Sa-announce
Threads by month
- ----- 2025 -----
- February
- January
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
April 2023
- 1 participants
- 4 discussions
Dear all,
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。
本公示分为五部分:
1、openEuler-20.03-LTS-SP1 Update 20230423发布情况及待修复缺陷
2、openEuler-20.03-LTS-SP3 Update 20230423发布情况及待修复缺陷
3、openEuler-22.03-LTS Update 20230423发布情况及待修复缺陷
4、openEuler-22.03-LTS-SP1 Update 20230423发布情况及待修复缺陷
5、openEuler 关键组件待修复CVE 清单
6、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2023/04/30)提供 update_ 20230426 版本。
openEuler-20.03-LTS-SP1 Update 20230423
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题2个,已知漏洞21个。目前版本分支剩余待修复缺陷29个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6W4KC?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2023-28842
docker
6.8
CVE-2023-28841
docker
6.8
CVE-2023-28840
docker
8.7
CVE-2023-24538
golang
5.9
CVE-2023-24537
golang
8.1
CVE-2023-24536
golang
5.9
CVE-2023-24534
golang
7.5
CVE-2023-27536
curl
no score info
CVE-2023-27349
bluez
8
CVE-2023-2004
freetype
5.3
CVE-2023-1981
avahi
6.2
CVE-2023-1668
openvswitch
7.1
CVE-2023-28708
tomcat
4.3
CVE-2022-44370
nasm
7.8
CVE-2023-30456
kernel
7.8
CVE-2023-1990
kernel
1
CVE-2023-1989
kernel
1
CVE-2023-1829
kernel
1
CVE-2022-36280
kernel
5.5
CVE-2022-27672
kernel
4.7
CVE-2023-1393
xorg-x11-server
7.8
Bugfix:
issue
仓库
#I6S0T7:例行分析grub2软件包补丁
grub2
#I6VTA2:【update20230412-20.03-lts-sp3】samba.service start失败,restart有报错信息
samba
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I281C1
【fuzz】runtime error:
libsass
Base-service
I437CR
[SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错
obs-server
Others
I48GIM
【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I4G4A5
Undefine-shift in _bfd_safe_read_leb128
binutils
Compiler
I4G4B1
Integer overflow in print_vms_time
binutils
Compiler
I4G4VY
memleak in parse_gnu_debugaltlink
binutils
Compiler
I4G4WF
Heap-buffer-overflow in slurp_hppa_unwind_table
binutils
Compiler
I4G4WW
Use-after-free in make_qualified_name
binutils
Compiler
I4G4X6
memleak in byte_get_little_endian
binutils
Compiler
I4G4XF
memleak in process_mips_specific
binutils
Compiler
I4G4Y0
out-of-memory in vms_lib_read_index
binutils
Compiler
I4G4YJ
Heap-buffer-overflow in bfd_getl16
binutils
Compiler
I4G4YV
Floating point exception in _bfd_vms_slurp_etir
binutils
Compiler
I4J0OY
【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常
libdap
sig-recycle
I4JMG4
【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251
python-robotframework
sig-ROS
I4QV6N
【openEuler-20.03-LTS-SP1】flink命令执行失败
flink
sig-bigdata
I5IG1V
【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败
efl
sig-compat-winapp
I5IG6K
【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5JHX2
【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6CBNA
【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
I6VCMC
【20.03 SP1 update 20230329 Train】openstack-nova-priority-feature安装过程中有多余打印,建议优化
openstack-nova
sig-openstack
I6VFAE
[20.03 SP1] [x86/arm] mariadb授权给远程用户,远程连接服务失败
mariadb
DB
I6VFV6
[22.03 SP1] [x86/arm] mariadb授权给远程用户,远程连接服务失败
mariadb
DB
openEuler-20.03-LTS-SP3 Update 20230423
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问3个,已知漏洞22个。目前版本分支剩余待修复缺陷 11个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6W4KD?from=project-i…
CVE修复:
需求类型
软件包
优先级
CVE-2023-24534
golang
7.5
CVE-2023-24536
golang
5.9
CVE-2023-24537
golang
8.1
CVE-2023-24538
golang
5.9
CVE-2023-28840
docker
8.7
CVE-2023-28841
docker
6.8
CVE-2023-28842
docker
6.8
CVE-2023-0922
samba
5.9
CVE-2023-1668
openvswitch
7.1
CVE-2023-2004
freetype
5.3
CVE-2023-27536
curl
no score info
CVE-2023-27349
bluez
8
CVE-2023-1981
avahi
6.2
CVE-2023-28708
tomcat
4.3
CVE-2022-44370
nasm
7.8
CVE-2022-27672
kernel
4.7
CVE-2022-36280
kernel
5.5
CVE-2023-1829
kernel
1
CVE-2023-1989
kernel
1
CVE-2023-1990
kernel
1
CVE-2023-30456
kernel
7.8
CVE-2023-1393
xorg-x11-server
7.8
Bugfix:
issue
仓库
#I61N72:2003-lts-sp3 changelog 日期错误
openvswitch
#I6S0T7:例行分析grub2软件包补丁
grub2
#I6VTA2:【update20230412-20.03-lts-sp3】samba.service start失败,restart有报错信息
samba
openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I4QV7S
【openEuler-20.03-LTS-SP3】flink run 命令执行失败
flink
sig-bigdata
I5IGAS
【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5IGOR
【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败
fluidsynth
Application
I5KXUY
【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I5KY4S
【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功
vdsm
oVirt
I5LYJK
【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常
TCP_option_address
Kernel
I5XDXJ
openeuler:20.03-sp3下lua-lunit0.5和lua5.3不匹配
mugen
sig-QA
I613DI
【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败
openEuler-release
Base-service
I61LEV
【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错
tuna
Others
I6CBL7
【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6VFMI
[20.03 SP3] [x86/arm] mariadb授权给远程用户,远程连接服务失败
mariadb
DB
openEuler-22.03-LTS Update 20230423
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题2个,已知漏洞18个。目前版本分支剩余待修复缺陷8个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6W4KE?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2021-45985
lua
7.5
CVE-2023-24534
golang
7.5
CVE-2023-24536
golang
5.9
CVE-2023-24537
golang
8.1
CVE-2023-24538
golang
5.9
CVE-2023-28840
docker
8.7
CVE-2023-28841
docker
6.8
CVE-2023-28842
docker
6.8
CVE-2023-1801
tcpdump
5.5
CVE-2023-1668
openvswitch
7.1
CVE-2023-2004
freetype
5.3
CVE-2023-27349
bluez
8
CVE-2023-1981
avahi
6.2
CVE-2023-28708
tomcat
4.3
CVE-2022-44370
nasm
7.8
CVE-2022-23527
mod_auth_openidc
6.1
CVE-2023-28625
mod_auth_openidc
7.5
CVE-2023-1393
xorg-x11-server
7.8
Bugfix:
issue
仓库
#I6S0T7:例行分析grub2软件包补丁
grub2
#I6LRQH:驱动模块的路径不正确
kae_driver
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I5JIA6
【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JPII
【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin
ovirt-engine
oVirt
I665SM
resize2fs出现csum不一致
kernel
Kernel
I66KIH
【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败
openstack-ironic-inspector
sig-openstack
I677QX
【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误
opengauss-server
DB
I6CBPQ
【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6O1CK
【22.03 lts udpate 0315 】irb-jruby命令执行报错
jruby
sig-ruby
I6VFRX
[22.03-LTS][x86/arm]mariadb授权给远程用户,远程连接服务失败
mariadb
DB
openEuler-22.03-LTS SP1 Update 20230423
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题4个,已知漏洞18个。目前版本分支剩余待修复缺陷11个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6W4KB?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2021-45985
lua
7.5
CVE-2023-24534
golang
7.5
CVE-2023-24536
golang
5.9
CVE-2023-24537
golang
8.1
CVE-2023-24538
golang
5.9
CVE-2023-28840
docker
8.7
CVE-2023-28841
docker
6.8
CVE-2023-28842
docker
6.8
CVE-2023-1801
tcpdump
5.5
CVE-2023-1668
openvswitch
7.1
CVE-2023-2004
freetype
5.3
CVE-2023-27349
bluez
8
CVE-2023-1981
avahi
6.2
CVE-2023-28708
tomcat
4.3
CVE-2022-44370
nasm
7.8
CVE-2022-23527
mod_auth_openidc
6.1
CVE-2023-28625
mod_auth_openidc
7.5
CVE-2023-1393
xorg-x11-server
7.8
Bugfix:
issue
仓库
#I6JCA6:Upgrade to 2.0.3 release [libcgroup: 0.42.2 -> 2.0.3]
libcgroup
#I6X1TN:update_20230419 update to 8.0.28
php
#I6S0T7:例行分析grub2软件包补丁
grub2
#I6LRQH:驱动模块的路径不正确
kae_driver
openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6CBPN
【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
I6VCMC
【20.03 SP1 update 20230329 Train】openstack-nova-priority-feature安装过程中有多余打印,建议优化
openstack-nova
sig-openstack
I6VFV6
[22.03 SP1] [x86/arm] mariadb授权给远程用户,远程连接服务失败
mariadb
DB
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE(4.15日数据):
漏洞编号
Issue ID
剩余天数
CVSS评分
软件包
责任SIG
责任团队
CVE-2021-3923
I6Q365
0.22
2.3
risc-v-kernel
sig-RISC-V
外部
CVE-2023-1625
I6Q3J1
0.42
0.0
openstack-heat
sig-openstack
计算开源开发
CVE-2023-30456
I6U7CT
0.46
7.8
risc-v-kernel
sig-RISC-V
外部
CVE-2023-24538
I6T1GH
1.39
9.8
git-lfs
dev-utils
EulerOS
CVE-2023-1989
I6UW69
2.18
7.0
risc-v-kernel
sig-RISC-V
外部
CVE-2023-1637
I6QEZ5
2.32
5.5
risc-v-kernel
sig-RISC-V
外部
CVE-2023-1992
I6UXDJ
2.42
7.5
wireshark
Application
openEuler
CVE-2023-28866
I6QHVX
2.47
5.3
risc-v-kernel
sig-RISC-V
外部
CVE-2023-28859
I6QRYO
2.94
6.5
redis6
sig-bigdata
外部
CVE-2023-28859
I6QRYL
2.94
6.5
redis5
sig-bigdata
外部
CVE-2023-25661
I6QSNP
3.09
6.5
tensorflow
sig-ai
统信
CVE-2022-37434
I6X8UK
3.47
9.8
openresty-zlib
sig-OpenResty
外部
CVE-2023-24537
I6T1HR
4.39
7.5
git-lfs
dev-utils
EulerOS
CVE-2023-24537
I6T1GM
4.39
7.5
skopeo
sig-CloudNative
EulerOS
CVE-2023-24537
I6T1GA
4.39
7.5
etcd
sig-CloudNative
EulerOS
CVE-2022-44368
I6RHIW
5.41
5.5
nasm
Programming-language
openEuler
CVE-2022-44369
I6RHIP
5.41
5.5
nasm
Programming-language
openEuler
CVE-2023-24607
I6VWA6
5.42
7.8
qt5-qtbase
Programming-language
openEuler
CVE-2023-29132
I6S8GA
8.2
0.0
irssi
Application
openEuler
CVE-2023-24536
I6T1GW
8.39
7.5
git-lfs
dev-utils
EulerOS
CVE-2023-21980
I6WUER
9.21
7.1
mysql
Others
openEuler
CVE-2023-21980
I6WUEI
9.21
7.1
mysql5
DB
计算开源开发
CVE-2023-21912
I6WUFK
9.23
7.5
mysql
Others
openEuler
CVE-2023-21912
I6WUFB
9.23
7.5
mysql5
DB
计算开源开发
CVE-2023-24534
I6T1G0
9.39
7.5
git-lfs
dev-utils
EulerOS
CVE-2022-43551
I6X44E
9.77
7.5
mysql
Others
openEuler
CVE-2023-21930
I6X5R9
9.97
7.4
openjdk-1.8.0
Compiler
编译器
CVE-2023-21930
I6X5R7
9.97
7.4
openjdk-latest
Compiler
编译器
CVE-2023-21930
I6X5R5
9.97
7.4
openjdk-11
Compiler
编译器
CVE-2023-1872
I6V7V1
10.39
7.8
kernel
Kernel
EulerOS
CVE-2023-24534
I6T1HH
11.3
5.9
cri-tools
sig-CloudNative
麒麟
CVE-2023-24536
I6T1GB
11.3
5.9
cri-tools
sig-CloudNative
麒麟
CVE-2023-24537
I6T1G2
11.3
5.9
cri-tools
sig-CloudNative
麒麟
CVE-2023-24538
I6T1HU
11.31
5.9
cri-tools
sig-CloudNative
麒麟
CVE-2023-1859
I6T36G
11.67
0.0
risc-v-kernel
sig-RISC-V
外部
CVE-2023-1855
I6T36D
11.67
6.3
risc-v-kernel
sig-RISC-V
外部
CVE-2023-1855
I6T36A
11.67
6.3
kernel
Kernel
EulerOS
CVE-2023-28842
I6T4R5
11.94
6.8
moby
CVE-2023-28841
I6T4RA
11.95
6.8
moby
CVE-2023-2006
I6VK2H
13.6
7.8
kernel
Kernel
EulerOS
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
沐钰莹(openEuler release SIG)
Mobile: +86 15651995918
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail: muyuying1(a)huawei.com<mailto:muyuying1@huawei.com>
[cid:image002.png@01D95F4C.8C3691C0]Open Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件!
This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it
1
0
Dear all,
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。
本公示分为五部分:
1、openEuler-20.03-LTS-SP1 Update 20230412发布情况及待修复缺陷
2、openEuler-20.03-LTS-SP3 Update 20230412发布情况及待修复缺陷
3、openEuler-22.03-LTS Update 20230412发布情况及待修复缺陷
4、openEuler-22.03-LTS-SP1 Update 20230412发布情况及待修复缺陷
5、openEuler 关键组件待修复CVE 清单
6、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2023/04/16)提供 update_ 20230412 版本。
openEuler-20.03-LTS-SP1 Update 20230412
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题2个,已知漏洞13个。目前版本分支剩余待修复缺陷29个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6U2Y4?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2023-28756
ruby
7.5
CVE-2023-28755
ruby
7.5
CVE-2023-24329
python3
7.5
CVE-2023-28642
runc
6.1
CVE-2023-0922
samba
5.9
CVE-2019-17567
httpd
5.3
CVE-2023-1859
kernel
4.1
CVE-2023-1855
kernel
1
CVE-2023-1838
kernel
1
CVE-2023-1670
kernel
7.8
CVE-2023-1611
kernel
7
CVE-2023-1582
kernel
4.7
CVE-2021-3923
kernel
2.3
Bugfix:
issue
仓库
#I61DOT:【20.03SP1】编译mysql,报错误:‘pthread_cond_clockwait’的实参不依赖模板参数,所以‘pthread_cond_clockwait’的声明必须可用 [-fpermissive]
gcc
#I6TIG1:【openeuler-1.0-LTS】linux-4.19.y lts补丁回合(4.19.273-4.19.279)
kernel
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I281C1
【fuzz】runtime error:
libsass
Base-service
I437CR
[SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错
obs-server
Others
I48GIM
【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I4G4A5
Undefine-shift in _bfd_safe_read_leb128
binutils
Compiler
I4G4B1
Integer overflow in print_vms_time
binutils
Compiler
I4G4VY
memleak in parse_gnu_debugaltlink
binutils
Compiler
I4G4WF
Heap-buffer-overflow in slurp_hppa_unwind_table
binutils
Compiler
I4G4WW
Use-after-free in make_qualified_name
binutils
Compiler
I4G4X6
memleak in byte_get_little_endian
binutils
Compiler
I4G4XF
memleak in process_mips_specific
binutils
Compiler
I4G4Y0
out-of-memory in vms_lib_read_index
binutils
Compiler
I4G4YJ
Heap-buffer-overflow in bfd_getl16
binutils
Compiler
I4G4YV
Floating point exception in _bfd_vms_slurp_etir
binutils
Compiler
I4J0OY
【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常
libdap
sig-recycle
I4JMG4
【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251
python-robotframework
sig-ROS
I4K6ES
stack-buffer-overflow in UINT32_Marshal
libtpms
sig-security-facility
I4K6FU
global-buffer-overflow in Array_Marshal
libtpms
sig-security-facility
I4QV6N
【openEuler-20.03-LTS-SP1】flink命令执行失败
flink
sig-bigdata
I5IG1V
【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败
efl
sig-compat-winapp
I5IG6K
【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5JHX2
【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6CBNA
【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
openEuler-20.03-LTS-SP3 Update 20230412
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问1个,已知漏洞14个。目前版本分支剩余待修复缺陷 9个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6U2Y5?from=project-i…
CVE修复:
需求类型
软件包
优先级
CVE-2023-28755
ruby
7.5
CVE-2023-28756
ruby
7.5
CVE-2023-24329
python3
7.5
CVE-2023-28642
runc
6.1
CVE-2023-0922
samba
5.9
CVE-2019-17567
httpd
5.3
CVE-2023-1370
json-smart
7.5
CVE-2021-3923
kernel
2.3
CVE-2023-1582
kernel
4.7
CVE-2023-1611
kernel
7
CVE-2023-1670
kernel
7.8
CVE-2023-1838
kernel
1
CVE-2023-1855
kernel
1
CVE-2023-1859
kernel
4.1
Bugfix:
issue
仓库
#I6TIG1:【openeuler-1.0-LTS】linux-4.19.y lts补丁回合(4.19.273-4.19.279)
kernel
openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I5IGAS
【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5IGOR
【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败
fluidsynth
Application
I5KXUY
【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I5KY4S
【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功
vdsm
oVirt
I5LYJK
【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常
TCP_option_address
Kernel
I5XDXJ
openeuler:20.03-sp3下lua-lunit0.5和lua5.3不匹配
mugen
sig-QA
I613DI
【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败
openEuler-release
Base-service
I61LEV
【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错
tuna
Others
I6CBL7
【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
openEuler-22.03-LTS Update 20230412
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题0个,已知漏洞9个。目前版本分支剩余待修复缺陷7个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6U2Y6?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2023-28756
ruby
7.5
CVE-2023-28755
ruby
7.5
CVE-2023-24329
python3
7.5
CVE-2023-1370
json-smart
7.5
CVE-2022-4899
zstd
7.5
CVE-2023-0614
libldb
6.5
CVE-2023-0922
samba
5.9
CVE-2023-1582
kernel
4.7
CVE-2022-4744
kernel
7.8
Bugfix:
issue
仓库
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I5JIA6
【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JPII
【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin
ovirt-engine
oVirt
I665SM
resize2fs出现csum不一致
kernel
Kernel
I66KIH
【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败
openstack-ironic-inspector
sig-openstack
I677QX
【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误
opengauss-server
DB
I6CBPQ
【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6O1CK
【22.03 lts udpate 0315 】irb-jruby命令执行报错
jruby
sig-ruby
openEuler-22.03-LTS SP1 Update 20230412
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题2个,已知漏洞9个。目前版本分支剩余待修复缺陷9个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6U2Y3?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2023-1370
json-smart
7.5
CVE-2022-4899
zstd
7.5
CVE-2023-24329
python3
7.5
CVE-2023-0225
samba
5.9
CVE-2023-0922
samba
5.9
CVE-2023-0614
libldb
6.5
CVE-2022-46908
sqlite
9.8
CVE-2023-28755
ruby
7.5
CVE-2023-28756
ruby
7.5
Bugfix:
issue
仓库
#I6TPCU:【22.03-SP1】 回合 openeuler/gala-gopher bugfix 补丁
gala-gopher
#I6U7LG:gssproxy组件服务gssuserproxy.service命令行选项idle-timeout功能未生效
gssproxy
openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6CBPN
【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE(4.15日数据):
漏洞编号
Issue ID
剩余天数
CVSS评分
软件包
责任SIG
责任团队
CVE-2023-26485
I6S7WH
0.21
7.5
cmark
CVE-2023-24824
I6S7WF
0.21
7.5
cmark
CVE-2023-1838
I6T1EZ
3.44
7.1
risc-v-kernel
sig-RISC-V
外部
CVE-2023-24537
I6T1H3
3.56
7.5
butane
CVE-2023-24537
I6T1GZ
3.56
7.5
yaml-cpp03
Base-service
openEuler
CVE-2023-24537
I6T1GV
3.56
7.5
grafana
Application
openEuler
CVE-2023-24537
I6T1GR
3.56
7.5
toolbox
CVE-2023-24537
I6T1GI
3.56
7.5
containernetworking-plugins
sig-CloudNative
openEuler
CVE-2023-24537
I6T1GE
3.56
7.5
buildah
CVE-2023-24537
I6T1G6
3.56
7.5
kubevirt
sig-CloudNative
麒麟
CVE-2023-24537
I6T1FY
3.56
7.5
cri-o
sig-CloudNative
麒麟
CVE-2023-24537
I6T1HV
3.57
7.5
conmon
Others
openEuler
CVE-2023-24537
I6T1HF
3.57
7.5
podman
sig-CloudNative
麒麟
CVE-2023-24537
I6T1HB
3.57
7.5
ignition
CVE-2023-24537
I6T1H7
3.57
7.5
python-odo
sig-python-modules
openEuler
CVE-2022-4900
I6OOSB
4.19
0.0
php
Base-service
麒麟
CVE-2023-28840
I6T4RE
4.21
7.5
moby
CVE-2023-28425
I6OW4W
4.93
5.5
redis5
sig-bigdata
外部
CVE-2023-28425
I6OW46
4.93
5.5
redis
Others
openEuler
CVE-2023-28425
I6OW3K
4.93
5.5
python-redis
Base-service
openEuler
CVE-2023-28425
I6OW2W
4.93
5.5
redis6
sig-bigdata
外部
CVE-2023-1544
I6OZK3
5.06
5.5
qemu
Virt
虚拟化
CVE-2023-28708
I6PBXT
6.1
4.3
tomcat
Application
openEuler
CVE-2023-1583
I6PDF8
6.43
5.5
risc-v-kernel
sig-RISC-V
外部
CVE-2023-23913
I6PDIP
6.6
0.0
rubygem-rails
sig-ruby
openEuler
CVE-2023-1410
I6PLY9
6.97
4.8
grafana
Application
openEuler
CVE-2023-0160
I6PPPN
7.21
0.0
risc-v-kernel
sig-RISC-V
外部
CVE-2023-0870
I6PQ87
7.32
6.7
openstack-horizon
sig-openstack
计算开源开发
CVE-2023-1611
I6PQCU
7.45
6.3
risc-v-kernel
sig-RISC-V
外部
CVE-2021-3923
I6Q365
8.48
2.3
risc-v-kernel
sig-RISC-V
外部
CVE-2023-26916
I6SX7D
8.65
7.5
libyang
sig-high-performance-network
EulerOS
CVE-2023-1625
I6Q3J1
8.68
0.0
openstack-heat
sig-openstack
计算开源开发
CVE-2023-30456
I6U7CT
8.72
7.8
risc-v-kernel
sig-RISC-V
外部
CVE-2023-28840
I6T4RC
8.99
7.5
docker
sig-CloudNative
EulerOS
CVE-2021-45985
I6UFLK
9.01
7.5
lua
Base-service
EulerOS
CVE-2023-1637
I6QEZ5
10.58
5.5
risc-v-kernel
sig-RISC-V
外部
CVE-2023-27593
I6O473
10.65
5.5
cilium
sig-high-performance-network
EulerOS
CVE-2023-28866
I6QHVX
10.73
5.3
risc-v-kernel
sig-RISC-V
外部
CVE-2023-28859
I6QRYO
11.2
6.5
redis6
sig-bigdata
外部
CVE-2023-28859
I6QRYL
11.2
6.5
redis5
sig-bigdata
外部
CVE-2023-28859
I6QRYK
11.2
6.5
redis
Others
openEuler
CVE-2023-28859
I6QRYH
11.2
6.5
python-redis
Base-service
openEuler
CVE-2023-25661
I6QSNP
11.35
6.5
tensorflow
sig-ai
统信
CVE-2023-30456
I6U7AN
12.65
7.8
kernel
Kernel
EulerOS
CVE-2023-24537
I6T1HR
12.65
7.5
git-lfs
dev-utils
EulerOS
CVE-2023-24537
I6T1GM
12.65
7.5
skopeo
sig-CloudNative
EulerOS
CVE-2023-24537
I6T1GA
12.65
7.5
etcd
sig-CloudNative
EulerOS
CVE-2023-28642
I6RGR9
13.33
6.1
runc
sig-CloudNative
EulerOS
CVE-2022-44368
I6RHIW
13.67
5.5
nasm
Programming-language
openEuler
CVE-2022-44369
I6RHIP
13.67
5.5
nasm
Programming-language
openEuler
CVE-2022-39188
I5QVT3
13.81
4.7
kernel
Kernel
EulerOS
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
沐钰莹(openEuler release SIG)
Mobile: +86 15651995918
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail: muyuying1(a)huawei.com<mailto:muyuying1@huawei.com>
[cid:image002.png@01D95F4C.8C3691C0]Open Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件!
This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it
1
0
Dear all,
因上周清明假期,上周的版本(update_20230405)发布时间延期至本周,请谅解。
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。
本公示分为五部分:
1、openEuler-20.03-LTS-SP1 Update 20230405发布情况及待修复缺陷
2、openEuler-20.03-LTS-SP3 Update 20230405发布情况及待修复缺陷
3、openEuler-22.03-LTS Update 20230405发布情况及待修复缺陷
4、openEuler-22.03-LTS-SP1 Update 20230405发布情况及待修复缺陷
5、openEuler 关键组件待修复CVE 清单
6、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2023/04/16)提供 update_ 20230412 版本。
openEuler-20.03-LTS-SP1 Update 20230405
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题1个,已知漏洞15个。目前版本分支剩余待修复缺陷35个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6SC7U?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2023-28487
sudo
5.3
CVE-2023-28486
sudo
5.3
CVE-2023-0466
openssl
5.6
CVE-2023-0465
openssl
5.6
CVE-2023-0464
openssl
7.5
CVE-2023-25180
glib2
6.2
CVE-2023-24593
glib2
6.2
CVE-2023-1370
json-smart
7.5
CVE-2023-1108
undertow
7.5
CVE-2018-16438
hdf5
8.8
CVE-2018-14031
hdf5
8.8
CVE-2023-28772
kernel
7.8
CVE-2023-28328
kernel
5.5
CVE-2023-1513
kernel
7.5
CVE-2023-1380
kernel
6.6
Bugfix:
issue
仓库
#I6SMBI:ext4 buffer部分写可能导致idisk_size大于i_size
kernel
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I281C1
【fuzz】runtime error:
libsass
Base-service
I437CR
[SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错
obs-server
Others
I43OSX
[clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0
clamav
Others
I48GIM
【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I4G4A5
Undefine-shift in _bfd_safe_read_leb128
binutils
Compiler
I4G4B1
Integer overflow in print_vms_time
binutils
Compiler
I4G4VY
memleak in parse_gnu_debugaltlink
binutils
Compiler
I4G4WF
Heap-buffer-overflow in slurp_hppa_unwind_table
binutils
Compiler
I4G4WW
Use-after-free in make_qualified_name
binutils
Compiler
I4G4X6
memleak in byte_get_little_endian
binutils
Compiler
I4G4XF
memleak in process_mips_specific
binutils
Compiler
I4G4Y0
out-of-memory in vms_lib_read_index
binutils
Compiler
I4G4YJ
Heap-buffer-overflow in bfd_getl16
binutils
Compiler
I4G4YV
Floating point exception in _bfd_vms_slurp_etir
binutils
Compiler
I4J0OY
【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常
libdap
sig-recycle
I4JMG4
【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251
python-robotframework
sig-ROS
I4K6ES
stack-buffer-overflow in UINT32_Marshal
libtpms
sig-security-facility
I4K6FU
global-buffer-overflow in Array_Marshal
libtpms
sig-security-facility
I4O16Z
【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息
kernel
Kernel
I4QV6N
【openEuler-20.03-LTS-SP1】flink命令执行失败
flink
sig-bigdata
I5IG1V
【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败
efl
sig-compat-winapp
I5IG6K
【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5JHX2
【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6AZZU
【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped)
gcc
Compiler
I6CBNA
【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6CKZE
【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault
gcc
Compiler
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
I6O19D
【20.03 sp1 udpate 0315 】irb-jruby命令执行报错
jruby
sig-ruby
openEuler-20.03-LTS-SP3 Update 20230405
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问1个,已知漏洞13个。目前版本分支剩余待修复缺陷 12个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6SC7V?from=project-i…
CVE修复:
需求类型
软件包
优先级
CVE-2018-14031
hdf5
8.8
CVE-2018-16438
hdf5
8.8
CVE-2023-28487
sudo
5.3
CVE-2023-28486
sudo
5.3
CVE-2023-28328
kernel
5.5
CVE-2023-1380
kernel
6.6
CVE-2023-1513
kernel
7.5
CVE-2023-0464
openssl
7.5
CVE-2023-0465
openssl
5.6
CVE-2023-0466
openssl
5.6
CVE-2023-25180
glib2
6.2
CVE-2023-24593
glib2
6.2
CVE-2023-1108
undertow
7.5
Bugfix:
issue
仓库
#I6SMBI:ext4 buffer部分写可能导致idisk_size大于i_size
kernel
openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I4QV7S
【openEuler-20.03-LTS-SP3】flink run 命令执行失败
flink
sig-bigdata
I4UMEV
[openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历
kernel
Kernel
I5IGAS
【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5IGOR
【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败
fluidsynth
Application
I5KXUY
【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I5KY4S
【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功
vdsm
oVirt
I5LYJK
【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常
TCP_option_address
Kernel
I5XDXJ
openeuler:20.03-sp3下lua-lunit0.5和lua5.3不匹配
mugen
sig-QA
I613DI
【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败
openEuler-release
Base-service
I61LEV
【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错
tuna
Others
I66BBJ
[20.03-LTS-SP3]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源
openEuler-repos
Base-service
I6CBL7
【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
openEuler-22.03-LTS Update 20230405
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题1个,已知漏洞16个。目前版本分支剩余待修复缺陷8个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6SC7W?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2023-28487
sudo
5.3
CVE-2023-28486
sudo
5.3
CVE-2018-14031
hdf5
8.8
CVE-2018-16438
hdf5
8.8
CVE-2022-29901
kernel
6.5
CVE-2022-4269
kernel
5.5
CVE-2023-28327
kernel
5.5
CVE-2023-28328
kernel
5.5
CVE-2023-1380
kernel
6.6
CVE-2023-1513
kernel
7.5
CVE-2023-0464
openssl
7.5
CVE-2023-0465
openssl
5.6
CVE-2023-0466
openssl
5.6
CVE-2023-25180
glib2
6.2
CVE-2023-24593
glib2
6.2
CVE-2023-1108
undertow
7.5
Bugfix:
issue
仓库
#I6SFHJ:开源主线网络补丁回合
kernel
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
sig
I5JIA6
【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JPII
【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin
ovirt-engine
oVirt
I665SM
resize2fs出现csum不一致
kernel
Kernel
I66BDE
[22.03-LTS]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源
openEuler-repos
Base-service
I66KIH
【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败
openstack-ironic-inspector
sig-openstack
I677QX
【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误
opengauss-server
DB
I6CBPQ
【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6O1CK
【22.03 lts udpate 0315 】irb-jruby命令执行报错
jruby
sig-ruby
openEuler-22.03-LTS SP1 Update 20230405
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题1个,已知漏洞22个。目前版本分支剩余待修复缺陷11个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6SC7T?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2018-14031
hdf5
8.8
CVE-2018-16438
hdf5
8.8
CVE-2023-28487
sudo
5.3
CVE-2023-28486
sudo
5.3
CVE-2023-23004
kernel
5.5
CVE-2023-1249
kernel
5.5
CVE-2023-28327
kernel
5.5
CVE-2023-28328
kernel
5.5
CVE-2023-1380
kernel
6.6
CVE-2023-28466
kernel
7
CVE-2022-48424
kernel
7.8
CVE-2022-48423
kernel
7.8
CVE-2022-48425
kernel
7.8
CVE-2023-1281
kernel
7.8
CVE-2023-25809
runc
5
CVE-2023-0466
openssl
5.6
CVE-2023-0465
openssl
5.6
CVE-2023-24593
glib2
6.2
CVE-2023-25180
glib2
6.2
CVE-2023-0464
openssl
7.5
CVE-2023-1513
kernel
7.5
CVE-2023-1108
undertow
7.5
Bugfix:
issue
仓库
#I6SFHJ:开源主线网络补丁回合
kernel
openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
sig
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6AZZU
【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped)
gcc
Compiler
I6CBPN
【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6CKZE
【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault
gcc
Compiler
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE(4.13日数据):
漏洞编号
Issue ID
剩余天数
CVSS评分
软件包
责任SIG
CVE-2023-1390
I6N7CV
0.49
6.5
risc-v-kernel
sig-RISC-V
CVE-2023-28176
I6N797
0.49
0.0
firefox
Application
CVE-2023-28159
I6N78R
0.49
0.0
firefox
Application
CVE-2023-28161
I6N8CG
0.52
0.0
firefox
Application
CVE-2023-28160
I6N89T
0.52
0.0
firefox
Application
CVE-2023-28164
I6N87J
0.52
6.1
firefox
Application
CVE-2023-28162
I6N860
0.52
0.0
firefox
Application
CVE-2023-28177
I6N8JV
0.53
0.0
firefox
Application
CVE-2023-28163
I6N8EY
0.53
0.0
firefox
Application
CVE-2023-25751
I6N97Z
0.55
0.0
firefox
Application
CVE-2023-25752
I6N96P
0.55
6.1
firefox
Application
CVE-2023-25750
I6N96C
0.55
0.0
firefox
Application
CVE-2023-25748
I6N965
0.55
0.0
firefox
Application
CVE-2023-25749
I6N960
0.55
0.0
firefox
Application
CVE-2023-26485
I6S7WH
2.0
7.5
cmark
CVE-2023-24824
I6S7WF
2.0
7.5
cmark
CVE-2023-27593
I6O473
3.04
5.5
cilium
sig-high-performance-network
CVE-2023-26916
I6SX7D
4.73
7.5
libyang
sig-high-performance-network
CVE-2023-1838
I6T1EZ
5.23
7.1
risc-v-kernel
sig-RISC-V
CVE-2023-24534
I6T1HL
5.36
7.5
golang
sig-golang
CVE-2023-24537
I6T1HJ
5.36
8.1
golang
sig-golang
CVE-2022-4900
I6OOSB
5.98
0.0
php
Base-service
CVE-2023-28840
I6T4RE
6.0
7.5
moby
CVE-2023-28840
I6T4RC
6.0
7.5
docker
sig-CloudNative
CVE-2023-28425
I6OW4W
6.72
5.5
redis5
sig-bigdata
CVE-2023-28425
I6OW46
6.72
5.5
redis
Others
CVE-2023-28425
I6OW3K
6.72
5.5
python-redis
Base-service
CVE-2023-28425
I6OW2W
6.72
5.5
redis6
sig-bigdata
CVE-2023-1544
I6OZK3
6.85
5.5
qemu
Virt
CVE-2023-28708
I6PBXT
7.89
4.3
tomcat
Application
CVE-2023-1583
I6PDF8
8.22
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-23913
I6PDIP
8.39
0.0
rubygem-rails
sig-ruby
CVE-2023-1410
I6PLY9
8.76
4.8
grafana
Application
CVE-2023-0160
I6PPPN
9.0
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-0870
I6PQ87
9.11
6.7
openstack-horizon
sig-openstack
CVE-2023-1611
I6PQCU
9.24
6.3
risc-v-kernel
sig-RISC-V
CVE-2021-3923
I6Q365
10.27
2.3
risc-v-kernel
sig-RISC-V
CVE-2023-1625
I6Q3J1
10.47
0.0
openstack-heat
sig-openstack
CVE-2023-1637
I6QEZ5
12.37
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-28866
I6QHVX
12.52
5.3
risc-v-kernel
sig-RISC-V
CVE-2023-28859
I6QRYO
12.99
6.5
redis6
sig-bigdata
CVE-2023-28859
I6QRYL
12.99
6.5
redis5
sig-bigdata
CVE-2023-28859
I6QRYK
12.99
6.5
redis
Others
CVE-2023-28859
I6QRYH
12.99
6.5
python-redis
Base-service
CVE-2023-25661
I6QSNP
13.14
6.5
tensorflow
sig-ai
CVE-2022-39188
I5QVT3
13.81
4.7
kernel
Kernel
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
沐钰莹(openEuler release SIG)
Mobile: +86 15651995918
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail: muyuying1(a)huawei.com<mailto:muyuying1@huawei.com>
[cid:image002.png@01D95F4C.8C3691C0]Open Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件!
This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it
1
0
Dear all,
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。
本公示分为五部分:
1、openEuler-20.03-LTS-SP1 Update 20230329发布情况及待修复缺陷
2、openEuler-20.03-LTS-SP3 Update 20230329发布情况及待修复缺陷
3、openEuler-22.03-LTS Update 20230329发布情况及待修复缺陷
4、openEuler-22.03-LTS-SP1 Update 20230329发布情况及待修复缺陷
5、openEuler 关键组件待修复CVE 清单
6、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2023/04/09)提供 update_ 20230405 版本。
openEuler-20.03-LTS-SP1 Update 20230329
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题3个,已知漏洞18个。目前版本分支剩余待修复缺陷35个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6QETU?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2020-12762
libfastjson
7.8
CVE-2022-41725
golang
7.5
CVE-2022-41724
golang
7.5
CVE-2022-41723
golang
7.5
CVE-2023-28617
emacs
9.8
CVE-2023-27538
curl
5.8
CVE-2023-27536
curl
5.8
CVE-2023-27535
curl
5.8
CVE-2023-27534
curl
4.5
CVE-2023-27533
curl
4.5
CVE-2023-26769
liblouis
7.5
CVE-2022-36021
redis
5.5
CVE-2023-28466
kernel
7
CVE-2023-1382
kernel
0
CVE-2023-1281
kernel
7.8
CVE-2023-1079
kernel
6.8
CVE-2022-4269
kernel
5.5
CVE-2022-29901
kernel
5.6
Bugfix:
issue
仓库
#I6PS8F:vim9.0版本添加用户配置文件vimrc后Backspace键失效
vim
#I6D0K1:例行分析grub2软件包补丁
grub2
#I6MR1V:【OLK5.10】文件系统长稳环境出现fsck修复后仍有错误
kernel
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I281C1
【fuzz】runtime error:
libsass
Base-service
I437CR
[SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错
obs-server
Others
I43OSX
[clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0
clamav
Others
I48GIM
【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I4G4A5
Undefine-shift in _bfd_safe_read_leb128
binutils
Compiler
I4G4B1
Integer overflow in print_vms_time
binutils
Compiler
I4G4VY
memleak in parse_gnu_debugaltlink
binutils
Compiler
I4G4WF
Heap-buffer-overflow in slurp_hppa_unwind_table
binutils
Compiler
I4G4WW
Use-after-free in make_qualified_name
binutils
Compiler
I4G4X6
memleak in byte_get_little_endian
binutils
Compiler
I4G4XF
memleak in process_mips_specific
binutils
Compiler
I4G4Y0
out-of-memory in vms_lib_read_index
binutils
Compiler
I4G4YJ
Heap-buffer-overflow in bfd_getl16
binutils
Compiler
I4G4YV
Floating point exception in _bfd_vms_slurp_etir
binutils
Compiler
I4J0OY
【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常
libdap
sig-recycle
I4JMG4
【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251
python-robotframework
sig-ROS
I4K6ES
stack-buffer-overflow in UINT32_Marshal
libtpms
sig-security-facility
I4K6FU
global-buffer-overflow in Array_Marshal
libtpms
sig-security-facility
I4O16Z
【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息
kernel
Kernel
I4QV6N
【openEuler-20.03-LTS-SP1】flink命令执行失败
flink
sig-bigdata
I5IG1V
【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败
efl
sig-compat-winapp
I5IG6K
【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5JHX2
【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6AZZU
【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped)
gcc
Compiler
I6CBNA
【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6CKZE
【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault
gcc
Compiler
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
I6O19D
【20.03 sp1 udpate 0315 】irb-jruby命令执行报错
jruby
sig-ruby
openEuler-20.03-LTS-SP3 Update 20230329
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问5个,已知漏洞18个。目前版本分支剩余待修复缺陷 12个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6QETV?from=project-i…
CVE修复:
需求类型
软件包
优先级
CVE-2020-12762
libfastjson
7.8
CVE-2022-41723
golang
7.5
CVE-2022-41724
golang
7.5
CVE-2022-41725
golang
7.5
CVE-2023-28617
emacs
9.8
CVE-2023-27533
curl
4.5
CVE-2023-27534
curl
4.5
CVE-2023-27535
curl
5.8
CVE-2023-27536
curl
5.8
CVE-2023-27538
curl
5.8
CVE-2022-36021
redis
5.5
CVE-2023-26769
liblouis
7.5
CVE-2022-29901
kernel
5.6
CVE-2022-4269
kernel
5.5
CVE-2023-1079
kernel
6.8
CVE-2023-1281
kernel
7.8
CVE-2023-1382
kernel
0
CVE-2023-28466
kernel
7
Bugfix:
issue
仓库
#I6PS8F:vim9.0版本添加用户配置文件vimrc后Backspace键失效
vim
#I6D0K1:例行分析grub2软件包补丁
grub2
#I6KMOJ:grub2支持tpcm3.0特性
grub2
#I6L25L:shim支持可信计算3.0tpcm特性
shim
#I6MR1V:【OLK5.10】文件系统长稳环境出现fsck修复后仍有错误
kernel
openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I4QV7S
【openEuler-20.03-LTS-SP3】flink run 命令执行失败
flink
sig-bigdata
I4UMEV
[openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历
kernel
Kernel
I5IGAS
【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5IGOR
【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败
fluidsynth
Application
I5KXUY
【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I5KY4S
【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功
vdsm
oVirt
I5LYJK
【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常
TCP_option_address
Kernel
I5XDXJ
openeuler:20.03-sp3下lua-lunit0.5和lua5.3不匹配
mugen
sig-QA
I613DI
【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败
openEuler-release
Base-service
I61LEV
【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错
tuna
Others
I66BBJ
[20.03-LTS-SP3]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源
openEuler-repos
Base-service
I6CBL7
【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
openEuler-22.03-LTS Update 20230329
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题22个,已知漏洞5个。目前版本分支剩余待修复缺陷8个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6QETV?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2020-12762
libfastjson
7.8
CVE-2022-41723
golang
7.5
CVE-2022-41724
golang
7.5
CVE-2022-41725
golang
7.5
CVE-2023-28617
emacs
9.8
CVE-2023-27533
curl
4.5
CVE-2023-27534
curl
4.5
CVE-2023-27535
curl
5.8
CVE-2023-27536
curl
5.8
CVE-2023-27538
curl
5.8
CVE-2023-1161
wireshark
7.1
CVE-2022-36021
redis
5.5
CVE-2023-26769
liblouis
7.5
CVE-2022-48423
kernel
7.8
CVE-2022-48424
kernel
7.8
CVE-2022-48425
kernel
7.8
CVE-2023-1079
kernel
6.8
CVE-2023-1249
kernel
4.1
CVE-2023-1281
kernel
7.8
CVE-2023-1382
kernel
0
CVE-2023-22999
kernel
5.5
CVE-2023-28466
kernel
7
Bugfix:
issue
仓库
#I6RD72:upadte20230329【轻量级 PR】:Rebuild for next release
perl-libintl-perl
#I6PS8F:vim9.0版本添加用户配置文件vimrc后Backspace键失效
vim
#I6MTKW:【grub2】grub2-rpm-sort命令执行报错
grub2
#I6RDEF:update20230329 添加sw架构
perftest
#I5N162:【OLK 5.10】修复scsi_end_request并发场景出现ref->data空指针解引用问题
kernel
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
sig
I5JIA6
【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JPII
【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin
ovirt-engine
oVirt
I665SM
resize2fs出现csum不一致
kernel
Kernel
I66BDE
[22.03-LTS]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源
openEuler-repos
Base-service
I66KIH
【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败
openstack-ironic-inspector
sig-openstack
I677QX
【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误
opengauss-server
DB
I6CBPQ
【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6O1CK
【22.03 lts udpate 0315 】irb-jruby命令执行报错
jruby
sig-ruby
openEuler-22.03-LTS SP1 Update 20230329
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题10个,已知漏洞12个。目前版本分支剩余待修复缺陷13个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6QETT?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2020-12762
libfastjson
7.8
CVE-2022-41723
golang
7.5
CVE-2022-41724
golang
7.5
CVE-2022-41725
golang
7.5
CVE-2023-28617
emacs
9.8
CVE-2023-27533
curl
4.5
CVE-2023-27534
curl
4.5
CVE-2023-27535
curl
5.8
CVE-2023-27536
curl
5.8
CVE-2023-27538
curl
5.8
CVE-2023-1161
wireshark
7.1
CVE-2022-36021
redis
5.5
CVE-2023-26769
liblouis
7.5
Bugfix:
issue
仓库
#I6RD72:upadte20230329【轻量级 PR】:Rebuild for next release
perl-libintl-perl
#I6RE2O:update20230329 [Update] Update to v0.4.1
pin-gcc-client
#I64VTB:执行命令报错error -4
papi
#I6RE3L:update20230329 master到openEuler-22.03-LTS-SP1,升级到4.0.2
procps-ng
#I6GCRA:部署好server,client,插入ko,虚拟机重启
dpu-utilities
#I6JPN3:openEuler22.03 sp1,4.0版本procps-ng,开启虚拟机top命令统计不到CPU使用率 st,st占用率一直显示为0
procps-ng
#I6RE77:update20230329 update syscare to 1.0.1
syscare
#I67PXN:fix changelog date error
rsyslog
#I6PS8F:vim9.0版本添加用户配置文件vimrc后Backspace键失效
vim
#I5N162:【OLK 5.10】修复scsi_end_request并发场景出现ref->data空指针解引用问题
kernel
openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
sig
I657VX
【22.03_LTS_SP1_RC2】【x86/arm】deepin-dbus-generator不存在安全的编译选项PIE、STRIP
deepin-dbus-generator
sig-DDE
I657W3
【22.03_LTS_SP1_RC2】【x86/arm】deepin-graphics-driver-manager存在不安全的编译选项STRIP
deepin-graphics-driver-manager
sig-DDE
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6AZZU
【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped)
gcc
Compiler
I6CBPN
【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6CKZE
【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault
gcc
Compiler
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE(3.25日数据):
漏洞编号
Issue ID
剩余天数
CVSS评分
软件包
责任SIG
CVE-2023-25664
I6Q9HZ
0.17
9.8
tensorflow
sig-ai
CVE-2023-27586
I6OW3B
3.0
7.1
python-cairosvg
CVE-2023-0386
I6PBWH
4.17
7.8
risc-v-kernel
sig-RISC-V
CVE-2023-1192
I6KDQD
4.26
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-1194
I6KDP0
4.26
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-1195
I6KDOZ
4.26
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-1193
I6KEWP
4.38
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-0464
I6PDB8
4.42
7.5
openssl
sig-security-facility
CVE-2023-1249
I6KT9F
5.26
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-1249
I6KT9C
5.26
5.5
kernel
Kernel
CVE-2023-28772
I6PRCO
5.75
7.8
kernel
Kernel
CVE-2023-1108
I6KVMO
5.76
0.0
undertow
sig-Java
CVE-2023-27478
I6KWN7
5.8
6.5
libmemcached
Programming-language
CVE-2023-25669
I6Q38F
6.67
7.5
tensorflow
sig-ai
CVE-2023-25670
I6Q38E
6.67
7.5
tensorflow
sig-ai
CVE-2023-25659
I6Q37O
6.67
7.5
tensorflow
sig-ai
CVE-2023-25658
I6Q37N
6.67
7.5
tensorflow
sig-ai
CVE-2023-25673
I6Q9HC
7.16
7.5
tensorflow
sig-ai
CVE-2023-25671
I6Q9HA
7.16
7.5
tensorflow
sig-ai
CVE-2023-25665
I6Q9H7
7.16
7.5
tensorflow
sig-ai
CVE-2023-27579
I6Q9G1
7.16
7.5
tensorflow
sig-ai
CVE-2023-25663
I6Q9IB
7.17
7.5
tensorflow
sig-ai
CVE-2023-25666
I6Q9I8
7.17
7.5
tensorflow
sig-ai
CVE-2023-25667
I6Q9I6
7.17
7.5
tensorflow
sig-ai
CVE-2023-25660
I6Q9I4
7.17
7.5
tensorflow
sig-ai
CVE-2023-25674
I6Q9HW
7.17
7.5
tensorflow
sig-ai
CVE-2023-25662
I6Q9HP
7.17
7.5
tensorflow
sig-ai
CVE-2023-25672
I6Q9HK
7.17
7.5
tensorflow
sig-ai
CVE-2023-1289
I6LKHN
7.38
5.5
ImageMagick
Others
CVE-2011-5034
I6LPRE
7.96
0.0
geronimo-saaj
sig-Java
CVE-2023-1436
I6P70O
11.35
7.5
jettison
dev-utils
CVE-2023-1370
I6MX6A
11.35
7.5
json-smart
sig-Java
CVE-2023-1032
I6MSIY
11.63
0.0
kernel
Kernel
CVE-2023-28176
I6N797
12.77
0.0
firefox
Application
CVE-2023-28159
I6N78R
12.77
0.0
firefox
Application
CVE-2023-1390
I6N7CV
12.78
6.5
risc-v-kernel
sig-RISC-V
CVE-2023-28164
I6N87J
12.8
6.1
firefox
Application
CVE-2023-28162
I6N860
12.8
0.0
firefox
Application
CVE-2023-28177
I6N8JV
12.81
0.0
firefox
Application
CVE-2023-28163
I6N8EY
12.81
0.0
firefox
Application
CVE-2023-28161
I6N8CG
12.81
0.0
firefox
Application
CVE-2023-28160
I6N89T
12.81
0.0
firefox
Application
CVE-2023-25752
I6N96P
12.83
6.1
firefox
Application
CVE-2023-25750
I6N96C
12.83
0.0
firefox
Application
CVE-2023-25748
I6N965
12.83
0.0
firefox
Application
CVE-2023-25749
I6N960
12.83
0.0
firefox
Application
CVE-2023-25751
I6N97Z
12.84
0.0
firefox
Application
CVE-2023-28328
I6NCQH
13.0
0.0
kernel
Kernel
CVE-2023-28327
I6NCP2
13.0
0.0
kernel
Kernel
CVE-2023-1380
I6NCVX
13.01
0.0
kernel
Kernel
CVE-2022-39188
I5QVT3
13.81
4.7
kernel
Kernel
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
沐钰莹(openEuler release SIG)
Mobile: +86 15651995918
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail: muyuying1(a)huawei.com<mailto:muyuying1@huawei.com>
[cid:image002.png@01D95F4C.8C3691C0]Open Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件!
This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it
1
0