Sa-announce
Threads by month
- ----- 2025 -----
- February
- January
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
February 2023
- 1 participants
- 4 discussions
Dear all,
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。
本公示分为五部分:
1、openEuler-20.03-LTS-SP1 Update 20230222发布情况及待修复缺陷
2、openEuler-20.03-LTS-SP3 Update 20230222发布情况及待修复缺陷
3、openEuler-22.03-LTS Update 20230222发布情况及待修复缺陷
4、openEuler-22.03-LTS-SP1 Update 20230222发布情况及待修复缺陷
5、openEuler 关键组件待修复CVE 清单
6、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2023/03/05)提供 update_ 20230301 版本。
openEuler-20.03-LTS-SP1 Update 20230222
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题4个,已知漏洞22个。目前版本分支剩余待修复缺陷39个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6G5JO?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2023-23946
git
6.2
CVE-2023-22490
git
5.5
CVE-2023-0361
gnutls
5.9
CVE-2023-0286
shim
7.4
CVE-2022-46663
less
5.5
CVE-2023-23916
curl
6.5
CVE-2023-0804
libtiff
5.5
CVE-2023-0803
libtiff
5.5
CVE-2023-0802
libtiff
5.5
CVE-2023-0801
libtiff
5.5
CVE-2023-0800
libtiff
5.5
CVE-2023-0799
libtiff
5.5
CVE-2023-0798
libtiff
5.5
CVE-2023-0797
libtiff
5.5
CVE-2023-0796
libtiff
5.5
CVE-2023-0795
libtiff
5.5
CVE-2023-25567
gssntlmssp
7.5
CVE-2023-25565
gssntlmssp
7.5
CVE-2023-25564
gssntlmssp
6.5
CVE-2022-3560
pesign
5.5
CVE-2020-10775
ovirt-engine
5.3
CVE-2023-0494
xorg-x11-server
7.8
Bugfix:
issue
仓库
#I6FFRD:grub2-common软件包删除与grubby软件包重复的脚本文件/usr/sbin/installkernel
grub2
#I5Z32F:【openEuler-1.0-LTS】bonding 支持MPLS特性
kernel
#I6EXS8:例行分析dnf补丁,需要补丁回合
dnf
#I6GDU3:backport-CVE-2022-48281.patch上下文匹配出错,需修改
libtiff
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I281C1
【fuzz】runtime error:
libsass
Base-service
I437CR
[SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错
obs-server
Others
I43OSX
[clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0
clamav
Others
I48GIM
【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I490MU
Uncaught exception in get_tokens_unprocessed
python-pygments
Programming-language
I4F8YQ
integer overflow in start_input_bmp
libjpeg-turbo
Desktop
I4F903
Unexpect-exit in start_input_tga
libjpeg-turbo
Desktop
I4F913
Timeout in tjDecompress2
libjpeg-turbo
Desktop
I4G4A5
Undefine-shift in _bfd_safe_read_leb128
binutils
Compiler
I4G4B1
Integer overflow in print_vms_time
binutils
Compiler
I4G4VY
memleak in parse_gnu_debugaltlink
binutils
Compiler
I4G4WF
Heap-buffer-overflow in slurp_hppa_unwind_table
binutils
Compiler
I4G4WW
Use-after-free in make_qualified_name
binutils
Compiler
I4G4X6
memleak in byte_get_little_endian
binutils
Compiler
I4G4XF
memleak in process_mips_specific
binutils
Compiler
I4G4Y0
out-of-memory in vms_lib_read_index
binutils
Compiler
I4G4YJ
Heap-buffer-overflow in bfd_getl16
binutils
Compiler
I4G4YV
Floating point exception in _bfd_vms_slurp_etir
binutils
Compiler
I4J0OY
【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常
libdap
sig-recycle
I4JMG4
【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251
python-robotframework
sig-ROS
I4K6ES
stack-buffer-overflow in UINT32_Marshal
libtpms
sig-security-facility
I4K6FU
global-buffer-overflow in Array_Marshal
libtpms
sig-security-facility
I4K6R7
memleak in wrap_nettle_mpi_init
gnutls
sig-security-facility
I4K6UI
Timeout in _asn1_find_up
gnutls
sig-security-facility
I4O16Z
【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息
kernel
Kernel
I4QV6N
【openEuler-20.03-LTS-SP1】flink命令执行失败
flink
sig-bigdata
I5IG1V
【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败
efl
sig-compat-winapp
I5IG6K
【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5JHX2
【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AA06
【20.03-LTS-SP1-update-0111】【arm/x86】执行sosreport -a报错“TypeError: 'NoneType' object is not iterable”
sos
Base-service
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6AZZU
【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped)
gcc
Compiler
I6CBNA
【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6CKZE
【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault
gcc
Compiler
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
openEuler-20.03-LTS-SP3 Update 20230222
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问4个,已知漏洞23个。目前版本分支剩余待修复缺陷 13个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6G5JP?from=project-i…
CVE修复:
需求类型
软件包
status
优先级
CVE-2023-0286
shim
已完成
7.4
CVE-2022-46663
less
已完成
5.5
CVE-2023-0361
gnutls
已完成
5.9
CVE-2023-22490
git
已完成
5.5
CVE-2023-23946
git
已完成
6.2
CVE-2023-0795
libtiff
已完成
5.5
CVE-2023-0796
libtiff
已完成
5.5
CVE-2023-0797
libtiff
已完成
5.5
CVE-2023-0798
libtiff
已完成
5.5
CVE-2023-0799
libtiff
已完成
5.5
CVE-2023-0800
libtiff
已完成
5.5
CVE-2023-0801
libtiff
已完成
5.5
CVE-2023-0802
libtiff
已完成
5.5
CVE-2023-0803
libtiff
已完成
5.5
CVE-2023-0804
libtiff
已完成
5.5
CVE-2023-23916
curl
已完成
6.5
CVE-2023-22796
rubygem-activesupport
已完成
7.5
CVE-2022-3560
pesign
已完成
5.5
CVE-2023-25564
gssntlmssp
已完成
6.5
CVE-2023-25565
gssntlmssp
已完成
7.5
CVE-2023-25567
gssntlmssp
已完成
7.5
CVE-2020-10775
ovirt-engine
已完成
5.3
CVE-2023-0494
xorg-x11-server
已完成
7.8
Bugfix:
issue
仓库
#I6FFRD:grub2-common软件包删除与grubby软件包重复的脚本文件/usr/sbin/installkernel
grub2
#I5Z32F:【openEuler-1.0-LTS】bonding 支持MPLS特性
kernel
#I6EXS8:例行分析dnf补丁,需要补丁回合
dnf
#I6GDU3:backport-CVE-2022-48281.patch上下文匹配出错,需修改
libtiff
openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I4QV7S
【openEuler-20.03-LTS-SP3】flink run 命令执行失败
flink
sig-bigdata
I4UMEV
[openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历
kernel
Kernel
I5IGAS
【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5IGOR
【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败
fluidsynth
Application
I5KXUY
【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I5KY4S
【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功
vdsm
oVirt
I5LYJK
【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常
TCP_option_address
Kernel
I5XDXJ
openeuler:20.03-sp3下lua-lunit0.5和lua5.3不匹配
mugen
sig-QA
I613DI
【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败
openEuler-release
Base-service
I61LEV
【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错
tuna
Others
I66BBJ
[20.03-LTS-SP3]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源
openEuler-repos
Base-service
I6CBL7
【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6CTKO
【openEuler sp3】【arm】ltp执行用例memcg_stress失败
kernel
Kernel
openEuler-22.03-LTS Update 20230222
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题3个,已知漏洞25个。目前版本分支剩余待修复缺陷9个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6G5JQ?from=project-i…
CVE修复:
CVE
仓库
status
score
CVE-2023-0286
shim
已完成
7.4
CVE-2022-46663
less
已完成
5.5
CVE-2023-0361
gnutls
已完成
5.9
CVE-2023-22490
git
已完成
5.5
CVE-2023-23946
git
已完成
6.2
CVE-2022-24963
apr
已完成
9.8
CVE-2023-0795
libtiff
已完成
5.5
CVE-2023-0796
libtiff
已完成
5.5
CVE-2023-0797
libtiff
已完成
5.5
CVE-2023-0798
libtiff
已完成
5.5
CVE-2023-0799
libtiff
已完成
5.5
CVE-2023-0800
libtiff
已完成
5.5
CVE-2023-0801
libtiff
已完成
5.5
CVE-2023-0802
libtiff
已完成
5.5
CVE-2023-0803
libtiff
已完成
5.5
CVE-2023-0804
libtiff
已完成
5.5
CVE-2023-23914
curl
已完成
4.3
CVE-2023-23915
curl
已完成
4.3
CVE-2023-23916
curl
已完成
6.5
CVE-2022-3560
pesign
已完成
5.5
CVE-2023-25564
gssntlmssp
已完成
6.5
CVE-2023-25565
gssntlmssp
已完成
7.5
CVE-2023-25567
gssntlmssp
已完成
7.5
CVE-2020-10775
ovirt-engine
已完成
5.3
CVE-2023-0494
xorg-x11-server
已完成
7.8
Bugfix:
issue
仓库
#I6D6JH:anaconda软件包补丁
anaconda
#I6ELVA:例行分析dnf补丁,需要补丁回合
dnf
#I6GDU3:backport-CVE-2022-48281.patch上下文匹配出错,需修改
libtiff
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I5JIA6
【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JPII
【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin
ovirt-engine
oVirt
I665SM
resize2fs出现csum不一致
kernel
Kernel
I66BDE
[22.03-LTS]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源
openEuler-repos
Base-service
I66KIH
【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败
openstack-ironic-inspector
sig-openstack
I677QX
【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误
opengauss-server
DB
I6AG88
【22.03-LTS】【arm/x86】nvwa第一次卸载时有异常报错信息
nvwa
sig-ops
I6AGEG
【22.03-LTS-SP1】【arm/x86】nvwa第一次卸载时有异常报错信息
nvwa
sig-ops
I6CBPQ
【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
openEuler-22.03-LTS SP1 Update 20230222
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题7个,已知漏洞33个。目前版本分支剩余待修复缺陷19个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6G5JN?from=project-i…
CVE修复:
CVE
仓库
status
score
CVE-2023-0286
shim
已完成
7.4
CVE-2022-46663
less
已完成
5.5
CVE-2023-0361
gnutls
已完成
5.9
CVE-2023-22490
git
已完成
5.5
CVE-2023-23946
git
已完成
6.2
CVE-2022-24963
apr
已完成
9.8
CVE-2023-0795
libtiff
已完成
5.5
CVE-2023-0796
libtiff
已完成
5.5
CVE-2023-0797
libtiff
已完成
5.5
CVE-2023-0798
libtiff
已完成
5.5
CVE-2023-0799
libtiff
已完成
5.5
CVE-2023-0800
libtiff
已完成
5.5
CVE-2023-0801
libtiff
已完成
5.5
CVE-2023-0802
libtiff
已完成
5.5
CVE-2023-0803
libtiff
已完成
5.5
CVE-2023-0804
libtiff
已完成
5.5
CVE-2023-23914
curl
已完成
4.3
CVE-2023-23915
curl
已完成
4.3
CVE-2023-23916
curl
已完成
6.5
CVE-2022-3724
wireshark
已完成
7.5
CVE-2022-4344
wireshark
已完成
4.3
CVE-2022-4345
wireshark
已完成
6.5
CVE-2023-0411
wireshark
已完成
6.5
CVE-2023-0412
wireshark
已完成
6.5
CVE-2023-0413
wireshark
已完成
6.5
CVE-2023-0415
wireshark
已完成
6.5
CVE-2023-0416
wireshark
已完成
6.5
CVE-2023-0417
wireshark
已完成
6.5
CVE-2022-3560
pesign
已完成
5.5
CVE-2023-25564
gssntlmssp
已完成
6.5
CVE-2023-25565
gssntlmssp
已完成
7.5
CVE-2023-25567
gssntlmssp
已完成
7.5
CVE-2023-0494
xorg-x11-server
已完成
7.8
Bugfix:
issue
仓库
#I6FF1I:clean code
oncn-bwm
#I6G8W9:例行回合社区补丁
efibootmgr
#I6FF6H:glib2社区补丁回合
glib2
#I66VIG:默认启动项中增加cgroup_disable=files
anaconda
#I6ELVA:例行分析dnf补丁,需要补丁回合
dnf
#I6G6XJ:删除新增的dbus-tools安装依赖,不必特地写明依赖
initscripts
#I6GDU3:backport-CVE-2022-48281.patch上下文匹配出错,需修改
libtiff
openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I65688
【22.03_LTS_SP1_RC2】【x86/arm】biometric-authentication存在不安全的编译选项STRIP、RPATH
biometric-authentication
sig-UKUI
I657VS
【22.03_LTS_SP1_RC2】【x86/arm】dde-api存在不安全的编译选项PIE、STRIP
dde-api
sig-DDE
I657VT
【22.03_LTS_SP1_RC2】【x86/arm】dde-daemon存在不安全的编译选项STRIP
dde-daemon
sig-DDE
I657VX
【22.03_LTS_SP1_RC2】【x86/arm】deepin-dbus-generator存在不安全的编译选项PIE、STRIP
deepin-dbus-generator
sig-DDE
I657W0
【22.03_LTS_SP1_RC2】【x86/arm】deepin-editor存在不安全的编译选项STRIP
deepin-editor
sig-DDE
I657W3
【22.03_LTS_SP1_RC2】【x86/arm】deepin-graphics-driver-manager存在不安全的编译选项STRIP
deepin-graphics-driver-manager
sig-DDE
I657W7
【22.03_LTS_SP1_RC2】【x86/arm】deepin-system-monitor存在不安全的编译选项STRIP
deepin-system-monitor
sig-DDE
I6583U
【22.03_LTS_SP1_RC2】【x86/arm】startdde存在不安全的编译选项PIE、STRIP
startdde
sig-DDE
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6AGEG
【22.03-LTS-SP1】【arm/x86】nvwa第一次卸载时有异常报错信息
nvwa
sig-ops
I6AZZU
【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped)
gcc
Compiler
I6CBPN
【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6CKRQ
【22.03 SP1 update20230201】【arm/x86】ceph-selinux卸载过程中有异常打印信息
ceph
sig-ceph
I6CKZE
【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault
gcc
Compiler
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE:
漏洞编号
Issue ID
剩余天数
CVSS评分
软件包
责任SIG
CVE-2023-25577
I6FDDR
2.89
7.5
python-werkzeug
Programming-language
CVE-2022-37705
I6BTSW
3.0
0.0
amanda
Application
CVE-2023-22332
I6BU4U
3.12
6.5
pgpool2
DB
CVE-2022-1922
I5D235
3.45
7.1
gstreamer1-plugins-good
Others
CVE-2022-1921
I5D213
3.45
7.8
gstreamer1-plugins-good
Others
CVE-2022-2122
I5D1ZP
3.45
7.1
gstreamer1-plugins-good
Others
CVE-2022-1920
I5D1Y3
3.45
7.8
gstreamer1-plugins-good
Others
CVE-2022-1923
I5D24F
3.46
7.1
gstreamer1-plugins-good
Others
CVE-2022-1925
I5D2FN
3.47
7.1
gstreamer1-plugins-good
Others
CVE-2022-1924
I5D2EE
3.47
7.1
gstreamer1-plugins-good
Others
CVE-2023-0687
I6DBA9
3.51
9.8
glibc
Computing
CVE-2023-0568
I6FMFH
3.81
7.5
php
Base-service
CVE-2023-22605
I6C2FM
3.87
0.0
mingw-binutils
sig-compat-winapp
CVE-2023-22608
I6C2FI
3.87
0.0
mingw-binutils
sig-compat-winapp
CVE-2023-22609
I6C2FH
3.87
0.0
binutils
Compiler
CVE-2023-22607
I6C2FD
3.87
0.0
mingw-binutils
sig-compat-winapp
CVE-2023-22606
I6C2F9
3.87
0.0
mingw-binutils
sig-compat-winapp
CVE-2023-22603
I6C2F5
3.87
0.0
mingw-binutils
sig-compat-winapp
CVE-2023-22604
I6C2F2
3.87
0.0
mingw-binutils
sig-compat-winapp
CVE-2023-22605
I6C2EY
3.87
0.0
binutils
Compiler
CVE-2023-22608
I6C2EW
3.87
0.0
binutils
Compiler
CVE-2023-22609
I6C2ET
3.87
0.0
mingw-binutils
sig-compat-winapp
CVE-2023-22607
I6C2EO
3.87
0.0
binutils
Compiler
CVE-2023-22606
I6C2EN
3.87
0.0
binutils
Compiler
CVE-2023-22603
I6C2EM
3.87
0.0
binutils
Compiler
CVE-2023-22604
I6C2EJ
3.87
0.0
binutils
Compiler
CVE-2023-0590
I6C30L
3.95
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-25173
I6FP5B
4.12
7.8
containerd
sig-CloudNative
CVE-2023-0482
I6C3N1
4.24
0.0
resteasy
sig-Java
CVE-2022-38266
I6C3NB
4.39
6.5
leptonica
Base-service
CVE-2023-0430
I6C6UA
4.62
0.0
thunderbird
sig-desktop-apps
CVE-2023-24807
I6FXT1
4.87
7.5
nodejs
sig-nodejs
CVE-2023-0615
I6CIGU
5.75
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-0045
I6CU98
7.28
0.0
kernel
Kernel
CVE-2022-48337
I6GNJ9
8.75
7.8
emacs
Desktop
CVE-2022-48338
I6GNJ6
8.75
7.3
emacs
Desktop
CVE-2022-48339
I6GNIQ
8.75
7.3
emacs
Desktop
CVE-2022-4384
I6DBAC
10.45
6.5
stream
CVE-2022-37704
I6DKBH
11.0
0.0
amanda
Application
CVE-2023-25725
I6F4NL
11.09
7.5
haproxy
System-tool
CVE-2023-25586
I6DKU7
11.27
0.0
mingw-binutils
sig-compat-winapp
CVE-2023-25586
I6DKU4
11.27
0.0
binutils
Compiler
CVE-2022-4304
I6DKV8
11.29
0.0
edk2
Virt
CVE-2022-4203
I6DKUZ
11.29
0.0
compat-openssl11
CVE-2023-25585
I6DKUW
11.29
0.0
mingw-binutils
sig-compat-winapp
CVE-2023-25587
I6DKUV
11.29
0.0
mingw-binutils
sig-compat-winapp
CVE-2022-4203
I6DKUU
11.29
0.0
edk2
Virt
CVE-2023-25585
I6DKUP
11.29
0.0
binutils
Compiler
CVE-2023-25587
I6DKUO
11.29
0.0
binutils
Compiler
CVE-2022-4304
I6DKUI
11.29
0.0
compat-openssl11
CVE-2023-20938
I6DKVG
11.41
0.0
kernel
Kernel
CVE-2023-25584
I6DSPJ
11.87
0.0
binutils
Compiler
CVE-2023-25588
I6DSPH
11.87
0.0
mingw-binutils
sig-compat-winapp
CVE-2023-25584
I6DSPB
11.87
0.0
mingw-binutils
sig-compat-winapp
CVE-2023-25588
I6DSP8
11.87
0.0
binutils
Compiler
CVE-2023-21866
I6DZ7K
12.72
4.9
mysql
Others
CVE-2023-21874
I6DZ7A
12.72
2.7
mysql
Others
CVE-2023-21868
I6DZ76
12.72
6.5
mysql
Others
CVE-2023-21863
I6DZ6V
12.72
4.9
mysql
Others
CVE-2023-21869
I6DZ6M
12.72
5.5
mysql
Others
CVE-2023-21836
I6DZ9K
12.73
4.9
mysql
Others
CVE-2023-21871
I6DZ99
12.73
4.9
mysql
Others
CVE-2023-21865
I6DZ8X
12.73
4.9
mysql
Others
CVE-2023-21872
I6DZ8C
12.73
5.5
mysql
Others
CVE-2023-21867
I6DZ84
12.73
4.9
mysql
Others
CVE-2023-21873
I6DZ7Z
12.73
4.9
mysql
Others
CVE-2023-21864
I6DZ7V
12.73
4.9
mysql
Others
CVE-2023-21870
I6DZ7O
12.73
4.9
mysql
Others
CVE-2023-25166
I6E2G8
12.87
6.5
python-odo
sig-python-modules
CVE-2022-41862
I6E3MO
13.12
0.0
postgresql
DB
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
沐钰莹(openEuler release SIG)
Mobile: +86 15651995918
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail: muyuying1(a)huawei.com<mailto:muyuying1@huawei.com>
[cid:image004.png@01D94A2D.4ADECF00]Open Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件!
This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it
1
0
Dear all,
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。
本公示分为五部分:
1、openEuler-20.03-LTS-SP1 Update 20230215发布情况及待修复缺陷
2、openEuler-20.03-LTS-SP3 Update 20230215发布情况及待修复缺陷
3、openEuler-22.03-LTS Update 20230215发布情况及待修复缺陷
4、openEuler 关键组件待修复CVE 清单
5、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2023/02/26)提供 update_ 20230222 版本。
openEuler-20.03-LTS-SP1 Update 20230215
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题4个,已知漏洞16个。目前版本分支剩余待修复缺陷46个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6EJNU?from=project-i…
CVE
仓库
score
CVE-2022-25147
apr-util
9.8
CVE-2022-24963
apr
9.8
CVE-2022-48303
tar
7.8
CVE-2023-25193
harfbuzz
7.5
CVE-2023-23969
python-django
7.5
CVE-2023-0286
openssl
7.4
CVE-2022-4904
c-ares
6.9
CVE-2023-0215
openssl
5.9
CVE-2022-4450
openssl
5.9
CVE-2022-4304
openssl
5.9
CVE-2023-0615
kernel
5.5
CVE-2023-22799
rubygem-globalid
5.3
CVE-2020-10775
ovirt-engine
5.3
CVE-2022-3707
kernel
5.1
CVE-2023-23931
python-cryptography
4.8
CVE-2023-0045
kernel
1
CVE修复:
Bugfix:
issue
仓库
#I5CM8U:apache-commons-io包中的Ignore-some-test-because-bep.patch文件为空,但是spec文件中
apache-commons-io
#I637N1:varnishd -?命令执行报错
varnish
#I5GT2K:【20.03-SP1、20.03-SP3】【arm/x86】pcp-system-tools包下的pcp-mpstat命令执行报错
pcp
#I6DZIB:【openEuler-1.0-LTS】block, bfq: switch 'bfqg->ref' to use atomic refcount apis
kernel
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示:
任务标题
关联仓库
SIG
【fuzz】runtime error:
libsass
Base-service
[SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错
obs-server
Others
[clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0
clamav
Others
【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
Uncaught exception in get_tokens_unprocessed
python-pygments
Programming-language
integer overflow in start_input_bmp
libjpeg-turbo
Desktop
Unexpect-exit in start_input_tga
libjpeg-turbo
Desktop
Timeout in tjDecompress2
libjpeg-turbo
Desktop
Undefine-shift in _bfd_safe_read_leb128
binutils
Compiler
Integer overflow in print_vms_time
binutils
Compiler
memleak in parse_gnu_debugaltlink
binutils
Compiler
Heap-buffer-overflow in slurp_hppa_unwind_table
binutils
Compiler
Use-after-free in make_qualified_name
binutils
Compiler
memleak in byte_get_little_endian
binutils
Compiler
memleak in process_mips_specific
binutils
Compiler
out-of-memory in vms_lib_read_index
binutils
Compiler
Heap-buffer-overflow in bfd_getl16
binutils
Compiler
Floating point exception in _bfd_vms_slurp_etir
binutils
Compiler
【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常
libdap
sig-recycle
【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251
python-robotframework
sig-ROS
stack-buffer-overflow in UINT32_Marshal
libtpms
sig-security-facility
global-buffer-overflow in Array_Marshal
libtpms
sig-security-facility
memleak in wrap_nettle_mpi_init
gnutls
sig-security-facility
Timeout in _asn1_find_up
gnutls
sig-security-facility
integer overflow in luaV_execute
lua
Base-service
integer overflow in intarith
lua
Base-service
Division by zero in luaV_execute
lua
Base-service
Timeout in luaV_finishget
lua
Base-service
【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息
kernel
Kernel
【openEuler-20.03-LTS-SP1】flink命令执行失败
flink
sig-bigdata
【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败
efl
sig-compat-winapp
【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
【22.03 LTS-SP1】【arm】【fuzz】编译ICE:internal compiler error: in tree_to_uhwi, at tree.c:7395
pin-gcc-client
#N/A
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
【22.03 LTS-SP1】【arm】gcc12编译mysql 8.0.20报错
gcc-12
#N/A
【20.03-LTS-SP1-update-0111】【arm/x86】执行sosreport -a报错“TypeError: 'NoneType' object is not iterable”
sos
Base-service
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped)
gcc
Compiler
【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault
gcc
Compiler
[22.03SP1lts][arm/x86] gala-gopher服务启动后,日志存在报错:ldapdb_canonuser_plug_init() failed in sasl_canonuser_add_plugin(): invalid paramer
gala-gopher
#N/A
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
yum安装pin-server-demo后安装pin-gcc-client显示libMLIRPlugin.so.12冲突
pin-gcc-client
#N/A
create_gcov在kernel6.1上执行报错
autofdo
Compiler
openEuler-20.03-LTS-SP3 Update 20230215
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问4个,已知漏洞17个。目前版本分支剩余待修复缺陷 13个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6EJNV?from=project-i…
CVE修复:
需求类型
软件包
优先级
CVE-2022-25147
apr-util
9.8
CVE-2022-24963
apr
9.8
CVE-2022-48303
tar
7.8
CVE-2023-25193
harfbuzz
7.5
CVE-2023-23969
python-django
7.5
CVE-2023-0286
openssl
7.4
CVE-2022-4904
c-ares
6.9
CVE-2022-4304
openssl
5.9
CVE-2022-4450
openssl
5.9
CVE-2023-0215
openssl
5.9
CVE-2023-0615
kernel
5.5
CVE-2022-41717
golang
5.3
CVE-2023-22799
rubygem-globalid
5.3
CVE-2020-10775
ovirt-engine
5.3
CVE-2022-3707
kernel
5.1
CVE-2023-23931
python-cryptography
4.8
CVE-2023-0045
kernel
1
Bugfix:
issue
仓库
#I5CM8U:apache-commons-io包中的Ignore-some-test-because-bep.patch文件为空,但是spec文件中
apache-commons-io
#I637OK:varnishd -? 命令执行报错
varnish
#I5GT2K:【20.03-SP1、20.03-SP3】【arm/x86】pcp-system-tools包下的pcp-mpstat命令执行报错
pcp
#I6DZIB:【openEuler-1.0-LTS】block, bfq: switch 'bfqg->ref' to use atomic refcount apis
kernel
openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I4QV7S
【openEuler-20.03-LTS-SP3】flink run 命令执行失败
flink
sig-bigdata
I4UMEV
[openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历
kernel
Kernel
I5IGAS
【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5IGOR
【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败
fluidsynth
Application
I5KXUY
【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I5KY4S
【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功
vdsm
oVirt
I5LYJK
【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常
TCP_option_address
Kernel
I5XDXJ
openeuler:20.03-sp3下lua-lunit0.5和lua5.3不匹配
mugen
sig-QA
I613DI
【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败
openEuler-release
Base-service
I61LEV
【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错
tuna
Others
I66BBJ
[20.03-LTS-SP3]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源
openEuler-repos
Base-service
I6CBL7
【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6CTKO
【openEuler sp3】【arm】ltp执行用例memcg_stress失败
kernel
Kernel
openEuler-22.03-LTS Update 20230215
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题3个,已知漏洞24个。目前版本分支剩余待修复缺陷13个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6EJNW?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2022-25147
apr-util
9.8
CVE-2022-48303
tar
7.8
CVE-2023-25193
harfbuzz
7.5
CVE-2022-3724
wireshark
7.5
CVE-2023-23969
python-django
7.5
CVE-2023-0286
openssl
7.4
CVE-2023-0590
kernel
7
CVE-2022-4904
c-ares
6.9
CVE-2022-4345
wireshark
6.5
CVE-2023-0411
wireshark
6.5
CVE-2023-0412
wireshark
6.5
CVE-2023-0413
wireshark
6.5
CVE-2023-0415
wireshark
6.5
CVE-2023-0416
wireshark
6.5
CVE-2023-0417
wireshark
6.5
CVE-2022-4304
openssl
5.9
CVE-2022-4450
openssl
5.9
CVE-2023-0215
openssl
5.9
CVE-2023-0394
kernel
5.5
CVE-2023-22799
rubygem-globalid
5.3
CVE-2020-10775
ovirt-engine
5.3
CVE-2022-3707
kernel
5.1
CVE-2023-23931
python-cryptography
4.8
CVE-2022-4344
wireshark
4.3
Bugfix:
issue
仓库
#I5CM8U:apache-commons-io包中的Ignore-some-test-because-bep.patch文件为空,但是spec文件中
apache-commons-io
#I6DAK8:glibc新增对外符号pthread_cond_clockwait@GLIBC_2.28
glibc
#I5GSXG:【22.03-LTS、22.03-SP1】【arm/x86】pcp-system-tools包下的pcp-mpstat命令执行报错
pcp
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I5G9CY
升级iinstall-scripts包会导致系统启动异常
install-scripts
sig-OS-Builder
I5JIA6
【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JPII
【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin
ovirt-engine
oVirt
I5Q4S3
[22.03-LTS]x86虚拟机卸载qxl模块,机器自动重启
openEuler/kernel
#N/A
I5QKGT
【22.03LTS_update0907】【arm/x86】kmod-drbd90软件包安装之后文件有缺失
kmod-drbd90
sig-Ha
I64919
【22.03_LTS_update1130】【arm/x86】xorg-x11-server-Xwayland因缺少依赖导致无法安装
xorg-x11-server-xwayland
Desktop
I665SM
resize2fs出现csum不一致
kernel
Kernel
I66BDE
[22.03-LTS]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源
openEuler-repos
Base-service
I66KIH
【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败
openstack-ironic-inspector
sig-openstack
I6AG88
【22.03-LTS】【arm/x86】nvwa第一次卸载时有异常报错信息
nvwa
sig-ops
I6AGEG
【22.03-LTS-SP1】【arm/x86】nvwa第一次卸载时有异常报错信息
nvwa
sig-ops
I6CBPQ
【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6CN7B
【22.03 LTS update20230201】【arm/x86】cephadm卸载过程中有异常打印信息
ceph
sig-ceph
openEuler-22.03-LTS SP1 Update 20230215
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题5个,已知漏洞14个。目前版本分支剩余待修复缺陷26个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6EJNT?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2022-48303
tar
7.8
CVE-2023-23931
python-cryptography
4.8
CVE-2022-4304
openssl
5.9
CVE-2022-4450
openssl
5.9
CVE-2023-0215
openssl
5.9
CVE-2023-0286
openssl
7.4
CVE-2022-25147
apr-util
9.8
CVE-2023-25193
harfbuzz
7.5
CVE-2022-4904
c-ares
6.9
CVE-2023-22799
rubygem-globalid
5.3
CVE-2023-23969
python-django
7.5
CVE-2022-3707
kernel
5.1
CVE-2023-0394
kernel
5.5
CVE-2023-0590
kernel
7
Bugfix:
issue
仓库
#I6DQPW:优化iproute版本号
iproute
#I5D9O9:Upgrade to latest release [initscripts: 10.12 -> 10.17]
initscripts
#I6DAK8:glibc新增对外符号pthread_cond_clockwait@GLIBC_2.28
glibc
#I5GSXG:【22.03-LTS、22.03-SP1】【arm/x86】pcp-system-tools包下的pcp-mpstat命令执行报错
pcp
#I6FA2S:update_20230215-openEuler 22.03-LTS-SP1版本申请新增jieba
jieba
openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I6566R
【22.03_LTS_SP1_RC2】【x86/arm】k3s存在不安全的编译选项PIE
k3s
#N/A
I65688
【22.03_LTS_SP1_RC2】【x86/arm】biometric-authentication存在不安全的编译选项STRIP、RPATH
biometric-authentication
sig-UKUI
I657VS
【22.03_LTS_SP1_RC2】【x86/arm】dde-api存在不安全的编译选项PIE、STRIP
dde-api
sig-DDE
I657VT
【22.03_LTS_SP1_RC2】【x86/arm】dde-daemon存在不安全的编译选项STRIP
dde-daemon
sig-DDE
I657VX
【22.03_LTS_SP1_RC2】【x86/arm】deepin-dbus-generator存在不安全的编译选项PIE、STRIP
deepin-dbus-generator
sig-DDE
I657W0
【22.03_LTS_SP1_RC2】【x86/arm】deepin-editor存在不安全的编译选项STRIP
deepin-editor
sig-DDE
I657W3
【22.03_LTS_SP1_RC2】【x86/arm】deepin-graphics-driver-manager存在不安全的编译选项STRIP
deepin-graphics-driver-manager
sig-DDE
I657W7
【22.03_LTS_SP1_RC2】【x86/arm】deepin-system-monitor存在不安全的编译选项STRIP
deepin-system-monitor
sig-DDE
I657WZ
【22.03_LTS_SP1_RC2】【x86/arm】hikptool存在不安全的编译选项PIE、RPATH、STRIP
hikptool
#N/A
I6583U
【22.03_LTS_SP1_RC2】【x86/arm】startdde存在不安全的编译选项PIE、STRIP
startdde
sig-DDE
I67RNK
【22.03 LTS-SP1】【arm】【fuzz】编译ICE:internal compiler error: in tree_to_uhwi, at tree.c:7395
pin-gcc-client
#N/A
I683UO
【22.03 LTS-SP1】【arm】【codedb】编译ICE:internal compiler error:Aborted
pin-gcc-client
#N/A
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I69WOV
【22.03 LTS-SP1】【arm】gcc12编译mysql 8.0.20报错
gcc-12
#N/A
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6AGEG
【22.03-LTS-SP1】【arm/x86】nvwa第一次卸载时有异常报错信息
nvwa
sig-ops
I6AZZU
【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped)
gcc
Compiler
I6CBPN
【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6CKRQ
【22.03 SP1 update20230201】【arm/x86】ceph-selinux卸载过程中有异常打印信息
ceph
sig-ceph
I6CKZE
【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault
gcc
Compiler
I6CN3V
【22.03 SP1 update20230201】【arm/x86】cephadm卸载过程中有异常打印信息
ceph
sig-ceph
I6CPVR
[22.03SP1lts][arm/x86] gala-gopher服务启动后,日志存在报错:ldapdb_canonuser_plug_init() failed in sasl_canonuser_add_plugin(): invalid paramer
gala-gopher
#N/A
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6E8LE
yum安装pin-server-demo后安装pin-gcc-client显示libMLIRPlugin.so.12冲突
pin-gcc-client
#N/A
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE:
漏洞编号
Issue ID
剩余天数
CVSS评分
软件包
责任SIG
CVE-2023-0397
I6B4B3
0.6
6.5
zephyr
CVE-2023-0396
I6B579
1.52
6.8
zephyr
CVE-2023-0240
I6BTWC
2.91
7.8
kernel
Kernel
CVE-2023-0494
I6DHAD
3.2
7.8
xorg-x11-server
Desktop
CVE-2023-0286
I6DKU5
3.71
7.4
shim
Base-service
CVE-2021-37501
I6DM5L
3.96
7.5
hdf5
Runtime
CVE-2023-0341
I6DPL7
4.17
7.8
editorconfig
CVE-2022-46663
I6DQ53
4.19
7.5
nodejs-less
sig-nodejs
CVE-2023-22796
I6B6XB
5.31
0.0
rubygem-activesupport
sig-ruby
CVE-2023-22797
I6B6X9
5.31
0.0
rubygem-actionpack
sig-ruby
CVE-2022-47951
I6B751
5.56
5.7
openstack-cinder
sig-openstack
CVE-2023-0468
I6B7IH
6.32
4.7
risc-v-kernel
sig-RISC-V
CVE-2023-0469
I6B7VG
7.1
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-25565
I6F4NQ
10.58
7.5
gssntlmssp
dev-utils
CVE-2023-25566
I6F4NO
10.58
7.5
gssntlmssp
dev-utils
CVE-2023-25567
I6F4NM
10.58
7.5
gssntlmssp
dev-utils
CVE-2022-40152
I6F9G7
11.15
7.5
jackson-dataformat-xml
sig-Java
CVE-2022-37705
I6BTSW
11.44
0.0
amanda
Application
CVE-2023-22332
I6BU4U
11.56
6.5
pgpool2
DB
CVE-2023-0568
I6FMFH
12.25
7.5
php
Base-service
CVE-2023-22607
I6C2FD
12.31
0.0
mingw-binutils
sig-compat-winapp
CVE-2023-22606
I6C2F9
12.31
0.0
mingw-binutils
sig-compat-winapp
CVE-2023-22603
I6C2F5
12.31
0.0
mingw-binutils
sig-compat-winapp
CVE-2023-22604
I6C2F2
12.31
0.0
mingw-binutils
sig-compat-winapp
CVE-2023-22605
I6C2EY
12.31
0.0
binutils
Compiler
CVE-2023-22608
I6C2EW
12.31
0.0
binutils
Compiler
CVE-2023-22609
I6C2ET
12.31
0.0
mingw-binutils
sig-compat-winapp
CVE-2023-22607
I6C2EO
12.31
0.0
binutils
Compiler
CVE-2023-22606
I6C2EN
12.31
0.0
binutils
Compiler
CVE-2023-22603
I6C2EM
12.31
0.0
binutils
Compiler
CVE-2023-22604
I6C2EJ
12.31
0.0
binutils
Compiler
CVE-2023-22605
I6C2FM
12.32
0.0
mingw-binutils
sig-compat-winapp
CVE-2023-22608
I6C2FI
12.32
0.0
mingw-binutils
sig-compat-winapp
CVE-2023-22609
I6C2FH
12.32
0.0
binutils
Compiler
CVE-2023-0590
I6C30L
12.39
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-0482
I6C3N1
12.69
0.0
resteasy
sig-Java
CVE-2022-38266
I6C3NB
12.83
6.5
leptonica
Base-service
CVE-2023-0597
I6C6UC
13.06
5.5
kernel
Kernel
CVE-2023-0430
I6C6UA
13.06
0.0
thunderbird
sig-desktop-apps
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
沐钰莹(openEuler release SIG)
Mobile: +86 15651995918
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail: muyuying1(a)huawei.com<mailto:muyuying1@huawei.com>
[cid:image004.png@01D9438B.2FBED150]Open Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件!
This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it
1
0
Dear all,
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。
本公示分为五部分:
1、openEuler-20.03-LTS-SP1 Update 20230201发布情况及待修复缺陷
2、openEuler-20.03-LTS-SP3 Update 20230201发布情况及待修复缺陷
3、openEuler-22.03-LTS Update 20230201发布情况及待修复缺陷
4、openEuler 关键组件待修复CVE 清单
5、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2023/02/18)提供 update_20230217 版本。
openEuler-20.03-LTS-SP1 Update 20230208
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题3个,已知漏洞12个。目前版本分支剩余待修复缺陷39个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6BKWV?from=project-i…
CVE
仓库
score
CVE-2023-22745
tpm2-tss
6.4
CVE-2023-0433
vim
7.8
CVE-2022-41717
golang
5.3
CVE-2022-4883
libXpm
8.1
CVE-2022-46285
libXpm
7.5
CVE-2022-44617
libXpm
7.5
CVE-2023-22497
netdata
9.1
CVE-2023-22496
netdata
9.8
CVE-2023-23455
kernel
5.5
CVE-2023-23454
kernel
5.5
CVE-2023-0394
kernel
5.5
CVE-2020-10775
ovirt-engine
5.3
CVE修复:
Bugfix:
issue
仓库
#I6CR2R:openEuler 20.03 SP3 上安装完spdk后,缺少setup.sh文件,无法切换到用户态。
spdk
#I6CE9I:【openEuler 1.0-LTS】回合主线trace特性相关的bugfix补丁
kernel
#I6DQPW:优化iproute版本号
iproute
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I281C1
【fuzz】runtime error:
libsass
Base-service
I437CR
[SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错
obs-server
Others
I43OSX
[clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0
clamav
Others
I48GIM
【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I490MU
Uncaught exception in get_tokens_unprocessed
python-pygments
Programming-language
I4F8YQ
integer overflow in start_input_bmp
libjpeg-turbo
Desktop
I4F8ZI
heap-buffer-overflow in get_word_rgb_row
libjpeg-turbo
Desktop
I4F903
Unexpect-exit in start_input_tga
libjpeg-turbo
Desktop
I4F913
Timeout in tjDecompress2
libjpeg-turbo
Desktop
I4G4A5
Undefine-shift in _bfd_safe_read_leb128
binutils
Compiler
I4G4B1
Integer overflow in print_vms_time
binutils
Compiler
I4G4VY
memleak in parse_gnu_debugaltlink
binutils
Compiler
I4G4WF
Heap-buffer-overflow in slurp_hppa_unwind_table
binutils
Compiler
I4G4WW
Use-after-free in make_qualified_name
binutils
Compiler
I4G4X6
memleak in byte_get_little_endian
binutils
Compiler
I4G4XF
memleak in process_mips_specific
binutils
Compiler
I4G4Y0
out-of-memory in vms_lib_read_index
binutils
Compiler
I4G4YJ
Heap-buffer-overflow in bfd_getl16
binutils
Compiler
I4G4YV
Floating point exception in _bfd_vms_slurp_etir
binutils
Compiler
I4J0OY
【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常
libdap
sig-recycle
I4JMG4
【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251
python-robotframework
sig-ROS
I4K6ES
stack-buffer-overflow in UINT32_Marshal
libtpms
sig-security-facility
I4K6FU
global-buffer-overflow in Array_Marshal
libtpms
sig-security-facility
I4K6R7
memleak in wrap_nettle_mpi_init
gnutls
sig-security-facility
I4K6UI
Timeout in _asn1_find_up
gnutls
sig-security-facility
I4KT2A
integer overflow in luaV_execute
lua
Base-service
I4KT3D
integer overflow in intarith
lua
Base-service
I4KT3Q
Division by zero in luaV_execute
lua
Base-service
I4KT40
Timeout in luaV_finishget
lua
Base-service
I4O16Z
【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息
kernel
Kernel
I5IG1V
【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败
efl
sig-compat-winapp
I5IG6K
【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5JHX2
【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AA06
【20.03-LTS-SP1-update-0111】【arm/x86】执行sosreport -a报错“TypeError: 'NoneType' object is not iterable”
sos
Base-service
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6AZZU
【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped)
gcc
Compiler
I6CBNA
【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6CKZE
【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault
gcc
Compiler
openEuler-20.03-LTS-SP3 Update 20230208
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问3个,已知漏洞12个。目前版本分支剩余待修复缺陷 16个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I64IWS?from=project-i…
CVE修复:
需求类型
软件包
优先级
CVE-2023-22745
tpm2-tss
6.4
CVE-2023-0433
vim
7.8
CVE-2022-47952
lxc
3.3
CVE-2022-4883
libXpm
8.1
CVE-2022-46285
libXpm
7.5
CVE-2022-44617
libXpm
7.5
CVE-2023-22497
netdata
9.1
CVE-2023-22496
netdata
9.8
CVE-2023-23455
kernel
5.5
CVE-2023-23454
kernel
5.5
CVE-2023-0394
kernel
5.5
CVE-2020-10775
ovirt-engine
5.3
Bugfix:
issue
仓库
status
责任田
#I6CQI9:eggo部署k8s集群失败
eggo
已完成
EulerOS-容器
#I6CR2R:openEuler 20.03 SP3 上安装完spdk后,缺少setup.sh文件,无法切换到用户态。
spdk
已完成
EulerOS-存算
#I6CE9I:【openEuler 1.0-LTS】回合主线trace特性相关的bugfix补丁
kernel
待办的
内核
openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I4UMEV
[openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历
kernel
Kernel
I5IGAS
【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5IGOR
【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败
fluidsynth
Application
I5KXUY
【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I5KY4S
【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功
vdsm
oVirt
I5LYJK
【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常
TCP_option_address
Kernel
I5XDXJ
openeuler:20.03-sp3下lua-lunit0.5和lua5.3不匹配
mugen
sig-QA
I613DI
【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败
openEuler-release
Base-service
I61LEV
【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错
tuna
Others
I66BBJ
[20.03-LTS-SP3]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源
openEuler-repos
Base-service
I66J22
【20.03-LTS-SP3】【arm/x86】openvswitch-ipsec软件包安装失败,提示冲突
openvswitch
Networking
I66J48
【20.03-LTS-SP3】【arm/x86】ovn-controller.service服务启动失败
openvswitch
Networking
I66J58
【20.03-LTS-SP3】【arm/x86】ovn-northd.service服务启动失败
openvswitch
Networking
I66J5V
【20.03-LTS-SP3】【arm/x86】ovn-controller-vtep.service服务启动失败
openvswitch
Networking
I6CBL7
【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6CTKO
【openEuler sp3】【arm】ltp执行用例memcg_stress失败
kernel
Kernel
openEuler-22.03-LTS Update 20230208
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题4个,已知漏洞18个。目前版本分支剩余待修复缺陷10个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I64IWT?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2023-0433
vim
7.8
CVE-2023-22745
tpm2-tss
6.4
CVE-2022-47952
lxc
3.3
CVE-2022-41717
golang
5.3
CVE-2022-47016
tmux
7.8
CVE-2023-25136
openssh
5.5
CVE-2022-44617
libXpm
7.5
CVE-2022-46285
libXpm
7.5
CVE-2022-4883
libXpm
8.1
CVE-2022-3094
bind
7.5
CVE-2022-3736
bind
7.5
CVE-2022-3924
bind
7.5
CVE-2023-22496
netdata
9.8
CVE-2023-22497
netdata
9.1
CVE-2023-0179
kernel
7.8
CVE-2023-23454
kernel
5.5
CVE-2023-23455
kernel
5.5
CVE-2020-10775
ovirt-engine
5.3
Bugfix:
issue
仓库
#I6CQI9:eggo部署k8s集群失败
eggo
#I6CHOH:升级qemu6.2.0后在X86环境启动安全容器报错Expected '=' after parameter 'kernel_irqchip
kata-containers
#I6D0K1:例行分析grub2软件包补丁
grub2
#I5L4QX:[合规提升]建议统一spec文件的License名称规范
install-scripts
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I5JIA6
【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JPII
【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin
ovirt-engine
oVirt
I5Q4S3
[22.03-LTS]x86虚拟机卸载qxl模块,机器自动重启
kernel
Kernel
I665SM
resize2fs出现csum不一致
kernel
Kernel
I66BDE
[22.03-LTS]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源
openEuler-repos
Base-service
I6CBPQ
【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I66KIH
【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败
openstack-ironic-inspector
sig-openstack
I6AG88
【22.03-LTS】【arm/x86】nvwa第一次卸载时有异常报错信息
nvwa
sig-ops
I6AGEG
【22.03-LTS-SP1】【arm/x86】nvwa第一次卸载时有异常报错信息
nvwa
sig-ops
I6CN7B
【22.03 LTS update20230201】【arm/x86】cephadm卸载过程中有异常打印信息
ceph
sig-ceph
openEuler-22.03-LTS SP1 Update 20230208
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题5个,已知漏洞17个。目前版本分支剩余待修复缺陷20个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I64IWT?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2023-0433
vim
7.8
CVE-2023-22745
tpm2-tss
6.4
CVE-2022-47952
lxc
3.3
CVE-2022-41717
golang
5.3
CVE-2022-47016
tmux
7.8
CVE-2022-44617
libXpm
7.5
CVE-2022-46285
libXpm
7.5
CVE-2022-4883
libXpm
8.1
CVE-2022-3094
bind
7.5
CVE-2022-3736
bind
7.5
CVE-2022-3924
bind
7.5
CVE-2023-22497
netdata
9.1
CVE-2023-22496
netdata
9.8
CVE-2023-0179
kernel
7.8
CVE-2023-23454
kernel
5.5
CVE-2023-23455
kernel
5.5
CVE-2023-25136
openssh
5.5
Bugfix:
issue
仓库
#I6CQI9:eggo部署k8s集群失败
eggo
#I6CHOH:升级qemu6.2.0后在X86环境启动安全容器报错Expected '=' after parameter 'kernel_irqchip
kata-containers
#I6D0K1:例行分析grub2软件包补丁
grub2
#I6DFQT:spec文件中缺少Patch0003,导致部分补丁未生效
install-scripts
#I6D9QD:删除.a库文件
newt
openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I65688
【22.03_LTS_SP1_RC2】【x86/arm】biometric-authentication存在不安全的编译选项STRIP、RPATH
biometric-authentication
sig-UKUI
I657VE
【22.03_LTS_SP1_RC2】【x86/arm】blackbox_exporter存在不安全的编译选项PIE、STRIP
blackbox_exporter
sig-CloudNative
I657VP
【22.03_LTS_SP1_RC2】【x86/arm】containernetworking-plugins存在不安全的编译选项PIE、STRIP
containernetworking-plugins
sig-CloudNative
I657VS
【22.03_LTS_SP1_RC2】【x86/arm】dde-api存在不安全的编译选项PIE、STRIP
dde-api
sig-DDE
I657VT
【22.03_LTS_SP1_RC2】【x86/arm】dde-daemon存在不安全的编译选项STRIP
dde-daemon
sig-DDE
I657VX
【22.03_LTS_SP1_RC2】【x86/arm】deepin-dbus-generator存在不安全的编译选项PIE、STRIP
deepin-dbus-generator
sig-DDE
I657W0
【22.03_LTS_SP1_RC2】【x86/arm】deepin-editor存在不安全的编译选项STRIP
deepin-editor
sig-DDE
I657W3
【22.03_LTS_SP1_RC2】【x86/arm】deepin-graphics-driver-manager存在不安全的编译选项STRIP
deepin-graphics-driver-manager
sig-DDE
I657W7
【22.03_LTS_SP1_RC2】【x86/arm】deepin-system-monitor存在不安全的编译选项STRIP
deepin-system-monitor
sig-DDE
I657W8
【22.03_LTS_SP1_RC2】【x86/arm】delve存在不安全的编译选项PIE、STRIP
delve
dev-utils
I65839
【22.03_LTS_SP1_RC2】【x86/arm】pushgateway存在不安全的编译选项PIE、STRIP
pushgateway
sig-CloudNative
I6583U
【22.03_LTS_SP1_RC2】【x86/arm】startdde存在不安全的编译选项PIE、STRIP
startdde
sig-DDE
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6AGEG
【22.03-LTS-SP1】【arm/x86】nvwa第一次卸载时有异常报错信息
nvwa
sig-ops
I6AZZU
【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped)
gcc
Compiler
I6CBPN
【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6CKRQ
【22.03 SP1 update20230201】【arm/x86】ceph-selinux卸载过程中有异常打印信息
ceph
sig-ceph
I6CKZE
【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault
gcc
Compiler
I6CN3V
【22.03 SP1 update20230201】【arm/x86】cephadm卸载过程中有异常打印信息
ceph
sig-ceph
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE:
漏洞编号
Issue ID
剩余天数
CVSS评分
软件包
责任SIG
CVE-2023-22458
I6ATA3
1.42
5.5
redis6
sig-bigdata
CVE-2022-35977
I6ATA2
1.42
5.5
redis6
sig-bigdata
CVE-2023-22458
I6ATA1
1.42
5.5
redis5
sig-bigdata
CVE-2022-35977
I6ATA0
1.42
5.5
redis5
sig-bigdata
CVE-2022-23498
I6CK4L
1.87
8.8
grafana
Application
CVE-2022-47950
I6AY3Q
2.29
6.5
openstack-swift
sig-openstack
CVE-2023-22486
I6B8C9
2.51
7.5
cmark
CVE-2022-47929
I6B0FD
2.79
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-21843
I6B1HM
2.92
3.7
openjdk-11
Compiler
CVE-2023-21830
I6B1HL
2.92
5.3
openjdk-11
Compiler
CVE-2023-21835
I6B1HK
2.92
5.3
openjdk-17
Compiler
CVE-2023-21835
I6B1HJ
2.92
5.3
openjdk-11
Compiler
CVE-2023-21843
I6B1HI
2.92
3.7
openjdk-1.8.0
Compiler
CVE-2023-21830
I6B1HG
2.92
5.3
openjdk-1.8.0
Compiler
CVE-2023-21835
I6B1HE
2.92
5.3
openjdk-1.8.0
Compiler
CVE-2023-21843
I6B1H9
2.92
3.7
openjdk-latest
Compiler
CVE-2023-21830
I6B1H8
2.92
5.3
openjdk-latest
Compiler
CVE-2023-21835
I6B1H7
2.92
5.3
openjdk-latest
Compiler
CVE-2023-0394
I6B1V3
3.42
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-0397
I6B4B3
4.21
6.5
zephyr
CVE-2022-4344
I6B4CF
4.52
4.3
wireshark
Application
CVE-2023-0396
I6B579
5.13
6.8
zephyr
CVE-2022-4345
I6B59U
5.44
6.5
wireshark
Application
CVE-2023-25193
I6CZP6
5.54
7.5
harfbuzz
Desktop
CVE-2023-0240
I6BTWC
6.51
7.8
kernel
Kernel
CVE-2022-25147
I6EWIN
6.56
9.8
apr
Base-service
CVE-2023-0286
I6DKTF
7.31
7.4
openssl
sig-security-facility
CVE-2023-0341
I6DPL7
7.77
7.8
editorconfig
CVE-2022-44566
I6B6XD
8.92
0.0
rubygem-activerecord
sig-ruby
CVE-2023-22796
I6B6XB
8.92
0.0
rubygem-activesupport
sig-ruby
CVE-2023-22794
I6B6XA
8.92
0.0
rubygem-activerecord
sig-ruby
CVE-2023-22797
I6B6X9
8.92
0.0
rubygem-actionpack
sig-ruby
CVE-2022-47951
I6B751
9.17
5.7
openstack-cinder
sig-openstack
CVE-2023-0468
I6B7IH
9.92
4.7
risc-v-kernel
sig-RISC-V
CVE-2023-0469
I6B7VG
10.71
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-22799
I6B82I
10.92
0.0
rubygem-globalid
sig-ruby
CVE-2023-0416
I6B8C4
11.3
6.5
wireshark
Application
CVE-2023-0412
I6B8C2
11.3
6.5
wireshark
Application
CVE-2023-0411
I6B8C1
11.3
6.5
wireshark
Application
CVE-2023-0415
I6B8C0
11.3
6.5
wireshark
Application
CVE-2023-0417
I6B8BW
11.3
6.5
wireshark
Application
CVE-2023-0413
I6B8BS
11.3
6.5
wireshark
Application
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
沐钰莹(openEuler release SIG)
Mobile: +86 15651995918
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail: muyuying1(a)huawei.com<mailto:muyuying1@huawei.com>
[cid:image004.png@01D940B8.00571F10]Open Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件!
This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it
1
0
Dear all,
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。
本公示分为五部分:
1、openEuler-20.03-LTS-SP1 Update 20230201发布情况及待修复缺陷
2、openEuler-20.03-LTS-SP3 Update 20230201发布情况及待修复缺陷
3、openEuler-22.03-LTS Update 20230201发布情况及待修复缺陷
4、openEuler 关键组件待修复CVE 清单
5、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2023/02/07)提供 update_20230203 版本。
openEuler-20.03-LTS-SP1 Update 20230201
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题2个,已知漏洞17个。目前版本分支剩余待修复缺陷39个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6BKWV?from=project-i…
CVE
仓库
score
CVE-2023-24056
pkgconf
9.8
CVE-2023-22809
sudo
7.8
CVE-2023-0288
vim
7.8
CVE-2022-47024
vim
7.8
CVE-2022-41953
git
7.8
CVE-2022-48281
libtiff
7.5
CVE-2022-38023
samba
8.1
CVE-2022-47021
opusfile
7.8
CVE-2022-42890
batik
7.5
CVE-2022-42252
tomcat
7.5
CVE-2022-41704
batik
7.5
CVE-2023-23455
kernel
5.5
CVE-2023-23454
kernel
7.8
CVE-2023-0047
kernel
5.1
CVE-2022-47929
kernel
5.5
CVE-2020-10775
ovirt-engine
5.3
CVE-2021-3930
qemu
6.5
CVE修复:
Bugfix:
issue
仓库
#I6AXHU:4.19回合主线bugfix补丁
kernel
#I5UNVT:开源软件包libbpf补丁例行分析回合
libbpf
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I281C1
【fuzz】runtime error:
libsass
Base-service
I437CR
[SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错
obs-server
Others
I43OSX
[clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0
clamav
Others
I490MU
Uncaught exception in get_tokens_unprocessed
python-pygments
Programming-language
I4F8YQ
integer overflow in start_input_bmp
libjpeg-turbo
Desktop
I4F8ZI
heap-buffer-overflow in get_word_rgb_row
libjpeg-turbo
Desktop
I4F903
Unexpect-exit in start_input_tga
libjpeg-turbo
Desktop
I4F913
Timeout in tjDecompress2
libjpeg-turbo
Desktop
I4G4A5
Undefine-shift in _bfd_safe_read_leb128
binutils
Base-service
I4G4B1
Integer overflow in print_vms_time
binutils
Base-service
I4G4VY
memleak in parse_gnu_debugaltlink
binutils
Base-service
I4G4WF
Heap-buffer-overflow in slurp_hppa_unwind_table
binutils
Base-service
I4G4WW
Use-after-free in make_qualified_name
binutils
Base-service
I4G4X6
memleak in byte_get_little_endian
binutils
Base-service
I4G4XF
memleak in process_mips_specific
binutils
Base-service
I4G4Y0
out-of-memory in vms_lib_read_index
binutils
Base-service
I4G4YJ
Heap-buffer-overflow in bfd_getl16
binutils
Base-service
I4G4YV
Floating point exception in _bfd_vms_slurp_etir
binutils
Base-service
I4J0OY
【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常
libdap
sig-recycle
I4K6ES
stack-buffer-overflow in UINT32_Marshal
libtpms
sig-security-facility
I4K6FU
global-buffer-overflow in Array_Marshal
libtpms
sig-security-facility
I4K6R7
memleak in wrap_nettle_mpi_init
gnutls
sig-security-facility
I4K6UI
Timeout in _asn1_find_up
gnutls
sig-security-facility
I4KT2A
integer overflow in luaV_execute
lua
Base-service
I4KT3D
integer overflow in intarith
lua
Base-service
I4KT3Q
Division by zero in luaV_execute
lua
Base-service
I4KT40
Timeout in luaV_finishget
lua
Base-service
I4O16Z
【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息
kernel
Kernel
I4QV6N
【openEuler-20.03-LTS-SP1】flink命令执行失败
flink
sig-ai-bigdata
I5IG1V
【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败
efl
sig-compat-winapp
I5IG6K
【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AA06
【20.03-LTS-SP1-update-0111】【arm/x86】执行sosreport -a报错“TypeError: 'NoneType' object is not iterable”
sos
Base-service
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6AZZU
【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped)
gcc
Compiler
openEuler-20.03-LTS-SP3 Update 20230201
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问2个,已知漏洞16个。目前版本分支剩余待修复缺陷 11个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I64IWS?from=project-i…
CVE修复:
需求类型
软件包
优先级
CVE-2023-24056
pkgconf
9.8
CVE-2023-22809
sudo
7.8
CVE-2023-0288
vim
7.8
CVE-2022-47024
vim
7.8
CVE-2022-41953
git
7.8
CVE-2022-48281
libtiff
7.5
CVE-2022-38023
samba
8.1
CVE-2022-47021
opusfile
7.8
CVE-2022-42890
batik
7.5
CVE-2022-42252
tomcat
7.5
CVE-2022-41704
batik
7.5
CVE-2023-23455
kernel
5.5
CVE-2023-23454
kernel
7.8
CVE-2023-0047
kernel
5.1
CVE-2022-47929
kernel
5.5
CVE-2021-3930
qemu
6.5
Bugfix:
issue
仓库
status
责任田
#I6AXHU:4.19回合主线bugfix补丁
kernel
已完成
内核
#I5UNVT:开源软件包libbpf补丁例行分析回合
libbpf
已完成
EulerOS-网络
openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I4QV7S
【openEuler-20.03-LTS-SP3】flink run 命令执行失败
flink
sig-ai-bigdata
I4UMEV
[openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历
kernel
Kernel
I5IGAS
【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5IGOR
【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败
fluidsynth
Application
I613DI
【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败
openEuler-release
Base-service
I61LEV
【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错
tuna
Others
I66BBJ
[20.03-LTS-SP3]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源
openEuler-repos
Base-service
I66J22
【20.03-LTS-SP3】【arm/x86】openvswitch-ipsec软件包安装失败,提示冲突
openvswitch
Networking
I66J48
【20.03-LTS-SP3】【arm/x86】ovn-controller.service服务启动失败
openvswitch
Networking
I66J58
【20.03-LTS-SP3】【arm/x86】ovn-northd.service服务启动失败
openvswitch
Networking
I66J5V
【20.03-LTS-SP3】【arm/x86】ovn-controller-vtep.service服务启动失败
openvswitch
Networking
openEuler-22.03-LTS Update 20230201
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题8个,已知漏洞21个。目前版本分支剩余待修复缺陷3个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I64IWT?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2022-47024
vim
7.8
CVE-2023-0288
vim
7.8
CVE-2023-22809
sudo
7.8
CVE-2023-24056
pkgconf
9.8
CVE-2022-41953
git
7.8
CVE-2022-38023
samba
8.1
CVE-2022-48281
libtiff
7.5
CVE-2022-42252
tomcat
7.5
CVE-2022-47021
opusfile
7.8
CVE-2022-41704
batik
7.5
CVE-2022-42890
batik
7.5
CVE-2021-36690
sqlite
7.5
CVE-2022-4696
kernel
7.8
CVE-2022-47929
kernel
5.5
CVE-2023-0179
kernel
1
CVE-2023-0210
kernel
5.9
CVE-2023-20928
kernel
7.5
CVE-2023-23454
kernel
7.8
CVE-2023-23455
kernel
5.5
CVE-2023-23559
kernel
7.8
CVE-2020-10775
ovirt-engine
5.3
Bugfix:
issue
仓库
#I6CA2Y:update_20230201-修复glib2-static安装时找不到sysprof-capture-static安装依赖
sysprof
#I6CA6S:update-20230201-add loongarch support for ceph
ceph
#I6AYYO:PR373 SPEC删除了补丁,但补丁文件没有被删除
systemd
#I6C4QA:【X86/ARM】【SDV-All-libxml2-补丁分析】补丁数量:4
libxml2
#I6C2MC:使用gradle编译项目报Javac compiler message file broken: key=compiler.misc.msg.bug arguments
openjdk-11
#I6BCMV:【openEuler:Mainline】obs编译失败
A-Tune
#I6AW65:【backport】mm/vmpressure: fix data-race with memcg->socket_pressure
kernel
#I5UNVT:开源软件包libbpf补丁例行分析回合
libbpf
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I5Q4S3
[22.03-LTS]x86虚拟机卸载qxl模块,机器自动重启
kernel
Kernel
I665SM
resize2fs出现csum不一致
kernel
Kernel
I66BDE
[22.03-LTS]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源
openEuler-repos
Base-service
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE:
漏洞编号
Issue ID
剩余天数
CVSS评分
软件包
责任SIG
CVE-2023-23454
I6AQIL
3.56
7.8
kernel
Kernel
CVE-2022-0553
I6A0G8
7.77
4.6
zephyr
CVE-2023-0210
I6A0GV
7.77
0.0
risc-v-kernel
sig-RISC-V
CVE-2022-47015
I6BCFO
8.73
7.5
mariadb
DB
CVE-2022-47016
I6BCFM
8.73
7.8
tmux
Desktop
CVE-2023-0433
I6BU72
11.35
7.8
vim
Base-service
CVE-2023-0047
I68UPT
1.14
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-0047
I68UPT
1.14
0.0
risc-v-kernel
sig-RISC-V
CVE-2022-47952
I68C10
12.47
3.3
lxc
iSulad
CVE-2022-41717
I6ANT9
12.53
5.3
golang
sig-golang
CVE-2023-0179
I6AOP8
12.59
0.0
kernel
Kernel
CVE-2023-0266
I6AOWP
12.62
0.0
kernel
Kernel
CVE-2023-23455
I6AQG9
12.76
5.5
kernel
Kernel
CVE-2023-22458
I6ATA3
13.38
0.0
redis6
sig-bigdata
CVE-2022-35977
I6ATA2
13.38
0.0
redis6
sig-bigdata
CVE-2023-22458
I6ATA1
13.38
0.0
redis5
sig-bigdata
CVE-2022-35977
I6ATA0
13.38
0.0
redis5
sig-bigdata
CVE-2022-47630
I6AVW5
13.74
3.5
arm-trusted-firmware
Base-service
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
沐钰莹(openEuler release SIG)
Mobile: +86 15651995918
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail: muyuying1(a)huawei.com<mailto:muyuying1@huawei.com>
[cid:image002.png@01D937F6.CC7F7D50]Open Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件!
This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it
_______________________________________________
Dev mailing list -- dev(a)openeuler.org
To unsubscribe send an email to dev-leave(a)openeuler.org
1
0