
Dear all,
经社区Release SIG、QA SIG及 CICD SIG
评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。
本公示分为五部分:
1、openEuler-20.03-LTS-SP1
Update 20230329发布情况及待修复缺陷
2、openEuler-20.03-LTS-SP3
Update 20230329发布情况及待修复缺陷
3、openEuler-22.03-LTS
Update 20230329发布情况及待修复缺陷
4、openEuler-22.03-LTS-SP1
Update 20230329发布情况及待修复缺陷
5、openEuler
关键组件待修复CVE 清单
6、openEuler
社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2023/04/09)提供
update_
20230405
版本。
openEuler-20.03-LTS-SP1 Update
20230329
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题3个,已知漏洞18个。目前版本分支剩余待修复缺陷35个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复
及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6QETU?from=project-issue
CVE修复:
CVE |
仓库 |
score |
CVE-2020-12762 |
libfastjson |
7.8 |
CVE-2022-41725 |
golang |
7.5 |
CVE-2022-41724 |
golang |
7.5 |
CVE-2022-41723 |
golang |
7.5 |
CVE-2023-28617 |
emacs |
9.8 |
CVE-2023-27538 |
curl |
5.8 |
CVE-2023-27536 |
curl |
5.8 |
CVE-2023-27535 |
curl |
5.8 |
CVE-2023-27534 |
curl |
4.5 |
CVE-2023-27533 |
curl |
4.5 |
CVE-2023-26769 |
liblouis |
7.5 |
CVE-2022-36021 |
redis |
5.5 |
CVE-2023-28466 |
kernel |
7 |
CVE-2023-1382 |
kernel |
0 |
CVE-2023-1281 |
kernel |
7.8 |
CVE-2023-1079 |
kernel |
6.8 |
CVE-2022-4269 |
kernel |
5.5 |
CVE-2022-29901 |
kernel |
5.6 |
Bugfix:
issue |
仓库 |
#I6PS8F:vim9.0版本添加用户配置文件vimrc后Backspace键失效 |
vim |
#I6D0K1:例行分析grub2软件包补丁 |
grub2 |
#I6MR1V:【OLK5.10】文件系统长稳环境出现fsck修复后仍有错误 |
kernel |
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本
发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE
及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示:
任务ID |
任务标题 |
关联仓库 |
SIG |
I281C1 |
【fuzz】runtime error: |
libsass |
Base-service |
I437CR |
[SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错 |
obs-server |
Others |
I43OSX |
[clamav]
执行clamscan --statistics pcre命令会出现error,但是最终返回码为0 |
clamav |
Others |
I48GIM |
【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败 |
ovirt-cockpit-sso |
oVirt |
I4G4A5 |
Undefine-shift in _bfd_safe_read_leb128 |
binutils |
Compiler |
I4G4B1 |
Integer overflow in print_vms_time |
binutils |
Compiler |
I4G4VY |
memleak in parse_gnu_debugaltlink |
binutils |
Compiler |
I4G4WF |
Heap-buffer-overflow in slurp_hppa_unwind_table |
binutils |
Compiler |
I4G4WW |
Use-after-free in make_qualified_name |
binutils |
Compiler |
I4G4X6 |
memleak in byte_get_little_endian |
binutils |
Compiler |
I4G4XF |
memleak in process_mips_specific |
binutils |
Compiler |
I4G4Y0 |
out-of-memory in vms_lib_read_index |
binutils |
Compiler |
I4G4YJ |
Heap-buffer-overflow in bfd_getl16 |
binutils |
Compiler |
I4G4YV |
Floating point exception in _bfd_vms_slurp_etir |
binutils |
Compiler |
I4J0OY |
【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常 |
libdap |
sig-recycle |
I4JMG4 |
【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251 |
python-robotframework |
sig-ROS |
I4K6ES |
stack-buffer-overflow in UINT32_Marshal
|
libtpms |
sig-security-facility |
I4K6FU |
global-buffer-overflow in Array_Marshal |
libtpms |
sig-security-facility |
I4O16Z |
【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息 |
kernel |
Kernel |
I4QV6N |
【openEuler-20.03-LTS-SP1】flink命令执行失败
|
flink |
sig-bigdata |
I5IG1V |
【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败 |
efl |
sig-compat-winapp |
I5IG6K |
【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 |
opencryptoki |
dev-utils |
I5JHX2 |
【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败 |
ovirt-engine |
oVirt |
I6975Y |
【arm】--enable-bootstrap构建gcc失败 |
gcc |
Compiler |
I6AASB |
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE:
lto1: internal compiler error: rewrite failed for realloc |
gcc |
Compiler |
I6AZZU |
【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation
fault (core dumped) |
gcc |
Compiler |
I6CBNA |
【20.03 sp1 udpate 0131
】netdata -W createdataset=10命令执行失败 |
netdata |
Base-service |
I6CKZE |
【arm】【deja】使用22.03 LTS-SP1发布源gcc
出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault |
gcc |
Compiler |
I6DRDY |
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败 |
gcc |
Compiler |
I6DUTF |
[22.03sp1lts][arm/x86] obsredis.service服务启动失败 |
obs-server |
Others |
I6EUHB |
create_gcov在kernel6.1上执行报错 |
autofdo |
Compiler |
I6FQCO |
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof |
opengauss-server |
DB |
I6I438 |
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' |
gcc |
Compiler |
I6I47O |
【x86】【deja】运行出现Segmentation fault |
gcc |
Compiler |
I6O19D |
【20.03 sp1 udpate 0315
】irb-jruby命令执行报错 |
jruby |
sig-ruby |
openEuler-20.03-LTS-SP3 Update
20230329
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问5个,已知漏洞18个。目前版本分支剩余待修复缺陷
12个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP3 Update版本CVE修复
及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6QETV?from=project-issue
CVE修复:
需求类型 |
软件包 |
优先级 |
CVE-2020-12762 |
libfastjson |
7.8 |
CVE-2022-41723 |
golang |
7.5 |
CVE-2022-41724 |
golang |
7.5 |
CVE-2022-41725 |
golang |
7.5 |
CVE-2023-28617 |
emacs |
9.8 |
CVE-2023-27533 |
curl |
4.5 |
CVE-2023-27534 |
curl |
4.5 |
CVE-2023-27535 |
curl |
5.8 |
CVE-2023-27536 |
curl |
5.8 |
CVE-2023-27538 |
curl |
5.8 |
CVE-2022-36021 |
redis |
5.5 |
CVE-2023-26769 |
liblouis |
7.5 |
CVE-2022-29901 |
kernel |
5.6 |
CVE-2022-4269 |
kernel |
5.5 |
CVE-2023-1079 |
kernel |
6.8 |
CVE-2023-1281 |
kernel |
7.8 |
CVE-2023-1382 |
kernel |
0 |
CVE-2023-28466 |
kernel |
7 |
Bugfix:
issue |
仓库 |
#I6PS8F:vim9.0版本添加用户配置文件vimrc后Backspace键失效 |
vim |
#I6D0K1:例行分析grub2软件包补丁 |
grub2 |
#I6KMOJ:grub2支持tpcm3.0特性 |
grub2 |
#I6L25L:shim支持可信计算3.0tpcm特性 |
shim |
#I6MR1V:【OLK5.10】文件系统长稳环境出现fsck修复后仍有错误 |
kernel |
openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本
发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE
及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示:
任务ID |
任务标题 |
关联仓库 |
SIG |
I4QV7S |
【openEuler-20.03-LTS-SP3】flink run
命令执行失败 |
flink |
sig-bigdata |
I4UMEV |
[openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历 |
kernel |
Kernel |
I5IGAS |
【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 |
opencryptoki |
dev-utils |
I5IGOR |
【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败 |
fluidsynth |
Application |
I5KXUY |
【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败 |
ovirt-cockpit-sso |
oVirt |
I5KY4S |
【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功 |
vdsm |
oVirt |
I5LYJK |
【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常 |
TCP_option_address |
Kernel |
I5XDXJ |
openeuler:20.03-sp3下lua-lunit0.5和lua5.3不匹配 |
mugen |
sig-QA |
I613DI |
【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败 |
openEuler-release |
Base-service |
I61LEV |
【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope
-h报错 |
tuna |
Others |
I66BBJ |
[20.03-LTS-SP3]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源 |
openEuler-repos |
Base-service |
I6CBL7 |
【20.03 sp3 udpate 0131
】netdata -W createdataset=10命令执行失败 |
netdata |
Base-service |
openEuler-22.03-LTS
Update
20230329
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题22个,已知漏洞5个。目前版本分支剩余待修复缺陷8个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复
及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6QETV?from=project-issue
CVE修复:
CVE |
仓库 |
score |
CVE-2020-12762 |
libfastjson |
7.8 |
CVE-2022-41723 |
golang |
7.5 |
CVE-2022-41724 |
golang |
7.5 |
CVE-2022-41725 |
golang |
7.5 |
CVE-2023-28617 |
emacs |
9.8 |
CVE-2023-27533 |
curl |
4.5 |
CVE-2023-27534 |
curl |
4.5 |
CVE-2023-27535 |
curl |
5.8 |
CVE-2023-27536 |
curl |
5.8 |
CVE-2023-27538 |
curl |
5.8 |
CVE-2023-1161 |
wireshark |
7.1 |
CVE-2022-36021 |
redis |
5.5 |
CVE-2023-26769 |
liblouis |
7.5 |
CVE-2022-48423 |
kernel |
7.8 |
CVE-2022-48424 |
kernel |
7.8 |
CVE-2022-48425 |
kernel |
7.8 |
CVE-2023-1079 |
kernel |
6.8 |
CVE-2023-1249 |
kernel |
4.1 |
CVE-2023-1281 |
kernel |
7.8 |
CVE-2023-1382 |
kernel |
0 |
CVE-2023-22999 |
kernel |
5.5 |
CVE-2023-28466 |
kernel |
7 |
Bugfix:
issue |
仓库 |
#I6RD72:upadte20230329【轻量级
PR】:Rebuild for next release |
perl-libintl-perl |
#I6PS8F:vim9.0版本添加用户配置文件vimrc后Backspace键失效 |
vim |
#I6MTKW:【grub2】grub2-rpm-sort命令执行报错 |
grub2 |
#I6RDEF:update20230329
添加sw架构 |
perftest |
#I5N162:【OLK
5.10】修复scsi_end_request并发场景出现ref->data空指针解引用问题 |
kernel |
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本
发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/OpenStack/Train/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/OpenStack/Wallaby/
openEuler-22.03-LTS Update版本待修复问题清单公示:
任务ID |
任务标题 |
关联仓库 |
sig |
I5JIA6 |
【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败 |
ovirt-engine |
oVirt |
I5JPII |
【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin |
ovirt-engine |
oVirt |
I665SM |
resize2fs出现csum不一致 |
kernel |
Kernel |
I66BDE |
[22.03-LTS]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源 |
openEuler-repos |
Base-service |
I66KIH |
【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败 |
openstack-ironic-inspector |
sig-openstack |
I677QX |
【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误 |
opengauss-server |
DB |
I6CBPQ |
【22.03 lts udpate 0131
】netdata -W createdataset=10命令执行失败 |
netdata |
Base-service |
I6O1CK |
【22.03 lts udpate 0315
】irb-jruby命令执行报错 |
jruby |
sig-ruby |
openEuler-22.03-LTS SP1
Update
20230329
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题10个,已知漏洞12个。目前版本分支剩余待修复缺陷13个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS SP1 Update版本CVE修复
及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6QETT?from=project-issue
CVE修复:
CVE |
仓库 |
score |
CVE-2020-12762 |
libfastjson |
7.8 |
CVE-2022-41723 |
golang |
7.5 |
CVE-2022-41724 |
golang |
7.5 |
CVE-2022-41725 |
golang |
7.5 |
CVE-2023-28617 |
emacs |
9.8 |
CVE-2023-27533 |
curl |
4.5 |
CVE-2023-27534 |
curl |
4.5 |
CVE-2023-27535 |
curl |
5.8 |
CVE-2023-27536 |
curl |
5.8 |
CVE-2023-27538 |
curl |
5.8 |
CVE-2023-1161 |
wireshark |
7.1 |
CVE-2022-36021 |
redis |
5.5 |
CVE-2023-26769 |
liblouis |
7.5 |
Bugfix:
issue |
仓库 |
#I6RD72:upadte20230329【轻量级
PR】:Rebuild for next release |
perl-libintl-perl |
#I6RE2O:update20230329 [Update] Update to v0.4.1 |
pin-gcc-client |
#I64VTB:执行命令报错error
-4 |
papi |
#I6RE3L:update20230329 master到openEuler-22.03-LTS-SP1,升级到4.0.2 |
procps-ng |
#I6GCRA:部署好server,client,插入ko,虚拟机重启 |
dpu-utilities |
#I6JPN3:openEuler22.03 sp1,4.0版本procps-ng,开启虚拟机top命令统计不到CPU使用率
st,st占用率一直显示为0 |
procps-ng |
#I6RE77:update20230329 update syscare to 1.0.1 |
syscare |
#I67PXN:fix changelog date error |
rsyslog |
#I6PS8F:vim9.0版本添加用户配置文件vimrc后Backspace键失效 |
vim |
#I5N162:【OLK
5.10】修复scsi_end_request并发场景出现ref->data空指针解引用问题 |
kernel |
openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本
发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/OpenStack/Train/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/OpenStack/Wallaby/
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示:
任务ID |
任务标题 |
关联仓库 |
sig |
I657VX |
【22.03_LTS_SP1_RC2】【x86/arm】deepin-dbus-generator不存在安全的编译选项PIE、STRIP |
deepin-dbus-generator |
sig-DDE |
I657W3 |
【22.03_LTS_SP1_RC2】【x86/arm】deepin-graphics-driver-manager存在不安全的编译选项STRIP |
deepin-graphics-driver-manager |
sig-DDE |
I6975Y |
【arm】--enable-bootstrap构建gcc失败 |
gcc |
Compiler |
I6AASB |
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1:
internal compiler error: rewrite failed for realloc |
gcc |
Compiler |
I6AZZU |
【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation
fault (core dumped) |
gcc |
Compiler |
I6CBPN |
【22.03 lts sp1 udpate 0131
】netdata -W createdataset=10命令执行失败 |
netdata |
Base-service |
I6CKZE |
【arm】【deja】使用22.03 LTS-SP1发布源gcc
出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault |
gcc |
Compiler |
I6DRDY |
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败 |
gcc |
Compiler |
I6DUTF |
[22.03sp1lts][arm/x86] obsredis.service服务启动失败 |
obs-server |
Others |
I6EUHB |
create_gcov在kernel6.1上执行报错 |
autofdo |
Compiler |
I6FQCO |
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof |
opengauss-server |
DB |
I6I438 |
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' |
gcc |
Compiler |
I6I47O |
【x86】【deja】运行出现Segmentation fault |
gcc |
Compiler |
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG
关注涉及CVE组件的修复情况。
严重等级(Severity Rating) |
漏洞修复时长 |
致命(Critical) |
7天 |
高(High) |
14天 |
中(Medium) |
30天 |
低(Low) |
30天 |
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE%E5%8C%BA%E6%BC%8F%E6%B4%9E%E7%AE%A1%E7%90%86
近14天将超期CVE(3.25日数据):
漏洞编号 |
Issue ID |
剩余天数 |
CVSS评分 |
软件包 |
责任SIG |
CVE-2023-25664 |
I6Q9HZ |
0.17 |
9.8 |
tensorflow |
sig-ai |
CVE-2023-27586 |
I6OW3B |
3.0 |
7.1 |
python-cairosvg |
|
CVE-2023-0386 |
I6PBWH |
4.17 |
7.8 |
risc-v-kernel |
sig-RISC-V |
CVE-2023-1192 |
I6KDQD |
4.26 |
0.0 |
risc-v-kernel |
sig-RISC-V |
CVE-2023-1194 |
I6KDP0 |
4.26 |
0.0 |
risc-v-kernel |
sig-RISC-V |
CVE-2023-1195 |
I6KDOZ |
4.26 |
0.0 |
risc-v-kernel |
sig-RISC-V |
CVE-2023-1193 |
I6KEWP |
4.38 |
0.0 |
risc-v-kernel |
sig-RISC-V |
CVE-2023-0464 |
I6PDB8 |
4.42 |
7.5 |
openssl |
sig-security-facility |
CVE-2023-1249 |
I6KT9F |
5.26 |
5.5 |
risc-v-kernel |
sig-RISC-V |
CVE-2023-1249 |
I6KT9C |
5.26 |
5.5 |
kernel |
Kernel |
CVE-2023-28772 |
I6PRCO |
5.75 |
7.8 |
kernel |
Kernel |
CVE-2023-1108 |
I6KVMO |
5.76 |
0.0 |
undertow |
sig-Java |
CVE-2023-27478 |
I6KWN7 |
5.8 |
6.5 |
libmemcached |
Programming-language |
CVE-2023-25669 |
I6Q38F |
6.67 |
7.5 |
tensorflow |
sig-ai |
CVE-2023-25670 |
I6Q38E |
6.67 |
7.5 |
tensorflow |
sig-ai |
CVE-2023-25659 |
I6Q37O |
6.67 |
7.5 |
tensorflow |
sig-ai |
CVE-2023-25658 |
I6Q37N |
6.67 |
7.5 |
tensorflow |
sig-ai |
CVE-2023-25673 |
I6Q9HC |
7.16 |
7.5 |
tensorflow |
sig-ai |
CVE-2023-25671 |
I6Q9HA |
7.16 |
7.5 |
tensorflow |
sig-ai |
CVE-2023-25665 |
I6Q9H7 |
7.16 |
7.5 |
tensorflow |
sig-ai |
CVE-2023-27579 |
I6Q9G1 |
7.16 |
7.5 |
tensorflow |
sig-ai |
CVE-2023-25663 |
I6Q9IB |
7.17 |
7.5 |
tensorflow |
sig-ai |
CVE-2023-25666 |
I6Q9I8 |
7.17 |
7.5 |
tensorflow |
sig-ai |
CVE-2023-25667 |
I6Q9I6 |
7.17 |
7.5 |
tensorflow |
sig-ai |
CVE-2023-25660 |
I6Q9I4 |
7.17 |
7.5 |
tensorflow |
sig-ai |
CVE-2023-25674 |
I6Q9HW |
7.17 |
7.5 |
tensorflow |
sig-ai |
CVE-2023-25662 |
I6Q9HP |
7.17 |
7.5 |
tensorflow |
sig-ai |
CVE-2023-25672 |
I6Q9HK |
7.17 |
7.5 |
tensorflow |
sig-ai |
CVE-2023-1289 |
I6LKHN |
7.38 |
5.5 |
ImageMagick |
Others |
CVE-2011-5034 |
I6LPRE |
7.96 |
0.0 |
geronimo-saaj |
sig-Java |
CVE-2023-1436 |
I6P70O |
11.35 |
7.5 |
jettison |
dev-utils |
CVE-2023-1370 |
I6MX6A |
11.35 |
7.5 |
json-smart |
sig-Java |
CVE-2023-1032 |
I6MSIY |
11.63 |
0.0 |
kernel |
Kernel |
CVE-2023-28176 |
I6N797 |
12.77 |
0.0 |
firefox |
Application |
CVE-2023-28159 |
I6N78R |
12.77 |
0.0 |
firefox |
Application |
CVE-2023-1390 |
I6N7CV |
12.78 |
6.5 |
risc-v-kernel |
sig-RISC-V |
CVE-2023-28164 |
I6N87J |
12.8 |
6.1 |
firefox |
Application |
CVE-2023-28162 |
I6N860 |
12.8 |
0.0 |
firefox |
Application |
CVE-2023-28177 |
I6N8JV |
12.81 |
0.0 |
firefox |
Application |
CVE-2023-28163 |
I6N8EY |
12.81 |
0.0 |
firefox |
Application |
CVE-2023-28161 |
I6N8CG |
12.81 |
0.0 |
firefox |
Application |
CVE-2023-28160 |
I6N89T |
12.81 |
0.0 |
firefox |
Application |
CVE-2023-25752 |
I6N96P |
12.83 |
6.1 |
firefox |
Application |
CVE-2023-25750 |
I6N96C |
12.83 |
0.0 |
firefox |
Application |
CVE-2023-25748 |
I6N965 |
12.83 |
0.0 |
firefox |
Application |
CVE-2023-25749 |
I6N960 |
12.83 |
0.0 |
firefox |
Application |
CVE-2023-25751 |
I6N97Z |
12.84 |
0.0 |
firefox |
Application |
CVE-2023-28328 |
I6NCQH |
13.0 |
0.0 |
kernel |
Kernel |
CVE-2023-28327 |
I6NCP2 |
13.0 |
0.0 |
kernel |
Kernel |
CVE-2023-1380 |
I6NCVX |
13.01 |
0.0 |
kernel |
Kernel |
CVE-2022-39188 |
I5QVT3 |
13.81 |
4.7 |
kernel |
Kernel |
openEuler
社区指导文档及开放平台链接:
openEuler
版本分支维护规范:
openEuler release-management
版本分支PR指导:
社区QA
版本测试提单规范
社区QA
测试平台 radiates
https://radiatest.openeuler.org
沐钰莹(openEuler release SIG)
Mobile: +86 15651995918
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail:
muyuying1@huawei.com
Open
Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件!
This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it
participants (1)
-
muyuying