Sa-announce
Threads by month
- ----- 2025 -----
- February
- January
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
March 2023
- 1 participants
- 4 discussions
Dear all,
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。
本公示分为五部分:
1、openEuler-20.03-LTS-SP1 Update 20230322发布情况及待修复缺陷
2、openEuler-20.03-LTS-SP3 Update 20230322发布情况及待修复缺陷
3、openEuler-22.03-LTS Update 20230322发布情况及待修复缺陷
4、openEuler-22.03-LTS-SP1 Update 20230322发布情况及待修复缺陷
5、openEuler 关键组件待修复CVE 清单
6、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2023/04/02)提供 update_ 20230329 版本。
openEuler-20.03-LTS-SP1 Update 20230322
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题4个,已知漏洞4个。目前版本分支剩余待修复缺陷35个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6OCCM?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2022-27337
poppler
6.5
CVE-2023-1073
kernel
6.3
CVE-2023-1095
kernel
5.5
CVE-2023-1264
vim
5.5
Bugfix:
issue
仓库
#I6P8R2:udpate-20230322 json-c:enable DT
json-c
#I6E9D3:[openEuler-1.0-LTS] oom: decouple mems_allowed from oom_unkillable_task
kernel
#I6LJQB: 配置使用saslauthd+pam后鉴权长时间运行,saslauthd进程内打开文件失败
pam
#I6P8V4:update20230322 Minor fix in the compatibility library
gdbm
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I281C1
【fuzz】runtime error:
libsass
Base-service
I437CR
[SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错
obs-server
Others
I43OSX
[clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0
clamav
Others
I48GIM
【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I4G4A5
Undefine-shift in _bfd_safe_read_leb128
binutils
Compiler
I4G4B1
Integer overflow in print_vms_time
binutils
Compiler
I4G4VY
memleak in parse_gnu_debugaltlink
binutils
Compiler
I4G4WF
Heap-buffer-overflow in slurp_hppa_unwind_table
binutils
Compiler
I4G4WW
Use-after-free in make_qualified_name
binutils
Compiler
I4G4X6
memleak in byte_get_little_endian
binutils
Compiler
I4G4XF
memleak in process_mips_specific
binutils
Compiler
I4G4Y0
out-of-memory in vms_lib_read_index
binutils
Compiler
I4G4YJ
Heap-buffer-overflow in bfd_getl16
binutils
Compiler
I4G4YV
Floating point exception in _bfd_vms_slurp_etir
binutils
Compiler
I4J0OY
【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常
libdap
sig-recycle
I4JMG4
【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251
python-robotframework
sig-ROS
I4K6ES
stack-buffer-overflow in UINT32_Marshal
libtpms
sig-security-facility
I4K6FU
global-buffer-overflow in Array_Marshal
libtpms
sig-security-facility
I4O16Z
【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息
kernel
Kernel
I4QV6N
【openEuler-20.03-LTS-SP1】flink命令执行失败
flink
sig-bigdata
I5IG1V
【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败
efl
sig-compat-winapp
I5IG6K
【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5JHX2
【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6AZZU
【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped)
gcc
Compiler
I6CBNA
【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6CKZE
【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault
gcc
Compiler
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
I6O19D
【20.03 sp1 udpate 0315 】irb-jruby命令执行报错
jruby
sig-ruby
openEuler-20.03-LTS-SP3 Update 20230322
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问4个,已知漏洞5个。目前版本分支剩余待修复缺陷 12个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6OCCO?from=project-i…
CVE修复:
需求类型
软件包
优先级
CVE-2020-10775
ovirt-engine
5.3
CVE-2022-27337
poppler
6.5
CVE-2023-1073
kernel
6.3
CVE-2023-1095
kernel
5.5
CVE-2023-1264
vim
5.5
Bugfix:
issue
仓库
#I6P8R2:udpate-20230322 json-c:enable DT
json-c
#I6E9D3:[openEuler-1.0-LTS] oom: decouple mems_allowed from oom_unkillable_task
kernel
#I6LJQB: 配置使用saslauthd+pam后鉴权长时间运行,saslauthd进程内打开文件失败
pam
#I6P8V4:update20230322 Minor fix in the compatibility library
gdbm
openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I4QV7S
【openEuler-20.03-LTS-SP3】flink run 命令执行失败
flink
sig-bigdata
I4UMEV
[openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历
kernel
Kernel
I5IGAS
【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5IGOR
【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败
fluidsynth
Application
I5KXUY
【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I5KY4S
【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功
vdsm
oVirt
I5LYJK
【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常
TCP_option_address
Kernel
I5XDXJ
openeuler:20.03-sp3下lua-lunit0.5和lua5.3不匹配
mugen
sig-QA
I613DI
【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败
openEuler-release
Base-service
I61LEV
【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错
tuna
Others
I66BBJ
[20.03-LTS-SP3]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源
openEuler-repos
Base-service
I6CBL7
【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
openEuler-22.03-LTS Update 20230322
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题6个,已知漏洞2个。目前版本分支剩余待修复缺陷8个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6OCCP?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2022-27337
poppler
6.5
CVE-2023-1264
vim
5.5
Bugfix:
issue
仓库
#I6DM2X:兼容-accel参数
stratovirt
#I6OFGK:例行分析python-urllib3补丁,需要补丁回合
python-urllib3
#I6LJQB: 配置使用saslauthd+pam后鉴权长时间运行,saslauthd进程内打开文件失败
pam
#I6P8V4:update20230322 Minor fix in the compatibility library
gdbm
#I5YM6P:openEuler 22.03 LTS Next版本python-chardet软件升级至5.0.0
python-chardet
#I6NVPT:[OLK-5.10] 产品长稳测试中出现热补丁相关的hungtask<https://gitee.com/open_euler/dashboard?issue_id=I6NVPT>
kernel
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
sig
I5JIA6
【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JPII
【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin
ovirt-engine
oVirt
I665SM
resize2fs出现csum不一致
kernel
Kernel
I66BDE
[22.03-LTS]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源
openEuler-repos
Base-service
I66KIH
【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败
openstack-ironic-inspector
sig-openstack
I677QX
【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误
opengauss-server
DB
I6CBPQ
【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6O1CK
【22.03 lts udpate 0315 】irb-jruby命令执行报错
jruby
sig-ruby
openEuler-22.03-LTS SP1 Update 20230322
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题8个,已知漏洞5个。目前版本分支剩余待修复缺陷14个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6OCCL?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2022-27337
poppler
6.5
CVE-2023-1264
vim
5.5
CVE-2023-1074
kernel
4.7
CVE-2023-1079
kernel
6.8
CVE-2023-1382
kernel
0
Bugfix:
issue
仓库
#I6P9BJ:update20230322-update iputils to version 20221126
iputils
#I6DM2X:兼容-accel参数
stratovirt
#I6ORHV:【22.03_LTS_SP1】jemalloc版本需要从5.2.1升级到5.3.0
jemalloc
#I6NY9Y:22.03-openEuler-LTS-SP1升级zbar,通过升级合入上游社区修复的一系列问题
zbar
#I6OFGK:例行分析python-urllib3补丁,需要补丁回合
python-urllib3
#I6LJQB: 配置使用saslauthd+pam后鉴权长时间运行,saslauthd进程内打开文件失败
pam
#I6P8V4:update20230322 Minor fix in the compatibility library
gdbm
#I6NVPT:[OLK-5.10] 产品长稳测试中出现热补丁相关的hungtask
kernel
openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
sig
I657VX
【22.03_LTS_SP1_RC2】【x86/arm】deepin-dbus-generator不存在安全的编译选项PIE、STRIP
deepin-dbus-generator
sig-DDE
I657W0
【22.03_LTS_SP1_RC2】【x86/arm】deepin-editor存在不安全的编译选项STRIP
deepin-editor
sig-DDE
I657W3
【22.03_LTS_SP1_RC2】【x86/arm】deepin-graphics-driver-manager存在不安全的编译选项STRIP
deepin-graphics-driver-manager
sig-DDE
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6AZZU
【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped)
gcc
Compiler
I6CBPN
【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6CKZE
【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault
gcc
Compiler
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE(3.25日数据):
漏洞编号
Issue ID
剩余天数
CVSS评分
软件包
责任SIG
CVE-2022-48423
I6OD4U
1.61
9.8
kernel
Kernel
CVE-2021-3329
I6HUIN
3.0
6.5
zephyr
CVE-2023-1076
I6I7UH
4.37
4.7
risc-v-kernel
sig-RISC-V
CVE-2023-1079
I6I7UE
4.37
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-1074
I6I7UD
4.37
4.7
risc-v-kernel
sig-RISC-V
CVE-2023-1075
I6I7U8
4.37
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-20860
I6PDX0
4.6
9.1
springframework
sig-Java
CVE-2023-28466
I6NIUR
4.61
7.0
kernel
Kernel
CVE-2023-28466
I6NIUL
4.61
7.0
risc-v-kernel
sig-RISC-V
CVE-2023-27781
I6NIU2
4.61
7.8
jpegoptim
Application
CVE-2023-1095
I6IK9V
5.25
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-1018
I6IKCI
5.5
5.5
libtpms
sig-security-facility
CVE-2020-12413
I6IKCQ
5.52
5.9
firefox
Application
CVE-2023-22997
I6IKXC
5.6
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-22998
I6IKWZ
5.6
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-22999
I6IKWS
5.6
5.5
kernel
Kernel
CVE-2023-22996
I6IKWQ
5.6
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-22997
I6IKWJ
5.6
5.5
kernel
Kernel
CVE-2023-22998
I6IKWF
5.6
5.5
kernel
Kernel
CVE-2023-22999
I6IKXV
5.61
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-25155
I6IRPL
5.87
6.5
redis
Others
CVE-2023-25155
I6IRP9
5.87
6.5
redis6
sig-bigdata
CVE-2023-25155
I6IROQ
5.87
6.5
redis5
sig-bigdata
CVE-2022-36021
I6IRS4
5.88
5.5
redis
Others
CVE-2022-36021
I6IRRY
5.88
5.5
redis6
sig-bigdata
CVE-2022-36021
I6IRRU
5.88
5.5
redis5
sig-bigdata
CVE-2019-14576
I6ISX4
5.92
0.0
edk2
Virt
CVE-2019-14561
I6ISWY
5.92
0.0
edk2
Virt
CVE-2023-22462
I6ITUB
5.95
5.4
grafana
Application
CVE-2023-27594
I6O472
6.19
7.3
cilium
sig-high-performance-network
CVE-2023-0594
I6IVYK
6.25
5.4
grafana
Application
CVE-2023-0507
I6IVYI
6.25
5.4
grafana
Application
CVE-2023-23004
I6IXRY
6.65
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-23006
I6IXRQ
6.65
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-23002
I6IXRB
6.65
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-23005
I6IXQX
6.65
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-23004
I6IXPT
6.65
5.5
kernel
Kernel
CVE-2023-23006
I6IXPJ
6.65
5.5
kernel
Kernel
CVE-2023-23002
I6IXOH
6.65
5.5
kernel
Kernel
CVE-2023-23005
I6IXO8
6.65
5.5
kernel
Kernel
CVE-2023-23001
I6IXNW
6.65
5.5
kernel
Kernel
CVE-2023-1161
I6JJJE
8.25
6.5
wireshark
Application
CVE-2022-48425
I6OD5R
8.61
7.8
kernel
Kernel
CVE-2022-48424
I6OD4P
8.61
7.8
kernel
Kernel
CVE-2023-1281
I6OP9S
9.51
7.8
kernel
Kernel
CVE-2023-27586
I6OW3B
9.87
7.1
python-cairosvg
CVE-2022-41725
I6OXZH
9.93
7.5
golang
sig-golang
CVE-2022-41724
I6OXZB
9.93
7.5
golang
sig-golang
CVE-2022-41723
I6OXYJ
9.93
7.5
golang
sig-golang
CVE-2019-10358
I6K7LN
10.87
6.5
maven2
sig-Java
CVE-2017-1000397
I6K7IR
10.87
5.9
maven2
sig-Java
CVE-2023-1194
I6KDP0
11.12
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-1195
I6KDOZ
11.12
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-1192
I6KDQD
11.13
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-1192
I6KDP1
11.13
0.0
kernel
Kernel
CVE-2023-1193
I6KEWP
11.25
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-1193
I6KEWO
11.25
6.5
kernel
Kernel
CVE-2023-1249
I6KT9F
12.12
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-1249
I6KT9C
12.12
4.1
kernel
Kernel
CVE-2023-1252
I6KTT3
12.25
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-1108
I6KVMO
12.63
0.0
undertow
sig-Java
CVE-2023-27478
I6KWN7
12.66
6.5
libmemcached
Programming-language
CVE-2022-39188
I5QVT3
13.81
4.7
kernel
Kernel
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
沐钰莹(openEuler release SIG)
Mobile: +86 15651995918
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail: muyuying1(a)huawei.com<mailto:muyuying1@huawei.com>
[cid:image002.png@01D95F4C.8C3691C0]Open Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件!
This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it
1
0
Dear all,
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。
本公示分为五部分:
1、openEuler-20.03-LTS-SP1 Update 20230315发布情况及待修复缺陷
2、openEuler-20.03-LTS-SP3 Update 20230315发布情况及待修复缺陷
3、openEuler-22.03-LTS Update 20230315发布情况及待修复缺陷
4、openEuler-22.03-LTS-SP1 Update 20230315发布情况及待修复缺陷
5、openEuler 关键组件待修复CVE 清单
6、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2023/03/26)提供 update_ 20230322 版本。
openEuler-20.03-LTS-SP1 Update 20230315
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题4个,已知漏洞23个。目前版本分支剩余待修复缺陷38个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6MFEQ?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2022-40899
future
7.5
CVE-2023-26253
glusterfs
7.5
CVE-2023-27522
httpd
5.9
CVE-2023-25690
httpd
7.5
CVE-2022-25857
snakeyaml
7.5
CVE-2022-38749
snakeyaml
6.5
CVE-2022-38750
snakeyaml
5.5
CVE-2022-38751
snakeyaml
6.5
CVE-2022-38752
snakeyaml
6.5
CVE-2022-41854
snakeyaml
6.5
CVE-2023-20938
kernel
8.8
CVE-2023-0461
kernel
7.8
CVE-2023-1074
kernel
4.7
CVE-2023-1078
kernel
7.8
CVE-2023-1076
kernel
4.7
CVE-2023-1118
kernel
7.8
CVE-2023-26604
systemd
7.8
CVE-2023-1170
vim
7.8
CVE-2023-1175
vim
7.3
CVE-2023-27371
libmicrohttpd
7.5
CVE-2023-26545
kernel
7.8
CVE-2023-20052
clamav
5.3
CVE-2023-20032
clamav
9.8
Bugfix:
issue
仓库
#I6LHB0:修复由于snakeyaml升级到1.32版本导致jruby编译失败
jruby
#I6LHBA:修复由于snakeyaml升级到1.32版本导致polyglot编译失败
polyglot
#I6561X:软件包参数问题
netsniff-ng
#I643OL:【openEuler 2003 LTS】【openEuler-1.0-LTS】 [内核] [kernfs] [block] 测试iscsi中blk层宕机
kernel
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I281C1
【fuzz】runtime error:
libsass
Base-service
I437CR
[SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错
obs-server
Others
I43OSX
[clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0
clamav
Others
I48GIM
【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I4G4A5
Undefine-shift in _bfd_safe_read_leb128
binutils
Compiler
I4G4B1
Integer overflow in print_vms_time
binutils
Compiler
I4G4VY
memleak in parse_gnu_debugaltlink
binutils
Compiler
I4G4WF
Heap-buffer-overflow in slurp_hppa_unwind_table
binutils
Compiler
I4G4WW
Use-after-free in make_qualified_name
binutils
Compiler
I4G4X6
memleak in byte_get_little_endian
binutils
Compiler
I4G4XF
memleak in process_mips_specific
binutils
Compiler
I4G4Y0
out-of-memory in vms_lib_read_index
binutils
Compiler
I4G4YJ
Heap-buffer-overflow in bfd_getl16
binutils
Compiler
I4G4YV
Floating point exception in _bfd_vms_slurp_etir
binutils
Compiler
I4J0OY
【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常
libdap
sig-recycle
I4JMG4
【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251
python-robotframework
sig-ROS
I4K6ES
stack-buffer-overflow in UINT32_Marshal
libtpms
sig-security-facility
I4K6FU
global-buffer-overflow in Array_Marshal
libtpms
sig-security-facility
I4O16Z
【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息
kernel
Kernel
I4QV6N
【openEuler-20.03-LTS-SP1】flink命令执行失败
flink
sig-bigdata
I5IG1V
【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败
efl
sig-compat-winapp
I5IG6K
【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5JHX2
【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6AZZU
【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped)
gcc
Compiler
I6CBNA
【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6CKZE
【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault
gcc
Compiler
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
I6ISTD
[22.03-sp1]执行iscsiadm -m node -p 127.0.0.1 -u命令失败,内核报错
kernel
Kernel
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
I6ISTD
[22.03-sp1]执行iscsiadm -m node -p 127.0.0.1 -u命令失败,内核报错
kernel
Kernel
openEuler-20.03-LTS-SP3 Update 20230315
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问4个,已知漏洞23个。目前版本分支剩余待修复缺陷 11个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6MFER?from=project-i…
CVE修复:
需求类型
软件包
优先级
CVE-2023-27371
libmicrohttpd
7.5
CVE-2022-40899
future
7.5
CVE-2023-27522
httpd
5.9
CVE-2023-25690
httpd
7.5
CVE-2022-25857
snakeyaml
7.5
CVE-2022-38749
snakeyaml
6.5
CVE-2022-38750
snakeyaml
5.5
CVE-2022-38751
snakeyaml
6.5
CVE-2022-38752
snakeyaml
6.5
CVE-2022-41854
snakeyaml
6.5
CVE-2023-20938
kernel
8.8
CVE-2023-0461
kernel
7.8
CVE-2023-1074
kernel
4.7
CVE-2023-1078
kernel
7.8
CVE-2023-1076
kernel
4.7
CVE-2023-1118
kernel
7.8
CVE-2023-26604
systemd
7.8
CVE-2023-1170
vim
7.8
CVE-2023-1175
vim
7.3
CVE-2023-26253
glusterfs
7.5
CVE-2023-26545
kernel
7.8
CVE-2023-20052
clamav
5.3
CVE-2023-20032
clamav
9.8
Bugfix:
issue
仓库
#I6LHB0:修复由于snakeyaml升级到1.32版本导致jruby编译失败
jruby
#I6LHBA:修复由于snakeyaml升级到1.32版本导致polyglot编译失败
polyglot
#I6561X:软件包参数问题
netsniff-ng
#I643OL:【openEuler 2003 LTS】【openEuler-1.0-LTS】 [内核] [kernfs] [block] 测试iscsi中blk层宕机
kernel
openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I4QV7S
【openEuler-20.03-LTS-SP3】flink run 命令执行失败
flink
sig-bigdata
I5IGAS
【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5IGOR
【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败
fluidsynth
Application
I5KXUY
【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I5KY4S
【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功
vdsm
oVirt
I5LYJK
【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常
TCP_option_address
Kernel
I5XDXJ
openeuler:20.03-sp3下lua-lunit0.5和lua5.3不匹配
mugen
sig-QA
I613DI
【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败
openEuler-release
Base-service
I61LEV
【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错
tuna
Others
I66BBJ
[20.03-LTS-SP3]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源
openEuler-repos
Base-service
I6CBL7
【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
openEuler-22.03-LTS Update 20230315
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题6个,已知漏洞24个。目前版本分支剩余待修复缺陷9个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6MFES?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2023-27320
sudo
1
CVE-2023-27371
libmicrohttpd
7.5
CVE-2022-40899
future
7.5
CVE-2023-1170
vim
7.8
CVE-2023-1175
vim
7.3
CVE-2022-25857
snakeyaml
7.5
CVE-2022-38749
snakeyaml
6.5
CVE-2022-38750
snakeyaml
5.5
CVE-2022-38752
snakeyaml
6.5
CVE-2022-41854
snakeyaml
6.5
CVE-2023-20938
kernel
8.8
CVE-2023-0461
kernel
7.8
CVE-2023-1075
kernel
2.5
CVE-2023-1078
kernel
7.8
CVE-2023-1076
kernel
4.7
CVE-2023-22995
kernel
7.8
CVE-2023-1118
kernel
7.8
CVE-2023-27522
httpd
5.9
CVE-2023-25690
httpd
7.5
CVE-2023-26253
glusterfs
7.5
CVE-2023-26545
kernel
7.8
CVE-2022-38751
snakeyaml
6.5
CVE-2023-20052
clamav
5.3
CVE-2023-20032
clamav
9.8
Bugfix:
issue
仓库
#I6LBTJ:2203LTS版本的python3-paramiko包,通过RSA秘钥远程ssh验证报错,请求升级至2.11.0或2.11.0以后版本
python-paramiko
#I6KPA0:postfix 安装后 postfix.pem 证书有效期小于1年
postfix
#I6LHB0:修复由于snakeyaml升级到1.32版本导致jruby编译失败
jruby
#I6LHBA:修复由于snakeyaml升级到1.32版本导致polyglot编译失败
polyglot
#I6LNLJ:例行分析dnf补丁,需要补丁回合
dnf
#I6561X:软件包参数问题
netsniff-ng
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I5JIA6
【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JPII
【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin
ovirt-engine
oVirt
I665SM
resize2fs出现csum不一致
kernel
Kernel
I66BDE
[22.03-LTS]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源
openEuler-repos
Base-service
I66KIH
【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败
openstack-ironic-inspector
sig-openstack
I677QX
【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误
opengauss-server
DB
I6AG88
【22.03-LTS】【arm/x86】nvwa第一次卸载时有异常报错信息
nvwa
sig-ops
I6AGEG
【22.03-LTS-SP1】【arm/x86】nvwa第一次卸载时有异常报错信息
nvwa
sig-ops
I6CBPQ
【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
openEuler-22.03-LTS SP1 Update 20230315
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题11个,已知漏洞26个。目前版本分支剩余待修复缺陷14个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6MFEP?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2023-26081
epiphany
7.5
CVE-2023-26253
glusterfs
7.5
CVE-2022-38749
snakeyaml
6.5
CVE-2022-38750
snakeyaml
5.5
CVE-2022-38751
snakeyaml
6.5
CVE-2022-38752
snakeyaml
6.5
CVE-2022-41854
snakeyaml
6.5
CVE-2023-27320
sudo
1
CVE-2023-27522
httpd
5.9
CVE-2023-25690
httpd
7.5
CVE-2022-3560
pesign
5.5
CVE-2023-20938
kernel
8.8
CVE-2023-0461
kernel
7.8
CVE-2023-26607
kernel
7.1
CVE-2023-1075
kernel
2.5
CVE-2023-1078
kernel
7.8
CVE-2023-1076
kernel
4.7
CVE-2023-22995
kernel
7.8
CVE-2023-1118
kernel
7.8
CVE-2023-1175
vim
7.3
CVE-2023-1170
vim
7.8
CVE-2023-27371
libmicrohttpd
7.5
CVE-2023-26545
kernel
7.8
CVE-2022-40899
future
7.5
CVE-2023-20052
clamav
5.3
CVE-2023-20032
clamav
9.8
Bugfix:
issue
仓库
#I6J86M:repo python-lit-15.0.7-1源码包
python-lit
#I6K0AO:gala-gopher升级到1.0.2版本
gala-gopher
#I6KPA0:postfix 安装后 postfix.pem 证书有效期小于1年
postfix
#I6MR9A:例行回合社区补丁
efibootmgr
#I6LNLJ:例行分析dnf补丁,需要补丁回合
dnf
#I6561X:软件包参数问题
netsniff-ng
#I6LHB0:修复由于snakeyaml升级到1.32版本导致jruby编译失败
jruby
#I6LHBA:修复由于snakeyaml升级到1.32版本导致polyglot编译失败
polyglot
#I6NF3Y:update_0315补充clang对c、c++代码编译功能,需要补充libcxx、libcxxabi、llvm-libunwind三款软件
libcxx
#I6NF4V:udapte-0315补充clang对c、c++代码编译功能,需要补充libcxx、libcxxabi、llvm-libunwind三款软件
libcxxabi
#I6NF5I:update-0315 补充clang对c、c++代码编译功能,需要补充libcxx、libcxxabi、llvm-libunwind三款软件
llvm-libunwind
openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6AGEG
【22.03-LTS-SP1】【arm/x86】nvwa第一次卸载时有异常报错信息
nvwa
sig-ops
I6AZZU
【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped)
gcc
Compiler
I6CBPN
【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6CKRQ
【22.03 SP1 update20230201】【arm/x86】ceph-selinux卸载过程中有异常打印信息
ceph
sig-ceph
I6CKZE
【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault
gcc
Compiler
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
I6ISTD
[22.03-sp1]执行iscsiadm -m node -p 127.0.0.1 -u命令失败,内核报错
kernel
Kernel
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE(3.19日数据):
漏洞编号
Issue ID
剩余天数
CVSS评分
软件包
责任SIG
CVE-2023-0662
I6FWA8
0.13
5.3
php
Base-service
CVE-2023-0567
I6FXSZ
0.2
6.2
php
Base-service
CVE-2019-17003
I6FZ58
0.45
6.1
thunderbird
sig-desktop-apps
CVE-2023-23039
I6H8H5
6.02
5.7
risc-v-kernel
sig-RISC-V
CVE-2021-33367
I6H8GO
6.02
5.5
freeimage
dev-utils
CVE-2023-26464
I6MI3U
7.87
7.5
log4j12
Application
CVE-2021-3329
I6HUIN
9.2
6.5
zephyr
CVE-2023-1055
I6I76Q
10.33
5.5
three-eight-nine-ds-base
Application
CVE-2023-1076
I6I7UH
10.58
4.7
risc-v-kernel
sig-RISC-V
CVE-2023-1079
I6I7UE
10.58
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-1074
I6I7UD
10.58
4.7
risc-v-kernel
sig-RISC-V
CVE-2023-1079
I6I7U9
10.58
6.8
kernel
Kernel
CVE-2023-1075
I6I7U8
10.58
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-1075
I6I7U2
10.58
2.5
kernel
Kernel
CVE-2023-24533
I6LIQ9
10.8
7.5
golang
sig-golang
CVE-2023-27781
I6NIU2
10.81
7.8
jpegoptim
Application
CVE-2023-1073
I6IFV4
11.12
6.3
kernel
Kernel
CVE-2023-1095
I6IK9V
11.45
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-1095
I6IK9U
11.45
5.5
kernel
Kernel
CVE-2023-1018
I6IKCI
11.7
5.5
libtpms
sig-security-facility
CVE-2020-12413
I6IKCQ
11.72
5.9
firefox
Application
CVE-2023-22999
I6IKXV
11.81
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-22997
I6IKXC
11.81
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-22998
I6IKWZ
11.81
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-22999
I6IKWS
11.81
5.5
kernel
Kernel
CVE-2023-22996
I6IKWQ
11.81
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-22997
I6IKWJ
11.81
5.5
kernel
Kernel
CVE-2023-22998
I6IKWF
11.81
5.5
kernel
Kernel
CVE-2023-22996
I6IKWB
11.81
5.5
kernel
Kernel
CVE-2022-36021
I6IRS4
12.08
5.5
redis
Others
CVE-2022-36021
I6IRRY
12.08
5.5
redis6
sig-bigdata
CVE-2022-36021
I6IRRU
12.08
5.5
redis5
sig-bigdata
CVE-2023-25155
I6IRPL
12.08
6.5
redis
Others
CVE-2023-25155
I6IRP9
12.08
6.5
redis6
sig-bigdata
CVE-2023-25155
I6IROQ
12.08
6.5
redis5
sig-bigdata
CVE-2019-14576
I6ISX4
12.12
0.0
edk2
Virt
CVE-2019-14561
I6ISWY
12.12
0.0
edk2
Virt
CVE-2023-22462
I6ITUB
12.16
5.4
grafana
Application
CVE-2023-0594
I6IVYK
12.45
5.4
grafana
Application
CVE-2023-0507
I6IVYI
12.45
5.4
grafana
Application
CVE-2023-23004
I6IXRY
12.85
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-23006
I6IXRQ
12.85
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-23002
I6IXRB
12.85
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-23005
I6IXQX
12.85
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-23004
I6IXPT
12.85
5.5
kernel
Kernel
CVE-2023-23006
I6IXPJ
12.85
5.5
kernel
Kernel
CVE-2023-23002
I6IXOH
12.85
5.5
kernel
Kernel
CVE-2023-23005
I6IXO8
12.85
5.5
kernel
Kernel
CVE-2023-23001
I6IXNW
12.85
5.5
kernel
Kernel
CVE-2022-39188
I5QVT3
13.81
4.7
kernel
Kernel
CVE-2023-1161
I6JJJE
14.45
6.5
wireshark
Application
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
沐钰莹(openEuler release SIG)
Mobile: +86 15651995918
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail: muyuying1(a)huawei.com<mailto:muyuying1@huawei.com>
[cid:image004.png@01D95A6A.D96776D0]Open Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件!
This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it
1
0
Dear all,
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。
本公示分为五部分:
1、openEuler-20.03-LTS-SP1 Update 20230308发布情况及待修复缺陷
2、openEuler-20.03-LTS-SP3 Update 20230308发布情况及待修复缺陷
3、openEuler-22.03-LTS Update 20230308发布情况及待修复缺陷
4、openEuler-22.03-LTS-SP1 Update 20230308发布情况及待修复缺陷
5、openEuler 关键组件待修复CVE 清单
6、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2023/03/19)提供 update_ 20230315 版本。
openEuler-20.03-LTS-SP1 Update 20230308
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题2个,已知漏洞11个。目前版本分支剩余待修复缺陷36个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6JXVB?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2023-24998
apache-commons-fileupload
7.5
CVE-2022-37705
amanda
6.7
CVE-2022-37704
amanda
6.7
CVE-2023-0461
kernel
1
CVE-2023-1073
kernel
1
CVE-2023-1076
kernel
1
CVE-2023-1078
kernel
1
CVE-2023-1095
kernel
1
CVE-2023-1118
kernel
1
CVE-2023-23000
kernel
1
CVE-2023-26607
kernel
7.1
Bugfix:
issue
仓库
#I6L1MK:update_20230308 fix ipnetns attach failed
iproute
#I6KOXL:[openEuler-1.0-LTS] dhugetlb: use mutex lock in update_reserve_pages()
kernel
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I281C1
【fuzz】runtime error:
libsass
Base-service
I437CR
[SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错
obs-server
Others
I43OSX
[clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0
clamav
Others
I48GIM
【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I4F8YQ
integer overflow in start_input_bmp
libjpeg-turbo
Desktop
I4F903
Unexpect-exit in start_input_tga
libjpeg-turbo
Desktop
I4F913
Timeout in tjDecompress2
libjpeg-turbo
Desktop
I4G4A5
Undefine-shift in _bfd_safe_read_leb128
binutils
Compiler
I4G4B1
Integer overflow in print_vms_time
binutils
Compiler
I4G4VY
memleak in parse_gnu_debugaltlink
binutils
Compiler
I4G4WF
Heap-buffer-overflow in slurp_hppa_unwind_table
binutils
Compiler
I4G4WW
Use-after-free in make_qualified_name
binutils
Compiler
I4G4X6
memleak in byte_get_little_endian
binutils
Compiler
I4G4XF
memleak in process_mips_specific
binutils
Compiler
I4G4Y0
out-of-memory in vms_lib_read_index
binutils
Compiler
I4G4YJ
Heap-buffer-overflow in bfd_getl16
binutils
Compiler
I4G4YV
Floating point exception in _bfd_vms_slurp_etir
binutils
Compiler
I4J0OY
【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常
libdap
sig-recycle
I4K6ES
stack-buffer-overflow in UINT32_Marshal
libtpms
sig-security-facility
I4K6FU
global-buffer-overflow in Array_Marshal
libtpms
sig-security-facility
I4O16Z
【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息
kernel
Kernel
I5IG1V
【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败
efl
sig-compat-winapp
I5IG6K
【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5JHX2
【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6AZZU
【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped)
gcc
Compiler
I6CBNA
【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6CKZE
【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault
gcc
Compiler
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
I6ISTD
[22.03-sp1]执行iscsiadm -m node -p 127.0.0.1 -u命令失败,内核报错
kernel
Kernel
openEuler-20.03-LTS-SP3 Update 20230308
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问2个,已知漏洞12个。目前版本分支剩余待修复缺陷 10个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6JXVC?from=project-i…
CVE修复:
需求类型
软件包
优先级
CVE-2020-10775
ovirt-engine
5.3
CVE-2023-24998
apache-commons-fileupload
7.5
CVE-2022-37705
amanda
6.7
CVE-2022-37704
amanda
6.7
CVE-2023-0461
kernel
1
CVE-2023-1073
kernel
1
CVE-2023-1076
kernel
1
CVE-2023-1078
kernel
1
CVE-2023-1095
kernel
1
CVE-2023-1118
kernel
1
CVE-2023-23000
kernel
1
CVE-2023-26607
kernel
7.1
Bugfix:
issue
仓库
#I6L1MK:update_20230308 fix ipnetns attach failed
iproute
#I6KOXL:[openEuler-1.0-LTS] dhugetlb: use mutex lock in update_reserve_pages()
kernel
openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I5IGAS
【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5IGOR
【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败
fluidsynth
Application
I5KXUY
【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I5KY4S
【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功
vdsm
oVirt
I5LYJK
【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常
TCP_option_address
Kernel
I5XDXJ
openeuler:20.03-sp3下lua-lunit0.5和lua5.3不匹配
mugen
sig-QA
I613DI
【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败
openEuler-release
Base-service
I61LEV
【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错
tuna
Others
I66BBJ
[20.03-LTS-SP3]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源
openEuler-repos
Base-service
I6CBL7
【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
openEuler-22.03-LTS Update 20230308
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题3个,已知漏洞4个。目前版本分支剩余待修复缺陷9个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6JXVD?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2022-37705
amanda
6.7
CVE-2022-37704
amanda
6.7
CVE-2023-24998
apache-commons-fileupload
7.5
CVE-2023-23009
libreswan
7.5
Bugfix:
issue
仓库
#I6JA8U:【22.03 LTS update20230301】【arm/x86】unbound安装过程中有异常打印信息
unbound
#I6L1MK:update_20230308 fix ipnetns attach failed
iproute
#I6L25Z:update_20230308 Multi-Version_OpenStack-Wallaby_openEuler-22.03-LTS分支修复openstack依赖问题
python-chardet
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I5JIA6
【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JPII
【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin
ovirt-engine
oVirt
I665SM
resize2fs出现csum不一致
kernel
Kernel
I66BDE
[22.03-LTS]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源
openEuler-repos
Base-service
I66KIH
【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败
openstack-ironic-inspector
sig-openstack
I677QX
【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误
opengauss-server
DB
I6AG88
【22.03-LTS】【arm/x86】nvwa第一次卸载时有异常报错信息
nvwa
sig-ops
I6AGEG
【22.03-LTS-SP1】【arm/x86】nvwa第一次卸载时有异常报错信息
nvwa
sig-ops
I6CBPQ
【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
openEuler-22.03-LTS SP1 Update 20230308
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题3个,已知漏洞12个。目前版本分支剩余待修复缺陷21个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6JXVA?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2023-22796
rubygem-activesupport
7.5
CVE-2022-37705
amanda
6.7
CVE-2022-37704
amanda
6.7
CVE-2022-3560
pesign
5.5
CVE-2023-0240
kernel
7.8
CVE-2023-0615
kernel
5.5
CVE-2023-0045
kernel
5.1
CVE-2023-20938
kernel
8.8
CVE-2023-23586
kernel
5.5
CVE-2022-47629
libksba
9.8
CVE-2023-23009
libreswan
7.5
CVE-2023-24998
apache-commons-fileupload
7.5
Bugfix:
issue
仓库
#I6IQTA:openldap开启build_cross宏支持交叉编译
openldap
#I6JA8U:【22.03 LTS update20230301】【arm/x86】unbound安装过程中有异常打印信息
unbound
#I6L1MK:update_20230308 fix ipnetns attach failed
iproute
openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I657VS
【22.03_LTS_SP1_RC2】【x86/arm】dde-api不存在安全的编译选项PIE、STRIP
dde-api
sig-DDE
I657VT
【22.03_LTS_SP1_RC2】【x86/arm】dde-daemon存在不安全的编译选项STRIP
dde-daemon
sig-DDE
I657VX
【22.03_LTS_SP1_RC2】【x86/arm】deepin-dbus-generator不存在安全的编译选项PIE、STRIP
deepin-dbus-generator
sig-DDE
I657W0
【22.03_LTS_SP1_RC2】【x86/arm】deepin-editor存在不安全的编译选项STRIP
deepin-editor
sig-DDE
I657W3
【22.03_LTS_SP1_RC2】【x86/arm】deepin-graphics-driver-manager存在不安全的编译选项STRIP
deepin-graphics-driver-manager
sig-DDE
I657W7
【22.03_LTS_SP1_RC2】【x86/arm】deepin-system-monitor存在不安全的编译选项STRIP
deepin-system-monitor
sig-DDE
I6583U
【22.03_LTS_SP1_RC2】【x86/arm】startdde不存在安全的编译选项PIE、STRIP
startdde
sig-DDE
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6AGEG
【22.03-LTS-SP1】【arm/x86】nvwa第一次卸载时有异常报错信息
nvwa
sig-ops
I6AZZU
【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped)
gcc
Compiler
I6CBPN
【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6CKRQ
【22.03 SP1 update20230201】【arm/x86】ceph-selinux卸载过程中有异常打印信息
ceph
sig-ceph
I6CKZE
【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault
gcc
Compiler
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
I6ISTD
[22.03-sp1]执行iscsiadm -m node -p 127.0.0.1 -u命令失败,内核报错
kernel
Kernel
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE:
漏洞编号
Issue ID
剩余天数
CVSS评分
软件包
责任SIG
CVE-2023-26607
I6HWPB
0.64
7.1
risc-v-kernel
sig-RISC-V
CVE-2023-26605
I6HWOX
0.64
7.8
risc-v-kernel
sig-RISC-V
CVE-2023-26606
I6HWOO
0.64
7.8
risc-v-kernel
sig-RISC-V
CVE-2023-1077
I6I7UG
1.39
7.0
risc-v-kernel
sig-RISC-V
CVE-2023-22995
I6IEHV
1.89
7.8
risc-v-kernel
sig-RISC-V
CVE-2023-22995
I6IEH4
1.89
7.8
kernel
Kernel
CVE-2022-41723
I6IKBL
2.35
7.5
perl-Net-HTTP
Programming-language
CVE-2023-27371
I6IKCF
2.51
7.5
libmicrohttpd
Application
CVE-2023-1017
I6IUP1
3.01
7.8
libtpms
sig-security-facility
CVE-2022-25937
I6EUG8
3.1
6.5
openstack-glance
sig-openstack
CVE-2023-1118
I6IW01
3.53
7.8
kernel
Kernel
CVE-2023-23003
I6IXRI
3.66
7.8
risc-v-kernel
sig-RISC-V
CVE-2023-23003
I6IXPB
3.66
7.8
kernel
Kernel
CVE-2023-25730
I6F4RP
4.41
0.0
firefox
Application
CVE-2023-25739
I6F4RO
4.41
0.0
firefox
Application
CVE-2023-25736
I6F4RN
4.41
0.0
firefox
Application
CVE-2023-25738
I6F4RM
4.41
0.0
firefox
Application
CVE-2023-25731
I6F4RL
4.41
0.0
firefox
Application
CVE-2023-25735
I6F4RK
4.41
0.0
firefox
Application
CVE-2023-25740
I6F4RJ
4.41
0.0
firefox
Application
CVE-2023-25744
I6F4RI
4.41
0.0
firefox
Application
CVE-2023-25746
I6F4RH
4.41
0.0
firefox
Application
CVE-2023-25742
I6F4RG
4.41
0.0
firefox
Application
CVE-2023-25728
I6F4RF
4.41
0.0
firefox
Application
CVE-2023-25737
I6F4RE
4.41
0.0
firefox
Application
CVE-2023-25734
I6F4RD
4.41
0.0
firefox
Application
CVE-2023-25745
I6F4RA
4.41
0.0
firefox
Application
CVE-2023-25743
I6F4R8
4.41
0.0
firefox
Application
CVE-2023-25741
I6F4R6
4.41
0.0
firefox
Application
CVE-2023-25729
I6F4R2
4.41
0.0
firefox
Application
CVE-2023-25732
I6F4QX
4.41
0.0
firefox
Application
CVE-2023-25733
I6F4QT
4.41
0.0
firefox
Application
CVE-2023-0767
I6F4QN
4.41
0.0
firefox
Application
CVE-2022-27672
I6FB6C
4.91
4.7
kernel
Kernel
CVE-2022-38090
I6FDF4
5.03
4.4
microcode_ctl
System-tool
CVE-2022-33196
I6FDF2
5.03
6.7
microcode_ctl
System-tool
CVE-2023-23934
I6FDE3
5.03
3.5
python-werkzeug
Programming-language
CVE-2023-23918
I6GFMC
5.23
7.5
nodejs
sig-nodejs
CVE-2023-0778
I6FEKK
5.28
0.0
podman
sig-CloudNative
CVE-2016-3092
I6JLSA
5.72
7.5
struts
sig-Java
CVE-2023-20052
I6FMJU
5.95
0.0
clamav
Others
CVE-2023-0616
I6FOOO
6.14
0.0
thunderbird
sig-desktop-apps
CVE-2023-0662
I6FWA8
6.94
5.3
php
Base-service
CVE-2023-0567
I6FXSZ
7.01
0.0
php
Base-service
CVE-2023-23586
I6FYP9
7.14
5.5
kernel
Kernel
CVE-2019-17003
I6FZ58
7.26
6.1
thunderbird
sig-desktop-apps
CVE-2019-17003
I6FZ57
7.26
6.1
mozjs78
Desktop
CVE-2019-17003
I6FZ56
7.26
6.1
firefox
Application
CVE-2023-26604
I6JZ81
7.63
7.8
systemd
Base-service
CVE-2022-36397
I6FZ5I
8.61
7.8
kernel
Kernel
CVE-2023-1220
I6KVOV
9.64
8.8
chromium
Application
CVE-2023-1227
I6KVOD
9.64
8.8
chromium
Application
CVE-2023-1219
I6KVLQ
9.64
8.8
chromium
Application
CVE-2023-1218
I6KVL8
9.64
8.8
chromium
Application
CVE-2023-1216
I6KVKV
9.64
8.8
chromium
Application
CVE-2023-1213
I6KYB7
9.76
8.8
chromium
Application
CVE-2023-1214
I6KYB6
9.76
8.8
chromium
Application
CVE-2023-23920
I6GGBS
10.08
4.2
nodejs
sig-nodejs
CVE-2021-33639
I6H235
12.02
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-23039
I6H8HC
12.83
5.7
kernel
Kernel
CVE-2023-23039
I6H8H5
12.83
5.7
risc-v-kernel
sig-RISC-V
CVE-2021-33367
I6H8GO
12.83
5.5
freeimage
dev-utils
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
沐钰莹(openEuler release SIG)
Mobile: +86 15651995918
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail: muyuying1(a)huawei.com<mailto:muyuying1@huawei.com>
[cid:image004.png@01D95511.7855BC70]Open Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件!
This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it
1
0
Dear all,
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。
本公示分为五部分:
1、openEuler-20.03-LTS-SP1 Update 20230301发布情况及待修复缺陷
2、openEuler-20.03-LTS-SP3 Update 20230301发布情况及待修复缺陷
3、openEuler-22.03-LTS Update 20230301发布情况及待修复缺陷
4、openEuler-22.03-LTS-SP1 Update 20230301发布情况及待修复缺陷
5、openEuler 关键组件待修复CVE 清单
6、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2023/03/11)提供 update_ 20230308 版本。
openEuler-20.03-LTS-SP1 Update 20230301
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题5个,已知漏洞24个。目前版本分支剩余待修复缺陷43个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6HVKH?from=project-i…
CVE修复:
需求类型
软件包
优先级
CVE-2023-0687
glibc
9.8
CVE-2023-25153
containerd
5.5
CVE-2023-25173
containerd
7.8
CVE-2022-48337
emacs
7.8
CVE-2022-48338
emacs
7.3
CVE-2022-48339
emacs
7.3
CVE-2023-24580
python-django
7.5
CVE-2022-4304
nodejs
5.9
CVE-2022-4450
nodejs
7.5
CVE-2023-0215
nodejs
7.5
CVE-2023-0286
nodejs
7.4
CVE-2022-38266
leptonica
6.5
CVE-2023-0056
haproxy
4.3
CVE-2023-25725
haproxy
7.5
CVE-2022-37704
amanda
6.7
CVE-2022-37705
amanda
6.7
CVE-2021-33639
kernel
6.7
CVE-2023-26545
kernel
5.3
CVE-2020-10775
ovirt-engine
5.3
CVE-2022-4450
edk2
7.5
CVE-2023-0215
edk2
7.5
CVE-2023-0286
edk2
7.4
CVE-2023-0401
edk2
7.5
Bugfix:
issue
仓库
#I6E9JM:例行分析python-urllib3补丁,需要补丁回合<https://gitee.com/open_euler/dashboard?issue_id=I6E9JM>
python-urllib3
#I6AA06:【20.03-LTS-SP1-update-0111】【arm/x86】执行sosreport -a报错“TypeError: 'NoneType' object is not iterable”<https://gitee.com/open_euler/dashboard?issue_id=I6AA06>
sos
#I63KFX:自动化测试FC卡不显示FC卡的型号信息<https://gitee.com/open_euler/dashboard?issue_id=I63KFX>
oec-hardware
#I4RU21:回合社区补丁<https://gitee.com/open_euler/dashboard?issue_id=I4RU21>
dnf-plugins-core
#I6BO2R:【openEuler 1.0-LTS】【OLK-5.10】新增中断重入告警维测<https://gitee.com/open_euler/dashboard?issue_id=I6BO2R>
kernel
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I281C1
【fuzz】runtime error:
libsass
Base-service
I437CR
[SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错
obs-server
Others
I43OSX
[clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0
clamav
Others
I48GIM
【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I490MU
Uncaught exception in get_tokens_unprocessed
python-pygments
Programming-language
I4F8YQ
integer overflow in start_input_bmp
libjpeg-turbo
Desktop
I4F903
Unexpect-exit in start_input_tga
libjpeg-turbo
Desktop
I4F913
Timeout in tjDecompress2
libjpeg-turbo
Desktop
I4G4A5
Undefine-shift in _bfd_safe_read_leb128
binutils
Compiler
I4G4B1
Integer overflow in print_vms_time
binutils
Compiler
I4G4VY
memleak in parse_gnu_debugaltlink
binutils
Compiler
I4G4WF
Heap-buffer-overflow in slurp_hppa_unwind_table
binutils
Compiler
I4G4WW
Use-after-free in make_qualified_name
binutils
Compiler
I4G4X6
memleak in byte_get_little_endian
binutils
Compiler
I4G4XF
memleak in process_mips_specific
binutils
Compiler
I4G4Y0
out-of-memory in vms_lib_read_index
binutils
Compiler
I4G4YJ
Heap-buffer-overflow in bfd_getl16
binutils
Compiler
I4G4YV
Floating point exception in _bfd_vms_slurp_etir
binutils
Compiler
I4J0OY
【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常
libdap
sig-recycle
I4JMG4
【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251
python-robotframework
sig-ROS
I4K6ES
stack-buffer-overflow in UINT32_Marshal
libtpms
sig-security-facility
I4K6FU
global-buffer-overflow in Array_Marshal
libtpms
sig-security-facility
I4K6R7
memleak in wrap_nettle_mpi_init
gnutls
sig-security-facility
I4K6UI
Timeout in _asn1_find_up
gnutls
sig-security-facility
I4O16Z
【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息
kernel
Kernel
I4QV6N
【openEuler-20.03-LTS-SP1】flink命令执行失败
flink
sig-bigdata
I5IG1V
【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败
efl
sig-compat-winapp
I5IG6K
【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5JHX2
【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6AZZU
【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped)
gcc
Compiler
I6CBNA
【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6CKZE
【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault
gcc
Compiler
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
I6ISTD
[22.03-sp1]执行iscsiadm -m node -p 127.0.0.1 -u命令失败,内核报错
kernel
Kernel
I6IU04
【update20230228-22.03-lts-sp1】amcrypt-ossl 命令执行失败
amanda
Application
I6IU77
【update20230228-22.03-lts-sp1】amaespipe命令执行失败
amanda
Application
openEuler-20.03-LTS-SP3 Update 20230301
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问5个,已知漏洞23个。目前版本分支剩余待修复缺陷 14个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6HVKI?from=project-i…
CVE修复:
需求类型
软件包
优先级
CVE-2023-0687
glibc
9.8
CVE-2023-25153
containerd
5.5
CVE-2023-25173
containerd
7.8
CVE-2022-48337
emacs
7.8
CVE-2022-48338
emacs
7.3
CVE-2022-48339
emacs
7.3
CVE-2023-24580
python-django
7.5
CVE-2022-4304
nodejs
5.9
CVE-2022-4450
nodejs
7.5
CVE-2023-0215
nodejs
7.5
CVE-2023-0286
nodejs
7.4
CVE-2022-38266
leptonica
6.5
CVE-2023-0056
haproxy
4.3
CVE-2023-25725
haproxy
7.5
CVE-2022-37704
amanda
6.7
CVE-2022-37705
amanda
6.7
CVE-2021-33639
kernel
6.7
CVE-2023-26545
kernel
5.3
CVE-2020-10775
ovirt-engine
5.3
CVE-2022-4450
edk2
7.5
CVE-2023-0215
edk2
7.5
CVE-2023-0286
edk2
7.4
CVE-2023-0401
edk2
7.5
Bugfix:
issue
仓库
#I6E9JM:例行分析python-urllib3补丁,需要补丁回合
python-urllib3
#I4RADS:【20.03-LTS-SP1】log4j升级失败
log4j
#I63KFX:自动化测试FC卡不显示FC卡的型号信息
oec-hardware
#I4RU21:回合社区补丁
dnf-plugins-core
#I6BO2R:【openEuler 1.0-LTS】【OLK-5.10】新增中断重入告警维测
kernel
openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I4QV7S
【openEuler-20.03-LTS-SP3】flink run 命令执行失败
flink
sig-bigdata
I4UMEV
[openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历
kernel
Kernel
I5IGAS
【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5IGOR
【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败
fluidsynth
Application
I5KXUY
【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I5KY4S
【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功
vdsm
oVirt
I5LYJK
【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常
TCP_option_address
Kernel
I5XDXJ
openeuler:20.03-sp3下lua-lunit0.5和lua5.3不匹配
mugen
sig-QA
I613DI
【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败
openEuler-release
Base-service
I61LEV
【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错
tuna
Others
I66BBJ
[20.03-LTS-SP3]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源
openEuler-repos
Base-service
I6CBL7
【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6ITY0
【update20230228-20.03-lts-sp3】amcrypt-ossl 命令执行失败
amanda
Application
I6IUAO
【update20230228-20.03-lts-sp3】amaespipe命令执行失败
amanda
Application
openEuler-22.03-LTS Update 20230301
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题5个,已知漏洞29个。目前版本分支剩余待修复缺陷11个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6HVKJ?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2023-0687
glibc
9.8
CVE-2023-25153
containerd
5.5
CVE-2023-25173
containerd
7.8
CVE-2022-48337
emacs
7.8
CVE-2022-48338
emacs
7.3
CVE-2022-48339
emacs
7.3
CVE-2023-22796
rubygem-activesupport
7.5
CVE-2022-44566
rubygem-activerecord
7.5
CVE-2023-22794
rubygem-activerecord
8.8
CVE-2023-24580
python-django
7.5
CVE-2022-4304
nodejs
5.9
CVE-2022-4450
nodejs
7.5
CVE-2023-0215
nodejs
7.5
CVE-2023-0286
nodejs
7.4
CVE-2022-38266
leptonica
6.5
CVE-2023-0056
haproxy
4.3
CVE-2023-25725
haproxy
7.5
CVE-2023-26081
epiphany
0
CVE-2022-37704
amanda
6.7
CVE-2022-37705
amanda
6.7
CVE-2021-33639
kernel
6.7
CVE-2023-0597
kernel
5.5
CVE-2023-0615
kernel
5.5
CVE-2020-10775
ovirt-engine
5.3
CVE-2022-44789
mujs
8.8
CVE-2022-4450
edk2
7.5
CVE-2023-0215
edk2
7.5
CVE-2023-0286
edk2
7.4
CVE-2023-0401
edk2
7.5
Bugfix:
issue
仓库
#I6E9JM:例行分析python-urllib3补丁,需要补丁回合
python-urllib3
#I6GM47:openEuler-22.03-LTS-SP1分支unbound为何未合入社区已知#610 #611问题
unbound
#I63KFX:自动化测试FC卡不显示FC卡的型号信息
oec-hardware
#I57PCI:python3-dnf-plugin-post-transaction-actions子包缺少目录
dnf-plugins-core
#I6IRK0:update_0301 避免全量升级出现文件冲突
cups
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I5JIA6
【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JPII
【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin
ovirt-engine
oVirt
I665SM
resize2fs出现csum不一致
kernel
Kernel
I66BDE
[22.03-LTS]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源
openEuler-repos
Base-service
I66KIH
【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败
openstack-ironic-inspector
sig-openstack
I677QX
【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误
opengauss-server
DB
I6AG88
【22.03-LTS】【arm/x86】nvwa第一次卸载时有异常报错信息
nvwa
sig-ops
I6AGEG
【22.03-LTS-SP1】【arm/x86】nvwa第一次卸载时有异常报错信息
nvwa
sig-ops
I6CBPQ
【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6IU0H
【update20230228-22.03-lts】amcrypt-ossl 命令执行失败
amanda
Application
I6IU1P
【update20230228-22.03-lts】amaespipe命令执行失败
amanda
Application
openEuler-22.03-LTS SP1 Update 20230301
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题16个,已知漏洞24个。目前版本分支剩余待修复缺陷23个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6HVKG?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2023-0687
glibc
9.8
CVE-2023-25153
containerd
5.5
CVE-2023-25173
containerd
7.8
CVE-2022-48337
emacs
7.8
CVE-2022-48338
emacs
7.3
CVE-2022-48339
emacs
7.3
CVE-2022-44566
rubygem-activerecord
7.5
CVE-2023-22794
rubygem-activerecord
8.8
CVE-2023-24580
python-django
7.5
CVE-2022-3560
pesign
5.5
CVE-2022-4304
nodejs
5.9
CVE-2022-4450
nodejs
7.5
CVE-2023-0215
nodejs
7.5
CVE-2023-0286
nodejs
7.4
CVE-2022-38266
leptonica
6.5
CVE-2023-0056
haproxy
4.3
CVE-2023-25725
haproxy
7.5
CVE-2022-37704
amanda
6.7
CVE-2022-37705
amanda
6.7
CVE-2022-44789
mujs
8.8
CVE-2022-4450
edk2
7.5
CVE-2023-0215
edk2
7.5
CVE-2023-0286
edk2
7.4
CVE-2023-0401
edk2
7.5
Bugfix:
issue
仓库
#I6FF6H:glib2社区补丁回合
glib2
#I6CA2Y:update_20230201-修复glib2-static安装时找不到sysprof-capture-static安装依赖
sysprof
#I6HRK9:删除.a库文件并添加make依赖
c-ares
#I6HL17:samba 22.03-LTS-SP1升级
samba
#I6CGPC:verdor.obscpio文件包缺少stringio-3.0.1.gem
obs-bundled-gems
#I6GM47:openEuler-22.03-LTS-SP1分支unbound为何未合入社区已知#610 #611问题
unbound
#I63KFX:自动化测试FC卡不显示FC卡的型号信息
oec-hardware
#I6IRWV:update-0301 fix update conflict of devel and help
cups
#I6IS21:update-0301 disable static library
libXxf86vm
#I6GJ7I:安装摘要信息引导界面--root密码输入框,密码输入框眼睛图标含义未汉化
anaconda
#I5WLDC:Upgrade to latest release [dnf-plugins-core: 4.0.24 -> 4.3.1]
dnf-plugins-core
#I6I9HY:delete static library
libtirpc
#I6IAVJ:delete static library
ipset
#I6IBB9:delete static library
nghttp2
#I6IBLQ:delete static library
libdnet
#I6E9JM:例行分析python-urllib3补丁,需要补丁回合
python-urllib3
openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I657VS
【22.03_LTS_SP1_RC2】【x86/arm】dde-api存在不安全的编译选项PIE、STRIP
dde-api
sig-DDE
I657VT
【22.03_LTS_SP1_RC2】【x86/arm】dde-daemon存在不安全的编译选项STRIP
dde-daemon
sig-DDE
I657VX
【22.03_LTS_SP1_RC2】【x86/arm】deepin-dbus-generator存在不安全的编译选项PIE、STRIP
deepin-dbus-generator
sig-DDE
I657W0
【22.03_LTS_SP1_RC2】【x86/arm】deepin-editor存在不安全的编译选项STRIP
deepin-editor
sig-DDE
I657W3
【22.03_LTS_SP1_RC2】【x86/arm】deepin-graphics-driver-manager存在不安全的编译选项STRIP
deepin-graphics-driver-manager
sig-DDE
I657W7
【22.03_LTS_SP1_RC2】【x86/arm】deepin-system-monitor存在不安全的编译选项STRIP
deepin-system-monitor
sig-DDE
I6583U
【22.03_LTS_SP1_RC2】【x86/arm】startdde存在不安全的编译选项PIE、STRIP
startdde
sig-DDE
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6AGEG
【22.03-LTS-SP1】【arm/x86】nvwa第一次卸载时有异常报错信息
nvwa
sig-ops
I6AZZU
【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped)
gcc
Compiler
I6CBPN
【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6CKRQ
【22.03 SP1 update20230201】【arm/x86】ceph-selinux卸载过程中有异常打印信息
ceph
sig-ceph
I6CKZE
【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault
gcc
Compiler
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
I6ISTD
[22.03-sp1]执行iscsiadm -m node -p 127.0.0.1 -u命令失败,内核报错
kernel
Kernel
I6IU04
【update20230228-22.03-lts-sp1】amcrypt-ossl 命令执行失败
amanda
Application
I6IU77
【update20230228-22.03-lts-sp1】amaespipe命令执行失败
amanda
Application
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE:
漏洞编号
Issue ID
剩余天数
CVSS评分
软件包
责任SIG
CVE-2023-23919
I6GFMF
1.26
7.5
nodejs
sig-nodejs
CVE-2023-23918
I6GFMC
1.26
7.5
nodejs
sig-nodejs
CVE-2023-24998
I6GH6P
1.55
7.5
apache-commons-fileupload
dev-utils
CVE-2023-26242
I6GMYX
2.11
7.8
risc-v-kernel
sig-RISC-V
CVE-2022-48340
I6GQAI
2.26
7.5
glusterfs
Storage
CVE-2023-23009
I6GTCD
2.91
7.5
libreswan
System-tool
CVE-2023-26314
I6GYV6
3.14
8.8
mono
Base-service
CVE-2022-4384
I6DBAC
3.84
6.5
stream
CVE-2023-25586
I6DKU7
4.66
0.0
mingw-binutils
sig-compat-winapp
CVE-2023-25586
I6DKU4
4.66
0.0
binutils
Compiler
CVE-2022-4304
I6DKV8
4.68
5.9
edk2
Virt
CVE-2022-4203
I6DKUZ
4.68
0.0
compat-openssl11
CVE-2023-25585
I6DKUW
4.68
0.0
mingw-binutils
sig-compat-winapp
CVE-2023-25587
I6DKUV
4.68
0.0
mingw-binutils
sig-compat-winapp
CVE-2022-4203
I6DKUU
4.68
0.0
edk2
Virt
CVE-2023-25585
I6DKUP
4.68
0.0
binutils
Compiler
CVE-2023-25587
I6DKUO
4.68
0.0
binutils
Compiler
CVE-2022-4304
I6DKUI
4.68
5.9
compat-openssl11
CVE-2023-25584
I6DSPJ
5.26
0.0
binutils
Compiler
CVE-2023-25588
I6DSPH
5.26
0.0
mingw-binutils
sig-compat-winapp
CVE-2023-25584
I6DSPB
5.26
0.0
mingw-binutils
sig-compat-winapp
CVE-2023-25588
I6DSP8
5.26
0.0
binutils
Compiler
CVE-2023-21864
I6DZ7V
6.11
4.9
mysql
Others
CVE-2023-21870
I6DZ7O
6.11
4.9
mysql
Others
CVE-2023-21866
I6DZ7K
6.11
4.9
mysql
Others
CVE-2023-21874
I6DZ7A
6.11
2.7
mysql
Others
CVE-2023-21868
I6DZ76
6.11
6.5
mysql
Others
CVE-2023-21863
I6DZ6V
6.11
4.9
mysql
Others
CVE-2023-21869
I6DZ6M
6.11
5.5
mysql
Others
CVE-2023-21836
I6DZ9K
6.12
4.9
mysql
Others
CVE-2023-21871
I6DZ99
6.12
4.9
mysql
Others
CVE-2023-21865
I6DZ8X
6.12
4.9
mysql
Others
CVE-2023-21872
I6DZ8C
6.12
5.5
mysql
Others
CVE-2023-21867
I6DZ84
6.12
4.9
mysql
Others
CVE-2023-21873
I6DZ7Z
6.12
4.9
mysql
Others
CVE-2023-25166
I6E2G8
6.26
6.5
python-odo
sig-python-modules
CVE-2022-41862
I6E3MO
6.51
0.0
postgresql
DB
CVE-2023-20938
I6DKVG
8.15
8.8
kernel
Kernel
CVE-2023-1077
I6I7UG
8.64
7.0
risc-v-kernel
sig-RISC-V
CVE-2023-1077
I6I7UB
8.64
7.0
kernel
Kernel
CVE-2022-25937
I6EUG8
10.35
6.5
openstack-glance
sig-openstack
CVE-2023-0767
I6F4QN
11.65
0.0
firefox
Application
CVE-2023-25730
I6F4RP
11.66
0.0
firefox
Application
CVE-2023-25739
I6F4RO
11.66
0.0
firefox
Application
CVE-2023-25736
I6F4RN
11.66
0.0
firefox
Application
CVE-2023-25738
I6F4RM
11.66
0.0
firefox
Application
CVE-2023-25731
I6F4RL
11.66
0.0
firefox
Application
CVE-2023-25735
I6F4RK
11.66
0.0
firefox
Application
CVE-2023-25740
I6F4RJ
11.66
0.0
firefox
Application
CVE-2023-25744
I6F4RI
11.66
0.0
firefox
Application
CVE-2023-25746
I6F4RH
11.66
0.0
firefox
Application
CVE-2023-25742
I6F4RG
11.66
0.0
firefox
Application
CVE-2023-25728
I6F4RF
11.66
0.0
firefox
Application
CVE-2023-25737
I6F4RE
11.66
0.0
firefox
Application
CVE-2023-25734
I6F4RD
11.66
0.0
firefox
Application
CVE-2023-25745
I6F4RA
11.66
0.0
firefox
Application
CVE-2023-25743
I6F4R8
11.66
0.0
firefox
Application
CVE-2023-25741
I6F4R6
11.66
0.0
firefox
Application
CVE-2023-25729
I6F4R2
11.66
0.0
firefox
Application
CVE-2023-25732
I6F4QX
11.66
0.0
firefox
Application
CVE-2023-25733
I6F4QT
11.66
0.0
firefox
Application
CVE-2023-26242
I6GMYH
11.86
7.8
kernel
Kernel
CVE-2022-27672
I6FB6C
12.16
0.0
kernel
Kernel
CVE-2022-38090
I6FDF4
12.28
0.0
microcode_ctl
System-tool
CVE-2022-33196
I6FDF2
12.28
0.0
microcode_ctl
System-tool
CVE-2023-23934
I6FDE3
12.28
3.5
python-werkzeug
Programming-language
CVE-2023-0778
I6FEKK
12.53
0.0
podman
sig-CloudNative
CVE-2016-3092
I6JLSA
12.97
7.5
struts
sig-Java
CVE-2023-20052
I6FMJU
13.2
0.0
clamav
Others
CVE-2023-20032
I6FMJ3
13.2
0.0
clamav
Others
CVE-2023-0616
I6FOOO
13.39
0.0
thunderbird
sig-desktop-apps
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
沐钰莹(openEuler release SIG)
Mobile: +86 15651995918
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail: muyuying1(a)huawei.com<mailto:muyuying1@huawei.com>
[cid:image004.png@01D94F60.32558360]Open Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件!
This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it
1
0