Sa-announce
Threads by month
- ----- 2025 -----
- February
- January
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- 1 participants
- 226 discussions
Dear all,
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。
本公示分为五部分:
1、openEuler-20.03-LTS-SP1 Update 20221212发布情况及待修复缺陷
2、openEuler-20.03-LTS-SP3 Update 20221212发布情况及待修复缺陷
3、openEuler-22.03-LTS Update 20221212发布情况及待修复缺陷
4、openEuler 关键组件待修复CVE 清单
5、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2022/12/23)提供 update_20221219版本。
openEuler-20.03-LTS-SP1 Update 20221212
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题5个,已知漏洞6个。目前版本分支剩余待修复缺陷52个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I65OEP?from=project-i…
CVE修复:
CVE
仓库
CVSS评分
CVE-2022-4293
vim
5.5
CVE-2022-4292
vim
7.8
CVE-2022-4129
kernel
5.5
CVE-2022-37454
php
9.8
CVE-2022-23471
containerd
5.7
CVE-2021-25740
kubernetes
3.1
Bugfix:
issue
仓库
#I61DOT:【20.03SP1】编译mysql,报错误:‘pthread_cond_clockwait’的实参不依赖模板参数,所以‘pthread_cond_clockwait’的声明必须可用 [-fpermissive]
gcc
#I6582O:【22.03_LTS_SP1_RC2】【x86/arm】oec-hardware存在不安全的编译选项STRIP
oec-hardware
#I64Y5Y: sharepool中存在double free问题
kernel
#I65HTI:grub2-probe会错误将ext4文件系统识别为minix文件系统
grub2
#I5OY7U:注意spec中changelog撰写规范
groff
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I281C1
【fuzz】runtime error:
libsass
Base-service
I437CR
[SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错
obs-server
Others
I43OSX
[clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0
clamav
Others
I48GIM
【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I490MU
Uncaught exception in get_tokens_unprocessed
python-pygments
Programming-language
I4F8YQ
integer overflow in start_input_bmp
libjpeg-turbo
Desktop
I4F8ZI
heap-buffer-overflow in get_word_rgb_row
libjpeg-turbo
Desktop
I4F903
Unexpect-exit in start_input_tga
libjpeg-turbo
Desktop
I4F913
Timeout in tjDecompress2
libjpeg-turbo
Desktop
I4FRSL
Undefined-shift in bitset_set
augeas
Desktop
I4FT5J
Timeout in fa_from_re
augeas
Desktop
I4FT5U
stack overflow in fa_from_re
augeas
Desktop
I4FT61
stack overflow in re_case_expand
augeas
Desktop
I4FT67
memleaks in ref_make_ref
augeas
Desktop
I4FT6B
SEGV in re_case_expand
augeas
Desktop
I4FT6F
stack overflow in parse_concat_exp
augeas
Desktop
I4FT7B
stack overflow in calc_eclosure_iter
augeas
Desktop
I4FT8E
stack overflow in peek_token
augeas
Desktop
I4FT8P
stack overflow in parse_path_expr
augeas
Desktop
I4FT97
Out of memory in ns_from_locpath
augeas
Desktop
I4FT9A
SEGV in eval_expr
augeas
Desktop
I4FT9C
SEGV in tree_prev
augeas
Desktop
I4FT9G
stack overflow in check_expr
augeas
Desktop
I4FT9I
stack overflow in free_expr
augeas
Desktop
I4G4A5
Undefine-shift in _bfd_safe_read_leb128
binutils
Compiler
I4G4B1
Integer overflow in print_vms_time
binutils
Compiler
I4G4VY
memleak in parse_gnu_debugaltlink
binutils
Compiler
I4G4WF
Heap-buffer-overflow in slurp_hppa_unwind_table
binutils
Compiler
I4G4WW
Use-after-free in make_qualified_name
binutils
Compiler
I4G4X6
memleak in byte_get_little_endian
binutils
Compiler
I4G4XF
memleak in process_mips_specific
binutils
Compiler
I4G4Y0
out-of-memory in vms_lib_read_index
binutils
Compiler
I4G4YJ
Heap-buffer-overflow in bfd_getl16
binutils
Compiler
I4G4YV
Floating point exception in _bfd_vms_slurp_etir
binutils
Compiler
I4G5UN
SEGV in redisvFormatCommand
hiredis
Base-service
I4J0OY
【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常
libdap
sig-recycle
I4JMG4
【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251
python-robotframework
sig-ROS
I4K6ES
stack-buffer-overflow in UINT32_Marshal
libtpms
sig-security-facility
I4K6FU
global-buffer-overflow in Array_Marshal
libtpms
sig-security-facility
I4K6R7
memleak in wrap_nettle_mpi_init
gnutls
sig-security-facility
I4K6UI
Timeout in _asn1_find_up
gnutls
sig-security-facility
I4KT2A
integer overflow in luaV_execute
lua
Base-service
I4KT3D
integer overflow in intarith
lua
Base-service
I4KT3Q
Division by zero in luaV_execute
lua
Base-service
I4KT40
Timeout in luaV_finishget
lua
Base-service
I4O16Z
【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息
kernel
Kernel
I4QV6N
【openEuler-20.03-LTS-SP1】flink命令执行失败
flink
sig-bigdata
I5G81X
【20.03 SP1】selinux-policy卸载异常
selinux-policy
sig-security-facility
I5IG1V
【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败
efl
sig-compat-winapp
I5IG6K
【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5JHX2
【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JNSL
【20.03 SP1 update 20220727】【arm】htcacheclean.service服务启动之后,日志中提示”Can't open PID file /run/httpd/htcacheclean/pid“
httpd
Networking
openEuler-20.03-LTS-SP3 Update 20221212
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问题6个,已知漏洞6个。目前版本分支剩余待修复缺陷16个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I65OEQ?from=project-i…
CVE修复:
需求类型
软件包
CVSS评分
CVE-2022-4293
vim
5.5
CVE-2022-4292
vim
7.8
CVE-2022-4129
kernel
5.5
CVE-2022-37454
php
9.8
CVE-2022-23471
containerd
5.7
CVE-2019-10241
jetty
6.1
Bugfix:
issue
仓库
#I5XUQW:openEuler-20.03-LTS-SP3 rebase from master
openjdk-11
#I5SRS6:ovs 2.12.0-5 存在浮动 IP 短暂不通
openvswitch
#I6582O:【22.03_LTS_SP1_RC2】【x86/arm】oec-hardware存在不安全的编译选项STRIP
oec-hardware
#I64Y5Y: sharepool中存在double free问题
kernel
#I65HTI:grub2-probe会错误将ext4文件系统识别为minix文件系统
grub2
#I5OY7U:注意spec中changelog撰写规范
groff
openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I4QV7S
【openEuler-20.03-LTS-SP3】flink run 命令执行失败
flink
sig-bigdata
I4UMEV
[openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历
kernel
Kernel
I5IGAS
【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5IGOR
【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败
fluidsynth
Application
I5JLNF
【20.03 SP3 update 20220727】【arm/x86】ovirt-websocket-proxy.service服务启动失败
ovirt-engine
oVirt
I5JLRQ
【20.03 SP3 update 20220727】【arm/x86】ovirt-engine-notifier.service服务启动失败
ovirt-engine
oVirt
I5KXUY
【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I5KY4S
【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功
vdsm
oVirt
I5LYJK
【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常
TCP_option_address
Kernel
I5SCLC
【20.03 SP3】selinux-policy卸载异常
selinux-policy
sig-security-facility
I5XDXJ
openeuler:20.03-sp3下lua-lunit0.5和lua5.3不匹配
mugen
sig-QA
I613DI
【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败
openEuler-release
Base-service
I61GMU
【20.03 LTS SP3】【arm/x86】安装tuna,然后执行命令:tuna -l报错:“ModuleNotFoundError: No module named 'gtk'”
tuna
Others
I61HAE
【20.03 LTS SP3】【arm/x86】whois命令执行结果不正常
whois
sig-epol
I61LEV
【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错
tuna
Others
I66BBJ
[20.03-LTS-SP3]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源
openEuler-repos
Base-service
openEuler-22.03-LTS Update 20221212
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题6个,已知漏洞4个。目前版本分支剩余待修复缺陷13个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I65OER?from=project-i…
CVE修复:
CVE
仓库
CVSS评分
CVE-2022-4292
vim
7.8
CVE-2022-4293
vim
5.5
CVE-2022-37454
php
9.8
CVE-2022-23471
containerd
5.7
Bugfix:
issue
仓库
#I6582O:【22.03_LTS_SP1_RC2】【x86/arm】oec-hardware存在不安全的编译选项STRIP
oec-hardware
#I62HDR:分支openEuler-22.03-LTS的spec文件错误
gnutls
#I604JE:【openEuler-22.03-LTS】performance.sh脚本中代码对性能有影响
openEuler-release
#I5M4N4:【22.03 LTS update 20220811】【arm/x86】openstack-ironic-inspector-conductor.service服务start失败
openstack-ironic-inspector
#I5M4KI:【22.03 LTS update 20220811】【arm/x86】openstack-ironic-inspector.service服务start失败
openstack-ironic-inspector
#I665HM:Update to 8u353
openjfx8
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I5G9CY
升级iinstall-scripts包会导致系统启动异常
install-scripts
sig-OS-Builder
I5JIA6
【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JPII
【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin
ovirt-engine
oVirt
I5Q4S3
[22.03-LTS]x86虚拟机卸载qxl模块,机器自动重启
kernel
Kernel
I5QKGT
【22.03LTS_update0907】【arm/x86】kmod-drbd90软件包安装之后文件有缺失
kmod-drbd90
sig-Ha
I61HDB
【22.03 LTS】【arm/x86】whois命令执行结果不正常
whois
sig-epol
I64919
【22.03_LTS_update1130】【arm/x86】xorg-x11-server-Xwayland因缺少依赖导致无法安装
xorg-x11-server-xwayland
Desktop
I65F8M
xd_tcpskinfo -p 端口筛选,部分端口筛选不生效
X-diagnosis
sig-ops
I65GWT
22.03-LTS-SP1部署摘要列表场景失败
digest-list-tools
sig-security-facility
I65M62
memhog、migspeed和numactl部分命令执行失败
numactl
Computing
I665SM
resize2fs出现csum不一致
kernel
Kernel
I66650
xdiag tcphandcheck检查 connect链接失败未有日志打印
X-diagnosis
sig-ops
I66BDE
[22.03-LTS]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源
openEuler-repos
Base-service
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE:
漏洞编号
Issue ID
剩余天数
CVSS评分
SIG
CVE-2022-2993
I65KSQ
0.45
9.8
CVE-2022-43680
I61T8B
1.54
0.0
CVE-2022-46908
I65W6T
3.31
9.8
DB
CVE-2022-3643
I651EB
3.5
10.0
Kernel
CVE-2022-34169
I5HV9H
4.37
7.5
Compiler
CVE-2022-4095
I62AX6
4.91
0.0
sig-RISC-V
CVE-2022-41720
I656KN
5.2
7.5
Programming-language
CVE-2022-3724
I657NJ
5.56
7.5
Application
CVE-2022-23491
I65DF7
5.95
7.5
sig-python-modules
CVE-2022-23476
I65E2X
6.1
7.5
sig-ruby
CVE-2022-41858
I62KQY
6.16
0.0
sig-RISC-V
CVE-2022-4128
I62RO7
7.04
5.5
sig-RISC-V
CVE-2022-4129
I62RO5
7.04
5.5
sig-RISC-V
CVE-2022-4127
I62RNZ
7.04
5.5
sig-RISC-V
CVE-2022-45873
I62ZXR
7.91
5.5
sig-RISC-V
CVE-2022-45888
I635JP
8.79
6.4
sig-RISC-V
CVE-2022-45887
I635JI
8.79
4.7
sig-RISC-V
CVE-2022-4134
I637EU
8.9
0.0
sig-openstack
CVE-2022-4378
I65TQE
9.8
8.4
Kernel
CVE-2022-4133
I63LYV
12.53
0.0
sig-openstack
CVE-2022-4139
I640L4
14.19
0.0
sig-RISC-V
CVE-2022-45414
I640LR
14.31
0.0
sig-desktop-apps
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
车明道(openEuler release SIG)
Mobile: +86 15345431107
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail: chemingdao(a)huawei.com<mailto:chemingdao@huawei.com>
[cid:image003.png@01D9134F.8D4231D0]Open Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件!
This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it
1
0
Dear all,
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。
本公示分为五部分:
1、openEuler-20.03-LTS-SP1 Update 20221205发布情况及待修复缺陷
2、openEuler-20.03-LTS-SP3 Update 20221205发布情况及待修复缺陷
3、openEuler-22.03-LTS Update 20221205发布情况及待修复缺陷
4、openEuler 关键组件待修复CVE 清单
5、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2022/12/16)提供 update_20221212版本。
openEuler-20.03-LTS-SP1 Update 20221205
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题3个,已知漏洞11个。目前版本分支剩余待修复缺陷53个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I64IWR?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2022-45939
emacs
7.8
CVE-2022-45934
kernel
7.8
CVE-2022-41858
kernel
4.7
CVE-2022-4095
kernel
6.3
CVE-2021-25743
kubernetes
3
CVE-2021-33640
libtar
6.2
CVE-2022-4144
qemu
6.5
CVE-2022-4141
vim
7.8
CVE-2022-3591
vim
7.8
CVE-2022-3520
vim
7.8
CVE-2022-3491
vim
9.8
Bugfix:
issue
仓库
#I63MQP:openEuler 4.19内核默认不支持Mellanox CX6网卡<https://gitee.com/open_euler/dashboard?issue_id=I63MQP>
kernel
#I643RV:【2203_SP1_RC1_everything】【arm/x86】samba-client包降级过程中存在异常信息: /usr/lib64/libsmbconf.so.0 不是符号链接<https://gitee.com/open_euler/dashboard?issue_id=I643RV>
samba
#I651K5:virtio硬直通场景,virtio端口初始化过程中前后端状态同步异常,导致初始virtio设备初始化失败<https://gitee.com/open_euler/dashboard?issue_id=I651K5>
dpdk
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I281C1
【fuzz】runtime error:
libsass
Base-service
I437CR
[SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错
obs-server
Others
I43OSX
[clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0
clamav
Others
I48GIM
【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I490MU
Uncaught exception in get_tokens_unprocessed
python-pygments
Programming-language
I4F8YQ
integer overflow in start_input_bmp
libjpeg-turbo
Desktop
I4F8ZI
heap-buffer-overflow in get_word_rgb_row
libjpeg-turbo
Desktop
I4F903
Unexpect-exit in start_input_tga
libjpeg-turbo
Desktop
I4F913
Timeout in tjDecompress2
libjpeg-turbo
Desktop
I4FRSL
Undefined-shift in bitset_set
augeas
Desktop
I4FT5J
Timeout in fa_from_re
augeas
Desktop
I4FT5U
stack overflow in fa_from_re
augeas
Desktop
I4FT61
stack overflow in re_case_expand
augeas
Desktop
I4FT67
memleaks in ref_make_ref
augeas
Desktop
I4FT6B
SEGV in re_case_expand
augeas
Desktop
I4FT6F
stack overflow in parse_concat_exp
augeas
Desktop
I4FT7B
stack overflow in calc_eclosure_iter
augeas
Desktop
I4FT8E
stack overflow in peek_token
augeas
Desktop
I4FT8P
stack overflow in parse_path_expr
augeas
Desktop
I4FT97
Out of memory in ns_from_locpath
augeas
Desktop
I4FT9A
SEGV in eval_expr
augeas
Desktop
I4FT9C
SEGV in tree_prev
augeas
Desktop
I4FT9G
stack overflow in check_expr
augeas
Desktop
I4FT9I
stack overflow in free_expr
augeas
Desktop
I4G4A5
Undefine-shift in _bfd_safe_read_leb128
binutils
Compiler
I4G4B1
Integer overflow in print_vms_time
binutils
Compiler
I4G4VY
memleak in parse_gnu_debugaltlink
binutils
Compiler
I4G4WF
Heap-buffer-overflow in slurp_hppa_unwind_table
binutils
Compiler
I4G4WW
Use-after-free in make_qualified_name
binutils
Compiler
I4G4X6
memleak in byte_get_little_endian
binutils
Compiler
I4G4XF
memleak in process_mips_specific
binutils
Compiler
I4G4Y0
out-of-memory in vms_lib_read_index
binutils
Compiler
I4G4YJ
Heap-buffer-overflow in bfd_getl16
binutils
Compiler
I4G4YV
Floating point exception in _bfd_vms_slurp_etir
binutils
Compiler
I4G5UN
SEGV in redisvFormatCommand
hiredis
Base-service
I4J0OY
【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常
libdap
sig-recycle
I4JMG4
【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251
python-robotframework
sig-ROS
I4K6ES
stack-buffer-overflow in UINT32_Marshal
libtpms
sig-security-facility
I4K6FU
global-buffer-overflow in Array_Marshal
libtpms
sig-security-facility
I4K6R7
memleak in wrap_nettle_mpi_init
gnutls
sig-security-facility
I4K6UI
Timeout in _asn1_find_up
gnutls
sig-security-facility
I4KT2A
integer overflow in luaV_execute
lua
Base-service
I4KT3D
integer overflow in intarith
lua
Base-service
I4KT3Q
Division by zero in luaV_execute
lua
Base-service
I4KT40
Timeout in luaV_finishget
lua
Base-service
I4O16Z
【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息
kernel
Kernel
I4QV6N
【openEuler-20.03-LTS-SP1】flink命令执行失败
flink
sig-bigdata
I5G81X
【20.03 SP1】selinux-policy卸载异常
selinux-policy
sig-security-facility
I5IG1V
【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败
efl
sig-compat-winapp
I5IG6K
【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5JHX2
【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JNSL
【20.03 SP1 update 20220727】【arm】htcacheclean.service服务启动之后,日志中提示”Can't open PID file /run/httpd/htcacheclean/pid“
httpd
Networking
I61DOT
【20.03SP1】编译mysql,报错误:‘pthread_cond_clockwait’的实参不依赖模板参数,所以‘pthread_cond_clockwait’的声明必须可用 [-fpermissive]
gcc
Compiler
openEuler-20.03-LTS-SP3 Update 20221205
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问题5个,已知漏洞11个。目前版本分支剩余待修复缺陷15个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I64IWS?from=project-i…
CVE修复:
需求类型
软件包
优先级
CVE-2022-45939
emacs
7.8
CVE-2022-45934
kernel
7.8
CVE-2022-41858
kernel
4.7
CVE-2022-4144
qemu
6.5
CVE-2022-4141
vim
7.8
CVE-2022-4095
kernel
6.3
CVE-2022-3591
vim
7.8
CVE-2022-3520
vim
7.8
CVE-2022-3491
vim
9.8
CVE-2021-33640
libtar
6.2
CVE-2021-25743
kubernetes
3
Bugfix:
issue
仓库
#I63MQP:openEuler 4.19内核默认不支持Mellanox CX6网卡<https://gitee.com/open_euler/dashboard?issue_id=I63MQP>
kernel
#I643RV:【2203_SP1_RC1_everything】【arm/x86】samba-client包降级过程中存在异常信息: /usr/lib64/libsmbconf.so.0 不是符号链接<https://gitee.com/open_euler/dashboard?issue_id=I643RV>
samba
#I5XUQW:openEuler-20.03-LTS-SP3 rebase from master<https://gitee.com/open_euler/dashboard?issue_id=I5XUQW>
openjdk-11
#I5XG9B:将master代码同步到openEuler20.03-LTS-xx<https://gitee.com/open_euler/dashboard?issue_id=I5XG9B>
openjdk-1.8.0
#I656AA:update_1207Update to jdk-19.0.0.0+36<https://gitee.com/open_euler/dashboard?issue_id=I656AA>
openjdk-latest
openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I4QV7S
【openEuler-20.03-LTS-SP3】flink run 命令执行失败
flink
sig-bigdata
I4RVHE
losetup : 当loop设备编号超过7位时,losetup命令无法操作该设备
util-linux
Base-service
I4UMEV
[openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历
kernel
Kernel
I5IGAS
【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5IGOR
【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败
fluidsynth
Application
I5JLNF
【20.03 SP3 update 20220727】【arm/x86】ovirt-websocket-proxy.service服务启动失败
ovirt-engine
oVirt
I5JLRQ
【20.03 SP3 update 20220727】【arm/x86】ovirt-engine-notifier.service服务启动失败
ovirt-engine
oVirt
I5KXUY
【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I5KY4S
【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功
vdsm
oVirt
I5LYJK
【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常
TCP_option_address
Kernel
I5SCLC
【20.03 SP3】selinux-policy卸载异常
selinux-policy
sig-security-facility
I613DI
【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败
openEuler-release
Base-service
I61GMU
【20.03 LTS SP3】【arm/x86】安装tuna,然后执行命令:tuna -l报错:“ModuleNotFoundError: No module named 'gtk'”
tuna
Others
I61HAE
【20.03 LTS SP3】【arm/x86】whois命令执行结果不正常
whois
sig-epol
I61LEV
【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错
tuna
Others
openEuler-22.03-LTS Update 20221205
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题5个,已知漏洞11个。目前版本分支剩余待修复缺陷8个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I64IWT?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2022-3491
vim
9.8
CVE-2022-3520
vim
7.8
CVE-2022-3591
vim
7.8
CVE-2022-4141
vim
7.8
CVE-2022-4144
qemu
6.5
CVE-2022-4144
qemu
6.5
CVE-2021-33640
libtar
6.2
CVE-2021-25743
kubernetes
3
CVE-2022-4139
kernel
7
CVE-2022-45934
kernel
7.8
CVE-2022-45939
emacs
7.8
Bugfix:
issue
仓库
#I63Q7W:同步上游upstream部分bugfix<https://gitee.com/open_euler/dashboard?issue_id=I63Q7W>
libvirt
#I643RV:【2203_SP1_RC1_everything】【arm/x86】samba-client包降级过程中存在异常信息: /usr/lib64/libsmbconf.so.0 不是符号链接<https://gitee.com/open_euler/dashboard?issue_id=I643RV>
samba
#I6515M:Update to 8u352<https://gitee.com/open_euler/dashboard?issue_id=I6515M>
openjfx8
#I657TC:update-1208 backport fedora kmp 特性<https://gitee.com/open_euler/dashboard?issue_id=I657TC>
openEuler-rpm-config
#I5KAX7:【OLK-5.10】【HNS3】add driver for HNS3 PMU<https://gitee.com/open_euler/dashboard?issue_id=I5KAX7>
kernel
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I5G9CY
升级iinstall-scripts包会导致系统启动异常
install-scripts
sig-OS-Builder
I5JIA6
【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JPII
【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin
ovirt-engine
oVirt
I5Q4S3
[22.03-LTS]x86虚拟机卸载qxl模块,机器自动重启
kernel
Kernel
I5QKGT
【22.03LTS_update0907】【arm/x86】kmod-drbd90软件包安装之后文件有缺失
kmod-drbd90
sig-Ha
I61HDB
【22.03 LTS】【arm/x86】whois命令执行结果不正常
whois
sig-epol
I646O0
[22.03-LTS]authz-0.1-27版本卸载失败
authz
iSulad
I64919
【22.03_LTS_update1130】【arm/x86】xorg-x11-server-Xwayland因缺少依赖导致无法安装
xorg-x11-server-xwayland
Desktop
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE:
漏洞编号
Issue ID
剩余天数
CVSS评分
软件包
CVE-2022-23824
I60EES
0.15
5.5
risc-v-kernel
CVE-2022-3931
I60LIJ
1.28
0.0
ceph
CVE-2022-43515
I64Y51
3.94
9.8
zabbix
CVE-2022-43516
I64Y50
3.94
9.8
zabbix
CVE-2022-3977
I60WOZ
4.15
0.0
risc-v-kernel
CVE-2022-34169
I5HV9H
4.37
7.5
openjdk-1.8.0
CVE-2022-1471
I64742
4.49
9.8
snakeyaml
CVE-2022-3857
I6159P
5.16
0.0
openjdk-11
CVE-2022-33986
I615LJ
5.5
6.4
risc-v-kernel
CVE-2022-45868
I644ZJ
5.79
7.8
h2
CVE-2022-22965
I65D5B
5.9
9.8
canal
CVE-2022-45403
I61D8N
6.15
0.0
thunderbird
CVE-2022-45420
I61D8K
6.15
0.0
thunderbird
CVE-2022-45410
I61D8G
6.15
0.0
thunderbird
CVE-2022-45409
I61D8F
6.15
0.0
thunderbird
CVE-2022-45421
I61D8C
6.15
0.0
thunderbird
CVE-2022-45412
I61D89
6.15
0.0
thunderbird
CVE-2022-45408
I61D88
6.15
0.0
thunderbird
CVE-2022-45406
I61D8T
6.16
0.0
thunderbird
CVE-2022-45418
I61D8S
6.16
0.0
thunderbird
CVE-2022-45405
I61D8P
6.16
0.0
thunderbird
CVE-2022-45404
I61D9O
6.2
0.0
thunderbird
CVE-2022-45416
I61DA3
6.21
0.0
thunderbird
CVE-2022-45411
I61DA2
6.21
0.0
thunderbird
CVE-2022-41325
I647X2
6.44
7.8
vlc
CVE-2022-43680
I61T8B
8.53
0.0
firefoxlibexpat
CVE-2022-4064
I6224N
10.23
3.7
rubygem-dalli
CVE-2022-4292
I64Y53
10.94
7.8
vim
CVE-2022-4095
I62AX6
11.9
0.0
risc-v-kernel
CVE-2022-4095
I62AX2
11.9
6.3
kernel
CVE-2022-41858
I62KQZ
13.15
4.7
kernel
CVE-2022-41858
I62KQY
13.15
0.0
risc-v-kernel
CVE-2022-4128
I62RO7
14.03
5.5
risc-v-kernel
CVE-2022-4129
I62RO5
14.03
5.5
risc-v-kernel
CVE-2022-4127
I62RNZ
14.03
5.5
risc-v-kernel
CVE-2022-4129
I62RNU
14.03
5.5
kernel
CVE-2022-43639
I62S1I
14.28
0.0
rubygem-pdf-reader
CVE-2022-43638
I62S1H
14.28
0.0
rubygem-pdf-reader
CVE-2022-43637
I62S1G
14.28
0.0
rubygem-pdf-reader
CVE-2022-43641
I62S1F
14.28
0.0
rubygem-pdf-reader
CVE-2022-43640
I62S1E
14.28
0.0
rubygem-pdf-reader
CVE-2022-45873
I62ZXR
14.9
5.5
NutShell-systemd
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
车明道(openEuler release SIG)
Mobile: +86 15345431107
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail: chemingdao(a)huawei.com<mailto:chemingdao@huawei.com>
[cid:image003.png@01D90C0A.DF2C29C0]Open Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件!
This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it
1
0
Dear all,
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。
本公示分为五部分:
1、openEuler-20.03-LTS-SP1 Update 20221128发布情况及待修复缺陷
2、openEuler-20.03-LTS-SP3 Update 20221128发布情况及待修复缺陷
3、openEuler-22.03-LTS Update 20221128发布情况及待修复缺陷
4、openEuler 关键组件待修复CVE 清单
5、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2022/12/09)提供 update_20221205版本。
openEuler-20.03-LTS-SP1 Update 20221128
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题1个,已知漏洞3个。目前版本分支剩余待修复缺陷53个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I63D1R?from=project-i…
CVE修复:
CVE
仓库
CVSS评分
CVE-2022-42898
samba
6.4
CVE-2022-36227
libarchive
9.8
CVE-2021-38578
edk2
9.8
Bugfix:
issue
仓库
#I5U037:[openEuler 20.03-LTS SP1][x86] 时钟源切换到acpi_pm导致机器卡顿,无法切回tsc
kernel
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I281C1
【fuzz】runtime error:
libsass
Base-service
I437CR
[SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错
obs-server
Others
I43OSX
[clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0
clamav
Others
I48GIM
【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I490MU
Uncaught exception in get_tokens_unprocessed
python-pygments
Programming-language
I4F8YQ
integer overflow in start_input_bmp
libjpeg-turbo
Desktop
I4F8ZI
heap-buffer-overflow in get_word_rgb_row
libjpeg-turbo
Desktop
I4F903
Unexpect-exit in start_input_tga
libjpeg-turbo
Desktop
I4F913
Timeout in tjDecompress2
libjpeg-turbo
Desktop
I4FRSL
Undefined-shift in bitset_set
augeas
Desktop
I4FT5J
Timeout in fa_from_re
augeas
Desktop
I4FT5U
stack overflow in fa_from_re
augeas
Desktop
I4FT61
stack overflow in re_case_expand
augeas
Desktop
I4FT67
memleaks in ref_make_ref
augeas
Desktop
I4FT6B
SEGV in re_case_expand
augeas
Desktop
I4FT6F
stack overflow in parse_concat_exp
augeas
Desktop
I4FT7B
stack overflow in calc_eclosure_iter
augeas
Desktop
I4FT8E
stack overflow in peek_token
augeas
Desktop
I4FT8P
stack overflow in parse_path_expr
augeas
Desktop
I4FT97
Out of memory in ns_from_locpath
augeas
Desktop
I4FT9A
SEGV in eval_expr
augeas
Desktop
I4FT9C
SEGV in tree_prev
augeas
Desktop
I4FT9G
stack overflow in check_expr
augeas
Desktop
I4FT9I
stack overflow in free_expr
augeas
Desktop
I4G4A5
Undefine-shift in _bfd_safe_read_leb128
binutils
Compiler
I4G4B1
Integer overflow in print_vms_time
binutils
Compiler
I4G4VY
memleak in parse_gnu_debugaltlink
binutils
Compiler
I4G4WF
Heap-buffer-overflow in slurp_hppa_unwind_table
binutils
Compiler
I4G4WW
Use-after-free in make_qualified_name
binutils
Compiler
I4G4X6
memleak in byte_get_little_endian
binutils
Compiler
I4G4XF
memleak in process_mips_specific
binutils
Compiler
I4G4Y0
out-of-memory in vms_lib_read_index
binutils
Compiler
I4G4YJ
Heap-buffer-overflow in bfd_getl16
binutils
Compiler
I4G4YV
Floating point exception in _bfd_vms_slurp_etir
binutils
Compiler
I4G5UN
SEGV in redisvFormatCommand
hiredis
Base-service
I4J0OY
【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常
libdap
sig-recycle
I4JMG4
【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251
python-robotframework
sig-ROS
I4K6ES
stack-buffer-overflow in UINT32_Marshal
libtpms
sig-security-facility
I4K6FU
global-buffer-overflow in Array_Marshal
libtpms
sig-security-facility
I4K6R7
memleak in wrap_nettle_mpi_init
gnutls
sig-security-facility
I4K6UI
Timeout in _asn1_find_up
gnutls
sig-security-facility
I4KT2A
integer overflow in luaV_execute
lua
Base-service
I4KT3D
integer overflow in intarith
lua
Base-service
I4KT3Q
Division by zero in luaV_execute
lua
Base-service
I4KT40
Timeout in luaV_finishget
lua
Base-service
I4O16Z
【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息
kernel
Kernel
I4QV6N
【openEuler-20.03-LTS-SP1】flink命令执行失败
flink
sig-bigdata
I5G81X
【20.03 SP1】selinux-policy卸载异常
selinux-policy
sig-security-facility
I5IG1V
【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败
efl
sig-compat-winapp
I5IG6K
【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5JHX2
【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JNSL
【20.03 SP1 update 20220727】【arm】htcacheclean.service服务启动之后,日志中提示”Can't open PID file /run/httpd/htcacheclean/pid“
httpd
Networking
I61DOT
【20.03SP1】编译mysql,报错误:‘pthread_cond_clockwait’的实参不依赖模板参数,所以‘pthread_cond_clockwait’的声明必须可用 [-fpermissive]
gcc
Compiler
openEuler-20.03-LTS-SP3 Update 20221128
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问题1个,已知漏洞3个。目前版本分支剩余待修复缺陷16个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I63D1S?from=project-i…
CVE修复:
需求类型
软件包
CVSS评分
CVE-2022-42898
samba
6.4
CVE-2021-38578
edk2
9.8
CVE-2022-36227
libarchive
9.8
Bugfix:
issue
仓库
#I5U037:[openEuler 20.03-LTS SP1][x86] 时钟源切换到acpi_pm导致机器卡顿,无法切回tsc
kernel
openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I4QV7S
【openEuler-20.03-LTS-SP3】flink run 命令执行失败
flink
sig-bigdata
I4RVHE
losetup : 当loop设备编号超过7位时,losetup命令无法操作该设备
util-linux
Base-service
I4UMEV
[openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历
kernel
Kernel
I5IGAS
【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5IGOR
【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败
fluidsynth
Application
I5JLNF
【20.03 SP3 update 20220727】【arm/x86】ovirt-websocket-proxy.service服务启动失败
ovirt-engine
oVirt
I5JLRQ
【20.03 SP3 update 20220727】【arm/x86】ovirt-engine-notifier.service服务启动失败
ovirt-engine
oVirt
I5KXUY
【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I5KY4S
【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功
vdsm
oVirt
I5LYJK
【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常
TCP_option_address
Kernel
I5PUIA
[20.03-LTS-SP3]spec文件存在软件包编译依赖自身,且打包包含系统环境文件
qrencode
Desktop
I5SCLC
【20.03 SP3】selinux-policy卸载异常
selinux-policy
sig-security-facility
I613DI
【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败
openEuler-release
Base-service
I61GMU
【20.03 LTS SP3】【arm/x86】安装tuna,然后执行命令:tuna -l报错:“ModuleNotFoundError: No module named 'gtk'”
tuna
Others
I61HAE
【20.03 LTS SP3】【arm/x86】whois命令执行结果不正常
whois
sig-epol
I61LEV
【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错
tuna
Others
openEuler-22.03-LTS Update 20221128
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题6个,已知漏洞4个。目前版本分支剩余待修复缺陷7个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I63D1T?from=project-i…
CVE修复:
CVE
仓库
CVSS评分
CVE-2022-42898
samba
6.4
CVE-2022-36227
libarchive
9.8
CVE-2021-38578
edk2
9.8
CVE-2022-0670
ceph
9.1
Bugfix:
issue
仓库
#I63A8B:【22.03 SP1 round1 arm/x86】libnetfilter_conntrack缺少编译依赖make
libnetfilter_conntrack
#I60J5L:supermin: failure: ext2fs_namei: parent directory not found
supermin
#I63KR6:对openEuler硬编码进行整改
systemd
#I50VNC:【22.03-RC7】【arm/x86】docbook5-style-xsl升级时有告警信息
docbook5-style-xsl
#I60MON:supermin: could not detect package manager used by this system or distro.<https://gitee.com/open_euler/dashboard?issue_id=I60MON>
supermin
#I619TB:libguestfs: error: appliance closed the connection unexpectedly, see earlier error messages<https://gitee.com/open_euler/dashboard?issue_id=I619TB>
libguestfs
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I5G9CY
升级iinstall-scripts包会导致系统启动异常
install-scripts
sig-OS-Builder
I5JIA6
【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JPII
【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin
ovirt-engine
oVirt
I5Q4S3
[22.03-LTS]x86虚拟机卸载qxl模块,机器自动重启
kernel
Kernel
I5QKGT
【22.03LTS_update0907】【arm/x86】kmod-drbd90软件包安装之后文件有缺失
kmod-drbd90
sig-Ha
I61HDB
【22.03 LTS】【arm/x86】whois命令执行结果不正常
whois
sig-epol
I61LBD
【22.03 LTS】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错
tuna
Others
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE:
漏洞编号
Issue ID
剩余天数
CVSS评分
软件包
SIG
CVE-2022-36077
I6064I
3.92
6.1
pcs
sig-Ha
CVE-2022-44789
I63156
4.07
7.8
mujs
Desktop
CVE-2022-3903
I6068Y
4.16
4.6
risc-v-kernel
sig-RISC-V
CVE-2022-34169
I5HV9H
4.37
7.5
openjdk-1.8.0
Compiler
CVE-2022-45885
I635KE
4.54
7.0
risc-v-kernel
sig-RISC-V
CVE-2022-45884
I635K9
4.54
7.0
risc-v-kernel
sig-RISC-V
CVE-2022-45886
I635JD
4.54
7.0
kernel
Kernel
CVE-2022-45885
I635IQ
4.54
7.0
kernel
Kernel
CVE-2022-45884
I635IG
4.54
7.0
kernel
Kernel
CVE-2022-45886
I635HJ
4.54
7.0
risc-v-kernel
sig-RISC-V
CVE-2022-23824
I60EES
4.91
5.5
risc-v-kernel
sig-RISC-V
CVE-2022-23824
I60EEP
4.91
5.5
kernel
Kernel
CVE-2022-3931
I60LIJ
6.04
0.0
ceph
sig-ceph
CVE-2022-3162
I60NSN
6.42
0.0
kubernetes
sig-CloudNative
CVE-2022-3294
I60NS7
6.42
0.0
kubernetes
sig-CloudNative
CVE-2022-45934
I63D3E
7.15
7.8
kernel
Kernel
CVE-2022-45919
I63D3C
7.15
7.0
kernel
Kernel
CVE-2022-45442
I63LLA
8.25
8.8
rubygem-sinatra
sig-ruby
CVE-2022-3977
I60WOZ
8.91
0.0
risc-v-kernel
sig-RISC-V
CVE-2022-4193
I63TAC
9.23
8.8
chromium
Application
CVE-2022-4194
I63TA9
9.23
8.8
chromium
Application
CVE-2022-4174
I63TA5
9.23
8.8
chromium
Application
CVE-2022-4176
I63TA0
9.23
8.8
chromium
Application
CVE-2022-4192
I63T9W
9.23
8.8
chromium
Application
CVE-2022-4180
I63T9V
9.23
8.8
chromium
Application
CVE-2022-4181
I63T9S
9.23
8.8
chromium
Application
CVE-2022-4191
I63T9R
9.23
8.8
chromium
Application
CVE-2022-4190
I63T9Q
9.23
8.8
chromium
Application
CVE-2022-4175
I63T9L
9.23
8.8
chromium
Application
CVE-2022-4178
I63T9H
9.23
8.8
chromium
Application
CVE-2022-4177
I63TAQ
9.24
8.8
chromium
Application
CVE-2022-4179
I63TAM
9.24
8.8
chromium
Application
CVE-2022-46146
I63UIM
9.32
8.8
grafana
Application
CVE-2022-3857
I6159P
9.92
0.0
openjdk-11
Compiler
CVE-2022-33986
I615LJ
10.26
6.4
risc-v-kernel
sig-RISC-V
CVE-2022-45868
I644ZJ
10.55
7.8
h2
DB
CVE-2022-45420
I61D8K
10.91
0.0
thunderbird
sig-desktop-apps
CVE-2022-45410
I61D8G
10.91
0.0
thunderbird
sig-desktop-apps
CVE-2022-45409
I61D8F
10.91
0.0
thunderbird
sig-desktop-apps
CVE-2022-45421
I61D8C
10.91
0.0
thunderbird
sig-desktop-apps
CVE-2022-45412
I61D89
10.91
0.0
thunderbird
sig-desktop-apps
CVE-2022-45408
I61D88
10.91
0.0
thunderbird
sig-desktop-apps
CVE-2022-45406
I61D8T
10.92
0.0
thunderbird
sig-desktop-apps
CVE-2022-45418
I61D8S
10.92
0.0
thunderbird
sig-desktop-apps
CVE-2022-45405
I61D8P
10.92
0.0
thunderbird
sig-desktop-apps
CVE-2022-42898
I61D8O
10.92
0.0
krb5
Base-service
CVE-2022-45403
I61D8N
10.92
0.0
thunderbird
sig-desktop-apps
CVE-2022-45404
I61D9O
10.96
0.0
thunderbird
sig-desktop-apps
CVE-2022-45416
I61DA3
10.97
0.0
thunderbird
sig-desktop-apps
CVE-2022-45411
I61DA2
10.97
0.0
thunderbird
sig-desktop-apps
CVE-2022-43680
I61T8B
13.29
0.0
firefoxlibexpat
CVE-2022-41902
I61ZQI
14.04
0.0
tensorflow
sig-ai
CVE-2022-41910
I61ZQB
14.04
0.0
tensorflow
sig-ai
CVE-2022-4064
I6224N
14.99
3.7
rubygem-dalli
sig-ruby
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
车明道(openEuler release SIG)
Mobile: +86 15345431107
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail: chemingdao(a)huawei.com<mailto:chemingdao@huawei.com>
[cid:image002.png@01D90853.5660C2F0]Open Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件!
This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it
1
0
Dear all,
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。
本公示分为五部分:
1、openEuler-20.03-LTS-SP1 Update 20221121发布情况及待修复缺陷
2、openEuler-20.03-LTS-SP3 Update 20221121发布情况及待修复缺陷
3、openEuler-22.03-LTS Update 20221121发布情况及待修复缺陷
4、openEuler 关键组件待修复CVE 清单
5、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2022/12/02)提供 update_20221128版本。
openEuler-20.03-LTS-SP1 Update 20221121
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题2个,已知漏洞15个。目前版本分支剩余待修复缺陷61个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I623QT?from=project-i…
CVE修复:
CVE
仓库
CVSS评分
CVE-2022-42896
kernel
7.6
CVE-2022-42895
kernel
6.3
CVE-2022-41716
golang
7.5
CVE-2022-3775
grub2
6.3
CVE-2022-2601
grub2
6.4
CVE-2022-45047
apache-sshd
9.8
CVE-2022-43548
nodejs
7.5
CVE-2022-41877
freerdp
9.1
CVE-2022-39347
freerdp
7.5
CVE-2022-39319
freerdp
9.1
CVE-2022-39318
freerdp
7.5
CVE-2022-39316
freerdp
7.5
CVE-2022-3553
xorg-x11-server
7.5
CVE-2022-3551
xorg-x11-server
7.5
CVE-2022-45199
python-pillow
7.5
Bugfix:
issue
仓库
#I61UGX:libdnet: add Obsoletes "< version" in spec
libdnet
#I61RA3:[OLK 5.10] driver/char/svm.c 删除冗余接口
kernel
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I281C1
【fuzz】runtime error:
libsass
Base-service
I437CR
[SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错
obs-server
Others
I43OSX
[clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0
clamav
Others
I48GIM
【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I490MU
Uncaught exception in get_tokens_unprocessed
python-pygments
Programming-language
I4F8YQ
integer overflow in start_input_bmp
libjpeg-turbo
Desktop
I4F8ZI
heap-buffer-overflow in get_word_rgb_row
libjpeg-turbo
Desktop
I4F903
Unexpect-exit in start_input_tga
libjpeg-turbo
Desktop
I4F913
Timeout in tjDecompress2
libjpeg-turbo
Desktop
I4FRSL
Undefined-shift in bitset_set
augeas
Desktop
I4FT5J
Timeout in fa_from_re
augeas
Desktop
I4FT5U
stack overflow in fa_from_re
augeas
Desktop
I4FT61
stack overflow in re_case_expand
augeas
Desktop
I4FT67
memleaks in ref_make_ref
augeas
Desktop
I4FT6B
SEGV in re_case_expand
augeas
Desktop
I4FT6F
stack overflow in parse_concat_exp
augeas
Desktop
I4FT7B
stack overflow in calc_eclosure_iter
augeas
Desktop
I4FT8E
stack overflow in peek_token
augeas
Desktop
I4FT8P
stack overflow in parse_path_expr
augeas
Desktop
I4FT97
Out of memory in ns_from_locpath
augeas
Desktop
I4FT9A
SEGV in eval_expr
augeas
Desktop
I4FT9C
SEGV in tree_prev
augeas
Desktop
I4FT9G
stack overflow in check_expr
augeas
Desktop
I4FT9I
stack overflow in free_expr
augeas
Desktop
I4G4A5
Undefine-shift in _bfd_safe_read_leb128
binutils
Compiler
I4G4B1
Integer overflow in print_vms_time
binutils
Compiler
I4G4VY
memleak in parse_gnu_debugaltlink
binutils
Compiler
I4G4WF
Heap-buffer-overflow in slurp_hppa_unwind_table
binutils
Compiler
I4G4WW
Use-after-free in make_qualified_name
binutils
Compiler
I4G4X6
memleak in byte_get_little_endian
binutils
Compiler
I4G4XF
memleak in process_mips_specific
binutils
Compiler
I4G4Y0
out-of-memory in vms_lib_read_index
binutils
Compiler
I4G4YJ
Heap-buffer-overflow in bfd_getl16
binutils
Compiler
I4G4YV
Floating point exception in _bfd_vms_slurp_etir
binutils
Compiler
I4G5UN
SEGV in redisvFormatCommand
hiredis
Base-service
I4J0OY
【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常
libdap
sig-recycle
I4JMG4
【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251
python-robotframework
sig-ROS
I4K6ES
stack-buffer-overflow in UINT32_Marshal
libtpms
sig-security-facility
I4K6FU
global-buffer-overflow in Array_Marshal
libtpms
sig-security-facility
I4K6R7
memleak in wrap_nettle_mpi_init
gnutls
sig-security-facility
I4K6UI
Timeout in _asn1_find_up
gnutls
sig-security-facility
I4KT2A
integer overflow in luaV_execute
lua
Base-service
I4KT3D
integer overflow in intarith
lua
Base-service
I4KT3Q
Division by zero in luaV_execute
lua
Base-service
I4KT40
Timeout in luaV_finishget
lua
Base-service
I4O16Z
【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息
kernel
Kernel
I4QV6N
【openEuler-20.03-LTS-SP1】flink命令执行失败
flink
sig-bigdata
I5G81X
【20.03 SP1】selinux-policy卸载异常
selinux-policy
sig-security-facility
I5IG1V
【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败
efl
sig-compat-winapp
I5IG6K
【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5JHX2
【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JNSL
【20.03 SP1 update 20220727】【arm】htcacheclean.service服务启动之后,日志中提示”Can't open PID file /run/httpd/htcacheclean/pid“
httpd
Networking
I61DOT
【20.03SP1】编译mysql,报错误:‘pthread_cond_clockwait’的实参不依赖模板参数,所以‘pthread_cond_clockwait’的声明必须可用 [-fpermissive]
gcc
Compiler
I61FG7
【22.03-LTS-SP1】gala-anteater缺少配置文件说明
gala-anteater
sig-ops
I61P1U
【22.03-LTS-SP1】gala-gopher启动后,日志中出现异常打印
gala-gopher
sig-ops
I61UMW
【22.03-LTS-SP1】gala-anteater检测sli-rtt模块,结果误差较大
gala-anteater
sig-ops
I620XV
【22.03-LTS-SP1】gala-anteater运行后出现异常日志
gala-anteater
sig-ops
I62BFZ
【22.03-LTS-SP1】故障检测过程中,停止openGauss服务端,gala-gopher日志出现traceback
gala-gopher
sig-ops
I62EDJ
【22.03-LTS-SP1】部署OpenGauss业务,手动执行pgsliprobe探针,探针启动成功后直接退出
gala-gopher
sig-ops
I62KFD
【22.03-LTS-SP1】gala-gopher 文档中“容器镜像安装运行”章节描述补充镜像归档路径以及执行配置
gala-gopher
sig-ops
I62KFS
【22.03-LTS-SP1】gala-gopher补充iproute依赖
gala-gopher
sig-ops
openEuler-20.03-LTS-SP3 Update 20221121
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问题4个,已知漏洞15个。目前版本分支剩余待修复缺陷16个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I623QU?from=project-i…
CVE修复:
需求类型
软件包
CVSS评分
CVE-2022-42896
kernel
7.6
CVE-2022-42895
kernel
6.3
CVE-2022-41716
golang
7.5
CVE-2022-3775
grub2
6.3
CVE-2022-2601
grub2
6.4
CVE-2022-45047
apache-sshd
9.8
CVE-2022-43548
nodejs
7.5
CVE-2022-41877
freerdp
9.1
CVE-2022-39347
freerdp
7.5
CVE-2022-39319
freerdp
9.1
CVE-2022-39318
freerdp
7.5
CVE-2022-39316
freerdp
7.5
CVE-2022-3553
xorg-x11-server
7.5
CVE-2022-3551
xorg-x11-server
7.5
CVE-2022-45199
python-pillow
7.5
Bugfix:
issue
仓库
#I61UGX:libdnet: add Obsoletes "< version" in spec
libdnet
#I61RA3:[OLK 5.10] driver/char/svm.c 删除冗余接口
kernel
#I62M7V:代码没有发布到源上
logrotate
#I62RD5:1123update formal release qla2xxx 10.02.08.01-k
qla2xxx
openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I4QV7S
【openEuler-20.03-LTS-SP3】flink run 命令执行失败
flink
sig-bigdata
I4RVHE
losetup : 当loop设备编号超过7位时,losetup命令无法操作该设备
util-linux
Base-service
I4UMEV
[openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历
kernel
Kernel
I5IGAS
【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5IGOR
【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败
fluidsynth
Application
I5JLNF
【20.03 SP3 update 20220727】【arm/x86】ovirt-websocket-proxy.service服务启动失败
ovirt-engine
oVirt
I5JLRQ
【20.03 SP3 update 20220727】【arm/x86】ovirt-engine-notifier.service服务启动失败
ovirt-engine
oVirt
I5KXUY
【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I5KY4S
【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功
vdsm
oVirt
I5LYJK
【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常
TCP_option_address
Kernel
I5PUIA
[20.03-LTS-SP3]spec文件存在软件包编译依赖自身,且打包包含系统环境文件
qrencode
Desktop
I5SCLC
【20.03 SP3】selinux-policy卸载异常
selinux-policy
sig-security-facility
I613DI
【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败
openEuler-release
Base-service
I61GMU
【20.03 LTS SP3】【arm/x86】安装tuna,然后执行命令:tuna -l报错:“ModuleNotFoundError: No module named 'gtk'”
tuna
Others
I61HAE
【20.03 LTS SP3】【arm/x86】whois命令执行结果不正常
whois
sig-epol
I61LEV
【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错
tuna
Others
openEuler-22.03-LTS Update 20221121
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题6个,已知漏洞18个。目前版本分支剩余待修复缺陷10个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I623QV?from=project-i…
CVE修复:
CVE
仓库
CVSS评分
CVE-2022-42895
kernel
6.3
CVE-2022-42896
kernel
7.6
CVE-2022-2601
grub2
6.4
CVE-2022-3775
grub2
6.3
CVE-2022-41716
golang
7.5
CVE-2022-31212
dbus-broker
7.5
CVE-2022-31213
dbus-broker
7.5
CVE-2022-45060
varnish
7.5
CVE-2022-43548
nodejs
7.5
CVE-2022-39316
freerdp
7.5
CVE-2022-39318
freerdp
7.5
CVE-2022-39319
freerdp
9.1
CVE-2022-39347
freerdp
7.5
CVE-2022-41877
freerdp
9.1
CVE-2022-45047
apache-sshd
9.8
CVE-2022-3551
xorg-x11-server
7.5
CVE-2022-3553
xorg-x11-server
7.5
CVE-2022-45199
python-pillow
7.5
Bugfix:
issue
仓库
#I61UGX:libdnet: add Obsoletes "< version" in spec
libdnet
#I62A5G:22.03-LTS分支安装未依赖0.27.5版本exiv2
libgexiv2
#I5B13B: rpm重复提供文件问题分析排查
sssd
#I62RD5:1123update formal release qla2xxx 10.02.08.01-k
qla2xxx
#I61RA3:[OLK 5.10] driver/char/svm.c 删除冗余接口
kernel
#I62SFP:1123update 添加sw架构
openssl
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I5G9CY
升级iinstall-scripts包会导致系统启动异常
install-scripts
sig-OS-Builder
I5JIA6
【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JPII
【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin
ovirt-engine
oVirt
I5LKM6
libxshmfence build problem in openEuler:22.03:LTS
libxshmfence
Desktop
I5Q4S3
[22.03-LTS]x86虚拟机卸载qxl模块,机器自动重启
kernel
Kernel
I5QKGT
【22.03LTS_update0907】【arm/x86】kmod-drbd90软件包安装之后文件有缺失
kmod-drbd90
sig-Ha
I5RHYO
【22.09 RC4】【arm/x86】package.ini中的redis_host配置为不存在的ip,重启pkgship服务失败,服务一直在尝试重启
pkgship
sig-EasyLife
I5TMFF
[22.03-LTS]先安装mysql-server,卸载后再安装mariadb-server,mariadb服务启动失败
mariadb
DB
I61HDB
【22.03 LTS】【arm/x86】whois命令执行结果不正常
whois
sig-epol
I61LBD
【22.03 LTS】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错
tuna
Others
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE:
漏洞编号
Issue ID
剩余天数
CVSS评分
软件包
SIG
CVE-2022-3964
I60VYP
0.86
8.1
ffmpeg
sig-DDE
CVE-2022-3965
I60VYN
0.86
8.1
ffmpeg
sig-DDE
CVE-2022-21271
I5YNUZ
3.93
5.3
openjdk-11
Compiler
CVE-2022-21271
I5YNUP
3.93
5.3
openjdk-1.8.0
Compiler
CVE-2022-34169
I5HV9H
4.37
7.5
openjdk-1.8.0
Compiler
CVE-2022-21496
I5Z0L9
5.68
5.3
openjdk-1.8.0
Compiler
CVE-2022-21426
I5Z0KW
5.68
5.3
openjdk-1.8.0
Compiler
CVE-2022-3821
I5Z4ZW
5.95
5.5
NutShell-systemd
sig-RISC-V
CVE-2022-41887
I61ZQJ
6.32
7.5
tensorflow
sig-ai
CVE-2022-41896
I61ZQH
6.32
7.5
tensorflow
sig-ai
CVE-2022-41889
I61ZQG
6.32
7.5
tensorflow
sig-ai
CVE-2022-41899
I61ZQE
6.32
7.5
tensorflow
sig-ai
CVE-2022-41895
I61ZQD
6.32
7.5
tensorflow
sig-ai
CVE-2022-41890
I61ZQC
6.32
7.5
tensorflow
sig-ai
CVE-2022-41886
I61ZQA
6.32
7.5
tensorflow
sig-ai
CVE-2022-41898
I61ZQ9
6.32
7.5
tensorflow
sig-ai
CVE-2022-41893
I61ZQ8
6.32
7.5
tensorflow
sig-ai
CVE-2022-41884
I61ZQW
6.33
7.5
tensorflow
sig-ai
CVE-2022-41888
I61ZQU
6.33
7.5
tensorflow
sig-ai
CVE-2022-41897
I61ZQT
6.33
7.5
tensorflow
sig-ai
CVE-2022-41901
I61ZQS
6.33
7.5
tensorflow
sig-ai
CVE-2022-41885
I61ZQR
6.33
7.5
tensorflow
sig-ai
CVE-2022-41908
I61ZQQ
6.33
7.5
tensorflow
sig-ai
CVE-2022-41907
I61ZQP
6.33
7.5
tensorflow
sig-ai
CVE-2022-41909
I61ZQO
6.33
7.5
tensorflow
sig-ai
CVE-2022-41894
I61ZQN
6.33
8.1
tensorflow
sig-ai
CVE-2022-41883
I61ZQM
6.33
7.5
tensorflow
sig-ai
CVE-2022-41911
I61ZQL
6.33
7.5
tensorflow
sig-ai
CVE-2022-41891
I61ZQK
6.33
7.5
tensorflow
sig-ai
CVE-2022-4065
I62253
7.37
7.8
testng
Application
CVE-2022-3854
I5ZDM6
7.46
0.0
ceph
sig-ceph
CVE-2022-38712
I5ZL10
8.24
5.9
kernel
Kernel
CVE-2022-40235
I5ZL2A
8.33
6.5
kernel
Kernel
CVE-2022-40768
I5ROPX
8.54
5.5
kernel
Kernel
CVE-2022-3910
I62KKJ
10.11
7.8
kernel
Kernel
CVE-2022-44792
I5ZSW1
10.75
6.5
net-snmp
Networking
CVE-2022-44793
I5ZSVX
10.75
6.5
net-snmp
Networking
CVE-2022-36077
I6064K
12.2
6.1
rsyslog
Base-service
CVE-2022-36077
I6064I
12.2
6.1
pcs
sig-Ha
CVE-2022-3903
I6068Y
12.45
4.6
risc-v-kernel
sig-RISC-V
CVE-2022-23824
I60EES
13.2
5.5
risc-v-kernel
sig-RISC-V
CVE-2022-23824
I60EEP
13.2
5.5
kernel
Kernel
CVE-2022-3931
I60LIJ
14.32
0.0
ceph
sig-ceph
CVE-2022-3162
I60NSN
14.71
0.0
kubernetes
sig-CloudNative
CVE-2022-3294
I60NS7
14.71
0.0
kubernetes
sig-CloudNative
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
车明道(openEuler release SIG)
Mobile: +86 15345431107
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail: chemingdao(a)huawei.com<mailto:chemingdao@huawei.com>
[cid:image003.png@01D901CD.8F3B6C60]Open Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件!
This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it
1
0
Dear all,
openEuler 22.03 LTS update ISO 版本经过经社区Release SIG、QA SIG及 CICD SIG 评估,满足版本出口质量,现进行发布公示,社区各开发者/爱好者可下载使用。
本次 update ISO 版本主要整合openEuler 22.03 LTS标准镜像范围Q2/Q3 阶段 update 版本发布的安全更新及Bugfix,实现了开箱即用。同时在系统表现上也有一定增强。(CVE及BUG 修复清单见附件)
Update ISO 作为预览版发布在openEuler preview 目录下。Release SIG 会持续收集社区开发者/爱好者建议,基于反馈考虑是否例行将update ISO 作为长周期支持版本gap期间的补充发布手段。
openEuler 22.03 LTS update ISO 版本下载链接:https://repo.openeuler.org/openEuler-preview/LTS-iso-update/ISO/
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
车明道(openEuler release SIG)
Mobile: +86 15345431107
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail: chemingdao(a)huawei.com<mailto:chemingdao@huawei.com>
[cid:image005.png@01D901F4.5F071D10]Open Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件!
This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it
1
0
Dear all,
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。
本公示分为五部分:
1、openEuler-20.03-LTS-SP1 Update 20221114发布情况及待修复缺陷
2、openEuler-20.03-LTS-SP3 Update 20221114发布情况及待修复缺陷
3、openEuler-22.03-LTS Update 20221114发布情况及待修复缺陷
4、openEuler 关键组件待修复CVE 清单
5、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2022/11/25)提供 update_20221121版本。
openEuler-20.03-LTS-SP1 Update 20221114
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题4个,已知漏洞4个。目前版本分支剩余待修复缺陷57个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I60WP4?from=project-i…
CVE修复:
CVE
仓库
CVSS 评分
CVE-2022-45061
python3
7.5
CVE-2022-3821
systemd
5.5
CVE-2022-3628
kernel
4.6
CVE-2022-3755
exiv2
6.5
Bugfix:
issue
仓库
#I60N0G:deepin-desktop-base install problem in openEuler:20.03:LTS:SP1:Epol
deepin-desktop-base
#I5YCR1:[软件升级]openEuler 软件vim 8.2版本升级至vim9.0版本
vim
#I61HB0:回合openEuler 22.03 LTS中的llvm-bolt软件包至oe 20.03 SP1
llvm-bolt
#I60QE9:【openEuler-1.0-LTS】block: fix use after free for bd_holder_dir
kernel
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I281C1
【fuzz】runtime error:
libsass
Base-service
I437CR
[SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错
obs-server
Others
I43OSX
[clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0
clamav
Others
I48GIM
【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I490MU
Uncaught exception in get_tokens_unprocessed
python-pygments
Programming-language
I4F8YQ
integer overflow in start_input_bmp
libjpeg-turbo
Desktop
I4F8ZI
heap-buffer-overflow in get_word_rgb_row
libjpeg-turbo
Desktop
I4F903
Unexpect-exit in start_input_tga
libjpeg-turbo
Desktop
I4F913
Timeout in tjDecompress2
libjpeg-turbo
Desktop
I4FRSL
Undefined-shift in bitset_set
augeas
Desktop
I4FT5J
Timeout in fa_from_re
augeas
Desktop
I4FT5U
stack overflow in fa_from_re
augeas
Desktop
I4FT61
stack overflow in re_case_expand
augeas
Desktop
I4FT67
memleaks in ref_make_ref
augeas
Desktop
I4FT6B
SEGV in re_case_expand
augeas
Desktop
I4FT6F
stack overflow in parse_concat_exp
augeas
Desktop
I4FT7B
stack overflow in calc_eclosure_iter
augeas
Desktop
I4FT8E
stack overflow in peek_token
augeas
Desktop
I4FT8P
stack overflow in parse_path_expr
augeas
Desktop
I4FT97
Out of memory in ns_from_locpath
augeas
Desktop
I4FT9A
SEGV in eval_expr
augeas
Desktop
I4FT9C
SEGV in tree_prev
augeas
Desktop
I4FT9G
stack overflow in check_expr
augeas
Desktop
I4FT9I
stack overflow in free_expr
augeas
Desktop
I4G4A5
Undefine-shift in _bfd_safe_read_leb128
binutils
Compiler
I4G4B1
Integer overflow in print_vms_time
binutils
Compiler
I4G4VY
memleak in parse_gnu_debugaltlink
binutils
Compiler
I4G4WF
Heap-buffer-overflow in slurp_hppa_unwind_table
binutils
Compiler
I4G4WW
Use-after-free in make_qualified_name
binutils
Compiler
I4G4X6
memleak in byte_get_little_endian
binutils
Compiler
I4G4XF
memleak in process_mips_specific
binutils
Compiler
I4G4Y0
out-of-memory in vms_lib_read_index
binutils
Compiler
I4G4YJ
Heap-buffer-overflow in bfd_getl16
binutils
Compiler
I4G4YV
Floating point exception in _bfd_vms_slurp_etir
binutils
Compiler
I4G5UN
SEGV in redisvFormatCommand
hiredis
Base-service
I4J0OY
【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常
libdap
sig-recycle
I4JMG4
【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251
python-robotframework
sig-ROS
I4K6ES
stack-buffer-overflow in UINT32_Marshal
libtpms
sig-security-facility
I4K6FU
global-buffer-overflow in Array_Marshal
libtpms
sig-security-facility
I4K6R7
memleak in wrap_nettle_mpi_init
gnutls
sig-security-facility
I4K6UI
Timeout in _asn1_find_up
gnutls
sig-security-facility
I4KT2A
integer overflow in luaV_execute
lua
Base-service
I4KT3D
integer overflow in intarith
lua
Base-service
I4KT3Q
Division by zero in luaV_execute
lua
Base-service
I4KT40
Timeout in luaV_finishget
lua
Base-service
I4O16Z
【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息
kernel
Kernel
I4QV6N
【openEuler-20.03-LTS-SP1】flink命令执行失败
flink
sig-bigdata
I5G81X
【20.03 SP1】selinux-policy卸载异常
selinux-policy
sig-security-facility
I5IG1V
【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败
efl
sig-compat-winapp
I5IG6K
【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5JHX2
【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JNSL
【20.03 SP1 update 20220727】【arm】htcacheclean.service服务启动之后,日志中提示”Can't open PID file /run/httpd/htcacheclean/pid“
httpd
Networking
I61DOT
【20.03SP1】编译mysql,报错误:‘pthread_cond_clockwait’的实参不依赖模板参数,所以‘pthread_cond_clockwait’的声明必须可用 [-fpermissive]
gcc
Compiler
I61FG7
【22.03-LTS-SP1】gala-anteater缺少配置文件说明
gala-anteater
sig-ops
I61FGB
【20.03 SP1/SP3】bolt-use模式结合codedb NPB应用,生成二进制运行报错:Program received signal SIGILL: Illegal instruction
gcc
Compiler
I61IHD
【22.03-LTS-SP1】gala-gopher启动后,日志中出现报错:failed to initialize skeleton BPF object 'io_count_bpf': -95
gala-gopher
sig-ops
I61K2J
【22.03-LTS-SP1】部署gauss主备后,pgsliprobe探针未能启动成功
gala-gopher
sig-ops
openEuler-20.03-LTS-SP3 Update 20221114
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问题3个,已知漏洞4个。目前版本分支剩余待修复缺陷16个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I60WP5?from=project-i…
CVE修复:
需求类型
软件包
CVSS 评分
CVE-2022-45061
python3
7.5
CVE-2022-3821
systemd
5.5
CVE-2022-3628
kernel
4.6
CVE-2022-3755
exiv2
6.5
Bugfix:
issue
仓库
#I60QE9:【openEuler-1.0-LTS】block: fix use after free for bd_holder_dir
kernel
#I5YCR1:[软件升级]openEuler 软件vim 8.2版本升级至vim9.0版本
vim
#I61HBQ:回合openEuler 22.03 LTS中的llvm-bolt软件包至oe 20.03 SP3
llvm-bolt
openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I4QV7S
【openEuler-20.03-LTS-SP3】flink run 命令执行失败
flink
sig-bigdata
I4RVHE
losetup : 当loop设备编号超过7位时,losetup命令无法操作该设备
util-linux
Base-service
I4UMEV
[openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历
kernel
Kernel
I5IGAS
【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5IGOR
【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败
fluidsynth
Application
I5JLNF
【20.03 SP3 update 20220727】【arm/x86】ovirt-websocket-proxy.service服务启动失败
ovirt-engine
oVirt
I5JLRQ
【20.03 SP3 update 20220727】【arm/x86】ovirt-engine-notifier.service服务启动失败
ovirt-engine
oVirt
I5KXUY
【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I5KY4S
【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功
vdsm
oVirt
I5LYJK
【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常
TCP_option_address
Kernel
I5PUIA
[20.03-LTS-SP3]spec文件存在软件包编译依赖自身,且打包包含系统环境文件
qrencode
Desktop
I5SCLC
【20.03 SP3】selinux-policy卸载异常
selinux-policy
sig-security-facility
I613DI
【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败
openEuler-release
Base-service
I61GMU
【20.03 LTS SP3】【arm/x86】安装tuna,然后执行命令:tuna -l报错:“ModuleNotFoundError: No module named 'gtk'”
tuna
Others
I61HAE
【20.03 LTS SP3】【arm/x86】whois命令执行结果不正常
whois
sig-epol
I61LEV
【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错
tuna
Others
openEuler-22.03-LTS Update 20221114
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题2个,已知漏洞7个。目前版本分支剩余待修复缺陷12个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I60WP6?from=project-i…
CVE修复:
CVE
仓库
CVSS 评分
CVE-2022-45061
python3
7.5
CVE-2022-3821
systemd
5.5
CVE-2022-3715
bash
4
CVE-2022-3628
kernel
4.6
CVE-2022-3755
exiv2
6.5
CVE-2022-1552
libpq
8.8
CVE-2022-45062
xfce4-settings
9.8
Bugfix:
issue
仓库
#I5YCR1:[软件升级]openEuler 软件vim 8.2版本升级至vim9.0版本
vim
#I5PA1M:同步22.09中的支持SMx国密算法
openssh
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I5G9CY
升级iinstall-scripts包会导致系统启动异常
install-scripts
sig-OS-Builder
I5JIA6
【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JPII
【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin
ovirt-engine
oVirt
I5LKKX
libbluray build problem in openEuler:22.03:LTS
libbluray
Desktop
I5LKM6
libxshmfence build problem in openEuler:22.03:LTS
libxshmfence
Desktop
I5Q4S3
[22.03-LTS]x86虚拟机卸载qxl模块,机器自动重启
kernel
Kernel
I5QKGT
【22.03LTS_update0907】【arm/x86】kmod-drbd90软件包安装之后文件有缺失
kmod-drbd90
sig-Ha
I5RHYO
【22.09 RC4】【arm/x86】package.ini中的redis_host配置为不存在的ip,重启pkgship服务失败,服务一直在尝试重启
pkgship
sig-EasyLife
I5TMFF
[22.03-LTS]先安装mysql-server,卸载后再安装mariadb-server,mariadb服务启动失败
mariadb
DB
I61GQ6
【22.03 LTS】【arm/x86】安装tuna,然后执行命令:tuna -l报错:“ModuleNotFoundError: No module named 'gtk'”
tuna
Others
I61HDB
【22.03 LTS】【arm/x86】whois命令执行结果不正常
whois
sig-epol
I61LBD
【22.03 LTS】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错
tuna
Others
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE:
漏洞编号
Issue ID
剩余天数
CVSS评分
软件包
SIG
CVE-2022-3629
I5WYLP
1.51
3.3
risc-v-kernel
sig-RISC-V
CVE-2022-3624
I5WYKS
1.51
3.3
risc-v-kernel
sig-RISC-V
CVE-2022-3630
I5WYKI
1.51
5.5
risc-v-kernel
sig-RISC-V
CVE-2022-3619
I5X0EY
1.61
4.3
risc-v-kernel
sig-RISC-V
CVE-2022-42432
I5X2IL
1.85
0.0
risc-v-kernel
sig-RISC-V
CVE-2022-3344
I5X2N5
1.95
5.5
risc-v-kernel
sig-RISC-V
CVE-2022-3633
I5X3LH
2.48
3.3
risc-v-kernel
sig-RISC-V
CVE-2022-3238
I5X87A
4.2
0.0
risc-v-kernel
sig-RISC-V
CVE-2022-34169
I5HV9H
4.37
7.5
openjdk-1.8.0
Compiler
CVE-2022-45059
I60DGG
4.69
7.5
varnish
System-tool
CVE-2022-45060
I60DGE
4.69
7.5
varnish
System-tool
CVE-2022-3650
I5XNUK
5.69
0.0
ceph
sig-ceph
CVE-2022-3474
I5XXF6
7.14
4.3
bazel
sig-bigdata
CVE-2022-3707
I5XXFH
7.2
0.0
risc-v-kernel
sig-RISC-V
CVE-2022-39348
I5Y48K
7.7
5.4
python-twisted
sig-python-modules
CVE-2022-3964
I60VYP
8.6
8.1
ffmpeg
sig-DDE
CVE-2022-3965
I60VYN
8.6
8.1
ffmpeg
sig-DDE
CVE-2022-45199
I611ZI
9.57
7.5
python-pillow
sig-python-modules
CVE-2022-45198
I611ZE
9.57
7.5
python-pillow
sig-python-modules
CVE-2022-3737
I61CPZ
10.77
7.8
typesafe-config
sig-Java
CVE-2022-41716
I61I0Y
11.59
7.5
golang
sig-golang
CVE-2022-21271
I5YNUZ
11.67
5.3
openjdk-11
Compiler
CVE-2022-21271
I5YNUP
11.67
5.3
openjdk-1.8.0
Compiler
CVE-2022-21496
I5Z0L9
13.42
5.3
openjdk-1.8.0
Compiler
CVE-2022-21426
I5Z0KW
13.42
5.3
openjdk-1.8.0
Compiler
CVE-2022-21434
I5Z0LE
13.43
5.3
openjdk-1.8.0
Compiler
CVE-2022-3821
I5Z4ZW
13.69
5.5
NutShell-systemd
sig-RISC-V
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
车明道(openEuler release SIG)
Mobile: +86 15345431107
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail: chemingdao(a)huawei.com<mailto:chemingdao@huawei.com>
[cid:image002.png@01D8FD11.66011D10]Open Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件!
This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it
1
0
Dear all,
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。
本公示分为五部分:
1、openEuler-20.03-LTS-SP1 Update 20221107发布情况及待修复缺陷
2、openEuler-20.03-LTS-SP3 Update 20221107发布情况及待修复缺陷
3、openEuler-22.03-LTS Update 20221107发布情况及待修复缺陷
4、openEuler 关键组件待修复CVE 清单
5、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2022/11/18)提供 update_20221114版本。
openEuler-20.03-LTS-SP1 Update 20221107
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题6个,已知漏洞13个。目前版本分支剩余待修复缺陷61个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5ZPR5?from=project-i…
CVE修复:
CVE
仓库
CVSS评分
CVE-2022-44638
pixman
8.8
CVE-2022-43995
sudo
7.1
CVE-2022-40304
libxml2
8.1
CVE-2022-40303
libxml2
7.5
CVE-2022-2602
kernel
6.5
CVE-2021-30560
libxslt
8.8
CVE-2022-34917
kafka
7.5
CVE-2022-26612
hadoop
9.8
CVE-2022-25168
hadoop
9.8
CVE-2021-37404
hadoop
9.8
CVE-2019-12399
kafka
7.5
CVE-2022-3756
exiv2
8.8
CVE-2022-40284
nfs-3g
7.8
Bugfix:
issue
仓库
#I5Z86E:【OLK-5.10】KASAN: use-after-free Read in eth_type_trans
kernel
#I6038I:修复问题和优化代码
oec-hardware
#I4G5U2:AddressSanitizer CHECK failed in sdscatvprintf
hiredis
#I604IM:【openEuler-20.03-LTS-SP1】performance.sh脚本中代码对性能有影响
openEuler-release
#I5ZZLE:nodejs-minimatch升级导致nodejs-grunt安装缺依赖
nodejs-grunt
#I5YIO4:修复CVE-2022-3517导致nodejs-glob包编译失败
nodejs-minimatch
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I281C1
【fuzz】runtime error:
libsass
Base-service
I437CR
[SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错
obs-server
Others
I43OSX
[clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0
clamav
Others
I44RHB
large loop in OBJ_obj2txt
openssl
sig-security-facility
I44RIX
large loop in bn_lshift_fixed_top
openssl
sig-security-facility
I48GIM
【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I490MU
Uncaught exception in get_tokens_unprocessed
python-pygments
Programming-language
I4CJX9
[20.03-LTS-SP1] 389-ds-base包下的部分命令-v参数不显示版本号
three-eight-nine-ds-base
Application
I4F8YQ
integer overflow in start_input_bmp
libjpeg-turbo
Desktop
I4F8ZI
heap-buffer-overflow in get_word_rgb_row
libjpeg-turbo
Desktop
I4F903
Unexpect-exit in start_input_tga
libjpeg-turbo
Desktop
I4F913
Timeout in tjDecompress2
libjpeg-turbo
Desktop
I4FRSL
Undefined-shift in bitset_set
augeas
Desktop
I4FT5J
Timeout in fa_from_re
augeas
Desktop
I4FT5U
stack overflow in fa_from_re
augeas
Desktop
I4FT61
stack overflow in re_case_expand
augeas
Desktop
I4FT67
memleaks in ref_make_ref
augeas
Desktop
I4FT6B
SEGV in re_case_expand
augeas
Desktop
I4FT6F
stack overflow in parse_concat_exp
augeas
Desktop
I4FT7B
stack overflow in calc_eclosure_iter
augeas
Desktop
I4FT8E
stack overflow in peek_token
augeas
Desktop
I4FT8P
stack overflow in parse_path_expr
augeas
Desktop
I4FT97
Out of memory in ns_from_locpath
augeas
Desktop
I4FT9A
SEGV in eval_expr
augeas
Desktop
I4FT9C
SEGV in tree_prev
augeas
Desktop
I4FT9G
stack overflow in check_expr
augeas
Desktop
I4FT9I
stack overflow in free_expr
augeas
Desktop
I4G4A5
Undefine-shift in _bfd_safe_read_leb128
binutils
Compiler
I4G4B1
Integer overflow in print_vms_time
binutils
Compiler
I4G4VY
memleak in parse_gnu_debugaltlink
binutils
Compiler
I4G4WF
Heap-buffer-overflow in slurp_hppa_unwind_table
binutils
Compiler
I4G4WW
Use-after-free in make_qualified_name
binutils
Compiler
I4G4X6
memleak in byte_get_little_endian
binutils
Compiler
I4G4XF
memleak in process_mips_specific
binutils
Compiler
I4G4Y0
out-of-memory in vms_lib_read_index
binutils
Compiler
I4G4YJ
Heap-buffer-overflow in bfd_getl16
binutils
Compiler
I4G4YV
Floating point exception in _bfd_vms_slurp_etir
binutils
Compiler
I4G5TL
stack-buffer-overflow in redisvFormatCommand
hiredis
Base-service
I4G5U2
AddressSanitizer CHECK failed in sdscatvprintf
hiredis
Base-service
I4G5UN
SEGV in redisvFormatCommand
hiredis
Base-service
I4G5WG
AddressSanitizer CHECK failed in sdscatlen
hiredis
Base-service
I4G5XO
Attempting free wild-addr in hi_free
hiredis
Base-service
I4J0OY
【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常
libdap
sig-recycle
I4JMG4
【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251
python-robotframework
sig-ROS
I4K6ES
stack-buffer-overflow in UINT32_Marshal
libtpms
sig-security-facility
I4K6FU
global-buffer-overflow in Array_Marshal
libtpms
sig-security-facility
I4K6R7
memleak in wrap_nettle_mpi_init
gnutls
sig-security-facility
I4K6UI
Timeout in _asn1_find_up
gnutls
sig-security-facility
I4KT2A
integer overflow in luaV_execute
lua
Base-service
I4KT3D
integer overflow in intarith
lua
Base-service
I4KT3Q
Division by zero in luaV_execute
lua
Base-service
I4KT40
Timeout in luaV_finishget
lua
Base-service
I4O16Z
【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息
kernel
Kernel
I4QV6N
【openEuler-20.03-LTS-SP1】flink命令执行失败
flink
sig-bigdata
I5G81X
【20.03 SP1】selinux-policy卸载异常
selinux-policy
sig-security-facility
I5GT2K
【20.03-SP1】【arm/x86】pcp-system-tools包下的pcp-mpstat命令执行报错
pcp
Application
I5IG1V
【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败
efl
sig-compat-winapp
I5IG6K
【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5JHX2
【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JNSL
【20.03 SP1 update 20220727】【arm】htcacheclean.service服务启动之后,日志中提示”Can't open PID file /run/httpd/htcacheclean/pid“
httpd
Networking
I5Q5D1
【20.03 SP1】ibus在sp1分支安装有异常告警
ibus
Desktop
openEuler-20.03-LTS-SP3 Update 20221107
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问题6个,已知漏洞18个。目前版本分支剩余待修复缺陷14个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5ZPR8?from=project-i…
CVE修复:
需求类型
软件包
CVSS评分
CVE-2022-44638
pixman
8.8
CVE-2022-43995
sudo
7.1
CVE-2022-42012
dbus
6.5
CVE-2022-42011
dbus
6.5
CVE-2022-42010
dbus
6.5
CVE-2022-40304
libxml2
8.1
CVE-2022-40303
libxml2
7.5
CVE-2022-2602
kernel
6.5
CVE-2021-30560
libxslt
8.8
CVE-2021-28041
openssh
7.1
CVE-2021-38593
qt5-qtbase
7.5
CVE-2022-34917
kafka
7.5
CVE-2022-26612
hadoop
9.8
CVE-2022-25168
hadoop
9.8
CVE-2021-37404
hadoop
9.8
CVE-2019-12399
kafka
7.5
CVE-2022-3756
exiv2
8.8
CVE-2022-40284
nfs-3g
7.8
Bugfix:
issue
仓库
#I5Z86E:【OLK-5.10】KASAN: use-after-free Read in eth_type_trans
kernel
#I5YZLF:openEuler-20.03-lts-SP3需要同步mster代码
grep
#I6038I:修复问题和优化代码
oec-hardware
#I604J1:【openEuler-20.03-LTS-SP3】performance.sh脚本中代码对性能有影响
openEuler-release
#I5ZZLE:nodejs-minimatch升级导致nodejs-grunt安装缺依赖
nodejs-grunt
#I5YIO4:修复CVE-2022-3517导致nodejs-glob包编译失败
nodejs-minimatch
openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I4QV7S
【openEuler-20.03-LTS-SP3】flink run 命令执行失败
flink
sig-bigdata
I4RVHE
losetup : 当loop设备编号超过7位时,losetup命令无法操作该设备
util-linux
Base-service
I4UMEV
[openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历
kernel
Kernel
I5IGAS
【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5IGOR
【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败
fluidsynth
Application
I5JBJ9
【20.03 SP3_EPOL_update20220727】ovirt-engine-backend包卸载过程的告警信息需要优化
ovirt-engine
oVirt
I5JLNF
【20.03 SP3 update 20220727】【arm/x86】ovirt-websocket-proxy.service服务启动失败
ovirt-engine
oVirt
I5JLRQ
【20.03 SP3 update 20220727】【arm/x86】ovirt-engine-notifier.service服务启动失败
ovirt-engine
oVirt
I5KXUY
【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I5KY4S
【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功
vdsm
oVirt
I5LYJK
【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常
TCP_option_address
Kernel
I5PT12
[20.03-LTS-SP3]spec文件存在软件包编译依赖自身,且打包包含系统环境文件
ima-evm-utils
Base-service
I5PUIA
[20.03-LTS-SP3]spec文件存在软件包编译依赖自身,且打包包含系统环境文件
qrencode
Desktop
I5SCLC
【20.03 SP3】selinux-policy卸载异常
selinux-policy
sig-security-facility
openEuler-22.03-LTS Update 20221107
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题9个,已知漏洞76个。目前版本分支剩余待修复缺陷10个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5ZPRA?from=project-i…
CVE修复:
CVE
仓库
CVSS评分
CVE-2021-45444
zsh
8.8
CVE-2022-24130
xterm
5.5
CVE-2022-23645
swtpm
5.5
CVE-2022-43995
sudo
7.1
CVE-2022-24303
python-pillow
5.9
CVE-2022-44638
pixman
8.8
CVE-2021-30560
libxslt
8.8
CVE-2022-23308
libxml2
7.5
CVE-2022-40303
libxml2
7.5
CVE-2022-40304
libxml2
8.1
CVE-2022-0561
libtiff
5.5
CVE-2022-0562
libtiff
5.5
CVE-2022-0891
libtiff
7.1
CVE-2022-22844
libtiff
5.5
CVE-2022-3542
kernel
5.5
CVE-2022-3606
kernel
5.5
CVE-2022-40768
kernel
5.5
CVE-2022-25235
expat
7.8
CVE-2022-25236
expat
9.8
CVE-2022-25313
expat
6.5
CVE-2022-25314
expat
7.5
CVE-2022-25315
expat
6.5
CVE-2021-0129
bluez
5.7
CVE-2021-43400
bluez
9.1
CVE-2021-43859
xstream
7.5
CVE-2019-17570
xmlrpc
9.8
CVE-2022-0581
wireshark
7.5
CVE-2022-0582
wireshark
9.8
CVE-2022-0583
wireshark
7.5
CVE-2022-0585
wireshark
6.5
CVE-2022-0586
wireshark
7.5
CVE-2022-3725
wireshark
7.5
CVE-2019-25058
usbguard
7.8
CVE-2022-23181
tomcat
7
CVE-2020-35518
three-eight-nine-ds-base
5.3
CVE-2021-45079
strongswan
9.1
CVE-2020-7663
rubygem-websocket-extensions
7.5
CVE-2021-38593
qt5-qtbase
7.5
CVE-2021-45115
python-django
7.5
CVE-2021-45116
python-django
7.5
CVE-2021-45452
python-django
5.3
CVE-2022-22818
python-django
6.1
CVE-2022-23833
python-django
7.5
CVE-2020-8178
nodejs-jison
9.8
CVE-2020-7729
nodejs-grunt
7.1
CVE-2020-28282
nodejs-getobject
9.8
CVE-2019-13173
nodejs-fstream
7.5
CVE-2019-2692
mysql-connector-java
6.3
CVE-2021-34432
mosquitto
7.5
CVE-2021-4104
log4j12
7.5
CVE-2022-23302
log4j12
8.8
CVE-2022-23307
log4j12
9.8
CVE-2021-3596
ImageMagick
6.5
CVE-2021-39212
ImageMagick
4.4
CVE-2022-0711
haproxy
7.5
CVE-2022-21702
grafana
5.4
CVE-2018-17942
gnulib
8.8
CVE-2019-20378
ganglia
6.1
CVE-2019-20379
ganglia
6.1
CVE-2019-13508
freetds
9.8
CVE-2022-25235
firefox
9.8
CVE-2022-25236
firefox
9.8
CVE-2022-25315
firefox
9.8
CVE-2010-3996
festival
7.8
CVE-2021-23214
postgresql
8.1
CVE-2021-23222
postgresql
5.9
CVE-2020-29260
libvncserver
7.5
CVE-2019-12399
kafka
7.5
CVE-2022-34917
kafka
7.5
CVE-2021-37404
hadoop
9.8
CVE-2022-25168
hadoop
9.8
CVE-2022-26612
hadoop
9.8
CVE-2019-19308
gnome-font-viewer
5.5
CVE-2022-42919
python3
7.8
CVE-2022-3756
exiv2
8.8
CVE-2022-40284
nfs-3g
7.8
Bugfix:
issue
仓库
#I5WGEF:auxtrace_Record_Reconstruct events in __init, HiSilicon PCIe tuning and tracing devices, PCIe trace packet support.
kernel
#I604JE:【openEuler-22.03-LTS】performance.sh脚本中代码对性能有影响
openEuler-release
#I5YSWV:建议添加编译依赖make,方便rpmbuild本地编译
libnetfilter_cttimeout
#I5YTIA:建议添加编译依赖make,方便rpmbuild本地编译
libnfnetlink
#I5YSRO:fix Potential Null Pointer Dereference
libdnet
#I6038I:修复问题和优化代码
oec-hardware
#I5ZZAH:rubygem-sqlite3在22.03-LTS分支编译失败
rubygem-sqlite3
#I5ZZLE:nodejs-minimatch升级导致nodejs-grunt安装缺依赖
nodejs-grunt
#I5YIO4:修复CVE-2022-3517导致nodejs-glob包编译失败
nodejs-minimatch
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I5G9CY
升级iinstall-scripts包会导致系统启动异常
install-scripts
sig-OS-Builder
I5JIA6
【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JPII
【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin
ovirt-engine
oVirt
I5LKKX
libbluray build problem in openEuler:22.03:LTS
libbluray
Desktop
I5LKM6
libxshmfence build problem in openEuler:22.03:LTS
libxshmfence
Desktop
I5LKY8
yaffs2 build problem in openEuler:22.03:LTS
yaffs2
sig-embedded
I5QKGT
【22.03LTS_update0907】【arm/x86】kmod-drbd90软件包安装之后文件有缺失
kmod-drbd90
sig-Ha
I5RHYO
【22.09 RC4】【arm/x86】package.ini中的redis_host配置为不存在的ip,重启pkgship服务失败,服务一直在尝试重启
pkgship
sig-EasyLife
I5Q4S3
[22.03-LTS]x86虚拟机卸载qxl模块,机器自动重启
kernel
Kernel
I5TMFF
[22.03-LTS]先安装mysql-server,卸载后再安装mariadb-server,mariadb服务启动失败
mariadb
DB
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE:
漏洞编号
Issue ID
剩余天数
CVSS评分
软件包
SIG
CVE-2022-2741
I5YPB2
1.1
7.5
zephyr
sig-Zephyr
CVE-2022-45062
I60DGK
2.78
9.8
xfce4-settings
xfce
CVE-2022-3535
I5W7BQ
2.94
3.5
risc-v-kernel
sig-RISC-V
CVE-2022-3531
I5W7BL
2.94
5.7
risc-v-kernel
sig-RISC-V
CVE-2022-3532
I5W7BF
2.94
5.7
risc-v-kernel
sig-RISC-V
CVE-2022-3533
I5W7AV
2.94
5.7
risc-v-kernel
sig-RISC-V
CVE-2022-3544
I5W7BX
2.95
5.5
risc-v-kernel
sig-RISC-V
CVE-2022-3543
I5W7BW
2.95
5.5
risc-v-kernel
sig-RISC-V
CVE-2022-3542
I5W7BT
2.95
5.5
risc-v-kernel
sig-RISC-V
CVE-2022-3563
I5W7ZQ
3.38
5.7
risc-v-kernel
sig-RISC-V
CVE-2022-38791
I5WD41
3.69
5.5
mariadb
DB
CVE-2016-5690
I60L14
3.85
9.8
ImageMagick
Others
CVE-2022-3586
I5WF1J
3.85
5.5
risc-v-kernel
sig-RISC-V
CVE-2022-3595
I5WFKO
4.26
5.5
risc-v-kernel
sig-RISC-V
CVE-2022-21589
I5WFL3
4.29
4.3
mysql5
DB
CVE-2022-21608
I5WFL5
4.3
4.9
mysql5
DB
CVE-2022-21592
I5WFL9
4.31
4.3
mysql5
DB
CVE-2022-21617
I5WFLE
4.32
4.9
mysql5
DB
CVE-2022-34169
I5HV9H
4.37
7.5
openjdk-1.8.0
Compiler
CVE-2018-20657
I5WL3H
4.68
binutils
Compiler
CVE-2022-3606
I5WLYF
4.73
5.5
risc-v-kernel
sig-RISC-V
CVE-2022-21626
I5WMU2
4.79
5.3
openjdk-latest
Compiler
CVE-2022-21626
I5WMTY
4.79
5.3
openjdk-11
Compiler
CVE-2022-21597
I5WMXW
4.8
5.3
openjdk-11
Compiler
CVE-2022-21618
I5WMXA
4.8
5.3
openjdk-latest
Compiler
CVE-2022-21618
I5WMX4
4.8
5.3
openjdk-11
Compiler
CVE-2022-21624
I5WMVR
4.8
3.7
openjdk-latest
Compiler
CVE-2022-21619
I5WMVP
4.8
3.7
openjdk-latest
Compiler
CVE-2022-21624
I5WMVM
4.8
3.7
openjdk-11
Compiler
CVE-2017-11552
I5WMZS
4.81
6.5
libmad
Others
CVE-2022-39399
I5WMYV
4.81
3.7
openjdk-11
Compiler
CVE-2022-39399
I5WMYG
4.81
3.7
openjdk-latest
Compiler
CVE-2022-21628
I5WMYC
4.81
5.3
openjdk-latest
Compiler
CVE-2022-21628
I5WMY2
4.81
5.3
openjdk-11
Compiler
CVE-2018-17828
I5WN2X
4.82
5.5
zziplib
Base-service
CVE-2018-16548
I5WN1L
4.82
6.5
zziplib
Base-service
CVE-2022-21619
I5WN4Q
4.83
3.7
openjdk-11
Compiler
CVE-2022-43945
I5ZL2W
5.28
7.5
kernel
Kernel
CVE-2022-42928
I5WR2P
5.61
firefox
Application
CVE-2022-3629
I5WYLP
6.6
3.3
risc-v-kernel
sig-RISC-V
CVE-2022-3624
I5WYKS
6.6
3.3
risc-v-kernel
sig-RISC-V
CVE-2022-3630
I5WYKI
6.6
5.5
risc-v-kernel
sig-RISC-V
CVE-2022-3619
I5X0EY
6.69
4.3
risc-v-kernel
sig-RISC-V
CVE-2022-42432
I5X2IL
6.93
risc-v-kernel
sig-RISC-V
CVE-2022-3344
I5X2N5
7.04
5.5
risc-v-kernel
sig-RISC-V
CVE-2022-3633
I5X3LH
7.56
3.3
risc-v-kernel
sig-RISC-V
CVE-2022-3872
I5ZWYZ
7.78
8.6
qemu
Virt
CVE-2022-3238
I5X87A
9.29
risc-v-kernel
sig-RISC-V
CVE-2021-39800
I5XCU6
9.62
5.5
kernel
Kernel
CVE-2022-39328
I60B4D
9.66
8.1
grafana
Application
CVE-2022-45061
I60CRW
9.73
7.5
python3
Base-service
CVE-2022-45059
I60DGG
9.78
7.5
varnish
System-tool
CVE-2022-45060
I60DGE
9.78
7.5
varnish
System-tool
CVE-2022-3650
I5XNUK
10.78
ceph
sig-ceph
CVE-2022-3474
I5XXF6
12.22
4.3
bazel
sig-bigdata
CVE-2022-3707
I5XXFH
12.28
risc-v-kernel
sig-RISC-V
CVE-2022-3707
I5XXFF
12.28
kernel
Kernel
CVE-2022-39348
I5Y48K
12.79
5.4
python-twisted
sig-python-modules
CVE-2022-3718
I5Y4G1
12.81
6.5
exiv2
Desktop
CVE-2022-24588
I5Y6LH
13.43
5.4
kernel
Kernel
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
车明道(openEuler release SIG)
Mobile: +86 15345431107
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail: chemingdao(a)huawei.com<mailto:chemingdao@huawei.com>
[cid:image003.png@01D8F7BA.A401F8C0]Open Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件!
This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it
1
0
发件人: chemingdao
发送时间: 2022年10月29日 17:53
收件人: 'dev(a)openeuler.org' <dev(a)openeuler.org>; 'release(a)openeuler.org' <release(a)openeuler.org>; 'qa(a)openeuler.org' <qa(a)openeuler.org>; 'sa-announce(a)openeuler.org' <sa-announce(a)openeuler.org>
主题: openEuler update_20221031版本发布公告
Dear all,
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。
本公示分为五部分:
1、openEuler-20.03-LTS-SP1 Update 20221031发布情况及待修复缺陷
2、openEuler-20.03-LTS-SP3 Update 20221031发布情况及待修复缺陷
3、openEuler-22.03-LTS Update 20221031发布情况及待修复缺陷
4、openEuler 关键组件待修复CVE 清单
5、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2022/11/11)提供 update_20221107版本。
openEuler-20.03-LTS-SP1 Update 20221031
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题6个,已知漏洞13个。目前版本分支剩余待修复缺陷61个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5YGLE?from=project-i…
CVE修复:
CVE
仓库
CVSS评分
CVE-2022-43680
expat
7.5
CVE-2022-32221
curl
4.8
CVE-2022-3437
samba
5.9
CVE-2022-3621
kernel
7.5
CVE-2022-3629
kernel
3.3
CVE-2022-3635
kernel
7
CVE-2022-3646
kernel
5.3
CVE-2022-40768
kernel
5.5
CVE-2022-43750
kernel
7.8
CVE-2022-3586
kernel
5.5
CVE-2022-41973
multipath-tools
7.8
CVE-2022-40617
strongswan
6.5
CVE-2022-3705
vim
7.5
Bugfix:
issue
仓库
#I595VS:iscsi-inq命令-d参数的用法与-h参看的说明不同
libiscsi
#I5CGEP:调用iscsi_task_mgmt_lun_reset_async函数出现segmentation fault问题
libiscsi
#I5NV0Q:注意spec中changelog撰写规范
libiscsi
#I5OX30:注意spec中changelog撰写规范
libiscsi
#I5X9IO:fix xmtr cannot start in xface4 environment
mtr
#I5VVP6:【openEuler-1.0-LTS】uacce增加reference counter保护
kernel
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I281C1
【fuzz】runtime error:
libsass
Base-service
I437CR
[SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错
obs-server
Others
I43OSX
[clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0
clamav
Others
I44RHB
large loop in OBJ_obj2txt
openssl
sig-security-facility
I44RIX
large loop in bn_lshift_fixed_top
openssl
sig-security-facility
I48GIM
【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I490MU
Uncaught exception in get_tokens_unprocessed
python-pygments
Programming-language
I4CJX9
[20.03-LTS-SP1] 389-ds-base包下的部分命令-v参数不显示版本号
three-eight-nine-ds-base
Application
I4F8YQ
integer overflow in start_input_bmp
libjpeg-turbo
Desktop
I4F8ZI
heap-buffer-overflow in get_word_rgb_row
libjpeg-turbo
Desktop
I4F903
Unexpect-exit in start_input_tga
libjpeg-turbo
Desktop
I4F913
Timeout in tjDecompress2
libjpeg-turbo
Desktop
I4FRSL
Undefined-shift in bitset_set
augeas
Desktop
I4FT5J
Timeout in fa_from_re
augeas
Desktop
I4FT5U
stack overflow in fa_from_re
augeas
Desktop
I4FT61
stack overflow in re_case_expand
augeas
Desktop
I4FT67
memleaks in ref_make_ref
augeas
Desktop
I4FT6B
SEGV in re_case_expand
augeas
Desktop
I4FT6F
stack overflow in parse_concat_exp
augeas
Desktop
I4FT7B
stack overflow in calc_eclosure_iter
augeas
Desktop
I4FT8E
stack overflow in peek_token
augeas
Desktop
I4FT8P
stack overflow in parse_path_expr
augeas
Desktop
I4FT97
Out of memory in ns_from_locpath
augeas
Desktop
I4FT9A
SEGV in eval_expr
augeas
Desktop
I4FT9C
SEGV in tree_prev
augeas
Desktop
I4FT9G
stack overflow in check_expr
augeas
Desktop
I4FT9I
stack overflow in free_expr
augeas
Desktop
I4G4A5
Undefine-shift in _bfd_safe_read_leb128
binutils
Compiler
I4G4B1
Integer overflow in print_vms_time
binutils
Compiler
I4G4VY
memleak in parse_gnu_debugaltlink
binutils
Compiler
I4G4WF
Heap-buffer-overflow in slurp_hppa_unwind_table
binutils
Compiler
I4G4WW
Use-after-free in make_qualified_name
binutils
Compiler
I4G4X6
memleak in byte_get_little_endian
binutils
Compiler
I4G4XF
memleak in process_mips_specific
binutils
Compiler
I4G4Y0
out-of-memory in vms_lib_read_index
binutils
Compiler
I4G4YJ
Heap-buffer-overflow in bfd_getl16
binutils
Compiler
I4G4YV
Floating point exception in _bfd_vms_slurp_etir
binutils
Compiler
I4G5TL
stack-buffer-overflow in redisvFormatCommand
hiredis
Base-service
I4G5U2
AddressSanitizer CHECK failed in sdscatvprintf
hiredis
Base-service
I4G5UN
SEGV in redisvFormatCommand
hiredis
Base-service
I4G5WG
AddressSanitizer CHECK failed in sdscatlen
hiredis
Base-service
I4G5XO
Attempting free wild-addr in hi_free
hiredis
Base-service
I4J0OY
【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常
libdap
sig-recycle
I4JMG4
【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251
python-robotframework
sig-ROS
I4K6ES
stack-buffer-overflow in UINT32_Marshal
libtpms
sig-security-facility
I4K6FU
global-buffer-overflow in Array_Marshal
libtpms
sig-security-facility
I4K6R7
memleak in wrap_nettle_mpi_init
gnutls
sig-security-facility
I4K6UI
Timeout in _asn1_find_up
gnutls
sig-security-facility
I4KT2A
integer overflow in luaV_execute
lua
Base-service
I4KT3D
integer overflow in intarith
lua
Base-service
I4KT3Q
Division by zero in luaV_execute
lua
Base-service
I4KT40
Timeout in luaV_finishget
lua
Base-service
I4O16Z
【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息
kernel
Kernel
I4QV6N
【openEuler-20.03-LTS-SP1】flink命令执行失败
flink
sig-bigdata
I5G81X
【20.03 SP1】selinux-policy卸载异常
selinux-policy
sig-security-facility
I5GT2K
【20.03-SP1】【arm/x86】pcp-system-tools包下的pcp-mpstat命令执行报错
pcp
Application
I5IG1V
【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败
efl
sig-compat-winapp
I5IG6K
【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5JHX2
【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JNSL
【20.03 SP1 update 20220727】【arm】htcacheclean.service服务启动之后,日志中提示”Can't open PID file /run/httpd/htcacheclean/pid“
httpd
Networking
I5Q5D1
【20.03 SP1】ibus在sp1分支安装有异常告警
ibus
Desktop
openEuler-20.03-LTS-SP3 Update 20221031
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问题12个,已知漏洞13个。目前版本分支剩余待修复缺陷14个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5YGLF?from=project-i…
CVE修复:
需求类型
软件包
CVSS评分
CVE-2022-43680
expat
7.5
CVE-2022-32221
curl
4.8
CVE-2022-3437
samba
5.9
CVE-2022-3621
kernel
7.5
CVE-2022-3629
kernel
3.3
CVE-2022-3635
kernel
7
CVE-2022-3646
kernel
5.3
CVE-2022-40768
kernel
5.5
CVE-2022-43750
kernel
7.8
CVE-2022-3586
kernel
5.5
CVE-2022-41973
multipath-tools
7.8
CVE-2022-40617
strongswan
6.5
CVE-2022-3705
vim
7.5
Bugfix:
issue
仓库
#I595VS:iscsi-inq命令-d参数的用法与-h参看的说明不同
libiscsi
#I5CGEP:调用iscsi_task_mgmt_lun_reset_async函数出现segmentation fault问题
libiscsi
#I5NV0Q:注意spec中changelog撰写规范
libiscsi
#I5OX30:注意spec中changelog撰写规范
libiscsi
#I5Z569:【20.03-sp3_update20221102】在dpvs场景适配内存页读写的控制
TCP_option_address
#I5W3SJ:isulad gc流程加固
iSulad
#I5RHBG:【20.03_SP3】【arm/x86】iSulad降级时依赖包未同步降级,导致依赖包版本不匹配出现报错
iSulad
#I5Z59H:【20.03-sp3_update20221102】add required package lxc lower and upper version
lcr
#I5Z58W:【20.03-sp3_update20221102】 add required package lcr lower and upper version
clibcni
#I5Z59O:【20.03-sp3_update20221102】update version to 4.0.3-2022101701
lxc
#I5YHK4:【CRI】kubectl exec由于数据丢失导致失败
kubernetes
#I5VVP6:【openEuler-1.0-LTS】uacce增加reference counter保护
kernel
openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I4QV7S
【openEuler-20.03-LTS-SP3】flink run 命令执行失败
flink
sig-bigdata
I4RVHE
losetup : 当loop设备编号超过7位时,losetup命令无法操作该设备
util-linux
Base-service
I4UMEV
[openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历
kernel
Kernel
I5IGAS
【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5IGOR
【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败
fluidsynth
Application
I5JBJ9
【20.03 SP3_EPOL_update20220727】ovirt-engine-backend包卸载过程的告警信息需要优化
ovirt-engine
oVirt
I5JLNF
【20.03 SP3 update 20220727】【arm/x86】ovirt-websocket-proxy.service服务启动失败
ovirt-engine
oVirt
I5JLRQ
【20.03 SP3 update 20220727】【arm/x86】ovirt-engine-notifier.service服务启动失败
ovirt-engine
oVirt
I5KXUY
【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I5KY4S
【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功
vdsm
oVirt
I5LYJK
【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常
TCP_option_address
Kernel
I5PT12
[20.03-LTS-SP3]spec文件存在软件包编译依赖自身,且打包包含系统环境文件
ima-evm-utils
Base-service
I5PUIA
[20.03-LTS-SP3]spec文件存在软件包编译依赖自身,且打包包含系统环境文件
qrencode
Desktop
I5SCLC
【20.03 SP3】selinux-policy卸载异常
selinux-policy
sig-security-facility
openEuler-22.03-LTS Update 20221031
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题16个,已知漏洞34个。目前版本分支剩余待修复缺陷10个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5YGLG?from=project-i…
CVE修复:
CVE
仓库
CVSS评分
CVE-2022-40617
strongswan
6.5
CVE-2022-43680
expat
7.5
CVE-2022-41973
multipath-tools
7.8
CVE-2022-3705
vim
7.5
CVE-2022-42915
curl
7.3
CVE-2022-32221
curl
4.8
CVE-2022-42916
curl
5.3
CVE-2022-3437
samba
5.9
CVE-2021-37616
exiv2
5.5
CVE-2021-37615
exiv2
5.5
CVE-2021-32815
exiv2
5.5
CVE-2021-37623
exiv2
5.5
CVE-2021-37622
exiv2
5.5
CVE-2021-34334
exiv2
5.5
CVE-2021-37620
exiv2
5.5
CVE-2021-37621
exiv2
5.5
CVE-2021-37619
exiv2
5.5
CVE-2021-34335
exiv2
5.5
CVE-2021-37618
exiv2
5.5
CVE-2021-31292
exiv2
7.5
CVE-2019-13108
exiv2
6.5
CVE-2019-13504
exiv2
6.5
CVE-2022-2978
kernel
7.8
CVE-2022-3523
kernel
5.3
CVE-2022-3535
kernel
3.5
CVE-2022-3625
kernel
7.8
CVE-2022-3629
kernel
3.3
CVE-2022-3621
kernel
7.5
CVE-2022-3623
kernel
7.5
CVE-2022-42432
kernel
1
CVE-2022-3646
kernel
5.3
CVE-2022-3635
kernel
7
CVE-2022-43750
kernel
7.8
CVE-2022-3628
kernel
1
Bugfix:
issue
仓库
#I595VS:iscsi-inq命令-d参数的用法与-h参看的说明不同
libiscsi
#I5CGEP:调用iscsi_task_mgmt_lun_reset_async函数出现segmentation fault问题
libiscsi
#I5NV0Q:注意spec中changelog撰写规范
libiscsi
#I5OX30:注意spec中changelog撰写规范
libiscsi
#I5JNRY:remove dependency of nss-help for nss and nss-util
nss
#I5S7HX:增加spec文件中Provides和Obsoletes字段的版本号信息
sssd
#I5R5G9:在spec文件中,为SMx算法添加provides字段
openssl
#I5SCWP:需要提供libgcrypt-sm3
libgcrypt
#I5OBVF:例行分析anaconda、grub2、libdnf软件包补丁
libdnf
#I5TQV5: 开源软件包openssh社区补丁回合
openssh
#I5YQKC: 并发执行isula-build时kill daemon,/var/lib/isula-build/storage/overlay目录存在残留
isula-build
#I5OMXK:openEuler 22.03 LTS update版本发布yocto-pseudo
yocto-pseudo
#I5Z5BQ:fix no /dev/isgx on non-FLC platforms with 5.10 kernel
linux-sgx-driver
#I5Y13K:bunzip2 -L/-V和bzcat -L/-V查询信息打印异常且返回值不为0
bzip2
#I5RZPQ:bzip2提供的so版本不唯一
bzip2
#I5YRAC:【OLK-5.10】scsi: sd: Revert "scsi: sd: Remove a local variable"
kernel
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I5G9CY
升级iinstall-scripts包会导致系统启动异常
install-scripts
sig-OS-Builder
I5JIA6
【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JPII
【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin
ovirt-engine
oVirt
I5LKKX
libbluray build problem in openEuler:22.03:LTS
libbluray
Desktop
I5LKM6
libxshmfence build problem in openEuler:22.03:LTS
libxshmfence
Desktop
I5LKY8
yaffs2 build problem in openEuler:22.03:LTS
yaffs2
sig-embedded
I5QKGT
【22.03LTS_update0907】【arm/x86】kmod-drbd90软件包安装之后文件有缺失
kmod-drbd90
sig-Ha
I5RHYO
【22.09 RC4】【arm/x86】package.ini中的redis_host配置为不存在的ip,重启pkgship服务失败,服务一直在尝试重启
pkgship
sig-EasyLife
I5Q4S3
[22.03-LTS]x86虚拟机卸载qxl模块,机器自动重启
kernel
Kernel
I5TMFF
[22.03-LTS]先安装mysql-server,卸载后再安装mariadb-server,mariadb服务启动失败
mariadb
DB
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE:
漏洞编号
Issue ID
剩余天数
CVSS评分
软件包
SIG
CVE-2022-3424
I5UBUG
1
risc-v-kernel
sig-RISC-V
CVE-2022-3577
I5X9E0
1.46
7.8
risc-v-kernel
sig-RISC-V
CVE-2022-3435
I5UJIG
1.99
4.3
risc-v-kernel
sig-RISC-V
CVE-2022-42703
I5USP2
3.5
5.5
risc-v-kernel
sig-RISC-V
CVE-2022-43750
I5XTUC
3.7
7.8
risc-v-kernel
sig-RISC-V
CVE-2022-3654
I5XWK1
3.85
8.8
chromium
Application
CVE-2022-3652
I5XWJV
3.85
8.8
chromium
Application
CVE-2022-3656
I5XWJT
3.85
8.8
chromium
Application
CVE-2022-3658
I5XWJR
3.85
8.8
chromium
Application
CVE-2022-3657
I5XWQK
3.88
8.8
chromium
Application
CVE-2022-3655
I5XWQJ
3.88
8.8
chromium
Application
CVE-2022-3659
I5XWY2
3.92
8.8
chromium
Application
CVE-2022-3653
I5XWXZ
3.92
8.8
chromium
Application
CVE-2022-3697
I5XXE0
4.08
7.5
ansible
dev-utils
CVE-2022-34169
I5HV9H
4.37
7.5
openjdk-1.8.0
Compiler
CVE-2022-39286
I5Y50E
4.97
8.8
python-jupyter-core
CVE-2022-3725
I5Y58X
5.08
7.5
wireshark
Application
CVE-2022-3466
I5VEVL
5.99
cri-o
sig-CloudNative
CVE-2022-3723
I5YENW
6.88
8.8
chromium
Application
CVE-2022-42721
I5VM7S
6.88
5.5
risc-v-kernel
sig-RISC-V
CVE-2022-42722
I5VMMV
6.99
5.5
risc-v-kernel
sig-RISC-V
CVE-2022-3757
I5YF3B
7.14
8.8
exiv2
Desktop
CVE-2022-3756
I5YF3M
7.17
8.8
exiv2
Desktop
CVE-2022-2741
I5YPB2
9.15
7.5
zephyr
CVE-2022-42252
I5YPBQ
9.2
7.5
tomcat
Application
CVE-2022-41974
I5XJYL
9.41
7.8
multipath-tools
Storage
CVE-2022-3523
I5VZ0L
10.37
5.3
kernel
Kernel
CVE-2021-32785
I5Z074
10.52
7.5
httpd
Networking
CVE-2022-40304
I5W79V
10.98
libxml2
Base-service
CVE-2022-40303
I5W79R
10.98
libxml2
Base-service
CVE-2022-3544
I5W7BX
10.99
5.5
risc-v-kernel
sig-RISC-V
CVE-2022-3543
I5W7BW
10.99
5.5
risc-v-kernel
sig-RISC-V
CVE-2022-3542
I5W7BT
10.99
5.5
risc-v-kernel
sig-RISC-V
CVE-2022-3535
I5W7BQ
10.99
3.5
risc-v-kernel
sig-RISC-V
CVE-2022-3531
I5W7BL
10.99
5.7
risc-v-kernel
sig-RISC-V
CVE-2022-3532
I5W7BF
10.99
5.7
risc-v-kernel
sig-RISC-V
CVE-2022-3542
I5W7B1
10.99
5.5
kernel
Kernel
CVE-2022-3533
I5W7AV
10.99
5.7
risc-v-kernel
sig-RISC-V
CVE-2022-3563
I5W7ZQ
11.43
5.7
risc-v-kernel
sig-RISC-V
CVE-2022-3563
I5W7YB
11.43
5.7
kernel
Kernel
CVE-2022-43995
I5Z7XW
11.51
7.1
sudo
Base-service
CVE-2022-38791
I5WD41
11.73
5.5
mariadb
DB
CVE-2022-44638
I5ZCPG
11.86
8.8
pixman
Desktop
CVE-2022-3586
I5WF1J
11.9
5.5
risc-v-kernel
sig-RISC-V
CVE-2022-2602
I5WFKI
12.3
6.5
kernel
Kernel
CVE-2022-3595
I5WFKO
12.31
5.5
risc-v-kernel
sig-RISC-V
CVE-2022-3595
I5WFKN
12.31
5.5
kernel
Kernel
CVE-2022-21589
I5WFL3
12.34
4.3
mysql5
DB
CVE-2022-21608
I5WFL5
12.35
4.9
mysql5
DB
CVE-2022-21592
I5WFL9
12.36
4.3
mysql5
DB
CVE-2022-21617
I5WFLE
12.37
4.9
mysql5
DB
CVE-2022-32287
I5ZEF8
12.45
7.5
lucene4
sig-Java
CVE-2018-20657
I5WL3H
12.73
binutils
Compiler
CVE-2022-3606
I5WLYF
12.77
5.5
risc-v-kernel
sig-RISC-V
CVE-2022-3606
I5WLXN
12.77
5.5
kernel
Kernel
CVE-2022-21624
I5WMVR
12.84
3.7
openjdk-latest
Compiler
CVE-2022-21619
I5WMVP
12.84
3.7
openjdk-latest
Compiler
CVE-2022-21624
I5WMVM
12.84
3.7
openjdk-11
Compiler
CVE-2022-21626
I5WMU2
12.84
5.3
openjdk-latest
Compiler
CVE-2022-21626
I5WMTY
12.84
5.3
openjdk-11
Compiler
CVE-2022-39399
I5WMYV
12.85
3.7
openjdk-11
Compiler
CVE-2022-39399
I5WMYG
12.85
3.7
openjdk-latest
Compiler
CVE-2022-21628
I5WMYC
12.85
5.3
openjdk-latest
Compiler
CVE-2022-21628
I5WMY2
12.85
5.3
openjdk-11
Compiler
CVE-2022-21597
I5WMXW
12.85
5.3
openjdk-11
Compiler
CVE-2022-21618
I5WMXA
12.85
5.3
openjdk-latest
Compiler
CVE-2022-21618
I5WMX4
12.85
5.3
openjdk-11
Compiler
CVE-2012-6136
I5WMWP
12.85
5.5
tuned
Computing
CVE-2017-11552
I5WMZS
12.86
6.5
libmad
Others
CVE-2018-17828
I5WN2X
12.87
5.5
zziplib
Base-service
CVE-2018-16548
I5WN1L
12.87
6.5
zziplib
Base-service
CVE-2022-21619
I5WN4Q
12.88
3.7
openjdk-11
Compiler
CVE-2022-35717
I5ZL1K
13.14
7.8
kernel
Kernel
CVE-2022-42928
I5WR2P
13.65
firefox
Application
CVE-2022-3624
I5WYKS
14.64
3.3
risc-v-kernel
sig-RISC-V
CVE-2022-3630
I5WYKI
14.64
5.5
risc-v-kernel
sig-RISC-V
CVE-2022-3629
I5WYLP
14.65
3.3
risc-v-kernel
sig-RISC-V
CVE-2022-3629
I5WYLL
14.65
3.3
kernel
Kernel
CVE-2022-3619
I5X0EY
14.74
4.3
risc-v-kernel
sig-RISC-V
CVE-2022-3619
I5X0E3
14.74
4.3
kernel
Kernel
CVE-2022-42432
I5X2IL
14.98
risc-v-kernel
sig-RISC-V
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
车明道(openEuler release SIG)
Mobile: +86 15345431107
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail: chemingdao(a)huawei.com<mailto:chemingdao@huawei.com>
[cid:image003.png@01D8F168.5DF4B280]Open Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件!
This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it
1
0
Dear all,
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。
本公示分为五部分:
1、openEuler-20.03-LTS-SP1 Update 20221024发布情况及待修复缺陷
2、openEuler-20.03-LTS-SP3 Update 20221024发布情况及待修复缺陷
3、openEuler-22.03-LTS Update 20221024发布情况及待修复缺陷
4、openEuler 关键组件待修复CVE 清单
5、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2022/11/05)提供 update_20221031版本。
openEuler-20.03-LTS-SP1 Update 20221024
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题4个,已知漏洞26个。目前版本分支剩余待修复缺陷62个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5X85F?from=project-i…
CVE修复:
CVE
仓库
CVSS评分
CVE-2022-41849
kernel
4.2
CVE-2022-41742
nginx
7.1
CVE-2022-41741
nginx
7.8
CVE-2022-39260
git
8.8
CVE-2022-39253
git
5.5
CVE-2022-3627
libtiff
6.5
CVE-2022-3626
libtiff
6.5
CVE-2022-3599
libtiff
6.5
CVE-2022-3598
libtiff
6.5
CVE-2022-3597
libtiff
6.5
CVE-2022-3594
kernel
7.5
CVE-2022-3570
libtiff
9.8
CVE-2022-3566
kernel
7.1
CVE-2022-3565
kernel
8
CVE-2022-3564
kernel
8
CVE-2022-3545
kernel
7.8
CVE-2022-3542
kernel
5.5
CVE-2022-3535
kernel
3.5
CVE-2022-3524
kernel
7.5
CVE-2022-3521
kernel
2.5
CVE-2022-3515
libksba
8.1
CVE-2022-20423
kernel
4.6
CVE-2021-46848
libtasn1
9.1
CVE-2022-3517
nodejs-minimatch
7.5
CVE-2022-3555
libX11
7.5
CVE-2022-3554
libX11
7.5
Bugfix:
issue
仓库
#I5XX3U:Backport and apply AutoBOLT from openEuler GCC 10.3.1 to openEuler GCC 7.3.1
gcc
#I3BQJM:安装kmodtool构建的软件包时出现打印异常,但不影响功能
openEuler-rpm-config
#I5XWVP:oec-hardware版本升级至1.1.3
oec-hardware
#I5WW82:【openEuler-1.0-LTS】不支持 MegaRAID 9560-16i
kernel
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I281C1
【fuzz】runtime error:
libsass
Base-service
I437CR
[SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错
obs-server
Others
I43OSX
[clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0
clamav
Others
I44RHB
large loop in OBJ_obj2txt
openssl
sig-security-facility
I44RIX
large loop in bn_lshift_fixed_top
openssl
sig-security-facility
I47I56
yum升级出现dkms的错误告警打印
dkms
Others
I48GIM
【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I490MU
Uncaught exception in get_tokens_unprocessed
python-pygments
Programming-language
I4CJX9
[20.03-LTS-SP1] 389-ds-base包下的部分命令-v参数不显示版本号
three-eight-nine-ds-base
Application
I4F8YQ
integer overflow in start_input_bmp
libjpeg-turbo
Desktop
I4F8ZI
heap-buffer-overflow in get_word_rgb_row
libjpeg-turbo
Desktop
I4F903
Unexpect-exit in start_input_tga
libjpeg-turbo
Desktop
I4F913
Timeout in tjDecompress2
libjpeg-turbo
Desktop
I4FRSL
Undefined-shift in bitset_set
augeas
Desktop
I4FT5J
Timeout in fa_from_re
augeas
Desktop
I4FT5U
stack overflow in fa_from_re
augeas
Desktop
I4FT61
stack overflow in re_case_expand
augeas
Desktop
I4FT67
memleaks in ref_make_ref
augeas
Desktop
I4FT6B
SEGV in re_case_expand
augeas
Desktop
I4FT6F
stack overflow in parse_concat_exp
augeas
Desktop
I4FT7B
stack overflow in calc_eclosure_iter
augeas
Desktop
I4FT8E
stack overflow in peek_token
augeas
Desktop
I4FT8P
stack overflow in parse_path_expr
augeas
Desktop
I4FT97
Out of memory in ns_from_locpath
augeas
Desktop
I4FT9A
SEGV in eval_expr
augeas
Desktop
I4FT9C
SEGV in tree_prev
augeas
Desktop
I4FT9G
stack overflow in check_expr
augeas
Desktop
I4FT9I
stack overflow in free_expr
augeas
Desktop
I4G4A5
Undefine-shift in _bfd_safe_read_leb128
binutils
Compiler
I4G4B1
Integer overflow in print_vms_time
binutils
Compiler
I4G4VY
memleak in parse_gnu_debugaltlink
binutils
Compiler
I4G4WF
Heap-buffer-overflow in slurp_hppa_unwind_table
binutils
Compiler
I4G4WW
Use-after-free in make_qualified_name
binutils
Compiler
I4G4X6
memleak in byte_get_little_endian
binutils
Compiler
I4G4XF
memleak in process_mips_specific
binutils
Compiler
I4G4Y0
out-of-memory in vms_lib_read_index
binutils
Compiler
I4G4YJ
Heap-buffer-overflow in bfd_getl16
binutils
Compiler
I4G4YV
Floating point exception in _bfd_vms_slurp_etir
binutils
Compiler
I4G5TL
stack-buffer-overflow in redisvFormatCommand
hiredis
Base-service
I4G5U2
AddressSanitizer CHECK failed in sdscatvprintf
hiredis
Base-service
I4G5UN
SEGV in redisvFormatCommand
hiredis
Base-service
I4G5WG
AddressSanitizer CHECK failed in sdscatlen
hiredis
Base-service
I4G5XO
Attempting free wild-addr in hi_free
hiredis
Base-service
I4J0OY
【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常
libdap
sig-recycle
I4JMG4
【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251
python-robotframework
sig-ROS
I4K6ES
stack-buffer-overflow in UINT32_Marshal
libtpms
sig-security-facility
I4K6FU
global-buffer-overflow in Array_Marshal
libtpms
sig-security-facility
I4K6R7
memleak in wrap_nettle_mpi_init
gnutls
sig-security-facility
I4K6UI
Timeout in _asn1_find_up
gnutls
sig-security-facility
I4KT2A
integer overflow in luaV_execute
lua
Base-service
I4KT3D
integer overflow in intarith
lua
Base-service
I4KT3Q
Division by zero in luaV_execute
lua
Base-service
I4KT40
Timeout in luaV_finishget
lua
Base-service
I4O16Z
【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息
kernel
Kernel
I4QV6N
【openEuler-20.03-LTS-SP1】flink命令执行失败
flink
sig-bigdata
I5G81X
【20.03 SP1】selinux-policy卸载异常
selinux-policy
sig-security-facility
I5GT2K
【20.03-SP1】【arm/x86】pcp-system-tools包下的pcp-mpstat命令执行报错
pcp
Application
I5IG1V
【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败
efl
sig-compat-winapp
I5IG6K
【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5JHX2
【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JNSL
【20.03 SP1 update 20220727】【arm】htcacheclean.service服务启动之后,日志中提示”Can't open PID file /run/httpd/htcacheclean/pid“
httpd
Networking
I5Q5D1
【20.03 SP1】ibus在sp1分支安装有异常告警
ibus
Desktop
openEuler-20.03-LTS-SP3 Update 20221024
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问题4个,已知漏洞26个。目前版本分支剩余待修复缺陷14个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5X85G?from=project-i…
CVE修复:
需求类型
软件包
CVSS评分
CVE-2022-41849
kernel
4.2
CVE-2022-41742
nginx
7.1
CVE-2022-41741
nginx
7.8
CVE-2022-39260
git
8.8
CVE-2022-39253
git
5.5
CVE-2022-3627
libtiff
6.5
CVE-2022-3626
libtiff
6.5
CVE-2022-3599
libtiff
6.5
CVE-2022-3598
libtiff
6.5
CVE-2022-3597
libtiff
6.5
CVE-2022-3594
kernel
7.5
CVE-2022-3570
libtiff
9.8
CVE-2022-3566
kernel
7.1
CVE-2022-3565
kernel
8
CVE-2022-3564
kernel
8
CVE-2022-3545
kernel
7.8
CVE-2022-3542
kernel
5.5
CVE-2022-3535
kernel
3.5
CVE-2022-3524
kernel
7.5
CVE-2022-3521
kernel
2.5
CVE-2022-3515
libksba
8.1
CVE-2022-20423
kernel
4.6
CVE-2021-46848
libtasn1
9.1
CVE-2022-3517
nodejs-minimatch
7.5
CVE-2022-3555
libX11
7.5
CVE-2022-3554
libX11
7.5
Bugfix:
issue
仓库
#I5XX3U:Backport and apply AutoBOLT from openEuler GCC 10.3.1 to openEuler GCC 7.3.1
gcc
#I5XWVQ:oec-hardware版本升级至1.1.3
oec-hardware
#I5XV88:第三方模块构建热补丁时报错
kpatch
#I5WW82:【openEuler-1.0-LTS】不支持 MegaRAID 9560-16i<https://gitee.com/open_euler/dashboard?issue_id=I5WW82>
kernel
openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I4QV7S
【openEuler-20.03-LTS-SP3】flink run 命令执行失败
flink
sig-bigdata
I4RVHE
losetup : 当loop设备编号超过7位时,losetup命令无法操作该设备
util-linux
Base-service
I4UMEV
[openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历
kernel
Kernel
I5IGAS
【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5IGOR
【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败
fluidsynth
Application
I5JBJ9
【20.03 SP3_EPOL_update20220727】ovirt-engine-backend包卸载过程的告警信息需要优化
ovirt-engine
oVirt
I5JLNF
【20.03 SP3 update 20220727】【arm/x86】ovirt-websocket-proxy.service服务启动失败
ovirt-engine
oVirt
I5JLRQ
【20.03 SP3 update 20220727】【arm/x86】ovirt-engine-notifier.service服务启动失败
ovirt-engine
oVirt
I5KXUY
【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I5KY4S
【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功
vdsm
oVirt
I5LYJK
【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常
TCP_option_address
Kernel
I5PT12
[20.03-LTS-SP3]spec文件存在软件包编译依赖自身,且打包包含系统环境文件
ima-evm-utils
Base-service
I5PUIA
[20.03-LTS-SP3]spec文件存在软件包编译依赖自身,且打包包含系统环境文件
qrencode
Desktop
I5SCLC
【20.03 SP3】selinux-policy卸载异常
selinux-policy
sig-security-facility
openEuler-22.03-LTS Update 20221024
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题5个,已知漏洞17个。目前版本分支剩余待修复缺陷10个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5X85H?from=project-i…
CVE修复:
CVE
仓库
CVSS评分
CVE-2022-41742
nginx
7.1
CVE-2022-41741
nginx
7.8
CVE-2022-39260
git
8.8
CVE-2022-39253
git
5.5
CVE-2022-3627
libtiff
6.5
CVE-2022-3626
libtiff
6.5
CVE-2022-3599
libtiff
6.5
CVE-2022-3598
libtiff
6.5
CVE-2022-3597
libtiff
6.5
CVE-2022-3570
libtiff
9.8
CVE-2022-3515
libksba
8.1
CVE-2022-3165
qemu
6.5
CVE-2022-20423
kernel
4.6
CVE-2021-46848
libtasn1
9.1
CVE-2022-3517
nodejs-minimatch
7.5
CVE-2022-3555
libX11
7.5
CVE-2022-3554
libX11
7.5
Bugfix:
issue
仓库
#I5RYNU:删除二进制命令文件包含的RPATH和RUNPATH
acl
#I5UHVY:例行分析grub2软件包开源补丁
grub2
#I5XWVV:oec-hardware版本升级至1.1.3
oec-hardware
#I5WI80:upgrade to jdk11.0.17-8(GA)
openjdk-11
#I5UNSG: libbpf软件包开源补丁回合
libbpf
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I5G9CY
升级iinstall-scripts包会导致系统启动异常
install-scripts
sig-OS-Builder
I5JIA6
【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JPII
【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin
ovirt-engine
oVirt
I5LKKX
libbluray build problem in openEuler:22.03:LTS
libbluray
Desktop
I5LKM6
libxshmfence build problem in openEuler:22.03:LTS
libxshmfence
Desktop
I5LKY8
yaffs2 build problem in openEuler:22.03:LTS
yaffs2
sig-embedded
I5QKGT
【22.03LTS_update0907】【arm/x86】kmod-drbd90软件包安装之后文件有缺失
kmod-drbd90
sig-Ha
I5RHYO
【22.09 RC4】【arm/x86】package.ini中的redis_host配置为不存在的ip,重启pkgship服务失败,服务一直在尝试重启
pkgship
sig-EasyLife
I5Q4S3
[22.03-LTS]x86虚拟机卸载qxl模块,机器自动重启
kernel
Kernel
I5TMFF
[22.03-LTS]先安装mysql-server,卸载后再安装mariadb-server,mariadb服务启动失败
mariadb
DB
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE:
漏洞编号
剩余天数
CVSS评分
软件包
SIG
CVE-2022-41849
0.97
4.2
risc-v-kernel
sig-RISC-V
CVE-2022-41850
0.97
4.7
risc-v-kernel
sig-RISC-V
CVE-2022-41848
0.98
4.2
risc-v-kernel
sig-RISC-V
CVE-2022-0778
1.61
7.5
mariadb
DB
CVE-2022-3529
2.07
7.5
risc-v-kernel
sig-RISC-V
CVE-2022-3527
2.07
7.5
risc-v-kernel
sig-RISC-V
CVE-2022-3528
2.07
7.5
risc-v-kernel
sig-RISC-V
CVE-2022-3534
2.21
8
risc-v-kernel
sig-RISC-V
CVE-2022-3530
2.21
7.5
risc-v-kernel
sig-RISC-V
CVE-2022-3545
2.22
7.8
risc-v-kernel
sig-RISC-V
CVE-2022-3541
2.22
7.8
risc-v-kernel
sig-RISC-V
CVE-2022-3553
2.57
7.5
xorg-x11-server
Desktop
CVE-2022-3566
2.65
7.1
risc-v-kernel
sig-RISC-V
CVE-2022-3567
2.65
7.1
risc-v-kernel
sig-RISC-V
CVE-2022-3565
2.65
8
risc-v-kernel
sig-RISC-V
CVE-2022-3564
2.65
8
risc-v-kernel
sig-RISC-V
CVE-2022-3551
3.09
7.5
xorg-x11-server
Desktop
CVE-2018-19518
4.09
7.5
php
Base-service
CVE-2018-19935
4.1
7.5
php
Base-service
CVE-2022-42468
4.33
9.8
flume
sig-bigdata
CVE-2022-34169
4.37
7.5
openjdk-1.8.0
Compiler
CVE-2022-41420
4.56
5.5
nasm
Programming-language
CVE-2022-40617
5.34
strongswan
Application
CVE-2022-3625
5.87
7.8
kernel
Kernel
CVE-2022-3625
5.87
7.8
risc-v-kernel
sig-RISC-V
CVE-2022-3623
6.06
7.5
risc-v-kernel
sig-RISC-V
CVE-2022-3621
6.06
7.5
risc-v-kernel
sig-RISC-V
CVE-2022-3623
6.06
7.5
kernel
Kernel
CVE-2022-3621
6.06
7.5
kernel
Kernel
CVE-2022-3647
6.83
7.5
redis6
sig-bigdata
CVE-2022-3647
6.83
7.5
redis5
sig-bigdata
CVE-2022-3640
6.83
8.8
risc-v-kernel
sig-RISC-V
CVE-2022-3635
6.83
7
risc-v-kernel
sig-RISC-V
CVE-2022-3636
6.83
7.8
risc-v-kernel
sig-RISC-V
CVE-2022-3635
6.84
7
kernel
Kernel
CVE-2022-32172
8.14
5.4
zinc
sig-Java
CVE-2022-32171
8.14
5.4
zinc
sig-Java
CVE-2022-3424
8.22
risc-v-kernel
sig-RISC-V
CVE-2022-3577
8.68
7.8
risc-v-kernel
sig-RISC-V
CVE-2022-3435
9.22
4.3
risc-v-kernel
sig-RISC-V
CVE-2022-43680
9.43
7.5
expat
Base-service
CVE-2022-3647
9.94
7.5
redis
Others
CVE-2019-2684
10.71
5.9
tomcat
Application
CVE-2022-42703
10.72
5.5
risc-v-kernel
sig-RISC-V
CVE-2022-41704
10.83
7.5
batik
sig-Java
CVE-2022-42890
10.86
7.5
batik
sig-Java
CVE-2022-43750
10.93
7.8
risc-v-kernel
sig-RISC-V
CVE-1999-0634
12.95
openssh
Networking
CVE-2022-3466
13.22
cri-o
sig-CloudNative
CVE-2022-42721
14.1
5.5
risc-v-kernel
sig-RISC-V
CVE-2022-42721
14.1
5.5
kernel
Kernel
CVE-2022-42722
14.22
5.5
kernel
Kernel
CVE-2022-42722
14.22
5.5
risc-v-kernel
sig-RISC-V
CVE-2022-39229
14.73
4.3
grafana
Application
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
车明道(openEuler release SIG)
Mobile: +86 15345431107
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail: chemingdao(a)huawei.com<mailto:chemingdao@huawei.com>
[cid:image002.png@01D8EBB8.F723AD90]Open Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件!
This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it
1
0
Dear all,
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。
本公示分为五部分:
1、openEuler-20.03-LTS-SP1 Update 20221017发布情况及待修复缺陷
2、openEuler-20.03-LTS-SP3 Update 20221017发布情况及待修复缺陷
3、openEuler-22.03-LTS Update 20221017发布情况及待修复缺陷
4、openEuler 关键组件待修复CVE 清单
5、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2022/10/28)提供 update_20221024版本。
openEuler-20.03-LTS-SP1 Update 20221017
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题1个,已知漏洞24个。目前版本分支剩余待修复缺陷62个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5VZVG?from=project-i…
CVE修复:
CVE
仓库
CVSS评分
CVE-2022-42703
kernel
5.5
CVE-2022-42012
dbus
6.5
CVE-2022-42011
dbus
6.5
CVE-2022-42010
dbus
6.5
CVE-2022-41850
kernel
4.7
CVE-2022-41715
golang
4
CVE-2022-37434
mariadb-connector-c
9.8
CVE-2022-3324
vim
7.8
CVE-2022-3297
vim
7.8
CVE-2022-2929
dhcp
6.5
CVE-2022-2928
dhcp
7.5
CVE-2022-2880
golang
5.3
CVE-2022-2879
golang
6.2
CVE-2022-2058
libtiff
6.5
CVE-2022-2056
libtiff
6.5
CVE-2022-20422
kernel
7
CVE-2022-20421
kernel
7.8
CVE-2022-1941
protobuf
7.5
CVE-2020-0198
libexif
7.5
CVE-2020-0181
libexif
7.5
CVE-2020-0093
libexif
5
CVE-2019-9278
libexif
8.8
CVE-2019-1010180
crash
7.8
CVE-2021-33036
hadoop
8.8
Bugfix:
issue
仓库
#I5T5DD:[openEuler-1.0-LTS] 解决持有zone->lock后调用printk导致的 lockdep 问题
kernel
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I281C1
【fuzz】runtime error:
libsass
Base-service
I437CR
[SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错
obs-server
Others
I43OSX
[clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0
clamav
Others
I44RHB
large loop in OBJ_obj2txt
openssl
sig-security-facility
I44RIX
large loop in bn_lshift_fixed_top
openssl
sig-security-facility
I47I56
yum升级出现dkms的错误告警打印
dkms
Others
I48GIM
【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I490MU
Uncaught exception in get_tokens_unprocessed
python-pygments
Programming-language
I4CJX9
[20.03-LTS-SP1] 389-ds-base包下的部分命令-v参数不显示版本号
three-eight-nine-ds-base
Application
I4F8YQ
integer overflow in start_input_bmp
libjpeg-turbo
Desktop
I4F8ZI
heap-buffer-overflow in get_word_rgb_row
libjpeg-turbo
Desktop
I4F903
Unexpect-exit in start_input_tga
libjpeg-turbo
Desktop
I4F913
Timeout in tjDecompress2
libjpeg-turbo
Desktop
I4FRSL
Undefined-shift in bitset_set
augeas
Desktop
I4FT5J
Timeout in fa_from_re
augeas
Desktop
I4FT5U
stack overflow in fa_from_re
augeas
Desktop
I4FT61
stack overflow in re_case_expand
augeas
Desktop
I4FT67
memleaks in ref_make_ref
augeas
Desktop
I4FT6B
SEGV in re_case_expand
augeas
Desktop
I4FT6F
stack overflow in parse_concat_exp
augeas
Desktop
I4FT7B
stack overflow in calc_eclosure_iter
augeas
Desktop
I4FT8E
stack overflow in peek_token
augeas
Desktop
I4FT8P
stack overflow in parse_path_expr
augeas
Desktop
I4FT97
Out of memory in ns_from_locpath
augeas
Desktop
I4FT9A
SEGV in eval_expr
augeas
Desktop
I4FT9C
SEGV in tree_prev
augeas
Desktop
I4FT9G
stack overflow in check_expr
augeas
Desktop
I4FT9I
stack overflow in free_expr
augeas
Desktop
I4G4A5
Undefine-shift in _bfd_safe_read_leb128
binutils
Compiler
I4G4B1
Integer overflow in print_vms_time
binutils
Compiler
I4G4VY
memleak in parse_gnu_debugaltlink
binutils
Compiler
I4G4WF
Heap-buffer-overflow in slurp_hppa_unwind_table
binutils
Compiler
I4G4WW
Use-after-free in make_qualified_name
binutils
Compiler
I4G4X6
memleak in byte_get_little_endian
binutils
Compiler
I4G4XF
memleak in process_mips_specific
binutils
Compiler
I4G4Y0
out-of-memory in vms_lib_read_index
binutils
Compiler
I4G4YJ
Heap-buffer-overflow in bfd_getl16
binutils
Compiler
I4G4YV
Floating point exception in _bfd_vms_slurp_etir
binutils
Compiler
I4G5TL
stack-buffer-overflow in redisvFormatCommand
hiredis
Base-service
I4G5U2
AddressSanitizer CHECK failed in sdscatvprintf
hiredis
Base-service
I4G5UN
SEGV in redisvFormatCommand
hiredis
Base-service
I4G5WG
AddressSanitizer CHECK failed in sdscatlen
hiredis
Base-service
I4G5XO
Attempting free wild-addr in hi_free
hiredis
Base-service
I4J0OY
【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常
libdap
sig-recycle
I4JMG4
【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251
python-robotframework
sig-ROS
I4K6ES
stack-buffer-overflow in UINT32_Marshal
libtpms
sig-security-facility
I4K6FU
global-buffer-overflow in Array_Marshal
libtpms
sig-security-facility
I4K6R7
memleak in wrap_nettle_mpi_init
gnutls
sig-security-facility
I4K6UI
Timeout in _asn1_find_up
gnutls
sig-security-facility
I4KT2A
integer overflow in luaV_execute
lua
Base-service
I4KT3D
integer overflow in intarith
lua
Base-service
I4KT3Q
Division by zero in luaV_execute
lua
Base-service
I4KT40
Timeout in luaV_finishget
lua
Base-service
I4O16Z
【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息
kernel
Kernel
I4QV6N
【openEuler-20.03-LTS-SP1】flink命令执行失败
flink
sig-bigdata
I5G81X
【20.03 SP1】selinux-policy卸载异常
selinux-policy
sig-security-facility
I5GT2K
【20.03-SP1】【arm/x86】pcp-system-tools包下的pcp-mpstat命令执行报错
pcp
Application
I5IG1V
【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败
efl
sig-compat-winapp
I5IG6K
【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5JHX2
【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JNSL
【20.03 SP1 update 20220727】【arm】htcacheclean.service服务启动之后,日志中提示”Can't open PID file /run/httpd/htcacheclean/pid“
httpd
Networking
I5Q5D1
【20.03 SP1】ibus在sp1分支安装有异常告警
ibus
Desktop
openEuler-20.03-LTS-SP3 Update 20221017
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问题3个,已知漏洞21个。目前版本分支剩余待修复缺陷14个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5VZW1?from=project-i…
CVE修复:
需求类型
软件包
CVSS评分
CVE-2022-42703
kernel
5.5
CVE-2022-41850
kernel
4.7
CVE-2022-41715
golang
4
CVE-2022-37434
mariadb-connector-c
9.8
CVE-2022-3324
vim
7.8
CVE-2022-3297
vim
7.8
CVE-2022-2929
dhcp
6.5
CVE-2022-2928
dhcp
7.5
CVE-2022-2880
golang
5.3
CVE-2022-2879
golang
6.2
CVE-2022-2058
libtiff
6.5
CVE-2022-2056
libtiff
6.5
CVE-2022-20422
kernel
7
CVE-2022-20421
kernel
7.8
CVE-2022-1941
protobuf
7.5
CVE-2020-0198
libexif
7.5
CVE-2020-0181
libexif
7.5
CVE-2020-0093
libexif
5
CVE-2019-9278
libexif
8.8
CVE-2019-1010180
crash
7.8
CVE-2021-33036
hadoop
8.8
Bugfix:
issue
仓库
#I5NQEE:虚拟机安装时,环形进度条不转动
anaconda
#I5T5DD:[openEuler-1.0-LTS] 解决持有zone->lock后调用printk导致的 lockdep 问题
kernel
#I5UV23:【20.03 LTS SP3】libcareplus升级到1.0.0-13
libcareplus
openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I4QV7S
【openEuler-20.03-LTS-SP3】flink run 命令执行失败
flink
sig-bigdata
I4RVHE
losetup : 当loop设备编号超过7位时,losetup命令无法操作该设备
util-linux
Base-service
I4UMEV
[openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历
openEuler/kernel
Kernel
I5IGAS
【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5IGOR
【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败
fluidsynth
Application
I5JBJ9
【20.03 SP3_EPOL_update20220727】ovirt-engine-backend包卸载过程的告警信息需要优化
ovirt-engine
oVirt
I5JLNF
【20.03 SP3 update 20220727】【arm/x86】ovirt-websocket-proxy.service服务启动失败
ovirt-engine
oVirt
I5JLRQ
【20.03 SP3 update 20220727】【arm/x86】ovirt-engine-notifier.service服务启动失败
ovirt-engine
oVirt
I5KXUY
【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I5KY4S
【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功
vdsm
oVirt
I5LYJK
【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常
TCP_option_address
Kernel
I5PT12
[20.03-LTS-SP3]spec文件存在软件包编译依赖自身,且打包包含系统环境文件
ima-evm-utils
Base-service
I5PUIA
[20.03-LTS-SP3]spec文件存在软件包编译依赖自身,且打包包含系统环境文件
qrencode
Desktop
I5SCLC
【20.03 SP3】selinux-policy卸载异常
selinux-policy
sig-security-facility
openEuler-22.03-LTS Update 20221017
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题11个,已知漏洞29个。目前版本分支剩余待修复缺陷11个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I5VZWL?from=project-i…
CVE修复:
CVE
仓库
CVSS评分
CVE-2022-3297
vim
7.8
CVE-2022-3324
vim
7.8
CVE-2022-1941
protobuf
7.5
CVE-2022-37434
mariadb-connector-c
9.8
CVE-2022-2056
libtiff
6.5
CVE-2022-2058
libtiff
6.5
CVE-2022-1184
kernel
5.5
CVE-2022-20421
kernel
7.8
CVE-2022-20422
kernel
7
CVE-2022-3303
kernel
4.7
CVE-2022-3435
kernel
4.3
CVE-2022-41674
kernel
8.1
CVE-2022-41849
kernel
4.2
CVE-2022-41850
kernel
4.7
CVE-2022-42703
kernel
5.5
CVE-2022-42719
kernel
8.8
CVE-2022-42720
kernel
7.8
CVE-2022-42721
kernel
5.5
CVE-2022-2879
golang
6.2
CVE-2022-2880
golang
5.3
CVE-2022-41715
golang
4
CVE-2022-2928
dhcp
7.5
CVE-2022-2929
dhcp
6.5
CVE-2022-42010
dbus
6.5
CVE-2022-42011
dbus
6.5
CVE-2022-42012
dbus
6.5
CVE-2019-10101
crash
7.8
CVE-2021-34337
mailman
7.4
CVE-2021-33036
hadoop
8.8
Bugfix:
issue
仓库
#I5NQEE:虚拟机安装时,环形进度条不转动
anaconda
#I5T5DD:[openEuler-1.0-LTS] 解决持有zone->lock后调用printk导致的 lockdep 问题
kernel
#I416C7:kernel-rpm-macros 不支持-p |preamble 参数,
openEuler-rpm-config
#I5LQP4:[22.09-RC1][aarch64/x86_64]安装完成后输入命令“yum grouplist hidden”回显缺少“Installed Environment Groups” 和 “Installed Groups”子项
dnf
#I5UYJU: 有不支持的段,导致热补丁编译失败
kpatch
#I5TQQR:openEuler-22.03-LTS和openEuler-20.03-LTS-SP1分支spec差异排查和同步
NetworkManager
#I5TWH0:【22.03-LTS】NetworkManager主包中存在多余库文件
NetworkManager
#I5WBM8:initscripts spec优化
initscripts
#I5WMUY:[libpsl] change release number
libpsl
#I5W498:【OLK-5.10】IO长稳测试中,正常下发读写时出现文件系统错误导致挂载为readonly
kernel
#I5WN5N:hange default ntp server and correct the default value of RuntimeDirectoryInodesMax
systemd
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I5G9CY
升级iinstall-scripts包会导致系统启动异常
install-scripts
sig-OS-Builder
I5JIA6
【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JPII
【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin
ovirt-engine
oVirt
I5LKKX
libbluray build problem in openEuler:22.03:LTS
libbluray
Desktop
I5LKM6
libxshmfence build problem in openEuler:22.03:LTS
libxshmfence
Desktop
I5LKY8
yaffs2 build problem in openEuler:22.03:LTS
yaffs2
sig-embedded
I5Q4S3
[22.03-LTS]x86虚拟机卸载qxl模块,机器自动重启
openEuler/kernel
Kernel
I5QKGT
【22.03LTS_update0907】【arm/x86】kmod-drbd90软件包安装之后文件有缺失
kmod-drbd90
sig-Ha
I5RHYO
【22.09 RC4】【arm/x86】package.ini中的redis_host配置为不存在的ip,重启pkgship服务失败,服务一直在尝试重启
pkgship
sig-EasyLife
I5TMFF
[22.03-LTS]先安装mysql-server,卸载后再安装mariadb-server,mariadb服务启动失败
mariadb
DB
I5VL9Q
[22.03-LTS]安装完成后输入命令“yum grouplist hidden”回显缺少“Installed Environment Groups” 和 “Installed Groups”子项
anaconda
sig-OS-Builder
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE:
漏洞编号
剩余天数
CVSS评分
软件包
SIG
CVE-2022-37026
3.79
9.8
erlang
Programming-language
CVE-2022-32149
4.87
7.5
golang
sig-golang
CVE-2022-40674
5.7
9.8
firefox
Application
CVE-2022-41083
5.78
7.8
jupyter
sig-bigdata
CVE-2022-3479
5.93
7.5
nss
sig-security-facility
CVE-2022-42720
5.94
7.8
risc-v-kernel
sig-RISC-V
CVE-2022-42719
5.94
8.8
kernel
Kernel
CVE-2022-41674
5.94
8.1
kernel
Kernel
CVE-2022-42720
5.94
7.8
kernel
Kernel
CVE-2022-42719
5.94
8.8
risc-v-kernel
sig-RISC-V
CVE-2022-41674
5.94
8.1
risc-v-kernel
sig-RISC-V
CVE-2022-39201
6.57
7.5
grafana
Application
CVE-2022-31130
6.58
7.5
grafana
Application
CVE-2022-31123
6.73
7.8
grafana
Application
CVE-2022-3517
7.31
7.5
nodejs-minimatch
sig-nodejs
CVE-2022-3526
9.44
7.5
kernel
Kernel
CVE-2022-3522
9.44
7
kernel
Kernel
CVE-2022-3524
9.44
7.5
kernel
Kernel
CVE-2022-0778
9.45
7.5
mariadb
DB
CVE-2022-42969
9.52
7.5
python-py
Programming-language
CVE-2022-3529
9.91
7.5
risc-v-kernel
sig-RISC-V
CVE-2022-3527
9.91
7.5
risc-v-kernel
sig-RISC-V
CVE-2022-3528
9.91
7.5
risc-v-kernel
sig-RISC-V
CVE-2022-3527
9.91
7.5
kernel
Kernel
CVE-2022-3528
9.91
7.5
kernel
Kernel
CVE-2022-3554
10.05
7.5
libX11
Desktop
CVE-2022-3545
10.05
7.8
kernel
Kernel
CVE-2022-3555
10.05
7.5
libX11
Desktop
CVE-2022-3541
10.05
7.8
kernel
Kernel
CVE-2022-3534
10.05
8
kernel
Kernel
CVE-2022-3530
10.05
7.5
risc-v-kernel
sig-RISC-V
CVE-2022-3530
10.05
7.5
kernel
Kernel
CVE-2022-3545
10.06
7.8
risc-v-kernel
sig-RISC-V
CVE-2022-3541
10.06
7.8
risc-v-kernel
sig-RISC-V
CVE-2022-3534
10.06
8
risc-v-kernel
sig-RISC-V
CVE-2022-3553
10.42
7.5
xorg-x11-server
Desktop
CVE-2022-3566
10.49
7.1
risc-v-kernel
sig-RISC-V
CVE-2022-3565
10.49
8
risc-v-kernel
sig-RISC-V
CVE-2022-3566
10.49
7.1
kernel
Kernel
CVE-2022-3565
10.49
8
kernel
Kernel
CVE-2022-3564
10.49
8
risc-v-kernel
sig-RISC-V
CVE-2022-3564
10.49
8
kernel
Kernel
CVE-2018-14553
10.73
7.5
gd
Desktop
CVE-2018-1000222
10.73
8.8
gd
Desktop
CVE-2022-32893
10.78
8.8
webkit2gtk3
Desktop
CVE-2022-24107
10.79
7.8
poppler
Desktop
CVE-2022-24106
10.79
7.8
poppler
Desktop
CVE-2020-36604
10.79
8.1
nodejs-hoek
sig-nodejs
CVE-2022-38222
10.8
7.8
poppler
Desktop
CVE-2018-12015
10.85
7.5
tar
Base-service
CVE-2021-252893
10.91
7.5
python-pillow
sig-python-modules
CVE-2021-252891
10.91
7.5
python-pillow
sig-python-modules
CVE-2022-3551
10.93
7.5
xorg-x11-server
Desktop
CVE-2022-3594
11.38
7.5
kernel
Kernel
CVE-2018-5744
11.49
7.5
bind
Networking
CVE-2022-39260
11.56
8.5
git
Base-service
CVE-2018-19518
11.93
7.5
php
Base-service
CVE-2018-19935
11.94
7.5
php
Base-service
CVE-2022-41420
12.4
5.5
nasm
Programming-language
CVE-2022-40617
13.19
strongswan
Application
CVE-2022-20424
13.44
kernel
Kernel
CVE-2022-20423
13.56
4.6
kernel
Kernel
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
车明道(openEuler release SIG)
Mobile: +86 15345431107
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail: chemingdao(a)huawei.com<mailto:chemingdao@huawei.com>
[cid:image002.png@01D8E590.9E38BF00]Open Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件!
This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it
1
0