%8C%BA%E7%89%88%E6%9…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
1
0
各位openeuler社区的maintainer、 committer和contributor们好:
社区CICD sig基于release sig制定openeuler 24.03 LTS版本的release plan,将于4月14号18点创建快照,开始构建RC3版本,此时间点之后合入PR默认不带入版本!
From: xiasenlin [mailto:xiasenlin1@huawei.com]
Sent: Wednesday, April 3, 2024 9:37 PM
To: dev <dev(a)openeuler.org>; release <release(a)openeuler.org>
Subject: openeuler 24.03 LTS RC2&Beta版本构建通知
各位openeuler社区的maintainer、 committer和contributor们好:
社区CICD sig基于release sig制定openeuler 24.03 LTS版本的release plan,将于4月7号12点创建快照,开始构建RC2&Beta版本,此时间点之后合入PR默认不带入版本!
________________________________
夏森林 Xia Senlin
Mobile:+86-50000041340<tel:+86-50000041340>(For Welink,eSpace Calls)
Email:xiasenlin1(a)huawei.com<mailto:xiasenlin1@huawei.com>
1
0
BEGIN:VCALENDAR
PRODID:-//MDaemon Technologies Ltd//MDaemon 23.0.2
VERSION:2.0
METHOD:REQUEST
BEGIN:VTIMEZONE
TZID:China Standard Time
BEGIN:STANDARD
DTSTART:16010101T000000
TZOFFSETFROM:+0800
TZOFFSETTO:+0800
TZNAME:Standard Time
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
UID:Tencent298853961
SEQUENCE:0
DTSTAMP:20240410T031301Z
SUMMARY:openEuler Release SIG例会
ORGANIZER:MAILTO:bin.yan@montage-tech.com
PRIORITY:5
ATTENDEE;CUTYPE=INDIVIDUAL;PARTSTAT=NEEDS-ACTION;ROLE=REQ-PARTICIPANT;
RSVP=TRUE:MAILTO:,dev@openeuler.org,release@openeuler.org
DTSTART;TZID=China Standard Time:20240412T100000
DTEND;TZID=China Standard Time:20240412T120000
TRANSP:OPAQUE
X-MICROSOFT-CDO-BUSYSTATUS:TENTATIVE
X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY
X-MICROSOFT-DISALLOW-COUNTER:TRUE
BEGIN:VALARM
ACTION:DISPLAY
TRIGGER;VALUE=DURATION;RELATED=START:-PT15M
END:VALARM
END:VEVENT
END:VCALENDAR
1
0