
Dear all,
经社区Release SIG、QA SIG及 CICD
SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3、openEuler-22.03-LTS及openEuler-22.03-LTS-SP1
update版本满足版本出口质量,现进行发布公示。
本公示分为六部分:
1、openEuler-20.03-LTS-SP1 Update 20230531发布情况及待修复缺陷
2、openEuler-20.03-LTS-SP3 Update 20230531发布情况及待修复缺陷
3、openEuler-22.03-LTS Update 20230531发布情况及待修复缺陷
4、openEuler-22.03-LTS-SP1 Update 20230531发布情况及待修复缺陷
5、openEuler
关键组件待修复CVE 清单
6、openEuler
社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2023/06/10)提供
update_ 20230607
版本。
openEuler-20.03-LTS-SP1 Update
20230531
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题2个,已知漏洞19个。目前版本分支剩余待修复缺陷29个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I78ZFO?from=project-issue
CVE修复:
CVE |
软件包 |
优先级 |
CVE-2023-24805 |
cups-filters |
8.8 |
CVE-2015-1197 |
cpio |
1.9 |
CVE-2023-33204 |
sysstat |
7.8 |
CVE-2023-32067 |
c-ares |
7.5 |
CVE-2023-28204 |
webkit2gtk3 |
6.5 |
CVE-2023-2731 |
libtiff |
5.5 |
CVE-2023-2283 |
libssh |
4.2 |
CVE-2023-1999 |
libwebp |
6.3 |
CVE-2023-1667 |
libssh |
4.3 |
CVE-2023-30570 |
libreswan |
7.5 |
CVE-2023-2856 |
wireshark |
5.5 |
CVE-2021-37501 |
hdf5 |
7.5 |
CVE-2020-10811 |
hdf5 |
5.5 |
CVE-2019-8396 |
hdf5 |
6.5 |
CVE-2018-14460 |
hdf5 |
8.8 |
CVE-2018-14033 |
hdf5 |
8.8 |
CVE-2018-13867 |
hdf5 |
9.8 |
CVE-2022-1280 |
kernel |
6.3 |
CVE-2020-36694 |
kernel |
9.8 |
Bugfix:
issue |
软件包 |
#I6VF01:例行分析dnf补丁,需要补丁回合 |
dnf |
#I78PCH:【openEuler-1.0-LTS】cpufreq:conservative:
Add a switch to enable fast mode |
kernel |
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE
及安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高):
里程碑 |
任务ID |
任务标题 |
优先级 |
sig组 |
关联仓库 |
openEuler 20.03 LTS SP1 update20220817 |
I5JHX2 |
【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败 |
主要 |
sig/oVirt |
ovirt-engine |
openEuler 20.03-LTS-SP1 |
I4G4A5 |
Undefine-shift in _bfd_safe_read_leb128 |
无优先级 |
sig/Base-service |
binutils |
openEuler 20.03-LTS-SP1 |
I4G4B1 |
Integer overflow in print_vms_time |
无优先级 |
sig/Base-service |
binutils |
openEuler 20.03-LTS-SP1 |
I4G4VY |
memleak in parse_gnu_debugaltlink |
无优先级 |
sig/Base-service |
binutils |
openEuler 20.03-LTS-SP1 |
I4G4WF |
Heap-buffer-overflow in slurp_hppa_unwind_table |
无优先级 |
sig/Base-service |
binutils |
openEuler 20.03-LTS-SP1 |
I4G4WW |
Use-after-free in make_qualified_name |
无优先级 |
sig/Base-service |
binutils |
openEuler 20.03-LTS-SP1 |
I4G4X6 |
memleak in byte_get_little_endian |
无优先级 |
sig/Base-service |
binutils |
openEuler 20.03-LTS-SP1 |
I4G4XF |
memleak in process_mips_specific |
无优先级 |
sig/Base-service |
binutils |
openEuler 20.03-LTS-SP1 |
I4G4Y0 |
out-of-memory in vms_lib_read_index |
无优先级 |
sig/Base-service |
binutils |
openEuler 20.03-LTS-SP1 |
I4G4YJ |
Heap-buffer-overflow in bfd_getl16 |
无优先级 |
sig/Base-service |
binutils |
openEuler 20.03-LTS-SP1 |
I4G4YV |
Floating point exception in _bfd_vms_slurp_etir |
无优先级 |
sig/Base-service |
binutils |
openEuler 20.03-LTS-SP1 |
I4J0OY |
【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常 |
主要 |
sig/sig-recycle |
libdap |
openEuler 20.03-LTS-SP1 |
I4JMG4 |
【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251 |
主要 |
sig/sig-ROS |
python-robotframework |
openEuler 20.03-LTS-SP1 |
I5DLX7 |
[20.03 22.03]
管理员指南操作文档mysql服务搭建指导文档有误 |
主要 |
sig/doc |
docs |
openEuler 20.03-LTS-SP1 |
I5IG1V |
【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败 |
次要 |
|
efl |
openEuler 20.03-LTS-SP1 |
I5IG6K |
【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 |
次要 |
sig/dev-utils |
opencryptoki |
openEuler 20.03-LTS-SP1 |
I6VFAE |
[20.03 SP1] [x86/arm] mariadb授权给远程用户,远程连接服务失败 |
次要 |
sig/DB |
mariadb |
openEuler 20.03LTS SP1 update2103 |
I3E5C1 |
【20.03-SP1】【arm/x86】服务启动失败 |
主要 |
regression-failed |
hadoop |
openEuler 20.03LTS SP1 update210901 |
I48GIM |
【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败 |
主要 |
|
ovirt-cockpit-sso |
openEuler 20.03LTS SP1 update210926 |
I4CMSV |
【20.03-LTS-SP1】【arm/x86】搭建Kubernetes
集群缺少包etcd |
无优先级 |
sig/TC |
community |
openEuler 20.03LTS SP1 update220111 |
I4QV6N |
【openEuler-20.03-LTS-SP1】flink命令执行失败
|
无优先级 |
sig/sig-ai-bigdata |
flink |
openEuler-20.03-LTS-SP1 |
I3B5TJ |
在obs server环境上,配置rpm包签名,签名报错 |
无优先级 |
|
infrastructure |
openEuler-20.03-LTS-SP1 |
I3QGU7 |
系统不支持GB18030 |
无优先级 |
|
community |
openEuler-20.03-LTS-SP1-dailybuild |
I5Y6VJ |
ovirt-hosted-engine-setup install problem in openEuler:20:03:LTS:SP1 |
无优先级 |
sig/oVirt |
ovirt-hosted-engine-setup |
openEuler-20.03-LTS-SP1-dailybuild |
I5Y6XB |
cockpit-ovirt install problem in openEuler:20:03:LTS:SP1 |
无优先级 |
sig/oVirt |
cockpit-ovirt |
openEuler-20.03-LTS-SP1-dailybuild |
I5Y6YX |
ovirt-host install problem in openEuler:20:03:LTS:SP1 |
无优先级 |
sig/oVirt |
ovirt-host |
openEuler-20.03-LTS-SP1-dailybuild |
I5Y79E |
freeipa install problem in openEuler:20:03:LTS:SP1 |
无优先级 |
sig/oVirt |
freeipa |
openEuler-20.03-LTS-SP1-dailybuild |
I5Y99T |
mate-desktop install problem in openEuler:20:03:LTS:SP1 |
无优先级 |
sig/sig-mate-desktop |
mate-desktop |
openEuler-20.03-LTS-SP1-dailybuild |
I5YU6F |
ovirt-engine build problem in openEuler:20.03:LTS:SP1:Epol |
无优先级 |
sig/oVirt |
ovirt-engine |
openEuler-20.03-LTS-SP3 Update
20230531
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问5,已知漏洞17。目前版本分支剩余待修复缺陷
11个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I78ZFS?from=project-issue
CVE修复:
CVE |
软件包 |
优先级 |
CVE-2023-24805 |
cups-filters |
8.8 |
CVE-2023-28204 |
webkit2gtk3 |
6.5 |
CVE-2023-33204 |
sysstat |
7.8 |
CVE-2023-1999 |
libwebp |
6.3 |
CVE-2023-2731 |
libtiff |
5.5 |
CVE-2023-1667 |
libssh |
4.3 |
CVE-2023-2283 |
libssh |
4.2 |
CVE-2023-32067 |
c-ares |
7.5 |
CVE-2023-2856 |
wireshark |
5.5 |
CVE-2023-30570 |
libreswan |
7.5 |
CVE-2018-13867 |
hdf5 |
9.8 |
CVE-2018-14033 |
hdf5 |
8.8 |
CVE-2018-14460 |
hdf5 |
8.8 |
CVE-2019-8396 |
hdf5 |
6.5 |
CVE-2020-10811 |
hdf5 |
5.5 |
CVE-2021-37501 |
hdf5 |
7.5 |
CVE-2022-1280 |
kernel |
6.3 |
Bugfix:
issue |
软件包 |
#I6VF01:例行分析dnf补丁,需要补丁回合 |
dnf |
#I791WX:openEuler-20.03-LTS-SP3:shim调用BIOS接口用法错误 |
shim |
#I791JW:【mpctool】数据采集过程中,系统出现过温或传感器故障时,只间隔10S就继续尝试,需要区分保护 |
eagle |
#I78PCH:【openEuler-1.0-LTS】cpufreq:conservative:
Add a switch to enable fast mode |
kernel |
#I79TSD:udpate_20230531避免在开启tpcm的场景下对grub.cfg进行两次度量 |
grub2 |
openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE及安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高):
里程碑 |
任务ID |
任务标题 |
优先级 |
sig组 |
关联仓库 |
openEuler 20.03 LTS SP3 update20220801 |
I5LYJK |
【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常 |
主要 |
sig/Kernel |
TCP_option_address |
openEuler 20.03-LTS-SP3 |
I5IGAS |
【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 |
次要 |
sig/dev-utils |
opencryptoki |
openEuler 20.03-LTS-SP3 |
I5IGOR |
【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败 |
次要 |
sig/Application |
fluidsynth |
openEuler 20.03-LTS-SP3 |
I5KXUY |
【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败 |
主要 |
sig/oVirt |
ovirt-cockpit-sso |
openEuler 20.03-LTS-SP3 |
I613DI |
【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败 |
次要 |
sig/Base-service |
openEuler-release |
openEuler 20.03LTS SP3 update220111 |
I4QV7S |
【openEuler-20.03-LTS-SP3】flink run
命令执行失败 |
无优先级 |
sig/sig-ai-bigdata |
flink |
openEuler-20.03-LTS-SP3 |
I5KY4S |
【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功 |
主要 |
sig/oVirt |
vdsm |
openEuler-20.03-LTS-SP3 |
I6VFMI |
[20.03 SP3] [x86/arm] mariadb授权给远程用户,远程连接服务失败 |
次要 |
sig/DB |
mariadb |
openEuler-20.03-LTS-SP3 |
I72EAT |
【20.03 SP3】php相关包在20.03 LTS SP3降级失败 |
主要 |
sig/Base-service |
php |
openEuler-20.03-LTS-SP3 |
I72HWV |
【20.03-lts-sp3】x86环境上同时安装php-fpm软件包和php-opcache软件包后会导致php-fpm.service服务启动失败 |
次要 |
sig/Base-service |
php |
openEuler-20.03-LTS-SP3 |
I73YJO |
20.03-LTS-SP3 mellanox网卡无法用ethtool
工具配置速率 |
无优先级 |
sig/Kernel |
kernel |
openEuler-22.03-LTS
Update
20230531
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题5个,已知漏洞22个。目前版本分支剩余待修复缺陷9个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I78ZFW?from=project-issue
CVE修复:
CVE |
软件包 |
优先级 |
CVE-2023-24805 |
cups-filters |
8.8 |
CVE-2023-28204 |
webkit2gtk3 |
6.5 |
CVE-2023-32373 |
webkit2gtk3 |
8.8 |
CVE-2023-32409 |
webkit2gtk3 |
8.8 |
CVE-2023-33204 |
sysstat |
7.8 |
CVE-2023-1999 |
libwebp |
6.3 |
CVE-2023-2731 |
libtiff |
5.5 |
CVE-2023-32067 |
c-ares |
7.5 |
CVE-2023-0668 |
wireshark |
3.3 |
CVE-2023-2855 |
wireshark |
7.8 |
CVE-2023-2856 |
wireshark |
5.5 |
CVE-2023-2857 |
wireshark |
7.8 |
CVE-2023-2858 |
wireshark |
7.8 |
CVE-2023-2879 |
wireshark |
7.5 |
CVE-2023-30570 |
libreswan |
7.5 |
CVE-2018-13867 |
hdf5 |
9.8 |
CVE-2018-14033 |
hdf5 |
8.8 |
CVE-2018-14460 |
hdf5 |
8.8 |
CVE-2019-8396 |
hdf5 |
6.5 |
CVE-2020-10811 |
hdf5 |
5.5 |
CVE-2021-37501 |
hdf5 |
7.5 |
CVE-2023-22998 |
kernel |
5.5 |
Bugfix:
issue |
软件包 |
#I79R9U:update_20230531 libdnf
升级0.65.0-6版本 |
libdnf |
#I6LNLJ:例行分析dnf补丁,需要补丁回合 |
dnf |
#I79J4I:authselect
创建和应用验证策略后,root无法登录 |
authselect |
#I79RNH:update_20230531 examples use static libraries to avoid unlinked dynamic libraries |
dpdk |
#I798WQ:【OLK-5.10】arm64:oops
in cgroup_apply_control_disable |
kernel |
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/OpenStack/Train/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/OpenStack/Wallaby/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/obs-server/2.10.11/
openEuler CVE
及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-22.03-LTS Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高):
里程碑 |
任务ID |
任务标题 |
优先级 |
sig |
关联仓库 |
22.03-LTS-Kernel-Update |
I5E2N2 |
【openEuler 22.03-LTS】5.10内核执行ltp用例出现softlockup问题 |
无优先级 |
sig/Kernel,kind/bug |
kernel |
openEuler 22.03 LTS update20220727 |
I5JIA6 |
【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败 |
主要 |
sig/oVirt |
ovirt-engine |
openEuler-22.03-LTS |
I5Q4S3 |
[22.03-LTS]x86虚拟机卸载qxl模块,机器自动重启 |
主要 |
sig/Kernel |
kernel |
openEuler-22.03-LTS |
I677QX |
【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误 |
主要 |
sig/DB |
opengauss-server |
openEuler-22.03-LTS |
I6VFRX |
[22.03-LTS][x86/arm]mariadb授权给远程用户,远程连接服务失败 |
次要 |
sig/DB |
mariadb |
openEuler-22.03-LTS |
I72N5G |
【22.03-lts】x86环境上同时安装php-fpm软件包和php-opcache软件包后会导致php-fpm.service服务启动失败 |
次要 |
sig/Base-service |
php |
openEuler-22.03-LTS-round-3 |
I665SM |
resize2fs出现csum不一致 |
无优先级 |
sig/Kernel |
kernel |
openEuler-22.03-LTS-update220727 |
I5JPII |
【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin |
主要 |
sig/oVirt |
ovirt-engine |
openEuler-22.03-LTS-update220907 |
I5QKGT |
【22.03LTS_update0907】【arm/x86】kmod-drbd90软件包安装之后文件有缺失 |
主要 |
sig/sig-Ha |
kmod-drbd90 |
openEuler-22.03-LTS-SP1
Update
20230531
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS-SP1修复版本已知问题5个,已知漏洞21个。目前版本分支剩余待修复缺陷11个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I78ZFI?from=project-issue
CVE修复:
CVE |
软件包 |
优先级 |
CVE-2023-24805 |
cups-filters |
8.8 |
CVE-2023-28204 |
webkit2gtk3 |
6.5 |
CVE-2023-32373 |
webkit2gtk3 |
8.8 |
CVE-2023-32409 |
webkit2gtk3 |
8.8 |
CVE-2023-33204 |
sysstat |
7.8 |
CVE-2023-1999 |
libwebp |
6.3 |
CVE-2023-2731 |
libtiff |
5.5 |
CVE-2023-1667 |
libssh |
4.3 |
CVE-2023-2283 |
libssh |
4.2 |
CVE-2023-32067 |
c-ares |
7.5 |
CVE-2023-0668 |
wireshark |
3.3 |
CVE-2023-2855 |
wireshark |
7.8 |
CVE-2023-2856 |
wireshark |
5.5 |
CVE-2023-2857 |
wireshark |
7.8 |
CVE-2023-2858 |
wireshark |
7.8 |
CVE-2023-2879 |
wireshark |
7.5 |
CVE-2023-30570 |
libreswan |
7.5 |
CVE-2018-13867 |
hdf5 |
9.8 |
CVE-2019-8396 |
hdf5 |
6.5 |
CVE-2021-37501 |
hdf5 |
7.5 |
CVE-2023-22998 |
kernel |
5.5 |
Bugfix:
issue |
软件包 |
#I6QOW3:json-c libdnf回合上游补丁 |
libdnf |
#I6LNLJ:例行分析dnf补丁,需要补丁回合 |
dnf |
#I79J4I:authselect
创建和应用验证策略后,root无法登录 |
authselect |
#I79RNH:update_20230531 examples use static libraries to avoid unlinked dynamic libraries |
dpdk |
#I798WQ:【OLK-5.10】arm64:oops
in cgroup_apply_control_disable |
kernel |
openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.openatom.cn/project/show/openEuler:22.03:LTS:SP1
https://build.openeuler.openatom.cn/project/show/openEuler:22.03:LTS:SP1:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_version/OpenStack/Train/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_version/OpenStack/Wallaby/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_version/obs-server/2.10.11/
openEuler CVE
及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高):
里程碑 |
任务ID |
任务标题 |
优先级 |
sig组 |
关联仓库 |
openEuler 22.03-SP1 |
I6B4V1 |
【22.03 SP1 update 20230118】【arm】libhdfs在arm架构降级失败,x86正常 |
主要 |
sig/bigdata |
hadoop |
openEuler-22.03-LTS-SP1 |
I67NAZ |
【secGear】使用secGear工具.md和使用switchless特性.md文档优化 |
不重要 |
sig/doc |
docs |
openEuler-22.03-LTS-SP1 |
I67ZOF |
【Gazelle】用户态协议栈Gazelle用户指南.md文档优化 |
不重要 |
sig/doc |
docs |
openEuler-22.03-LTS-SP1 |
I6975Y |
【arm】--enable-bootstrap构建gcc失败 |
主要 |
sig/Compiler |
gcc |
openEuler-22.03-LTS-SP1 |
I69WOV |
【22.03 LTS-SP1】【arm】gcc12编译mysql 8.0.20报错 |
主要 |
sig/Compiler |
gcc-12 |
openEuler-22.03-LTS-SP1 |
I6AZZU |
【arm】【codedb】-O3 -flto -fipa-struct-reorg=3 -flto-partition=one运行bcftools应用Segmentation
fault (core dumped) |
主要 |
sig/Compiler |
gcc |
openEuler-22.03-LTS-SP1 |
I6DRDY |
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败 |
主要 |
sig/Compiler |
gcc |
openEuler-22.03-LTS-SP1 |
I6FQCO |
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof |
主要 |
sig/DB |
opengauss-server |
openEuler-22.03-LTS-SP1 |
I6I47O |
【x86】【deja】运行出现Segmentation fault |
主要 |
sig/Compiler |
gcc |
openEuler-22.03-LTS-SP1 |
I6VFV6 |
[22.03 SP1] [x86/arm] mariadb授权给远程用户,远程连接服务失败 |
次要 |
sig/DB |
mariadb |
openEuler-22.03-LTS-SP1 |
I73CKF |
【22.03-lts-sp1】x86环境上同时安装php-fpm软件包和php-opcache软件包后会导致php-fpm.service服务启动失败 |
次要 |
sig/Base-service |
php |
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG
关注涉及CVE组件的修复情况。
严重等级(Severity Rating) |
漏洞修复时长 |
致命(Critical) |
7天 |
高(High) |
14天 |
中(Medium) |
30天 |
低(Low) |
30天 |
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE%E5%8C%BA%E6%BC%8F%E6%B4%9E%E7%AE%A1%E7%90%86
近14天将超期CVE(6.2日数据):
漏洞编号 |
Issue ID |
剩余天数 |
CVSS评分 |
软件包 |
责任SIG |
CVE-2023-2513 |
I70BWR |
1.27 |
6.7 |
risc-v-kernel |
sig-RISC-V |
CVE-2022-40468 |
I774MR |
2.78 |
7.5 |
tinyproxy |
Networking |
CVE-2023-33285 |
I7780L |
2.95 |
7.5 |
qt |
Runtime |
CVE-2023-29942 |
I71FZI |
5.76 |
5.5 |
llvm |
Compiler |
CVE-2023-31979 |
I71RDC |
6.41 |
5.5 |
catdoc |
KDE |
CVE-2023-2598 |
I71SJY |
6.76 |
0.0 |
risc-v-kernel |
sig-RISC-V |
CVE-2023-32570 |
I7222V |
7.18 |
5.9 |
dav1d |
sig-DDE |
CVE-2023-2088 |
I723NR |
7.41 |
6.5 |
openstack-cinder |
sig-openstack |
CVE-2023-2854 |
I78R5J |
7.6 |
7.8 |
wireshark |
Application |
CVE-2023-2454 |
I72FSJ |
8.3 |
0.0 |
libpq |
DB |
CVE-2023-2455 |
I72FSG |
8.3 |
0.0 |
libpq |
DB |
CVE-2023-2454 |
I72FSE |
8.3 |
0.0 |
postgresql |
DB |
CVE-2023-2455 |
I72FSD |
8.3 |
0.0 |
postgresql |
DB |
CVE-2023-32082 |
I72GQS |
8.59 |
4.3 |
etcd |
sig-CloudNative |
CVE-2023-32250 |
I74FO5 |
10.0 |
8.1 |
kernel |
Kernel |
CVE-2023-2700 |
I734TH |
11.9 |
6.3 |
libvirt |
Virt |
CVE-2023-32978 |
I73NVV |
13.51 |
4.3 |
python-ldap |
sig-python-modules |
CVE-2023-31723 |
I740BX |
14.33 |
5.5 |
yasm |
Base-service |
CVE-2023-31725 |
I740BV |
14.33 |
5.5 |
yasm |
Base-service |
CVE-2023-2593 |
I74FPU |
14.79 |
0.0 |
risc-v-kernel |
sig-RISC-V |
CVE-2023-32249 |
I74FPK |
14.79 |
0.0 |
risc-v-kernel |
sig-RISC-V |
CVE-2023-32252 |
I74FP9 |
14.79 |
0.0 |
risc-v-kernel |
sig-RISC-V |
CVE-2023-32251 |
I74FP0 |
14.79 |
0.0 |
kernel |
Kernel |
CVE-2023-32256 |
I74FOF |
14.79 |
0.0 |
risc-v-kernel |
sig-RISC-V |
CVE-2023-32254 |
I74FNQ |
14.79 |
0.0 |
risc-v-kernel |
sig-RISC-V |
CVE-2023-2593 |
I74FNG |
14.79 |
0.0 |
kernel |
Kernel |
CVE-2023-32253 |
I74FN7 |
14.79 |
0.0 |
risc-v-kernel |
sig-RISC-V |
CVE-2023-32246 |
I74FN1 |
14.79 |
0.0 |
risc-v-kernel |
sig-RISC-V |
CVE-2023-32249 |
I74FMP |
14.79 |
0.0 |
kernel |
Kernel |
CVE-2023-32252 |
I74FLQ |
14.79 |
0.0 |
kernel |
Kernel |
CVE-2023-32247 |
I74FL8 |
14.79 |
0.0 |
risc-v-kernel |
sig-RISC-V |
CVE-2023-32251 |
I74FKX |
14.79 |
0.0 |
risc-v-kernel |
sig-RISC-V |
CVE-2023-32256 |
I74FKB |
14.79 |
0.0 |
kernel |
Kernel |
CVE-2023-32258 |
I74FJZ |
14.79 |
0.0 |
kernel |
Kernel |
CVE-2023-32250 |
I74FJM |
14.79 |
0.0 |
risc-v-kernel |
sig-RISC-V |
CVE-2023-32254 |
I74FJA |
14.79 |
0.0 |
kernel |
Kernel |
CVE-2023-32255 |
I74FIZ |
14.79 |
0.0 |
risc-v-kernel |
sig-RISC-V |
CVE-2023-32253 |
I74FIN |
14.79 |
0.0 |
kernel |
Kernel |
CVE-2023-32246 |
I74FIB |
14.79 |
0.0 |
kernel |
Kernel |
CVE-2023-32248 |
I74FHV |
14.79 |
0.0 |
risc-v-kernel |
sig-RISC-V |
CVE-2023-32247 |
I74FHK |
14.79 |
0.0 |
kernel |
Kernel |
CVE-2023-32258 |
I74FH0 |
14.79 |
0.0 |
risc-v-kernel |
sig-RISC-V |
CVE-2023-32257 |
I74FGJ |
14.79 |
0.0 |
risc-v-kernel |
sig-RISC-V |
CVE-2023-32255 |
I74FG3 |
14.79 |
0.0 |
kernel |
Kernel |
CVE-2023-32248 |
I74FF8 |
14.79 |
0.0 |
kernel |
Kernel |
CVE-2023-32257 |
I74FE8 |
14.79 |
0.0 |
kernel |
Kernel |
openEuler
社区指导文档及开放平台链接:
openEuler
版本分支维护规范:
openEuler release-management
版本分支PR指导:
社区QA
版本测试提单规范
社区QA
测试平台 radiates
https://radiatest.openeuler.org
车明道(openEuler release SIG)
Mobile: +86 15345431107
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail:
chemingdao@huawei.com
Open
Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件!
This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it
participants (1)
-
chemingdao