
Dear all, 经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。 本公示分为五部分: 1、openEuler-20.03-LTS-SP1 Update 20230510发布情况及待修复缺陷 2、openEuler-20.03-LTS-SP3 Update 20230510发布情况及待修复缺陷 3、openEuler-22.03-LTS Update 20230510发布情况及待修复缺陷 4、openEuler-22.03-LTS-SP1 Update 20230510发布情况及待修复缺陷 5、openEuler 关键组件待修复CVE 清单 6、openEuler 社区指导文档及开放平台链接 本次update版本发布后,下一个版本里程碑点(预计在2023/05/20)提供 update_ 20230517 版本。 openEuler-20.03-LTS-SP1 Update 20230510 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题2个,已知漏洞11个。目前版本分支剩余待修复缺陷29个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接: https://gitee.com/openeuler/release-management/issues/I6W4KC?from=project-is... CVE修复: CVE 仓库 score CVE-2023-2426 vim 6.8 CVE-2023-30608 python-sqlparse 7.5 CVE-2023-31436 kernel 7.8 CVE-2023-2483 kernel 1 CVE-2023-2269 kernel 5.5 CVE-2023-2194 kernel 6.7 CVE-2023-2177 kernel 5.5 CVE-2023-2176 kernel 7.8 CVE-2023-2007 kernel 4.4 CVE-2022-31629 php 6.5 CVE-2022-31628 php 5.5 Bugfix: issue 仓库 #I715PM:[openEuler-1.0-LTS] linux-4.19.y lts补丁分析回合(4.19.279-4.19.281) kernel #I6X0Z5:优化CVE-2022-32207:添加宏判断fchmod是否存在,以防用户不使用glibc情况下编译失败 curl openEuler-20.03-LTS-SP1版本编译构建信息查询链接: https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1 https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol openEuler-20.03-LTS-SP1 Update版本 发布源链接: https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/ https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/ openEuler CVE 及 安全公告公示链接: https://www.openeuler.org/zh/security/cve/ https://www.openeuler.org/zh/security/safety-bulletin/ https://repo.openeuler.org/security/data/cvrf/ openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I281C1 【fuzz】runtime error: libsass Base-service I437CR [SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错 obs-server Others I48GIM 【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I4G4A5 Undefine-shift in _bfd_safe_read_leb128 binutils Compiler I4G4B1 Integer overflow in print_vms_time binutils Compiler I4G4VY memleak in parse_gnu_debugaltlink binutils Compiler I4G4WF Heap-buffer-overflow in slurp_hppa_unwind_table binutils Compiler I4G4WW Use-after-free in make_qualified_name binutils Compiler I4G4X6 memleak in byte_get_little_endian binutils Compiler I4G4XF memleak in process_mips_specific binutils Compiler I4G4Y0 out-of-memory in vms_lib_read_index binutils Compiler I4G4YJ Heap-buffer-overflow in bfd_getl16 binutils Compiler I4G4YV Floating point exception in _bfd_vms_slurp_etir binutils Compiler I4J0OY 【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常 libdap sig-recycle I4JMG4 【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251 python-robotframework sig-ROS I4QV6N 【openEuler-20.03-LTS-SP1】flink命令执行失败 flink sig-bigdata I5IG1V 【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败 efl sig-compat-winapp I5IG6K 【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5JHX2 【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I6975Y 【arm】--enable-bootstrap构建gcc失败 gcc Compiler I6AASB 【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc gcc Compiler I6CBNA 【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6DRDY 【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败 gcc Compiler I6DUTF [22.03sp1lts][arm/x86] obsredis.service服务启动失败 obs-server Others I6EUHB create_gcov在kernel6.1上执行报错 autofdo Compiler I6FQCO 【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof opengauss-server DB I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler I6VCMC 【20.03 SP1 update 20230329 Train】openstack-nova-priority-feature安装过程中有多余打印,建议优化 openstack-nova sig-openstack I6VFAE [20.03 SP1] [x86/arm] mariadb授权给远程用户,远程连接服务失败 mariadb DB I6VFV6 [22.03 SP1] [x86/arm] mariadb授权给远程用户,远程连接服务失败 mariadb DB openEuler-20.03-LTS-SP3 Update 20230510 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问2个,已知漏洞11个。目前版本分支剩余待修复缺陷 10个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接: https://gitee.com/openeuler/release-management/issues/I6W4KD?from=project-is... CVE修复: 需求类型 软件包 优先级 CVE-2023-2426 vim 6.8 CVE-2023-30608 python-sqlparse 7.5 CVE-2023-2007 kernel 4.4 CVE-2023-2176 kernel 7.8 CVE-2023-2177 kernel 5.5 CVE-2023-2194 kernel 6.7 CVE-2023-2269 kernel 5.5 CVE-2023-2483 kernel 1 CVE-2023-31436 kernel 7.8 CVE-2022-31628 php 5.5 CVE-2022-31629 php 6.5 Bugfix: issue 仓库 #I715PM:[openEuler-1.0-LTS] linux-4.19.y lts补丁分析回合(4.19.279-4.19.281) kernel #I6X0Z5:优化CVE-2022-32207:添加宏判断fchmod是否存在,以防用户不使用glibc情况下编译失败 curl openEuler-20.03-LTS-SP3版本编译构建信息查询链接: https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3 https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol openEuler-20.03-LTS-SP3 Update版本 发布源链接: https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/ https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/ openEuler CVE 及 安全公告公示链接: https://www.openeuler.org/zh/security/cve/ https://www.openeuler.org/zh/security/safety-bulletin/ https://repo.openeuler.org/security/data/cvrf/ openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I4QV7S 【openEuler-20.03-LTS-SP3】flink run 命令执行失败 flink sig-bigdata I5IGAS 【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5IGOR 【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败 fluidsynth Application I5KXUY 【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I5KY4S 【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功 vdsm oVirt I5LYJK 【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常 TCP_option_address Kernel I613DI 【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败 openEuler-release Base-service I61LEV 【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错 tuna Others I6CBL7 【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6VFMI [20.03 SP3] [x86/arm] mariadb授权给远程用户,远程连接服务失败 mariadb DB openEuler-22.03-LTS Update 20230510 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题2个,已知漏洞15个。目前版本分支剩余待修复缺陷8个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接: https://gitee.com/openeuler/release-management/issues/I6W4KE?from=project-is... CVE修复: CVE 仓库 score CVE-2023-2426 vim 6.8 CVE-2023-24607 qt5-qtbase 7.8 CVE-2023-30608 python-sqlparse 7.5 CVE-2022-4382 kernel 7.4 CVE-2023-0458 kernel 5.3 CVE-2023-1998 kernel 5.6 CVE-2023-2007 kernel 4.4 CVE-2023-2008 kernel 7.8 CVE-2023-2166 kernel 5.5 CVE-2023-2176 kernel 7.8 CVE-2023-2194 kernel 6.7 CVE-2023-2269 kernel 5.5 CVE-2023-2483 kernel 1 CVE-2023-31436 kernel 7.8 CVE-2022-31629 php 6.5 Bugfix: issue 仓库 #I6TNTC:【OLK-5.10 同步】[syzkaller] KASAN: null-ptr-deref Write in bdi_split_work_to_wbs kernel #I6X0Z5:优化CVE-2022-32207:添加宏判断fchmod是否存在,以防用户不使用glibc情况下编译失败 curl openEuler-22.03-LTS版本编译构建信息查询链接: https://build.openeuler.org/project/show/openEuler:22.03:LTS https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol openEuler-22.03-LTS Update版本 发布源链接: https://repo.openeuler.org/openEuler-22.03-LTS/update/ https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/ https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Ope... https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Ope... openEuler-22.03-LTS Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I5JIA6 【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I5JPII 【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin ovirt-engine oVirt I665SM resize2fs出现csum不一致 kernel Kernel I66KIH 【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败 openstack-ironic-inspector sig-openstack I677QX 【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误 opengauss-server DB I6CBPQ 【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6O1CK 【22.03 lts udpate 0315 】irb-jruby命令执行报错 jruby sig-ruby I6VFRX [22.03-LTS][x86/arm]mariadb授权给远程用户,远程连接服务失败 mariadb DB openEuler-22.03-LTS SP1 Update 20230510 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题3个,已知漏洞12个。目前版本分支剩余待修复缺陷12个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接: https://gitee.com/openeuler/release-management/issues/I6W4KB?from=project-is... CVE修复: CVE 仓库 score CVE-2023-2426 vim 6.8 CVE-2023-30608 python-sqlparse 7.5 CVE-2022-4382 kernel 7.4 CVE-2023-0458 kernel 5.3 CVE-2023-1998 kernel 5.6 CVE-2023-2007 kernel 4.4 CVE-2023-2166 kernel 5.5 CVE-2023-2176 kernel 7.8 CVE-2023-2194 kernel 6.7 CVE-2023-2269 kernel 5.5 CVE-2023-2483 kernel 1 CVE-2023-31436 kernel 7.8 Bugfix: issue 仓库 #I7059Z:ip_conflict_check中获取的网卡名为空 X-diagnosis #I6X0Z5:优化CVE-2022-32207:添加宏判断fchmod是否存在,以防用户不使用glibc情况下编译失败 curl #I6TNTC:【OLK-5.10 同步】[syzkaller] KASAN: null-ptr-deref Write in bdi_split_work_to_wbs kernel openEuler-22.03-LTS SP1版本编译构建信息查询链接: https://build.openeuler.org/project/show/openEuler:22.03:LTS https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol openEuler-22.03-LTS SP1 Update版本 发布源链接: https://repo.openeuler.org/openEuler-22.03-LTS/update/ https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/ https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Ope... https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Ope... openEuler-22.03-LTS SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I6975Y 【arm】--enable-bootstrap构建gcc失败 gcc Compiler I6AASB 【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc gcc Compiler I6CBPN 【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6DRDY 【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败 gcc Compiler I6DUTF [22.03sp1lts][arm/x86] obsredis.service服务启动失败 obs-server Others I6EUHB create_gcov在kernel6.1上执行报错 autofdo Compiler I6FQCO 【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof opengauss-server DB I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler I6VCMC 【20.03 SP1 update 20230329 Train】openstack-nova-priority-feature安装过程中有多余打印,建议优化 openstack-nova sig-openstack I6VFV6 [22.03 SP1] [x86/arm] mariadb授权给远程用户,远程连接服务失败 mariadb DB I666GB dnf group install Core之后dnf group remove Core '--disablerepo=*'会卸载被保护的软件包 dnf sig-OS-Builder 社区待修复漏洞: openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。 严重等级(Severity Rating) 漏洞修复时长 致命(Critical) 7天 高(High) 14天 中(Medium) 30天 低(Low) 30天 可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE%E5%8C%BA%E6%B... 近14天将超期CVE(4.15日数据): 漏洞编号 Issue ID 剩余天数 CVSS评分 软件包 责任SIG CVE-2023-2019 I6VK2N 0.34 4.4 risc-v-kernel sig-RISC-V CVE-2022-4893 I6VR1V 0.95 0.0 freeipa oVirt CVE-2023-32007 I6ZW0C 3.02 8.8 spark sig-bigdata CVE-2023-31975 I71QSG 3.21 9.8 yasm Base-service CVE-2023-30861 I6ZWOG 3.39 7.5 python-flask Programming-language CVE-2023-30772 I6W80Q 3.76 6.4 risc-v-kernel sig-RISC-V CVE-2023-2002 I6WHKR 4.24 0.0 risc-v-kernel sig-RISC-V CVE-2023-28856 I6WI59 4.63 6.5 python-redis Base-service CVE-2023-28856 I6WI58 4.63 6.5 redis6 sig-bigdata CVE-2023-28856 I6WI57 4.63 6.5 redis5 sig-bigdata CVE-2023-28856 I6WI55 4.63 6.5 redis Others CVE-2023-2162 I6WUDR 5.47 5.5 kernel Kernel CVE-2023-2166 I6WUDQ 5.47 5.5 risc-v-kernel sig-RISC-V CVE-2023-2162 I6WUDO 5.47 5.5 risc-v-kernel sig-RISC-V CVE-2023-21962 I6WUEQ 5.49 4.9 mysql5 DB CVE-2023-21917 I6WUEP 5.49 4.9 mysql5 DB CVE-2023-21977 I6WUEN 5.49 4.9 mysql5 DB CVE-2023-21940 I6WUEM 5.49 4.4 mysql5 DB CVE-2023-21911 I6WUEK 5.49 4.9 mysql5 DB CVE-2023-21953 I6WUEF 5.49 4.9 mysql5 DB CVE-2023-21947 I6WUEE 5.49 4.4 mysql5 DB CVE-2023-21920 I6WUEC 5.49 4.9 mysql5 DB CVE-2023-21976 I6WUDV 5.49 4.9 mysql5 DB CVE-2023-21919 I6WUET 5.5 4.9 mysql5 DB CVE-2023-21972 I6WUES 5.5 4.9 mysql5 DB CVE-2023-21945 I6WUFO 5.51 4.9 mysql5 DB CVE-2023-21933 I6WUFM 5.51 4.9 mysql5 DB CVE-2023-21935 I6WUFL 5.51 4.9 mysql5 DB CVE-2023-21982 I6WUFJ 5.51 4.9 mysql5 DB CVE-2023-21955 I6WUFI 5.51 4.9 mysql5 DB CVE-2023-21929 I6WUFH 5.51 5.5 mysql5 DB CVE-2023-21966 I6WUFG 5.51 4.9 mysql5 DB CVE-2023-21963 I6WUFE 5.51 2.7 mysql5 DB CVE-2023-21913 I6WUFA 5.51 4.9 mysql5 DB CVE-2022-45048 I70CLU 5.58 8.8 apache-ranger CVE-2023-21946 I6WUHV 5.63 6.5 mysql5 DB CVE-2023-31039 I72MNP 5.93 9.8 brpc dev-utils CVE-2023-2177 I6X47F 6.06 5.5 risc-v-kernel sig-RISC-V CVE-2023-2177 I6X47E 6.06 5.5 kernel Kernel CVE-2023-26048 I6X44B 6.06 5.3 jetty sig-Java CVE-2023-2124 I6X4UQ 6.13 0.0 risc-v-kernel sig-RISC-V CVE-2022-37434 I72RG3 6.18 9.8 mysql Others CVE-2023-21968 I6X5PF 6.24 3.7 openjdk-latest Compiler CVE-2023-21968 I6X5PD 6.24 3.7 openjdk-11 Compiler CVE-2023-21939 I6X5N4 6.24 5.3 openjdk-1.8.0 Compiler CVE-2023-21939 I6X5N2 6.24 5.3 openjdk-latest Compiler CVE-2023-21939 I6X5N1 6.24 5.3 openjdk-11 Compiler CVE-2023-21938 I6X5R0 6.25 3.7 openjdk-11 Compiler CVE-2023-21938 I6X5QV 6.25 3.7 openjdk-1.8.0 Compiler CVE-2023-21938 I6X5QU 6.25 3.7 openjdk-latest Compiler CVE-2023-21968 I6X5Q5 6.25 3.7 openjdk-1.8.0 Compiler CVE-2023-21967 I6X5T1 6.26 5.9 openjdk-latest Compiler CVE-2023-21967 I6X5SQ 6.26 5.9 openjdk-11 Compiler CVE-2023-21967 I6X5SN 6.26 5.9 openjdk-1.8.0 Compiler CVE-2023-21954 I6X5SL 6.26 5.9 openjdk-11 Compiler CVE-2023-21954 I6X5SI 6.26 5.9 openjdk-1.8.0 Compiler CVE-2023-21954 I6X5SH 6.26 5.9 openjdk-latest Compiler CVE-2023-21937 I6X5RP 6.26 3.7 openjdk-1.8.0 Compiler CVE-2023-21937 I6X5RO 6.26 3.7 openjdk-latest Compiler CVE-2023-21937 I6X5RL 6.26 3.7 openjdk-11 Compiler CVE-2023-25759 I6X66O 6.37 5.4 platform sig-epol CVE-2023-30549 I70QQV 6.76 7.8 apptainer CVE-2022-2084 I6XCBL 6.93 5.5 cloud-init Base-service CVE-2023-1729 I6XGSW 7.15 0.0 LibRaw Programming-language CVE-2023-2194 I6XHPM 7.32 6.7 risc-v-kernel sig-RISC-V CVE-2023-1255 I6XHT7 7.36 5.9 openssl sig-security-facility CVE-2023-2222 I6XRGM 8.06 0.0 binutils Compiler CVE-2023-31484 I6ZROS 9.67 8.1 perl Base-service CVE-2023-26049 I6XY2G 9.71 5.3 jetty sig-Java CVE-2023-31972 I71QSB 10.21 7.8 yasm Base-service CVE-2023-31974 I71QS7 10.21 7.8 yasm Base-service CVE-2023-31973 I71R05 10.23 7.8 yasm Base-service CVE-2023-2610 I71RGF 10.58 7.8 vim Base-service CVE-2023-31085 I6YKYI 11.69 5.5 risc-v-kernel sig-RISC-V CVE-2023-31081 I6YKXQ 11.69 5.5 risc-v-kernel sig-RISC-V CVE-2023-31082 I6YKXJ 11.69 5.5 risc-v-kernel sig-RISC-V CVE-2023-31084 I6YKXB 11.69 5.5 kernel Kernel CVE-2023-31081 I6YKX6 11.69 5.5 kernel Kernel CVE-2023-31082 I6YKX3 11.69 5.5 kernel Kernel CVE-2023-31083 I6YOAV 11.82 4.7 risc-v-kernel sig-RISC-V CVE-2023-31083 I6YOAU 11.82 4.7 kernel Kernel CVE-2023-31085 I6YOAJ 11.82 5.5 kernel Kernel CVE-2023-31084 I6YO9Y 11.82 5.5 risc-v-kernel sig-RISC-V CVE-2023-2269 I6YR06 11.94 5.5 risc-v-kernel sig-RISC-V CVE-2023-30402 I6YWGP 12.43 5.5 yasm Base-service CVE-2023-26735 I6Z1YC 12.93 6.3 blackbox_exporter sig-CloudNative CVE-2023-0215 I72RGR 13.18 7.5 mysql Others CVE-2023-0458 I6Z6SU 13.59 5.3 kernel Kernel CVE-2023-1786 I6Z6T2 13.61 5.5 cloud-init Base-service openEuler 社区指导文档及开放平台链接: openEuler 版本分支维护规范: https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%8... openEuler release-management 版本分支PR指导: https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%8... 社区QA 版本测试提单规范 https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d651... 社区QA 测试平台 radiates https://radiatest.openeuler.org<https://radiatest.openeuler.org/> 沐钰莹(openEuler release SIG) Mobile: +86 15651995918 中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心 HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China E-mail: muyuying1@huawei.com<mailto:muyuying1@huawei.com> [cid:image002.png@01D95F4C.8C3691C0]Open Source OS for Digital Infrastructure 本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形 式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话 或邮件通知发件人并删除本邮件! This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for the person or entity whose address is listed above. Any use of the information contained herein in any way (including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by phone or email immediately and delete it