Sa-announce
Threads by month
- ----- 2025 -----
- June
- May
- April
- March
- February
- January
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- 1 participants
- 241 discussions
Dear all,
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3、openEuler-22.03-LTS及openEuler-22.03-LTS-SP1 update版本满足版本出口质量,现进行发布公示。
本公示分为六部分:
1、openEuler-20.03-LTS-SP1 Update 20230524发布情况及待修复缺陷
2、openEuler-20.03-LTS-SP3 Update 20230524发布情况及待修复缺陷
3、openEuler-22.03-LTS Update 20230524发布情况及待修复缺陷
4、openEuler-22.03-LTS-SP1 Update 20230524发布情况及待修复缺陷
5、openEuler 关键组件待修复CVE 清单
6、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2023/06/03)提供 update_ 20230531 版本。
openEuler-20.03-LTS-SP1 Update 20230524
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题2个,已知漏洞11个。目前版本分支剩余待修复缺陷33个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I773Z7?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2023-1786
cloud-init
5.5
CVE-2023-29400
golang
7.3
CVE-2023-24539
golang
7.3
CVE-2023-26555
ntp
6.4
CVE-2023-24607
qt5-qtbase
7.8
CVE-2023-32233
kernel
7.8
CVE-2023-2162
kernel
5.5
CVE-2023-2124
kernel
7
CVE-2023-1018
libtpms
5.5
CVE-2023-1017
libtpms
7.8
CVE-2022-1050
qemu
8.8
Bugfix:
issue
仓库
#I73KF0:CVE-2023-1393
tigervnc
#I6V709:GNU ar (GNU Binutils for Ubuntu) 2.26.1 编译4.19内核编译失败
kernel
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高):
里程碑
任务ID
任务标题
优先级
sig组
关联仓库
openEuler 20.03 LTS SP1 update20220817
I5JHX2
【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败
主要
sig/oVirt
ovirt-engine
openEuler 20.03-LTS-SP1
I4G4A5
Undefine-shift in _bfd_safe_read_leb128
无优先级
sig/Base-service
binutils
openEuler 20.03-LTS-SP1
I4G4B1
Integer overflow in print_vms_time
无优先级
sig/Base-service
binutils
openEuler 20.03-LTS-SP1
I4G4VY
memleak in parse_gnu_debugaltlink
无优先级
sig/Base-service
binutils
openEuler 20.03-LTS-SP1
I4G4WF
Heap-buffer-overflow in slurp_hppa_unwind_table
无优先级
sig/Base-service
binutils
openEuler 20.03-LTS-SP1
I4G4WW
Use-after-free in make_qualified_name
无优先级
sig/Base-service
binutils
openEuler 20.03-LTS-SP1
I4G4X6
memleak in byte_get_little_endian
无优先级
sig/Base-service
binutils
openEuler 20.03-LTS-SP1
I4G4XF
memleak in process_mips_specific
无优先级
sig/Base-service
binutils
openEuler 20.03-LTS-SP1
I4G4Y0
out-of-memory in vms_lib_read_index
无优先级
sig/Base-service
binutils
openEuler 20.03-LTS-SP1
I4G4YJ
Heap-buffer-overflow in bfd_getl16
无优先级
sig/Base-service
binutils
openEuler 20.03-LTS-SP1
I4G4YV
Floating point exception in _bfd_vms_slurp_etir
无优先级
sig/Base-service
binutils
openEuler 20.03-LTS-SP1
I4J0OY
【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常
主要
sig/sig-recycle
libdap
openEuler 20.03-LTS-SP1
I4JMG4
【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251
主要
sig/sig-ROS
python-robotframework
openEuler 20.03-LTS-SP1
I5DLX7
[20.03 22.03] 管理员指南操作文档mysql服务搭建指导文档有误
主要
sig/doc
docs
openEuler 20.03-LTS-SP1
I5IG1V
【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败
次要
sig/compat-winapp
efl
openEuler 20.03-LTS-SP1
I5IG6K
【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
次要
sig/dev-utils
opencryptoki
openEuler 20.03-LTS-SP1
I6VFAE
[20.03 SP1] [x86/arm] mariadb授权给远程用户,远程连接服务失败
次要
sig/DB
mariadb
openEuler 20.03LTS SP1 update2103
I3E5C1
【20.03-SP1】【arm/x86】服务启动失败
主要
sig/bigdata
hadoop
openEuler 20.03LTS SP1 update210729
I437CR
[SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错
无优先级
sig/Others
obs-server
openEuler 20.03LTS SP1 update210826
I47GLA
【20.03-LTS-SP1】srt-ffplay命令执行报错
次要
sig/sig-DDE
srt
openEuler 20.03LTS SP1 update210901
I48GIM
【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败
主要
sig/oVirt
ovirt-cockpit-sso
openEuler 20.03LTS SP1 update210926
I4CMSV
【20.03-LTS-SP1】【arm/x86】搭建Kubernetes 集群缺少包etcd
无优先级
sig/TC
community
openEuler 20.03LTS SP1 update220111
I4QV6N
【openEuler-20.03-LTS-SP1】flink命令执行失败
无优先级
sig/sig-ai-bigdata
flink
openEuler-20.03-LTS-SP1
I281C1
【fuzz】runtime error:
无优先级
sig/Base-service
libsass
openEuler-20.03-LTS-SP1
I3B5TJ
在obs server环境上,配置rpm包签名,签名报错
无优先级
sig/Infrastructure
infrastructure
openEuler-20.03-LTS-SP1
I3QGU7
系统不支持GB18030
无优先级
sig/TC
community
openEuler-20.03-LTS-SP1-dailybuild
I5XERK
certmonger build problem in openEuler:20.03:LTS:SP1
无优先级
sig/security-facility
certmonger
openEuler-20.03-LTS-SP1-dailybuild
I5Y6VJ
ovirt-hosted-engine-setup install problem in openEuler:20:03:LTS:SP1
无优先级
sig/oVirt
ovirt-hosted-engine-setup
openEuler-20.03-LTS-SP1-dailybuild
I5Y6XB
cockpit-ovirt install problem in openEuler:20:03:LTS:SP1
无优先级
sig/oVirt
cockpit-ovirt
openEuler-20.03-LTS-SP1-dailybuild
I5Y6YX
ovirt-host install problem in openEuler:20:03:LTS:SP1
无优先级
sig/oVirt
ovirt-host
openEuler-20.03-LTS-SP1-dailybuild
I5Y79E
freeipa install problem in openEuler:20:03:LTS:SP1
无优先级
sig/oVirt
freeipa
openEuler-20.03-LTS-SP1-dailybuild
I5Y99T
mate-desktop install problem in openEuler:20:03:LTS:SP1
无优先级
sig-mate-desktop
mate-desktop
openEuler-20.03-LTS-SP1-dailybuild
I5YU6F
ovirt-engine build problem in openEuler:20.03:LTS:SP1:Epol
无优先级
sig/oVirt
ovirt-engine
openEuler-20.03-LTS-SP3 Update 20230524
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问2个,已知漏洞11个。目前版本分支剩余待修复缺陷 23个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I773Z8?from=project-i…
CVE修复:
CVE
软件包
优先级
CVE-2023-1786
cloud-init
5.5
CVE-2023-24539
golang
7.3
CVE-2023-29400
golang
7.3
CVE-2023-26555
ntp
6.4
CVE-2023-24607
qt5-qtbase
7.8
CVE-2023-2124
kernel
7
CVE-2023-2162
kernel
5.5
CVE-2023-32233
kernel
7.8
CVE-2022-1050
qemu
8.8
CVE-2023-1017
libtpms
7.8
CVE-2023-1018
libtpms
5.5
Bugfix:
issue
仓库
#I73KF0:CVE-2023-1393
tigervnc
#I6V709:GNU ar (GNU Binutils for Ubuntu) 2.26.1 编译4.19内核编译失败
kernel
openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高):
里程碑
任务ID
任务标题
优先级
sig组
关联仓库
20.03-SP3-Kernel-Defect
I4N7OH
vxlan和ip6gre等网卡设备在配置了多个ipv6地址时会出现kernel stackoverflow
无优先级
sig/Kernel
kernel
20.03-SP3-Kernel-Defect
I4SPBX
需要在openEuler内核的version.h添加类似RHEL_RELEASE_VERSION的字段
无优先级
sig/Kernel
kernel
20.03-SP3-Kernel-Defect
I4TM4Y
删除zram设备时,内核出现panic
无优先级
sig/Kernel
kernel
20.03-SP3-Kernel-Defect
I4V86A
【20.03-LTS-SP3】计算机概率性待机唤醒后网络异常(X86)
无优先级
sig/Kernel
kernel
20.03-SP3-Kernel-Defect
I4VPBC
【openEuler20.03-LTP-SP3】iSERT completions hung due to unavailable iscsit tag
无优先级
sig/Kernel
kernel
20.03-SP3-Kernel-Defect
I4YKIJ
【openEuler-1.0-LTS】加速器VF执行业务后或者当前正在执行业务,对PF进行FLR,均有可能触发QM的总线异常,需要驱动在复位之前停流踢cache
无优先级
sig/Kernel
kernel
20.03-SP3-Kernel-Defect
I55ZTS
获取mlx5网卡统计信息时若此时网卡接口从down到up会概率导致内存越界访问
无优先级
sig/Kernel
kernel
20.03-SP3-Kernel-Defect
I57KI9
【openEuelr-1.0-LTS】解决不同config下编译错误
无优先级
sig/Kernel
kernel
20.03-SP3-Kernel-Update
I6RQVT
【openEuler-1.0-LTS】flush request下发后会因调度器队列中req过多导致长时间无法执行
无优先级
sig/Kernel
kernel
openEuler 20.03 LTS SP3 update20220801
I5LYJK
【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常
主要
sig/Kernel
TCP_option_address
openEuler 20.03-LTS-SP3
I5IGAS
【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
次要
sig/dev-utils
opencryptoki
openEuler 20.03-LTS-SP3
I5IGOR
【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败
次要
sig/Application
fluidsynth
openEuler 20.03-LTS-SP3
I5KXUY
【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败
主要
sig/oVirt
ovirt-cockpit-sso
openEuler 20.03-LTS-SP3
I613DI
【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败
次要
sig/Base-service
openEuler-release
openEuler 20.03LTS SP3 update220111
I4QV7S
【openEuler-20.03-LTS-SP3】flink run 命令执行失败
无优先级
sig/sig-ai-bigdata
flink
openEuler-20.03-LTS-SP3
I5KY4S
【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功
主要
sig/oVirt
vdsm
openEuler-20.03-LTS-SP3
I61LEV
【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错
主要
sig/Others
tuna
openEuler-20.03-LTS-SP3
I6VFMI
[20.03 SP3] [x86/arm] mariadb授权给远程用户,远程连接服务失败
次要
sig/DB
mariadb
openEuler-20.03-LTS-SP3
I72EAT
【20.03 SP3】php相关包在20.03 LTS SP3降级失败
主要
sig/Base-service
php
openEuler-20.03-LTS-SP3
I72HWV
【20.03-lts-sp3】x86环境上同时安装php-fpm软件包和php-opcache软件包后会导致php-fpm.service服务启动失败
次要
sig/Base-service
php
openEuler-20.03-LTS-SP3
I73YJO
20.03-LTS-SP3 mellanox网卡无法用ethtool 工具配置速率
无优先级
sig/Kernel
kernel
openEuler-20.03-LTS-SP3-dailybuild
I5XGD0
nbdkit build problem in openEuler-20.03:LTS:SP3
无优先级
sig/Others
nbdkit
openEuler-20.03-LTS-SP3-dailybuild
I5XHU5
certmonger build problem in openEuler-20.03:LTS:SP3
无优先级
sig/security-facility
certmonger
openEuler-22.03-LTS Update 20230524
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题5个,已知漏洞11个。目前版本分支剩余待修复缺陷9个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I773Z9?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2023-1786
cloud-init
5.5
CVE-2023-24539
golang
7.3
CVE-2023-29400
golang
7.3
CVE-2023-26555
ntp
6.4
CVE-2023-1667
libssh
4.3
CVE-2023-2283
libssh
4.2
CVE-2023-2124
kernel
7
CVE-2023-2162
kernel
5.5
CVE-2023-32233
kernel
7.8
CVE-2023-1017
libtpms
7.8
CVE-2023-1018
libtpms
5.5
Bugfix:
issue
仓库
#I774WK:firefox在22.03-LTS升级102版本,需要rust>=1.59.0
rust
#I6Y1VQ:firefox在22.03升级102版本,需要3.79版本的SECMOD_LockedModuleHasRemovableSlots特性,nss提供pkgconfig(nss)版本为3.54,需更改为3.72
nss
#I6PMGP:openeuler 22.03-LTS 分支 firefox 软件包版本太低,存在大量未修复 CVE,请尽快同步 master 上高版本到 openeuler 22.03-LTS 分支
firefox
#I5S2BN:建议开启saslauthd服务退出后自动重启
cyrus-sasl
#I73KF0:CVE-2023-1393
tigervnc
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/ob…
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-22.03-LTS Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高):
里程碑
任务ID
任务标题
优先级
sig
关联仓库
22.03-LTS-Kernel-Update
I5E2N2
【openEuler 22.03-LTS】5.10内核执行ltp用例出现softlockup问题
无优先级
sig/Kernel
kernel
openEuler-22.03-LTS
I5Q4S3
[22.03-LTS]x86虚拟机卸载qxl模块,机器自动重启
主要
sig/Kernel
kernel
openEuler-22.03-LTS
I64919
【22.03_LTS_update1130】【arm/x86】xorg-x11-server-Xwayland因缺少依赖导致无法安装
主要
sig/Desktop
xorg-x11-server-xwayland
openEuler-22.03-LTS
I677QX
【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误
主要
sig/DB
opengauss-server
openEuler-22.03-LTS
I6VFRX
[22.03-LTS][x86/arm]mariadb授权给远程用户,远程连接服务失败
次要
sig/DB
mariadb
openEuler-22.03-LTS
I72N5G
【22.03-lts】x86环境上同时安装php-fpm软件包和php-opcache软件包后会导致php-fpm.service服务启动失败
次要
sig/Base-service
php
openEuler-22.03-LTS-round-3
I665SM
resize2fs出现csum不一致
无优先级
sig/Kernel
kernel
openEuler-22.03-LTS-update220727
I5JPII
【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin
主要
sig/oVirt
ovirt-engine
openEuler-22.03-LTS-update220907
I5QKGT
【22.03LTS_update0907】【arm/x86】kmod-drbd90软件包安装之后文件有缺失
主要
sig/sig-Ha
kmod-drbd90
openEuler-22.03-LTS SP1 Update 20230524
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS-SP1修复版本已知问题4个,已知漏洞10个。目前版本分支剩余待修复缺陷15个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I773Z5?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2023-1786
cloud-init
5.5
CVE-2023-24539
golang
7.3
CVE-2023-29400
golang
7.3
CVE-2023-26555
ntp
6.4
CVE-2023-2124
kernel
7
CVE-2023-2162
kernel
5.5
CVE-2023-32233
kernel
7.8
CVE-2022-1050
qemu
8.8
CVE-2023-1017
libtpms
7.8
CVE-2023-1018
libtpms
5.5
Bugfix:
issue
仓库
#I6Y1VQ:firefox在22.03升级102版本,需要3.79版本的SECMOD_LockedModuleHasRemovableSlots特性,nss提供pkgconfig(nss)版本为3.54,需更改为3.72
nss
#I6PMGP:openeuler 22.03-LTS 分支 firefox 软件包版本太低,存在大量未修复 CVE,请尽快同步 master 上高版本到 openeuler 22.03-LTS 分支
firefox
#I73KF0:CVE-2023-1393
tigervnc
#I4XKVM:All linux capabilities cannot be parsed for digest list in openEuler-22.03
digest-list-tools
openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.openatom.cn/project/show/openEuler:22.03:LTS:SP1
https://build.openeuler.openatom.cn/project/show/openEuler:22.03:LTS:SP1:Ep…
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_versio…
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_versio…
https://repo.openeuler.org/openEuler-22.03-LTS-SP1/EPOL/update/multi_versio…
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示(任务ID标注红色的问题单优先级高):
里程碑
任务ID
任务标题
优先级
sig组
关联仓库
openEuler 22.03-SP1
I6B4V1
【22.03 SP1 update 20230118】【arm】libhdfs在arm架构降级失败,x86正常
主要
sig/bigdata
hadoop
openEuler-22.03-LTS-SP1
I67NAZ
【secGear】使用secGear工具.md和使用switchless特性.md文档优化
不重要
sig/doc
docs
openEuler-22.03-LTS-SP1
I67ZOF
【Gazelle】用户态协议栈Gazelle用户指南.md文档优化
不重要
sig/doc
docs
openEuler-22.03-LTS-SP1
I6975Y
【arm】--enable-bootstrap构建gcc失败
主要
sig/Compiler
gcc
openEuler-22.03-LTS-SP1
I69WOV
【22.03 LTS-SP1】【arm】gcc12编译mysql 8.0.20报错
主要
sig/Compiler
gcc-12
openEuler-22.03-LTS-SP1
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
主要
sig/Compiler
gcc
openEuler-22.03-LTS-SP1
I6AZZU
【arm】【codedb】-O3 -flto -fipa-struct-reorg=3 -flto-partition=one运行bcftools应用Segmentation fault (core dumped)
主要
sig/Compiler
gcc
openEuler-22.03-LTS-SP1
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
主要
sig/Compiler
gcc
openEuler-22.03-LTS-SP1
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
主要
sig/Others
obs-server
openEuler-22.03-LTS-SP1
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
主要
sig/DB
opengauss-server
openEuler-22.03-LTS-SP1
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
主要
sig/Compiler
gcc
openEuler-22.03-LTS-SP1
I6I47O
【x86】【deja】运行出现Segmentation fault
主要
sig/Compiler
gcc
openEuler-22.03-LTS-SP1
I6VCMC
【22.03 SP1 update 20230329 Train】openstack-nova-priority-feature安装过程中有多余打印,建议优化
次要
sig/sig-openstack
openstack-nova
openEuler-22.03-LTS-SP1
I6VFV6
[22.03 SP1] [x86/arm] mariadb授权给远程用户,远程连接服务失败
次要
sig/DB
mariadb
openEuler-22.03-LTS-SP1
I73CKF
【22.03-lts-sp1】x86环境上同时安装php-fpm软件包和php-opcache软件包后会导致php-fpm.service服务启动失败
次要
sig/Base-service
php
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE(5.26日数据):
漏洞编号
Issue ID
剩余天数
CVSS评分
软件包
责任SIG
CVE-2023-1999
I6ZQ58
2.34
0.0
thunderbird
sig-desktop-apps
CVE-2023-33250
I772H8
2.62
9.8
risc-v-kernel
sig-RISC-V
CVE-2023-33250
I772H5
2.62
9.8
kernel
Kernel
CVE-2020-36694
I77D7N
3.08
9.8
kernel
Kernel
CVE-2023-2430
I6ZT1T
3.96
6.6
risc-v-kernel
sig-RISC-V
CVE-2023-31722
I7408S
5.26
7.8
nasm
Programming-language
CVE-2023-31724
I740BT
5.28
7.8
yasm
Base-service
CVE-2023-24805
I740HE
5.34
8.8
cups-filters
System-tool
CVE-2023-33204
I75ZO1
5.99
7.0
sysstat
Base-service
CVE-2023-2483
I6ZWOM
6.46
6.4
risc-v-kernel
sig-RISC-V
CVE-2023-31655
I76OZB
6.84
7.5
redis
Others
CVE-2023-31655
I76OZA
6.84
7.5
python-redis
Base-service
CVE-2023-31655
I76OZ9
6.84
7.5
redis6
sig-bigdata
CVE-2023-31655
I76OZ7
6.84
7.5
redis5
sig-bigdata
CVE-2023-30570
I706O9
7.95
0.0
libreswan
System-tool
CVE-2023-2513
I70BWR
8.21
6.7
risc-v-kernel
sig-RISC-V
CVE-2022-40468
I774MR
9.73
7.5
tinyproxy
Networking
CVE-2022-32287
I77KHA
10.9
7.5
uimaj
sig-Java
CVE-2023-0494
I77WCP
11.89
7.8
tigervnc
Desktop
CVE-2022-46343
I77WN1
11.9
8.8
tigervnc
Desktop
CVE-2022-46342
I77WMI
11.9
8.8
tigervnc
Desktop
CVE-2022-46341
I77WM2
11.9
8.8
tigervnc
Desktop
CVE-2022-46340
I77WKR
11.9
8.8
tigervnc
Desktop
CVE-2022-4283
I77WFQ
11.9
7.8
tigervnc
Desktop
CVE-2022-46344
I77WOF
11.91
8.8
tigervnc
Desktop
CVE-2023-29942
I71FZI
12.7
5.5
llvm
Compiler
CVE-2023-2319
I71QQM
13.21
0.0
pcs
sig-Ha
CVE-2023-31979
I71RDC
13.35
5.5
catdoc
KDE
CVE-2022-3550
I78GGJ
13.7
8.8
xorg-x11-server
Desktop
CVE-2023-2598
I71SJY
13.71
0.0
risc-v-kernel
sig-RISC-V
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/master/%E7%A4%BE%E5%8C%BA%E7%89%88%E6%9…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
车明道(openEuler release SIG)
Mobile: +86 15345431107
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail: chemingdao(a)huawei.com<mailto:chemingdao@huawei.com>
[cid:image002.png@01D990C0.78633B30]Open Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件!
This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it
1
0
Dear all,
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。
本公示分为五部分:
1、openEuler-20.03-LTS-SP1 Update 20230517发布情况及待修复缺陷
2、openEuler-20.03-LTS-SP3 Update 20230517发布情况及待修复缺陷
3、openEuler-22.03-LTS Update 20230517发布情况及待修复缺陷
4、openEuler-22.03-LTS-SP1 Update 20230517发布情况及待修复缺陷
5、openEuler 关键组件待修复CVE 清单
6、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2023/05/28)提供 update_ 20230524 版本。
openEuler-20.03-LTS-SP1 Update 20230517
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题5个,已知漏洞17个。目前版本分支剩余待修复缺陷34个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I7303F?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2023-31484
perl
8.1
CVE-2023-2610
vim
7.8
CVE-2023-2609
vim
7.8
CVE-2022-2084
cloud-init
5.5
CVE-2023-26554
ntp
5.6
CVE-2023-26553
ntp
5.6
CVE-2023-26552
ntp
5.6
CVE-2023-26551
ntp
5.6
CVE-2023-31047
python-django
9.8
CVE-2023-28856
redis
6.5
CVE-2023-1729
LibRaw
3.3
CVE-2022-37434
mysql
9.8
CVE-2023-32269
kernel
6.7
CVE-2023-2513
kernel
6.7
CVE-2023-2483
kernel
6.4
CVE-2023-2002
kernel
7.8
CVE-2023-0458
kernel
4.7
Bugfix:
issue
仓库
#I6S2BP:【20.03 LTS SP1】【DWS】example 客户端用户态无法和服务端用户态打流
gazelle
#I73YR4:update-20230517 hinic: free tx mbuf use rte_pktmbuf_free_seg
dpdk
#I3BVI1:未定义宏_qt5时,spec文件中有语法错误
qt5-qtgraphicaleffects
#I73KN1:【20.03 LTS SP1】qt5-qtserialport.spec有错误,无法解析
qt5-qtserialport
#I72J0M:【openEuler 20.03-LTS-SP3】【arm/x86】ltp执行用例bind04失败
kernel
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I281C1
【fuzz】runtime error:
libsass
Base-service
I437CR
[SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错
obs-server
Others
I48GIM
【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I4G4A5
Undefine-shift in _bfd_safe_read_leb128
binutils
Compiler
I4G4B1
Integer overflow in print_vms_time
binutils
Compiler
I4G4VY
memleak in parse_gnu_debugaltlink
binutils
Compiler
I4G4WF
Heap-buffer-overflow in slurp_hppa_unwind_table
binutils
Compiler
I4G4WW
Use-after-free in make_qualified_name
binutils
Compiler
I4G4X6
memleak in byte_get_little_endian
binutils
Compiler
I4G4XF
memleak in process_mips_specific
binutils
Compiler
I4G4Y0
out-of-memory in vms_lib_read_index
binutils
Compiler
I4G4YJ
Heap-buffer-overflow in bfd_getl16
binutils
Compiler
I4G4YV
Floating point exception in _bfd_vms_slurp_etir
binutils
Compiler
I4J0OY
【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常
libdap
sig-recycle
I4JMG4
【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251
python-robotframework
sig-ROS
I4QV6N
【openEuler-20.03-LTS-SP1】flink命令执行失败
flink
sig-bigdata
I5IG1V
【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败
efl
sig-compat-winapp
I5IG6K
【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5JHX2
【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6CBNA
【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
I6VCMC
【20.03 SP1 update 20230329 Train】openstack-nova-priority-feature安装过程中有多余打印,建议优化
openstack-nova
sig-openstack
I6VFAE
[20.03 SP1] [x86/arm] mariadb授权给远程用户,远程连接服务失败
mariadb
DB
I6VFV6
[22.03 SP1] [x86/arm] mariadb授权给远程用户,远程连接服务失败
mariadb
DB
I73J4P
【20.03 LTS SP1】jffi.spec无法解析
jffi
dev-utils
I73JBY
【22.03 LTS SP1】jffi.spec无法解析
jffi
dev-utils
I73JE8
【20.03 LTS SP1】jnr-ffi.spec无法解析
jnr-ffi
dev-utils
openEuler-20.03-LTS-SP3 Update 20230517
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问3个,已知漏洞17个。目前版本分支剩余待修复缺陷 15个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I7303G?from=project-i…
CVE修复:
需求类型
软件包
优先级
CVE-2023-2609
vim
7.8
CVE-2023-2610
vim
7.8
CVE-2023-31484
perl
8.1
CVE-2022-2084
cloud-init
5.5
CVE-2023-26551
ntp
5.6
CVE-2023-26552
ntp
5.6
CVE-2023-26553
ntp
5.6
CVE-2023-26554
ntp
5.6
CVE-2023-28856
redis
6.5
CVE-2023-31047
python-django
9.8
CVE-2022-37434
mysql
9.8
CVE-2023-1729
LibRaw
3.3
CVE-2023-0458
kernel
4.7
CVE-2023-2002
kernel
7.8
CVE-2023-2483
kernel
6.4
CVE-2023-2513
kernel
6.7
CVE-2023-32269
kernel
6.7
Bugfix:
issue
仓库
#I6S2BP:【20.03 LTS SP1】【DWS】example 客户端用户态无法和服务端用户态打流
gazelle
#I73YR4:update-20230517 hinic: free tx mbuf use rte_pktmbuf_free_seg
dpdk
#I72J0M:【openEuler 20.03-LTS-SP3】【arm/x86】ltp执行用例bind04失败
kernel
openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I4QV7S
【openEuler-20.03-LTS-SP3】flink run 命令执行失败
flink
sig-bigdata
I5IGAS
【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5IGOR
【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败
fluidsynth
Application
I5KXUY
【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I5KY4S
【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功
vdsm
oVirt
I5LYJK
【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常
TCP_option_address
Kernel
I613DI
【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败
openEuler-release
Base-service
I61LEV
【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错
tuna
Others
I6CBL7
【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6VFMI
[20.03 SP3] [x86/arm] mariadb授权给远程用户,远程连接服务失败
mariadb
DB
I72EAT
【20.03 SP3】php相关包在20.03 LTS SP3降级失败
php
Base-service
I72HWV
【20.03-lts-sp3】x86环境上同时安装php-fpm软件包和php-opcache软件包后会导致php-fpm.service服务启动失败
php
Base-service
I73J7L
【20.03 LTS SP3】jffi.spec无法解析
jffi
dev-utils
I73JF9
【20.03 LTS SP3】jnr-ffi.spec无法解析
jnr-ffi
dev-utils
I73YJO
20.03-LTS-SP3 mellanox网卡无法用ethtool 工具配置速率
kernel
Kernel
openEuler-22.03-LTS Update 20230517
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题4个,已知漏洞19个。目前版本分支剩余待修复缺陷15个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I7303H?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2023-2609
vim
7.8
CVE-2023-2610
vim
7.8
CVE-2023-31484
perl
8.1
CVE-2022-2084
cloud-init
5.5
CVE-2023-26551
ntp
5.6
CVE-2023-26552
ntp
5.6
CVE-2023-26553
ntp
5.6
CVE-2023-26554
ntp
5.6
CVE-2023-28856
redis
6.5
CVE-2023-31047
python-django
9.8
CVE-2022-37434
mysql
9.8
CVE-2023-1729
LibRaw
3.3
CVE-2023-0459
kernel
5.3
CVE-2023-2002
kernel
7.8
CVE-2023-2177
kernel
5.5
CVE-2023-2483
kernel
6.4
CVE-2023-2513
kernel
6.7
CVE-2023-26544
kernel
7.8
CVE-2023-32269
kernel
6.7
Bugfix:
issue
仓库
#I6S2BP:【20.03 LTS SP1】【DWS】example 客户端用户态无法和服务端用户态打流
gazelle
#I73YR4:update-20230517 hinic: free tx mbuf use rte_pktmbuf_free_seg
dpdk
#I6YDHU:[OLK-5.10] "939325bbad27dc filemap: Correct the conditions for marking a folio as accessed"补丁回合错误
kernel
#I6ZFU8:libkcapi组件提供的用于FIPS模式下sha512hmac等命令自检的hmac文件内容错误
libkcapi
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I5G9CY
升级iinstall-scripts包会导致系统启动异常
install-scripts
sig-OS-Builder
I5JIA6
【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JPII
【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin
ovirt-engine
oVirt
I5QKGT
【22.03LTS_update0907】【arm/x86】kmod-drbd90软件包安装之后文件有缺失
kmod-drbd90
sig-Ha
I64919
【22.03_LTS_update1130】【arm/x86】xorg-x11-server-Xwayland因缺少依赖导致无法安装
xorg-x11-server-xwayland
Desktop
I665SM
resize2fs出现csum不一致
kernel
Kernel
I66KIH
【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败
openstack-ironic-inspector
sig-openstack
I677QX
【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误
opengauss-server
DB
I6CBPQ
【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6O1CK
【22.03 lts udpate 0315 】irb-jruby命令执行报错
jruby
sig-ruby
I6VFRX
[22.03-LTS][x86/arm]mariadb授权给远程用户,远程连接服务失败
mariadb
DB
I72N5G
【22.03-lts】x86环境上同时安装php-fpm软件包和php-opcache软件包后会导致php-fpm.service服务启动失败
php
Base-service
I73J9K
【22.03 LTS】jffi.spec无法解析
jffi
dev-utils
I73JGF
【22.03 LTS】jnr-ffi.spec无法解析
jnr-ffi
dev-utils
openEuler-22.03-LTS SP1 Update 20230517
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题12个,已知漏洞19个。目前版本分支剩余待修复缺陷13个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I7303E?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2023-2609
vim
7.8
CVE-2023-2610
vim
7.8
CVE-2023-31484
perl
8.1
CVE-2022-2084
cloud-init
5.5
CVE-2023-26551
ntp
5.6
CVE-2023-26552
ntp
5.6
CVE-2023-26553
ntp
5.6
CVE-2023-26554
ntp
5.6
CVE-2023-28856
redis
6.5
CVE-2023-31047
python-django
9.8
CVE-2022-37434
mysql
9.8
CVE-2023-1729
LibRaw
3.3
CVE-2023-21930
openjdk-11
7.4
CVE-2023-21967
openjdk-1.8.0
5.9
CVE-2023-0459
kernel
5.3
CVE-2023-2002
kernel
7.8
CVE-2023-2483
kernel
6.4
CVE-2023-26544
kernel
7.8
CVE-2023-32269
kernel
6.7
Bugfix:
issue
仓库
#I6S2BP:【20.03 LTS SP1】【DWS】example 客户端用户态无法和服务端用户态打流
gazelle
#I73YXU:update2023-0517 syscare 更新到1.0.1-5
syscare
#I6YDHU:[OLK-5.10] "939325bbad27dc filemap: Correct the conditions for marking a folio as accessed"补丁回合错误
kernel
#I6ZFU8:libkcapi组件提供的用于FIPS模式下sha512hmac等命令自检的hmac文件内容错误
libkcapi
#I71Z7N:建议添加网络请求的异常捕获
aops-apollo
#I70JEQ:[22.03-LTS-SP1-RC2][arm/x86] 建议优化注册主机时的错误提示
aops-ceres
#I71HXC:[22.03-LTS-SP1-RC2][arm/x86]注册主机,前后端对“主机用户名”长度限制不统一
aops-hermes
#I71ZOR:[22.03-LTS-SP1-RC3][arm/x86]前端访问失败
aops-hermes
#I73YYT:update-20230517 更新aops-vulcanus到1.2.0-4
aops-vulcanus
#I73YR4:update-20230517 hinic: free tx mbuf use rte_pktmbuf_free_seg
dpdk
#I73YZB:update20230517 更新aops-zeus到1.2.0-4
aops-zeus
#I73Z0R:update20230517 Sentencepiece version updata: Upgraded from 0.1.92 to 0.1.98
sentencepiece
openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6CBPN
【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
I6VCMC
【20.03 SP1 update 20230329 Train】openstack-nova-priority-feature安装过程中有多余打印,建议优化
openstack-nova
sig-openstack
I6VFV6
[22.03 SP1] [x86/arm] mariadb授权给远程用户,远程连接服务失败
mariadb
DB
I73CKF
【22.03-lts-sp1】x86环境上同时安装php-fpm软件包和php-opcache软件包后会导致php-fpm.service服务启动失败
php
Base-service
I73JBY
【22.03 LTS SP1】jffi.spec无法解析
jffi
dev-utils
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE(5.21日数据):
漏洞编号
Issue ID
剩余天数
CVSS评分
软件包
责任SIG
CVE-2023-32573
I71X1C
2.75
7.5
qt
Runtime
CVE-2023-2617
I72230
2.97
7.5
opencv
sig-ai
CVE-2023-2618
I7222Z
2.97
7.5
opencv
sig-ai
CVE-2023-31085
I6YKYI
3.54
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-31081
I6YKXQ
3.54
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-31082
I6YKXJ
3.54
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-31083
I6YOAV
3.67
4.7
risc-v-kernel
sig-RISC-V
CVE-2023-31084
I6YO9Y
3.67
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-2269
I6YR06
3.78
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-26735
I6Z1YC
4.78
6.3
blackbox_exporter
sig-CloudNative
CVE-2023-0215
I72RGR
5.03
7.5
mysql
Others
CVE-2023-1786
I6Z6T2
5.45
5.5
cloud-init
Base-service
CVE-2023-1999
I6ZQ58
7.17
0.0
thunderbird
sig-desktop-apps
CVE-2023-2430
I6ZT1T
8.8
6.6
risc-v-kernel
sig-RISC-V
CVE-2023-2483
I6ZWOM
11.3
6.4
risc-v-kernel
sig-RISC-V
CVE-2022-32885
I6ZYKW
11.93
0.0
webkit2gtk3
Desktop
CVE-2023-2162
I6WUDR
12.52
5.5
kernel
Kernel
CVE-2023-30570
I706O9
12.78
0.0
libreswan
System-tool
CVE-2023-2513
I70BWR
13.05
6.7
risc-v-kernel
sig-RISC-V
CVE-2023-2283
I70CLN
13.36
4.2
libssh
Networking
CVE-2023-1667
I70CLM
13.36
4.3
libssh
Networking
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
沐钰莹(openEuler release SIG)
Mobile: +86 15651995918
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail: muyuying1(a)huawei.com<mailto:muyuying1@huawei.com>
[cid:image002.png@01D95F4C.8C3691C0]Open Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件!
This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it
1
0
Dear all,
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。
本公示分为五部分:
1、openEuler-20.03-LTS-SP1 Update 20230510发布情况及待修复缺陷
2、openEuler-20.03-LTS-SP3 Update 20230510发布情况及待修复缺陷
3、openEuler-22.03-LTS Update 20230510发布情况及待修复缺陷
4、openEuler-22.03-LTS-SP1 Update 20230510发布情况及待修复缺陷
5、openEuler 关键组件待修复CVE 清单
6、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2023/05/20)提供 update_ 20230517 版本。
openEuler-20.03-LTS-SP1 Update 20230510
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题2个,已知漏洞11个。目前版本分支剩余待修复缺陷29个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6W4KC?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2023-2426
vim
6.8
CVE-2023-30608
python-sqlparse
7.5
CVE-2023-31436
kernel
7.8
CVE-2023-2483
kernel
1
CVE-2023-2269
kernel
5.5
CVE-2023-2194
kernel
6.7
CVE-2023-2177
kernel
5.5
CVE-2023-2176
kernel
7.8
CVE-2023-2007
kernel
4.4
CVE-2022-31629
php
6.5
CVE-2022-31628
php
5.5
Bugfix:
issue
仓库
#I715PM:[openEuler-1.0-LTS] linux-4.19.y lts补丁分析回合(4.19.279-4.19.281)
kernel
#I6X0Z5:优化CVE-2022-32207:添加宏判断fchmod是否存在,以防用户不使用glibc情况下编译失败
curl
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I281C1
【fuzz】runtime error:
libsass
Base-service
I437CR
[SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错
obs-server
Others
I48GIM
【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I4G4A5
Undefine-shift in _bfd_safe_read_leb128
binutils
Compiler
I4G4B1
Integer overflow in print_vms_time
binutils
Compiler
I4G4VY
memleak in parse_gnu_debugaltlink
binutils
Compiler
I4G4WF
Heap-buffer-overflow in slurp_hppa_unwind_table
binutils
Compiler
I4G4WW
Use-after-free in make_qualified_name
binutils
Compiler
I4G4X6
memleak in byte_get_little_endian
binutils
Compiler
I4G4XF
memleak in process_mips_specific
binutils
Compiler
I4G4Y0
out-of-memory in vms_lib_read_index
binutils
Compiler
I4G4YJ
Heap-buffer-overflow in bfd_getl16
binutils
Compiler
I4G4YV
Floating point exception in _bfd_vms_slurp_etir
binutils
Compiler
I4J0OY
【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常
libdap
sig-recycle
I4JMG4
【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251
python-robotframework
sig-ROS
I4QV6N
【openEuler-20.03-LTS-SP1】flink命令执行失败
flink
sig-bigdata
I5IG1V
【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败
efl
sig-compat-winapp
I5IG6K
【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5JHX2
【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6CBNA
【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
I6VCMC
【20.03 SP1 update 20230329 Train】openstack-nova-priority-feature安装过程中有多余打印,建议优化
openstack-nova
sig-openstack
I6VFAE
[20.03 SP1] [x86/arm] mariadb授权给远程用户,远程连接服务失败
mariadb
DB
I6VFV6
[22.03 SP1] [x86/arm] mariadb授权给远程用户,远程连接服务失败
mariadb
DB
openEuler-20.03-LTS-SP3 Update 20230510
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问2个,已知漏洞11个。目前版本分支剩余待修复缺陷 10个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6W4KD?from=project-i…
CVE修复:
需求类型
软件包
优先级
CVE-2023-2426
vim
6.8
CVE-2023-30608
python-sqlparse
7.5
CVE-2023-2007
kernel
4.4
CVE-2023-2176
kernel
7.8
CVE-2023-2177
kernel
5.5
CVE-2023-2194
kernel
6.7
CVE-2023-2269
kernel
5.5
CVE-2023-2483
kernel
1
CVE-2023-31436
kernel
7.8
CVE-2022-31628
php
5.5
CVE-2022-31629
php
6.5
Bugfix:
issue
仓库
#I715PM:[openEuler-1.0-LTS] linux-4.19.y lts补丁分析回合(4.19.279-4.19.281)
kernel
#I6X0Z5:优化CVE-2022-32207:添加宏判断fchmod是否存在,以防用户不使用glibc情况下编译失败
curl
openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I4QV7S
【openEuler-20.03-LTS-SP3】flink run 命令执行失败
flink
sig-bigdata
I5IGAS
【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5IGOR
【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败
fluidsynth
Application
I5KXUY
【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I5KY4S
【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功
vdsm
oVirt
I5LYJK
【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常
TCP_option_address
Kernel
I613DI
【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败
openEuler-release
Base-service
I61LEV
【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错
tuna
Others
I6CBL7
【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6VFMI
[20.03 SP3] [x86/arm] mariadb授权给远程用户,远程连接服务失败
mariadb
DB
openEuler-22.03-LTS Update 20230510
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题2个,已知漏洞15个。目前版本分支剩余待修复缺陷8个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6W4KE?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2023-2426
vim
6.8
CVE-2023-24607
qt5-qtbase
7.8
CVE-2023-30608
python-sqlparse
7.5
CVE-2022-4382
kernel
7.4
CVE-2023-0458
kernel
5.3
CVE-2023-1998
kernel
5.6
CVE-2023-2007
kernel
4.4
CVE-2023-2008
kernel
7.8
CVE-2023-2166
kernel
5.5
CVE-2023-2176
kernel
7.8
CVE-2023-2194
kernel
6.7
CVE-2023-2269
kernel
5.5
CVE-2023-2483
kernel
1
CVE-2023-31436
kernel
7.8
CVE-2022-31629
php
6.5
Bugfix:
issue
仓库
#I6TNTC:【OLK-5.10 同步】[syzkaller] KASAN: null-ptr-deref Write in bdi_split_work_to_wbs
kernel
#I6X0Z5:优化CVE-2022-32207:添加宏判断fchmod是否存在,以防用户不使用glibc情况下编译失败
curl
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I5JIA6
【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JPII
【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin
ovirt-engine
oVirt
I665SM
resize2fs出现csum不一致
kernel
Kernel
I66KIH
【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败
openstack-ironic-inspector
sig-openstack
I677QX
【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误
opengauss-server
DB
I6CBPQ
【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6O1CK
【22.03 lts udpate 0315 】irb-jruby命令执行报错
jruby
sig-ruby
I6VFRX
[22.03-LTS][x86/arm]mariadb授权给远程用户,远程连接服务失败
mariadb
DB
openEuler-22.03-LTS SP1 Update 20230510
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题3个,已知漏洞12个。目前版本分支剩余待修复缺陷12个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6W4KB?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2023-2426
vim
6.8
CVE-2023-30608
python-sqlparse
7.5
CVE-2022-4382
kernel
7.4
CVE-2023-0458
kernel
5.3
CVE-2023-1998
kernel
5.6
CVE-2023-2007
kernel
4.4
CVE-2023-2166
kernel
5.5
CVE-2023-2176
kernel
7.8
CVE-2023-2194
kernel
6.7
CVE-2023-2269
kernel
5.5
CVE-2023-2483
kernel
1
CVE-2023-31436
kernel
7.8
Bugfix:
issue
仓库
#I7059Z:ip_conflict_check中获取的网卡名为空
X-diagnosis
#I6X0Z5:优化CVE-2022-32207:添加宏判断fchmod是否存在,以防用户不使用glibc情况下编译失败
curl
#I6TNTC:【OLK-5.10 同步】[syzkaller] KASAN: null-ptr-deref Write in bdi_split_work_to_wbs
kernel
openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6CBPN
【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
I6VCMC
【20.03 SP1 update 20230329 Train】openstack-nova-priority-feature安装过程中有多余打印,建议优化
openstack-nova
sig-openstack
I6VFV6
[22.03 SP1] [x86/arm] mariadb授权给远程用户,远程连接服务失败
mariadb
DB
I666GB
dnf group install Core之后dnf group remove Core '--disablerepo=*'会卸载被保护的软件包
dnf
sig-OS-Builder
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE(4.15日数据):
漏洞编号
Issue ID
剩余天数
CVSS评分
软件包
责任SIG
CVE-2023-2019
I6VK2N
0.34
4.4
risc-v-kernel
sig-RISC-V
CVE-2022-4893
I6VR1V
0.95
0.0
freeipa
oVirt
CVE-2023-32007
I6ZW0C
3.02
8.8
spark
sig-bigdata
CVE-2023-31975
I71QSG
3.21
9.8
yasm
Base-service
CVE-2023-30861
I6ZWOG
3.39
7.5
python-flask
Programming-language
CVE-2023-30772
I6W80Q
3.76
6.4
risc-v-kernel
sig-RISC-V
CVE-2023-2002
I6WHKR
4.24
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-28856
I6WI59
4.63
6.5
python-redis
Base-service
CVE-2023-28856
I6WI58
4.63
6.5
redis6
sig-bigdata
CVE-2023-28856
I6WI57
4.63
6.5
redis5
sig-bigdata
CVE-2023-28856
I6WI55
4.63
6.5
redis
Others
CVE-2023-2162
I6WUDR
5.47
5.5
kernel
Kernel
CVE-2023-2166
I6WUDQ
5.47
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-2162
I6WUDO
5.47
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-21962
I6WUEQ
5.49
4.9
mysql5
DB
CVE-2023-21917
I6WUEP
5.49
4.9
mysql5
DB
CVE-2023-21977
I6WUEN
5.49
4.9
mysql5
DB
CVE-2023-21940
I6WUEM
5.49
4.4
mysql5
DB
CVE-2023-21911
I6WUEK
5.49
4.9
mysql5
DB
CVE-2023-21953
I6WUEF
5.49
4.9
mysql5
DB
CVE-2023-21947
I6WUEE
5.49
4.4
mysql5
DB
CVE-2023-21920
I6WUEC
5.49
4.9
mysql5
DB
CVE-2023-21976
I6WUDV
5.49
4.9
mysql5
DB
CVE-2023-21919
I6WUET
5.5
4.9
mysql5
DB
CVE-2023-21972
I6WUES
5.5
4.9
mysql5
DB
CVE-2023-21945
I6WUFO
5.51
4.9
mysql5
DB
CVE-2023-21933
I6WUFM
5.51
4.9
mysql5
DB
CVE-2023-21935
I6WUFL
5.51
4.9
mysql5
DB
CVE-2023-21982
I6WUFJ
5.51
4.9
mysql5
DB
CVE-2023-21955
I6WUFI
5.51
4.9
mysql5
DB
CVE-2023-21929
I6WUFH
5.51
5.5
mysql5
DB
CVE-2023-21966
I6WUFG
5.51
4.9
mysql5
DB
CVE-2023-21963
I6WUFE
5.51
2.7
mysql5
DB
CVE-2023-21913
I6WUFA
5.51
4.9
mysql5
DB
CVE-2022-45048
I70CLU
5.58
8.8
apache-ranger
CVE-2023-21946
I6WUHV
5.63
6.5
mysql5
DB
CVE-2023-31039
I72MNP
5.93
9.8
brpc
dev-utils
CVE-2023-2177
I6X47F
6.06
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-2177
I6X47E
6.06
5.5
kernel
Kernel
CVE-2023-26048
I6X44B
6.06
5.3
jetty
sig-Java
CVE-2023-2124
I6X4UQ
6.13
0.0
risc-v-kernel
sig-RISC-V
CVE-2022-37434
I72RG3
6.18
9.8
mysql
Others
CVE-2023-21968
I6X5PF
6.24
3.7
openjdk-latest
Compiler
CVE-2023-21968
I6X5PD
6.24
3.7
openjdk-11
Compiler
CVE-2023-21939
I6X5N4
6.24
5.3
openjdk-1.8.0
Compiler
CVE-2023-21939
I6X5N2
6.24
5.3
openjdk-latest
Compiler
CVE-2023-21939
I6X5N1
6.24
5.3
openjdk-11
Compiler
CVE-2023-21938
I6X5R0
6.25
3.7
openjdk-11
Compiler
CVE-2023-21938
I6X5QV
6.25
3.7
openjdk-1.8.0
Compiler
CVE-2023-21938
I6X5QU
6.25
3.7
openjdk-latest
Compiler
CVE-2023-21968
I6X5Q5
6.25
3.7
openjdk-1.8.0
Compiler
CVE-2023-21967
I6X5T1
6.26
5.9
openjdk-latest
Compiler
CVE-2023-21967
I6X5SQ
6.26
5.9
openjdk-11
Compiler
CVE-2023-21967
I6X5SN
6.26
5.9
openjdk-1.8.0
Compiler
CVE-2023-21954
I6X5SL
6.26
5.9
openjdk-11
Compiler
CVE-2023-21954
I6X5SI
6.26
5.9
openjdk-1.8.0
Compiler
CVE-2023-21954
I6X5SH
6.26
5.9
openjdk-latest
Compiler
CVE-2023-21937
I6X5RP
6.26
3.7
openjdk-1.8.0
Compiler
CVE-2023-21937
I6X5RO
6.26
3.7
openjdk-latest
Compiler
CVE-2023-21937
I6X5RL
6.26
3.7
openjdk-11
Compiler
CVE-2023-25759
I6X66O
6.37
5.4
platform
sig-epol
CVE-2023-30549
I70QQV
6.76
7.8
apptainer
CVE-2022-2084
I6XCBL
6.93
5.5
cloud-init
Base-service
CVE-2023-1729
I6XGSW
7.15
0.0
LibRaw
Programming-language
CVE-2023-2194
I6XHPM
7.32
6.7
risc-v-kernel
sig-RISC-V
CVE-2023-1255
I6XHT7
7.36
5.9
openssl
sig-security-facility
CVE-2023-2222
I6XRGM
8.06
0.0
binutils
Compiler
CVE-2023-31484
I6ZROS
9.67
8.1
perl
Base-service
CVE-2023-26049
I6XY2G
9.71
5.3
jetty
sig-Java
CVE-2023-31972
I71QSB
10.21
7.8
yasm
Base-service
CVE-2023-31974
I71QS7
10.21
7.8
yasm
Base-service
CVE-2023-31973
I71R05
10.23
7.8
yasm
Base-service
CVE-2023-2610
I71RGF
10.58
7.8
vim
Base-service
CVE-2023-31085
I6YKYI
11.69
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-31081
I6YKXQ
11.69
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-31082
I6YKXJ
11.69
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-31084
I6YKXB
11.69
5.5
kernel
Kernel
CVE-2023-31081
I6YKX6
11.69
5.5
kernel
Kernel
CVE-2023-31082
I6YKX3
11.69
5.5
kernel
Kernel
CVE-2023-31083
I6YOAV
11.82
4.7
risc-v-kernel
sig-RISC-V
CVE-2023-31083
I6YOAU
11.82
4.7
kernel
Kernel
CVE-2023-31085
I6YOAJ
11.82
5.5
kernel
Kernel
CVE-2023-31084
I6YO9Y
11.82
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-2269
I6YR06
11.94
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-30402
I6YWGP
12.43
5.5
yasm
Base-service
CVE-2023-26735
I6Z1YC
12.93
6.3
blackbox_exporter
sig-CloudNative
CVE-2023-0215
I72RGR
13.18
7.5
mysql
Others
CVE-2023-0458
I6Z6SU
13.59
5.3
kernel
Kernel
CVE-2023-1786
I6Z6T2
13.61
5.5
cloud-init
Base-service
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
沐钰莹(openEuler release SIG)
Mobile: +86 15651995918
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail: muyuying1(a)huawei.com<mailto:muyuying1@huawei.com>
[cid:image002.png@01D95F4C.8C3691C0]Open Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件!
This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it
1
0
Dear all,
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。
本公示分为五部分:
1、openEuler-20.03-LTS-SP1 Update 20230423发布情况及待修复缺陷
2、openEuler-20.03-LTS-SP3 Update 20230423发布情况及待修复缺陷
3、openEuler-22.03-LTS Update 20230423发布情况及待修复缺陷
4、openEuler-22.03-LTS-SP1 Update 20230423发布情况及待修复缺陷
5、openEuler 关键组件待修复CVE 清单
6、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2023/04/30)提供 update_ 20230426 版本。
openEuler-20.03-LTS-SP1 Update 20230423
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题2个,已知漏洞21个。目前版本分支剩余待修复缺陷29个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6W4KC?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2023-28842
docker
6.8
CVE-2023-28841
docker
6.8
CVE-2023-28840
docker
8.7
CVE-2023-24538
golang
5.9
CVE-2023-24537
golang
8.1
CVE-2023-24536
golang
5.9
CVE-2023-24534
golang
7.5
CVE-2023-27536
curl
no score info
CVE-2023-27349
bluez
8
CVE-2023-2004
freetype
5.3
CVE-2023-1981
avahi
6.2
CVE-2023-1668
openvswitch
7.1
CVE-2023-28708
tomcat
4.3
CVE-2022-44370
nasm
7.8
CVE-2023-30456
kernel
7.8
CVE-2023-1990
kernel
1
CVE-2023-1989
kernel
1
CVE-2023-1829
kernel
1
CVE-2022-36280
kernel
5.5
CVE-2022-27672
kernel
4.7
CVE-2023-1393
xorg-x11-server
7.8
Bugfix:
issue
仓库
#I6S0T7:例行分析grub2软件包补丁
grub2
#I6VTA2:【update20230412-20.03-lts-sp3】samba.service start失败,restart有报错信息
samba
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I281C1
【fuzz】runtime error:
libsass
Base-service
I437CR
[SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错
obs-server
Others
I48GIM
【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I4G4A5
Undefine-shift in _bfd_safe_read_leb128
binutils
Compiler
I4G4B1
Integer overflow in print_vms_time
binutils
Compiler
I4G4VY
memleak in parse_gnu_debugaltlink
binutils
Compiler
I4G4WF
Heap-buffer-overflow in slurp_hppa_unwind_table
binutils
Compiler
I4G4WW
Use-after-free in make_qualified_name
binutils
Compiler
I4G4X6
memleak in byte_get_little_endian
binutils
Compiler
I4G4XF
memleak in process_mips_specific
binutils
Compiler
I4G4Y0
out-of-memory in vms_lib_read_index
binutils
Compiler
I4G4YJ
Heap-buffer-overflow in bfd_getl16
binutils
Compiler
I4G4YV
Floating point exception in _bfd_vms_slurp_etir
binutils
Compiler
I4J0OY
【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常
libdap
sig-recycle
I4JMG4
【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251
python-robotframework
sig-ROS
I4QV6N
【openEuler-20.03-LTS-SP1】flink命令执行失败
flink
sig-bigdata
I5IG1V
【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败
efl
sig-compat-winapp
I5IG6K
【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5JHX2
【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6CBNA
【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
I6VCMC
【20.03 SP1 update 20230329 Train】openstack-nova-priority-feature安装过程中有多余打印,建议优化
openstack-nova
sig-openstack
I6VFAE
[20.03 SP1] [x86/arm] mariadb授权给远程用户,远程连接服务失败
mariadb
DB
I6VFV6
[22.03 SP1] [x86/arm] mariadb授权给远程用户,远程连接服务失败
mariadb
DB
openEuler-20.03-LTS-SP3 Update 20230423
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问3个,已知漏洞22个。目前版本分支剩余待修复缺陷 11个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6W4KD?from=project-i…
CVE修复:
需求类型
软件包
优先级
CVE-2023-24534
golang
7.5
CVE-2023-24536
golang
5.9
CVE-2023-24537
golang
8.1
CVE-2023-24538
golang
5.9
CVE-2023-28840
docker
8.7
CVE-2023-28841
docker
6.8
CVE-2023-28842
docker
6.8
CVE-2023-0922
samba
5.9
CVE-2023-1668
openvswitch
7.1
CVE-2023-2004
freetype
5.3
CVE-2023-27536
curl
no score info
CVE-2023-27349
bluez
8
CVE-2023-1981
avahi
6.2
CVE-2023-28708
tomcat
4.3
CVE-2022-44370
nasm
7.8
CVE-2022-27672
kernel
4.7
CVE-2022-36280
kernel
5.5
CVE-2023-1829
kernel
1
CVE-2023-1989
kernel
1
CVE-2023-1990
kernel
1
CVE-2023-30456
kernel
7.8
CVE-2023-1393
xorg-x11-server
7.8
Bugfix:
issue
仓库
#I61N72:2003-lts-sp3 changelog 日期错误
openvswitch
#I6S0T7:例行分析grub2软件包补丁
grub2
#I6VTA2:【update20230412-20.03-lts-sp3】samba.service start失败,restart有报错信息
samba
openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I4QV7S
【openEuler-20.03-LTS-SP3】flink run 命令执行失败
flink
sig-bigdata
I5IGAS
【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5IGOR
【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败
fluidsynth
Application
I5KXUY
【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I5KY4S
【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功
vdsm
oVirt
I5LYJK
【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常
TCP_option_address
Kernel
I5XDXJ
openeuler:20.03-sp3下lua-lunit0.5和lua5.3不匹配
mugen
sig-QA
I613DI
【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败
openEuler-release
Base-service
I61LEV
【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错
tuna
Others
I6CBL7
【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6VFMI
[20.03 SP3] [x86/arm] mariadb授权给远程用户,远程连接服务失败
mariadb
DB
openEuler-22.03-LTS Update 20230423
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题2个,已知漏洞18个。目前版本分支剩余待修复缺陷8个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6W4KE?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2021-45985
lua
7.5
CVE-2023-24534
golang
7.5
CVE-2023-24536
golang
5.9
CVE-2023-24537
golang
8.1
CVE-2023-24538
golang
5.9
CVE-2023-28840
docker
8.7
CVE-2023-28841
docker
6.8
CVE-2023-28842
docker
6.8
CVE-2023-1801
tcpdump
5.5
CVE-2023-1668
openvswitch
7.1
CVE-2023-2004
freetype
5.3
CVE-2023-27349
bluez
8
CVE-2023-1981
avahi
6.2
CVE-2023-28708
tomcat
4.3
CVE-2022-44370
nasm
7.8
CVE-2022-23527
mod_auth_openidc
6.1
CVE-2023-28625
mod_auth_openidc
7.5
CVE-2023-1393
xorg-x11-server
7.8
Bugfix:
issue
仓库
#I6S0T7:例行分析grub2软件包补丁
grub2
#I6LRQH:驱动模块的路径不正确
kae_driver
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I5JIA6
【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JPII
【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin
ovirt-engine
oVirt
I665SM
resize2fs出现csum不一致
kernel
Kernel
I66KIH
【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败
openstack-ironic-inspector
sig-openstack
I677QX
【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误
opengauss-server
DB
I6CBPQ
【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6O1CK
【22.03 lts udpate 0315 】irb-jruby命令执行报错
jruby
sig-ruby
I6VFRX
[22.03-LTS][x86/arm]mariadb授权给远程用户,远程连接服务失败
mariadb
DB
openEuler-22.03-LTS SP1 Update 20230423
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题4个,已知漏洞18个。目前版本分支剩余待修复缺陷11个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6W4KB?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2021-45985
lua
7.5
CVE-2023-24534
golang
7.5
CVE-2023-24536
golang
5.9
CVE-2023-24537
golang
8.1
CVE-2023-24538
golang
5.9
CVE-2023-28840
docker
8.7
CVE-2023-28841
docker
6.8
CVE-2023-28842
docker
6.8
CVE-2023-1801
tcpdump
5.5
CVE-2023-1668
openvswitch
7.1
CVE-2023-2004
freetype
5.3
CVE-2023-27349
bluez
8
CVE-2023-1981
avahi
6.2
CVE-2023-28708
tomcat
4.3
CVE-2022-44370
nasm
7.8
CVE-2022-23527
mod_auth_openidc
6.1
CVE-2023-28625
mod_auth_openidc
7.5
CVE-2023-1393
xorg-x11-server
7.8
Bugfix:
issue
仓库
#I6JCA6:Upgrade to 2.0.3 release [libcgroup: 0.42.2 -> 2.0.3]
libcgroup
#I6X1TN:update_20230419 update to 8.0.28
php
#I6S0T7:例行分析grub2软件包补丁
grub2
#I6LRQH:驱动模块的路径不正确
kae_driver
openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6CBPN
【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
I6VCMC
【20.03 SP1 update 20230329 Train】openstack-nova-priority-feature安装过程中有多余打印,建议优化
openstack-nova
sig-openstack
I6VFV6
[22.03 SP1] [x86/arm] mariadb授权给远程用户,远程连接服务失败
mariadb
DB
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE(4.15日数据):
漏洞编号
Issue ID
剩余天数
CVSS评分
软件包
责任SIG
责任团队
CVE-2021-3923
I6Q365
0.22
2.3
risc-v-kernel
sig-RISC-V
外部
CVE-2023-1625
I6Q3J1
0.42
0.0
openstack-heat
sig-openstack
计算开源开发
CVE-2023-30456
I6U7CT
0.46
7.8
risc-v-kernel
sig-RISC-V
外部
CVE-2023-24538
I6T1GH
1.39
9.8
git-lfs
dev-utils
EulerOS
CVE-2023-1989
I6UW69
2.18
7.0
risc-v-kernel
sig-RISC-V
外部
CVE-2023-1637
I6QEZ5
2.32
5.5
risc-v-kernel
sig-RISC-V
外部
CVE-2023-1992
I6UXDJ
2.42
7.5
wireshark
Application
openEuler
CVE-2023-28866
I6QHVX
2.47
5.3
risc-v-kernel
sig-RISC-V
外部
CVE-2023-28859
I6QRYO
2.94
6.5
redis6
sig-bigdata
外部
CVE-2023-28859
I6QRYL
2.94
6.5
redis5
sig-bigdata
外部
CVE-2023-25661
I6QSNP
3.09
6.5
tensorflow
sig-ai
统信
CVE-2022-37434
I6X8UK
3.47
9.8
openresty-zlib
sig-OpenResty
外部
CVE-2023-24537
I6T1HR
4.39
7.5
git-lfs
dev-utils
EulerOS
CVE-2023-24537
I6T1GM
4.39
7.5
skopeo
sig-CloudNative
EulerOS
CVE-2023-24537
I6T1GA
4.39
7.5
etcd
sig-CloudNative
EulerOS
CVE-2022-44368
I6RHIW
5.41
5.5
nasm
Programming-language
openEuler
CVE-2022-44369
I6RHIP
5.41
5.5
nasm
Programming-language
openEuler
CVE-2023-24607
I6VWA6
5.42
7.8
qt5-qtbase
Programming-language
openEuler
CVE-2023-29132
I6S8GA
8.2
0.0
irssi
Application
openEuler
CVE-2023-24536
I6T1GW
8.39
7.5
git-lfs
dev-utils
EulerOS
CVE-2023-21980
I6WUER
9.21
7.1
mysql
Others
openEuler
CVE-2023-21980
I6WUEI
9.21
7.1
mysql5
DB
计算开源开发
CVE-2023-21912
I6WUFK
9.23
7.5
mysql
Others
openEuler
CVE-2023-21912
I6WUFB
9.23
7.5
mysql5
DB
计算开源开发
CVE-2023-24534
I6T1G0
9.39
7.5
git-lfs
dev-utils
EulerOS
CVE-2022-43551
I6X44E
9.77
7.5
mysql
Others
openEuler
CVE-2023-21930
I6X5R9
9.97
7.4
openjdk-1.8.0
Compiler
编译器
CVE-2023-21930
I6X5R7
9.97
7.4
openjdk-latest
Compiler
编译器
CVE-2023-21930
I6X5R5
9.97
7.4
openjdk-11
Compiler
编译器
CVE-2023-1872
I6V7V1
10.39
7.8
kernel
Kernel
EulerOS
CVE-2023-24534
I6T1HH
11.3
5.9
cri-tools
sig-CloudNative
麒麟
CVE-2023-24536
I6T1GB
11.3
5.9
cri-tools
sig-CloudNative
麒麟
CVE-2023-24537
I6T1G2
11.3
5.9
cri-tools
sig-CloudNative
麒麟
CVE-2023-24538
I6T1HU
11.31
5.9
cri-tools
sig-CloudNative
麒麟
CVE-2023-1859
I6T36G
11.67
0.0
risc-v-kernel
sig-RISC-V
外部
CVE-2023-1855
I6T36D
11.67
6.3
risc-v-kernel
sig-RISC-V
外部
CVE-2023-1855
I6T36A
11.67
6.3
kernel
Kernel
EulerOS
CVE-2023-28842
I6T4R5
11.94
6.8
moby
CVE-2023-28841
I6T4RA
11.95
6.8
moby
CVE-2023-2006
I6VK2H
13.6
7.8
kernel
Kernel
EulerOS
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
沐钰莹(openEuler release SIG)
Mobile: +86 15651995918
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail: muyuying1(a)huawei.com<mailto:muyuying1@huawei.com>
[cid:image002.png@01D95F4C.8C3691C0]Open Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件!
This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it
1
0
Dear all,
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。
本公示分为五部分:
1、openEuler-20.03-LTS-SP1 Update 20230412发布情况及待修复缺陷
2、openEuler-20.03-LTS-SP3 Update 20230412发布情况及待修复缺陷
3、openEuler-22.03-LTS Update 20230412发布情况及待修复缺陷
4、openEuler-22.03-LTS-SP1 Update 20230412发布情况及待修复缺陷
5、openEuler 关键组件待修复CVE 清单
6、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2023/04/16)提供 update_ 20230412 版本。
openEuler-20.03-LTS-SP1 Update 20230412
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题2个,已知漏洞13个。目前版本分支剩余待修复缺陷29个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6U2Y4?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2023-28756
ruby
7.5
CVE-2023-28755
ruby
7.5
CVE-2023-24329
python3
7.5
CVE-2023-28642
runc
6.1
CVE-2023-0922
samba
5.9
CVE-2019-17567
httpd
5.3
CVE-2023-1859
kernel
4.1
CVE-2023-1855
kernel
1
CVE-2023-1838
kernel
1
CVE-2023-1670
kernel
7.8
CVE-2023-1611
kernel
7
CVE-2023-1582
kernel
4.7
CVE-2021-3923
kernel
2.3
Bugfix:
issue
仓库
#I61DOT:【20.03SP1】编译mysql,报错误:‘pthread_cond_clockwait’的实参不依赖模板参数,所以‘pthread_cond_clockwait’的声明必须可用 [-fpermissive]
gcc
#I6TIG1:【openeuler-1.0-LTS】linux-4.19.y lts补丁回合(4.19.273-4.19.279)
kernel
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I281C1
【fuzz】runtime error:
libsass
Base-service
I437CR
[SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错
obs-server
Others
I48GIM
【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I4G4A5
Undefine-shift in _bfd_safe_read_leb128
binutils
Compiler
I4G4B1
Integer overflow in print_vms_time
binutils
Compiler
I4G4VY
memleak in parse_gnu_debugaltlink
binutils
Compiler
I4G4WF
Heap-buffer-overflow in slurp_hppa_unwind_table
binutils
Compiler
I4G4WW
Use-after-free in make_qualified_name
binutils
Compiler
I4G4X6
memleak in byte_get_little_endian
binutils
Compiler
I4G4XF
memleak in process_mips_specific
binutils
Compiler
I4G4Y0
out-of-memory in vms_lib_read_index
binutils
Compiler
I4G4YJ
Heap-buffer-overflow in bfd_getl16
binutils
Compiler
I4G4YV
Floating point exception in _bfd_vms_slurp_etir
binutils
Compiler
I4J0OY
【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常
libdap
sig-recycle
I4JMG4
【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251
python-robotframework
sig-ROS
I4K6ES
stack-buffer-overflow in UINT32_Marshal
libtpms
sig-security-facility
I4K6FU
global-buffer-overflow in Array_Marshal
libtpms
sig-security-facility
I4QV6N
【openEuler-20.03-LTS-SP1】flink命令执行失败
flink
sig-bigdata
I5IG1V
【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败
efl
sig-compat-winapp
I5IG6K
【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5JHX2
【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6CBNA
【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
openEuler-20.03-LTS-SP3 Update 20230412
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问1个,已知漏洞14个。目前版本分支剩余待修复缺陷 9个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6U2Y5?from=project-i…
CVE修复:
需求类型
软件包
优先级
CVE-2023-28755
ruby
7.5
CVE-2023-28756
ruby
7.5
CVE-2023-24329
python3
7.5
CVE-2023-28642
runc
6.1
CVE-2023-0922
samba
5.9
CVE-2019-17567
httpd
5.3
CVE-2023-1370
json-smart
7.5
CVE-2021-3923
kernel
2.3
CVE-2023-1582
kernel
4.7
CVE-2023-1611
kernel
7
CVE-2023-1670
kernel
7.8
CVE-2023-1838
kernel
1
CVE-2023-1855
kernel
1
CVE-2023-1859
kernel
4.1
Bugfix:
issue
仓库
#I6TIG1:【openeuler-1.0-LTS】linux-4.19.y lts补丁回合(4.19.273-4.19.279)
kernel
openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I5IGAS
【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5IGOR
【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败
fluidsynth
Application
I5KXUY
【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I5KY4S
【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功
vdsm
oVirt
I5LYJK
【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常
TCP_option_address
Kernel
I5XDXJ
openeuler:20.03-sp3下lua-lunit0.5和lua5.3不匹配
mugen
sig-QA
I613DI
【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败
openEuler-release
Base-service
I61LEV
【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错
tuna
Others
I6CBL7
【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
openEuler-22.03-LTS Update 20230412
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题0个,已知漏洞9个。目前版本分支剩余待修复缺陷7个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6U2Y6?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2023-28756
ruby
7.5
CVE-2023-28755
ruby
7.5
CVE-2023-24329
python3
7.5
CVE-2023-1370
json-smart
7.5
CVE-2022-4899
zstd
7.5
CVE-2023-0614
libldb
6.5
CVE-2023-0922
samba
5.9
CVE-2023-1582
kernel
4.7
CVE-2022-4744
kernel
7.8
Bugfix:
issue
仓库
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I5JIA6
【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JPII
【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin
ovirt-engine
oVirt
I665SM
resize2fs出现csum不一致
kernel
Kernel
I66KIH
【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败
openstack-ironic-inspector
sig-openstack
I677QX
【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误
opengauss-server
DB
I6CBPQ
【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6O1CK
【22.03 lts udpate 0315 】irb-jruby命令执行报错
jruby
sig-ruby
openEuler-22.03-LTS SP1 Update 20230412
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题2个,已知漏洞9个。目前版本分支剩余待修复缺陷9个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6U2Y3?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2023-1370
json-smart
7.5
CVE-2022-4899
zstd
7.5
CVE-2023-24329
python3
7.5
CVE-2023-0225
samba
5.9
CVE-2023-0922
samba
5.9
CVE-2023-0614
libldb
6.5
CVE-2022-46908
sqlite
9.8
CVE-2023-28755
ruby
7.5
CVE-2023-28756
ruby
7.5
Bugfix:
issue
仓库
#I6TPCU:【22.03-SP1】 回合 openeuler/gala-gopher bugfix 补丁
gala-gopher
#I6U7LG:gssproxy组件服务gssuserproxy.service命令行选项idle-timeout功能未生效
gssproxy
openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6CBPN
【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE(4.15日数据):
漏洞编号
Issue ID
剩余天数
CVSS评分
软件包
责任SIG
责任团队
CVE-2023-26485
I6S7WH
0.21
7.5
cmark
CVE-2023-24824
I6S7WF
0.21
7.5
cmark
CVE-2023-1838
I6T1EZ
3.44
7.1
risc-v-kernel
sig-RISC-V
外部
CVE-2023-24537
I6T1H3
3.56
7.5
butane
CVE-2023-24537
I6T1GZ
3.56
7.5
yaml-cpp03
Base-service
openEuler
CVE-2023-24537
I6T1GV
3.56
7.5
grafana
Application
openEuler
CVE-2023-24537
I6T1GR
3.56
7.5
toolbox
CVE-2023-24537
I6T1GI
3.56
7.5
containernetworking-plugins
sig-CloudNative
openEuler
CVE-2023-24537
I6T1GE
3.56
7.5
buildah
CVE-2023-24537
I6T1G6
3.56
7.5
kubevirt
sig-CloudNative
麒麟
CVE-2023-24537
I6T1FY
3.56
7.5
cri-o
sig-CloudNative
麒麟
CVE-2023-24537
I6T1HV
3.57
7.5
conmon
Others
openEuler
CVE-2023-24537
I6T1HF
3.57
7.5
podman
sig-CloudNative
麒麟
CVE-2023-24537
I6T1HB
3.57
7.5
ignition
CVE-2023-24537
I6T1H7
3.57
7.5
python-odo
sig-python-modules
openEuler
CVE-2022-4900
I6OOSB
4.19
0.0
php
Base-service
麒麟
CVE-2023-28840
I6T4RE
4.21
7.5
moby
CVE-2023-28425
I6OW4W
4.93
5.5
redis5
sig-bigdata
外部
CVE-2023-28425
I6OW46
4.93
5.5
redis
Others
openEuler
CVE-2023-28425
I6OW3K
4.93
5.5
python-redis
Base-service
openEuler
CVE-2023-28425
I6OW2W
4.93
5.5
redis6
sig-bigdata
外部
CVE-2023-1544
I6OZK3
5.06
5.5
qemu
Virt
虚拟化
CVE-2023-28708
I6PBXT
6.1
4.3
tomcat
Application
openEuler
CVE-2023-1583
I6PDF8
6.43
5.5
risc-v-kernel
sig-RISC-V
外部
CVE-2023-23913
I6PDIP
6.6
0.0
rubygem-rails
sig-ruby
openEuler
CVE-2023-1410
I6PLY9
6.97
4.8
grafana
Application
openEuler
CVE-2023-0160
I6PPPN
7.21
0.0
risc-v-kernel
sig-RISC-V
外部
CVE-2023-0870
I6PQ87
7.32
6.7
openstack-horizon
sig-openstack
计算开源开发
CVE-2023-1611
I6PQCU
7.45
6.3
risc-v-kernel
sig-RISC-V
外部
CVE-2021-3923
I6Q365
8.48
2.3
risc-v-kernel
sig-RISC-V
外部
CVE-2023-26916
I6SX7D
8.65
7.5
libyang
sig-high-performance-network
EulerOS
CVE-2023-1625
I6Q3J1
8.68
0.0
openstack-heat
sig-openstack
计算开源开发
CVE-2023-30456
I6U7CT
8.72
7.8
risc-v-kernel
sig-RISC-V
外部
CVE-2023-28840
I6T4RC
8.99
7.5
docker
sig-CloudNative
EulerOS
CVE-2021-45985
I6UFLK
9.01
7.5
lua
Base-service
EulerOS
CVE-2023-1637
I6QEZ5
10.58
5.5
risc-v-kernel
sig-RISC-V
外部
CVE-2023-27593
I6O473
10.65
5.5
cilium
sig-high-performance-network
EulerOS
CVE-2023-28866
I6QHVX
10.73
5.3
risc-v-kernel
sig-RISC-V
外部
CVE-2023-28859
I6QRYO
11.2
6.5
redis6
sig-bigdata
外部
CVE-2023-28859
I6QRYL
11.2
6.5
redis5
sig-bigdata
外部
CVE-2023-28859
I6QRYK
11.2
6.5
redis
Others
openEuler
CVE-2023-28859
I6QRYH
11.2
6.5
python-redis
Base-service
openEuler
CVE-2023-25661
I6QSNP
11.35
6.5
tensorflow
sig-ai
统信
CVE-2023-30456
I6U7AN
12.65
7.8
kernel
Kernel
EulerOS
CVE-2023-24537
I6T1HR
12.65
7.5
git-lfs
dev-utils
EulerOS
CVE-2023-24537
I6T1GM
12.65
7.5
skopeo
sig-CloudNative
EulerOS
CVE-2023-24537
I6T1GA
12.65
7.5
etcd
sig-CloudNative
EulerOS
CVE-2023-28642
I6RGR9
13.33
6.1
runc
sig-CloudNative
EulerOS
CVE-2022-44368
I6RHIW
13.67
5.5
nasm
Programming-language
openEuler
CVE-2022-44369
I6RHIP
13.67
5.5
nasm
Programming-language
openEuler
CVE-2022-39188
I5QVT3
13.81
4.7
kernel
Kernel
EulerOS
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
沐钰莹(openEuler release SIG)
Mobile: +86 15651995918
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail: muyuying1(a)huawei.com<mailto:muyuying1@huawei.com>
[cid:image002.png@01D95F4C.8C3691C0]Open Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件!
This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it
1
0
Dear all,
因上周清明假期,上周的版本(update_20230405)发布时间延期至本周,请谅解。
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。
本公示分为五部分:
1、openEuler-20.03-LTS-SP1 Update 20230405发布情况及待修复缺陷
2、openEuler-20.03-LTS-SP3 Update 20230405发布情况及待修复缺陷
3、openEuler-22.03-LTS Update 20230405发布情况及待修复缺陷
4、openEuler-22.03-LTS-SP1 Update 20230405发布情况及待修复缺陷
5、openEuler 关键组件待修复CVE 清单
6、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2023/04/16)提供 update_ 20230412 版本。
openEuler-20.03-LTS-SP1 Update 20230405
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题1个,已知漏洞15个。目前版本分支剩余待修复缺陷35个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6SC7U?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2023-28487
sudo
5.3
CVE-2023-28486
sudo
5.3
CVE-2023-0466
openssl
5.6
CVE-2023-0465
openssl
5.6
CVE-2023-0464
openssl
7.5
CVE-2023-25180
glib2
6.2
CVE-2023-24593
glib2
6.2
CVE-2023-1370
json-smart
7.5
CVE-2023-1108
undertow
7.5
CVE-2018-16438
hdf5
8.8
CVE-2018-14031
hdf5
8.8
CVE-2023-28772
kernel
7.8
CVE-2023-28328
kernel
5.5
CVE-2023-1513
kernel
7.5
CVE-2023-1380
kernel
6.6
Bugfix:
issue
仓库
#I6SMBI:ext4 buffer部分写可能导致idisk_size大于i_size
kernel
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I281C1
【fuzz】runtime error:
libsass
Base-service
I437CR
[SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错
obs-server
Others
I43OSX
[clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0
clamav
Others
I48GIM
【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I4G4A5
Undefine-shift in _bfd_safe_read_leb128
binutils
Compiler
I4G4B1
Integer overflow in print_vms_time
binutils
Compiler
I4G4VY
memleak in parse_gnu_debugaltlink
binutils
Compiler
I4G4WF
Heap-buffer-overflow in slurp_hppa_unwind_table
binutils
Compiler
I4G4WW
Use-after-free in make_qualified_name
binutils
Compiler
I4G4X6
memleak in byte_get_little_endian
binutils
Compiler
I4G4XF
memleak in process_mips_specific
binutils
Compiler
I4G4Y0
out-of-memory in vms_lib_read_index
binutils
Compiler
I4G4YJ
Heap-buffer-overflow in bfd_getl16
binutils
Compiler
I4G4YV
Floating point exception in _bfd_vms_slurp_etir
binutils
Compiler
I4J0OY
【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常
libdap
sig-recycle
I4JMG4
【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251
python-robotframework
sig-ROS
I4K6ES
stack-buffer-overflow in UINT32_Marshal
libtpms
sig-security-facility
I4K6FU
global-buffer-overflow in Array_Marshal
libtpms
sig-security-facility
I4O16Z
【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息
kernel
Kernel
I4QV6N
【openEuler-20.03-LTS-SP1】flink命令执行失败
flink
sig-bigdata
I5IG1V
【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败
efl
sig-compat-winapp
I5IG6K
【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5JHX2
【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6AZZU
【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped)
gcc
Compiler
I6CBNA
【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6CKZE
【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault
gcc
Compiler
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
I6O19D
【20.03 sp1 udpate 0315 】irb-jruby命令执行报错
jruby
sig-ruby
openEuler-20.03-LTS-SP3 Update 20230405
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问1个,已知漏洞13个。目前版本分支剩余待修复缺陷 12个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6SC7V?from=project-i…
CVE修复:
需求类型
软件包
优先级
CVE-2018-14031
hdf5
8.8
CVE-2018-16438
hdf5
8.8
CVE-2023-28487
sudo
5.3
CVE-2023-28486
sudo
5.3
CVE-2023-28328
kernel
5.5
CVE-2023-1380
kernel
6.6
CVE-2023-1513
kernel
7.5
CVE-2023-0464
openssl
7.5
CVE-2023-0465
openssl
5.6
CVE-2023-0466
openssl
5.6
CVE-2023-25180
glib2
6.2
CVE-2023-24593
glib2
6.2
CVE-2023-1108
undertow
7.5
Bugfix:
issue
仓库
#I6SMBI:ext4 buffer部分写可能导致idisk_size大于i_size
kernel
openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I4QV7S
【openEuler-20.03-LTS-SP3】flink run 命令执行失败
flink
sig-bigdata
I4UMEV
[openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历
kernel
Kernel
I5IGAS
【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5IGOR
【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败
fluidsynth
Application
I5KXUY
【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I5KY4S
【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功
vdsm
oVirt
I5LYJK
【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常
TCP_option_address
Kernel
I5XDXJ
openeuler:20.03-sp3下lua-lunit0.5和lua5.3不匹配
mugen
sig-QA
I613DI
【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败
openEuler-release
Base-service
I61LEV
【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错
tuna
Others
I66BBJ
[20.03-LTS-SP3]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源
openEuler-repos
Base-service
I6CBL7
【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
openEuler-22.03-LTS Update 20230405
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题1个,已知漏洞16个。目前版本分支剩余待修复缺陷8个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6SC7W?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2023-28487
sudo
5.3
CVE-2023-28486
sudo
5.3
CVE-2018-14031
hdf5
8.8
CVE-2018-16438
hdf5
8.8
CVE-2022-29901
kernel
6.5
CVE-2022-4269
kernel
5.5
CVE-2023-28327
kernel
5.5
CVE-2023-28328
kernel
5.5
CVE-2023-1380
kernel
6.6
CVE-2023-1513
kernel
7.5
CVE-2023-0464
openssl
7.5
CVE-2023-0465
openssl
5.6
CVE-2023-0466
openssl
5.6
CVE-2023-25180
glib2
6.2
CVE-2023-24593
glib2
6.2
CVE-2023-1108
undertow
7.5
Bugfix:
issue
仓库
#I6SFHJ:开源主线网络补丁回合
kernel
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
sig
I5JIA6
【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JPII
【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin
ovirt-engine
oVirt
I665SM
resize2fs出现csum不一致
kernel
Kernel
I66BDE
[22.03-LTS]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源
openEuler-repos
Base-service
I66KIH
【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败
openstack-ironic-inspector
sig-openstack
I677QX
【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误
opengauss-server
DB
I6CBPQ
【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6O1CK
【22.03 lts udpate 0315 】irb-jruby命令执行报错
jruby
sig-ruby
openEuler-22.03-LTS SP1 Update 20230405
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题1个,已知漏洞22个。目前版本分支剩余待修复缺陷11个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6SC7T?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2018-14031
hdf5
8.8
CVE-2018-16438
hdf5
8.8
CVE-2023-28487
sudo
5.3
CVE-2023-28486
sudo
5.3
CVE-2023-23004
kernel
5.5
CVE-2023-1249
kernel
5.5
CVE-2023-28327
kernel
5.5
CVE-2023-28328
kernel
5.5
CVE-2023-1380
kernel
6.6
CVE-2023-28466
kernel
7
CVE-2022-48424
kernel
7.8
CVE-2022-48423
kernel
7.8
CVE-2022-48425
kernel
7.8
CVE-2023-1281
kernel
7.8
CVE-2023-25809
runc
5
CVE-2023-0466
openssl
5.6
CVE-2023-0465
openssl
5.6
CVE-2023-24593
glib2
6.2
CVE-2023-25180
glib2
6.2
CVE-2023-0464
openssl
7.5
CVE-2023-1513
kernel
7.5
CVE-2023-1108
undertow
7.5
Bugfix:
issue
仓库
#I6SFHJ:开源主线网络补丁回合
kernel
openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
sig
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6AZZU
【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped)
gcc
Compiler
I6CBPN
【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6CKZE
【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault
gcc
Compiler
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE(4.13日数据):
漏洞编号
Issue ID
剩余天数
CVSS评分
软件包
责任SIG
CVE-2023-1390
I6N7CV
0.49
6.5
risc-v-kernel
sig-RISC-V
CVE-2023-28176
I6N797
0.49
0.0
firefox
Application
CVE-2023-28159
I6N78R
0.49
0.0
firefox
Application
CVE-2023-28161
I6N8CG
0.52
0.0
firefox
Application
CVE-2023-28160
I6N89T
0.52
0.0
firefox
Application
CVE-2023-28164
I6N87J
0.52
6.1
firefox
Application
CVE-2023-28162
I6N860
0.52
0.0
firefox
Application
CVE-2023-28177
I6N8JV
0.53
0.0
firefox
Application
CVE-2023-28163
I6N8EY
0.53
0.0
firefox
Application
CVE-2023-25751
I6N97Z
0.55
0.0
firefox
Application
CVE-2023-25752
I6N96P
0.55
6.1
firefox
Application
CVE-2023-25750
I6N96C
0.55
0.0
firefox
Application
CVE-2023-25748
I6N965
0.55
0.0
firefox
Application
CVE-2023-25749
I6N960
0.55
0.0
firefox
Application
CVE-2023-26485
I6S7WH
2.0
7.5
cmark
CVE-2023-24824
I6S7WF
2.0
7.5
cmark
CVE-2023-27593
I6O473
3.04
5.5
cilium
sig-high-performance-network
CVE-2023-26916
I6SX7D
4.73
7.5
libyang
sig-high-performance-network
CVE-2023-1838
I6T1EZ
5.23
7.1
risc-v-kernel
sig-RISC-V
CVE-2023-24534
I6T1HL
5.36
7.5
golang
sig-golang
CVE-2023-24537
I6T1HJ
5.36
8.1
golang
sig-golang
CVE-2022-4900
I6OOSB
5.98
0.0
php
Base-service
CVE-2023-28840
I6T4RE
6.0
7.5
moby
CVE-2023-28840
I6T4RC
6.0
7.5
docker
sig-CloudNative
CVE-2023-28425
I6OW4W
6.72
5.5
redis5
sig-bigdata
CVE-2023-28425
I6OW46
6.72
5.5
redis
Others
CVE-2023-28425
I6OW3K
6.72
5.5
python-redis
Base-service
CVE-2023-28425
I6OW2W
6.72
5.5
redis6
sig-bigdata
CVE-2023-1544
I6OZK3
6.85
5.5
qemu
Virt
CVE-2023-28708
I6PBXT
7.89
4.3
tomcat
Application
CVE-2023-1583
I6PDF8
8.22
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-23913
I6PDIP
8.39
0.0
rubygem-rails
sig-ruby
CVE-2023-1410
I6PLY9
8.76
4.8
grafana
Application
CVE-2023-0160
I6PPPN
9.0
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-0870
I6PQ87
9.11
6.7
openstack-horizon
sig-openstack
CVE-2023-1611
I6PQCU
9.24
6.3
risc-v-kernel
sig-RISC-V
CVE-2021-3923
I6Q365
10.27
2.3
risc-v-kernel
sig-RISC-V
CVE-2023-1625
I6Q3J1
10.47
0.0
openstack-heat
sig-openstack
CVE-2023-1637
I6QEZ5
12.37
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-28866
I6QHVX
12.52
5.3
risc-v-kernel
sig-RISC-V
CVE-2023-28859
I6QRYO
12.99
6.5
redis6
sig-bigdata
CVE-2023-28859
I6QRYL
12.99
6.5
redis5
sig-bigdata
CVE-2023-28859
I6QRYK
12.99
6.5
redis
Others
CVE-2023-28859
I6QRYH
12.99
6.5
python-redis
Base-service
CVE-2023-25661
I6QSNP
13.14
6.5
tensorflow
sig-ai
CVE-2022-39188
I5QVT3
13.81
4.7
kernel
Kernel
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
沐钰莹(openEuler release SIG)
Mobile: +86 15651995918
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail: muyuying1(a)huawei.com<mailto:muyuying1@huawei.com>
[cid:image002.png@01D95F4C.8C3691C0]Open Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件!
This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it
1
0
Dear all,
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。
本公示分为五部分:
1、openEuler-20.03-LTS-SP1 Update 20230329发布情况及待修复缺陷
2、openEuler-20.03-LTS-SP3 Update 20230329发布情况及待修复缺陷
3、openEuler-22.03-LTS Update 20230329发布情况及待修复缺陷
4、openEuler-22.03-LTS-SP1 Update 20230329发布情况及待修复缺陷
5、openEuler 关键组件待修复CVE 清单
6、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2023/04/09)提供 update_ 20230405 版本。
openEuler-20.03-LTS-SP1 Update 20230329
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题3个,已知漏洞18个。目前版本分支剩余待修复缺陷35个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6QETU?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2020-12762
libfastjson
7.8
CVE-2022-41725
golang
7.5
CVE-2022-41724
golang
7.5
CVE-2022-41723
golang
7.5
CVE-2023-28617
emacs
9.8
CVE-2023-27538
curl
5.8
CVE-2023-27536
curl
5.8
CVE-2023-27535
curl
5.8
CVE-2023-27534
curl
4.5
CVE-2023-27533
curl
4.5
CVE-2023-26769
liblouis
7.5
CVE-2022-36021
redis
5.5
CVE-2023-28466
kernel
7
CVE-2023-1382
kernel
0
CVE-2023-1281
kernel
7.8
CVE-2023-1079
kernel
6.8
CVE-2022-4269
kernel
5.5
CVE-2022-29901
kernel
5.6
Bugfix:
issue
仓库
#I6PS8F:vim9.0版本添加用户配置文件vimrc后Backspace键失效
vim
#I6D0K1:例行分析grub2软件包补丁
grub2
#I6MR1V:【OLK5.10】文件系统长稳环境出现fsck修复后仍有错误
kernel
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I281C1
【fuzz】runtime error:
libsass
Base-service
I437CR
[SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错
obs-server
Others
I43OSX
[clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0
clamav
Others
I48GIM
【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I4G4A5
Undefine-shift in _bfd_safe_read_leb128
binutils
Compiler
I4G4B1
Integer overflow in print_vms_time
binutils
Compiler
I4G4VY
memleak in parse_gnu_debugaltlink
binutils
Compiler
I4G4WF
Heap-buffer-overflow in slurp_hppa_unwind_table
binutils
Compiler
I4G4WW
Use-after-free in make_qualified_name
binutils
Compiler
I4G4X6
memleak in byte_get_little_endian
binutils
Compiler
I4G4XF
memleak in process_mips_specific
binutils
Compiler
I4G4Y0
out-of-memory in vms_lib_read_index
binutils
Compiler
I4G4YJ
Heap-buffer-overflow in bfd_getl16
binutils
Compiler
I4G4YV
Floating point exception in _bfd_vms_slurp_etir
binutils
Compiler
I4J0OY
【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常
libdap
sig-recycle
I4JMG4
【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251
python-robotframework
sig-ROS
I4K6ES
stack-buffer-overflow in UINT32_Marshal
libtpms
sig-security-facility
I4K6FU
global-buffer-overflow in Array_Marshal
libtpms
sig-security-facility
I4O16Z
【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息
kernel
Kernel
I4QV6N
【openEuler-20.03-LTS-SP1】flink命令执行失败
flink
sig-bigdata
I5IG1V
【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败
efl
sig-compat-winapp
I5IG6K
【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5JHX2
【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6AZZU
【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped)
gcc
Compiler
I6CBNA
【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6CKZE
【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault
gcc
Compiler
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
I6O19D
【20.03 sp1 udpate 0315 】irb-jruby命令执行报错
jruby
sig-ruby
openEuler-20.03-LTS-SP3 Update 20230329
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问5个,已知漏洞18个。目前版本分支剩余待修复缺陷 12个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6QETV?from=project-i…
CVE修复:
需求类型
软件包
优先级
CVE-2020-12762
libfastjson
7.8
CVE-2022-41723
golang
7.5
CVE-2022-41724
golang
7.5
CVE-2022-41725
golang
7.5
CVE-2023-28617
emacs
9.8
CVE-2023-27533
curl
4.5
CVE-2023-27534
curl
4.5
CVE-2023-27535
curl
5.8
CVE-2023-27536
curl
5.8
CVE-2023-27538
curl
5.8
CVE-2022-36021
redis
5.5
CVE-2023-26769
liblouis
7.5
CVE-2022-29901
kernel
5.6
CVE-2022-4269
kernel
5.5
CVE-2023-1079
kernel
6.8
CVE-2023-1281
kernel
7.8
CVE-2023-1382
kernel
0
CVE-2023-28466
kernel
7
Bugfix:
issue
仓库
#I6PS8F:vim9.0版本添加用户配置文件vimrc后Backspace键失效
vim
#I6D0K1:例行分析grub2软件包补丁
grub2
#I6KMOJ:grub2支持tpcm3.0特性
grub2
#I6L25L:shim支持可信计算3.0tpcm特性
shim
#I6MR1V:【OLK5.10】文件系统长稳环境出现fsck修复后仍有错误
kernel
openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I4QV7S
【openEuler-20.03-LTS-SP3】flink run 命令执行失败
flink
sig-bigdata
I4UMEV
[openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历
kernel
Kernel
I5IGAS
【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5IGOR
【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败
fluidsynth
Application
I5KXUY
【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I5KY4S
【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功
vdsm
oVirt
I5LYJK
【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常
TCP_option_address
Kernel
I5XDXJ
openeuler:20.03-sp3下lua-lunit0.5和lua5.3不匹配
mugen
sig-QA
I613DI
【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败
openEuler-release
Base-service
I61LEV
【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错
tuna
Others
I66BBJ
[20.03-LTS-SP3]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源
openEuler-repos
Base-service
I6CBL7
【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
openEuler-22.03-LTS Update 20230329
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题22个,已知漏洞5个。目前版本分支剩余待修复缺陷8个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6QETV?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2020-12762
libfastjson
7.8
CVE-2022-41723
golang
7.5
CVE-2022-41724
golang
7.5
CVE-2022-41725
golang
7.5
CVE-2023-28617
emacs
9.8
CVE-2023-27533
curl
4.5
CVE-2023-27534
curl
4.5
CVE-2023-27535
curl
5.8
CVE-2023-27536
curl
5.8
CVE-2023-27538
curl
5.8
CVE-2023-1161
wireshark
7.1
CVE-2022-36021
redis
5.5
CVE-2023-26769
liblouis
7.5
CVE-2022-48423
kernel
7.8
CVE-2022-48424
kernel
7.8
CVE-2022-48425
kernel
7.8
CVE-2023-1079
kernel
6.8
CVE-2023-1249
kernel
4.1
CVE-2023-1281
kernel
7.8
CVE-2023-1382
kernel
0
CVE-2023-22999
kernel
5.5
CVE-2023-28466
kernel
7
Bugfix:
issue
仓库
#I6RD72:upadte20230329【轻量级 PR】:Rebuild for next release
perl-libintl-perl
#I6PS8F:vim9.0版本添加用户配置文件vimrc后Backspace键失效
vim
#I6MTKW:【grub2】grub2-rpm-sort命令执行报错
grub2
#I6RDEF:update20230329 添加sw架构
perftest
#I5N162:【OLK 5.10】修复scsi_end_request并发场景出现ref->data空指针解引用问题
kernel
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
sig
I5JIA6
【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JPII
【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin
ovirt-engine
oVirt
I665SM
resize2fs出现csum不一致
kernel
Kernel
I66BDE
[22.03-LTS]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源
openEuler-repos
Base-service
I66KIH
【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败
openstack-ironic-inspector
sig-openstack
I677QX
【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误
opengauss-server
DB
I6CBPQ
【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6O1CK
【22.03 lts udpate 0315 】irb-jruby命令执行报错
jruby
sig-ruby
openEuler-22.03-LTS SP1 Update 20230329
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题10个,已知漏洞12个。目前版本分支剩余待修复缺陷13个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6QETT?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2020-12762
libfastjson
7.8
CVE-2022-41723
golang
7.5
CVE-2022-41724
golang
7.5
CVE-2022-41725
golang
7.5
CVE-2023-28617
emacs
9.8
CVE-2023-27533
curl
4.5
CVE-2023-27534
curl
4.5
CVE-2023-27535
curl
5.8
CVE-2023-27536
curl
5.8
CVE-2023-27538
curl
5.8
CVE-2023-1161
wireshark
7.1
CVE-2022-36021
redis
5.5
CVE-2023-26769
liblouis
7.5
Bugfix:
issue
仓库
#I6RD72:upadte20230329【轻量级 PR】:Rebuild for next release
perl-libintl-perl
#I6RE2O:update20230329 [Update] Update to v0.4.1
pin-gcc-client
#I64VTB:执行命令报错error -4
papi
#I6RE3L:update20230329 master到openEuler-22.03-LTS-SP1,升级到4.0.2
procps-ng
#I6GCRA:部署好server,client,插入ko,虚拟机重启
dpu-utilities
#I6JPN3:openEuler22.03 sp1,4.0版本procps-ng,开启虚拟机top命令统计不到CPU使用率 st,st占用率一直显示为0
procps-ng
#I6RE77:update20230329 update syscare to 1.0.1
syscare
#I67PXN:fix changelog date error
rsyslog
#I6PS8F:vim9.0版本添加用户配置文件vimrc后Backspace键失效
vim
#I5N162:【OLK 5.10】修复scsi_end_request并发场景出现ref->data空指针解引用问题
kernel
openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
sig
I657VX
【22.03_LTS_SP1_RC2】【x86/arm】deepin-dbus-generator不存在安全的编译选项PIE、STRIP
deepin-dbus-generator
sig-DDE
I657W3
【22.03_LTS_SP1_RC2】【x86/arm】deepin-graphics-driver-manager存在不安全的编译选项STRIP
deepin-graphics-driver-manager
sig-DDE
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6AZZU
【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped)
gcc
Compiler
I6CBPN
【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6CKZE
【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault
gcc
Compiler
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE(3.25日数据):
漏洞编号
Issue ID
剩余天数
CVSS评分
软件包
责任SIG
CVE-2023-25664
I6Q9HZ
0.17
9.8
tensorflow
sig-ai
CVE-2023-27586
I6OW3B
3.0
7.1
python-cairosvg
CVE-2023-0386
I6PBWH
4.17
7.8
risc-v-kernel
sig-RISC-V
CVE-2023-1192
I6KDQD
4.26
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-1194
I6KDP0
4.26
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-1195
I6KDOZ
4.26
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-1193
I6KEWP
4.38
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-0464
I6PDB8
4.42
7.5
openssl
sig-security-facility
CVE-2023-1249
I6KT9F
5.26
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-1249
I6KT9C
5.26
5.5
kernel
Kernel
CVE-2023-28772
I6PRCO
5.75
7.8
kernel
Kernel
CVE-2023-1108
I6KVMO
5.76
0.0
undertow
sig-Java
CVE-2023-27478
I6KWN7
5.8
6.5
libmemcached
Programming-language
CVE-2023-25669
I6Q38F
6.67
7.5
tensorflow
sig-ai
CVE-2023-25670
I6Q38E
6.67
7.5
tensorflow
sig-ai
CVE-2023-25659
I6Q37O
6.67
7.5
tensorflow
sig-ai
CVE-2023-25658
I6Q37N
6.67
7.5
tensorflow
sig-ai
CVE-2023-25673
I6Q9HC
7.16
7.5
tensorflow
sig-ai
CVE-2023-25671
I6Q9HA
7.16
7.5
tensorflow
sig-ai
CVE-2023-25665
I6Q9H7
7.16
7.5
tensorflow
sig-ai
CVE-2023-27579
I6Q9G1
7.16
7.5
tensorflow
sig-ai
CVE-2023-25663
I6Q9IB
7.17
7.5
tensorflow
sig-ai
CVE-2023-25666
I6Q9I8
7.17
7.5
tensorflow
sig-ai
CVE-2023-25667
I6Q9I6
7.17
7.5
tensorflow
sig-ai
CVE-2023-25660
I6Q9I4
7.17
7.5
tensorflow
sig-ai
CVE-2023-25674
I6Q9HW
7.17
7.5
tensorflow
sig-ai
CVE-2023-25662
I6Q9HP
7.17
7.5
tensorflow
sig-ai
CVE-2023-25672
I6Q9HK
7.17
7.5
tensorflow
sig-ai
CVE-2023-1289
I6LKHN
7.38
5.5
ImageMagick
Others
CVE-2011-5034
I6LPRE
7.96
0.0
geronimo-saaj
sig-Java
CVE-2023-1436
I6P70O
11.35
7.5
jettison
dev-utils
CVE-2023-1370
I6MX6A
11.35
7.5
json-smart
sig-Java
CVE-2023-1032
I6MSIY
11.63
0.0
kernel
Kernel
CVE-2023-28176
I6N797
12.77
0.0
firefox
Application
CVE-2023-28159
I6N78R
12.77
0.0
firefox
Application
CVE-2023-1390
I6N7CV
12.78
6.5
risc-v-kernel
sig-RISC-V
CVE-2023-28164
I6N87J
12.8
6.1
firefox
Application
CVE-2023-28162
I6N860
12.8
0.0
firefox
Application
CVE-2023-28177
I6N8JV
12.81
0.0
firefox
Application
CVE-2023-28163
I6N8EY
12.81
0.0
firefox
Application
CVE-2023-28161
I6N8CG
12.81
0.0
firefox
Application
CVE-2023-28160
I6N89T
12.81
0.0
firefox
Application
CVE-2023-25752
I6N96P
12.83
6.1
firefox
Application
CVE-2023-25750
I6N96C
12.83
0.0
firefox
Application
CVE-2023-25748
I6N965
12.83
0.0
firefox
Application
CVE-2023-25749
I6N960
12.83
0.0
firefox
Application
CVE-2023-25751
I6N97Z
12.84
0.0
firefox
Application
CVE-2023-28328
I6NCQH
13.0
0.0
kernel
Kernel
CVE-2023-28327
I6NCP2
13.0
0.0
kernel
Kernel
CVE-2023-1380
I6NCVX
13.01
0.0
kernel
Kernel
CVE-2022-39188
I5QVT3
13.81
4.7
kernel
Kernel
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
沐钰莹(openEuler release SIG)
Mobile: +86 15651995918
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail: muyuying1(a)huawei.com<mailto:muyuying1@huawei.com>
[cid:image002.png@01D95F4C.8C3691C0]Open Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件!
This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it
1
0
Dear all,
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。
本公示分为五部分:
1、openEuler-20.03-LTS-SP1 Update 20230322发布情况及待修复缺陷
2、openEuler-20.03-LTS-SP3 Update 20230322发布情况及待修复缺陷
3、openEuler-22.03-LTS Update 20230322发布情况及待修复缺陷
4、openEuler-22.03-LTS-SP1 Update 20230322发布情况及待修复缺陷
5、openEuler 关键组件待修复CVE 清单
6、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2023/04/02)提供 update_ 20230329 版本。
openEuler-20.03-LTS-SP1 Update 20230322
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题4个,已知漏洞4个。目前版本分支剩余待修复缺陷35个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6OCCM?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2022-27337
poppler
6.5
CVE-2023-1073
kernel
6.3
CVE-2023-1095
kernel
5.5
CVE-2023-1264
vim
5.5
Bugfix:
issue
仓库
#I6P8R2:udpate-20230322 json-c:enable DT
json-c
#I6E9D3:[openEuler-1.0-LTS] oom: decouple mems_allowed from oom_unkillable_task
kernel
#I6LJQB: 配置使用saslauthd+pam后鉴权长时间运行,saslauthd进程内打开文件失败
pam
#I6P8V4:update20230322 Minor fix in the compatibility library
gdbm
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I281C1
【fuzz】runtime error:
libsass
Base-service
I437CR
[SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错
obs-server
Others
I43OSX
[clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0
clamav
Others
I48GIM
【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I4G4A5
Undefine-shift in _bfd_safe_read_leb128
binutils
Compiler
I4G4B1
Integer overflow in print_vms_time
binutils
Compiler
I4G4VY
memleak in parse_gnu_debugaltlink
binutils
Compiler
I4G4WF
Heap-buffer-overflow in slurp_hppa_unwind_table
binutils
Compiler
I4G4WW
Use-after-free in make_qualified_name
binutils
Compiler
I4G4X6
memleak in byte_get_little_endian
binutils
Compiler
I4G4XF
memleak in process_mips_specific
binutils
Compiler
I4G4Y0
out-of-memory in vms_lib_read_index
binutils
Compiler
I4G4YJ
Heap-buffer-overflow in bfd_getl16
binutils
Compiler
I4G4YV
Floating point exception in _bfd_vms_slurp_etir
binutils
Compiler
I4J0OY
【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常
libdap
sig-recycle
I4JMG4
【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251
python-robotframework
sig-ROS
I4K6ES
stack-buffer-overflow in UINT32_Marshal
libtpms
sig-security-facility
I4K6FU
global-buffer-overflow in Array_Marshal
libtpms
sig-security-facility
I4O16Z
【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息
kernel
Kernel
I4QV6N
【openEuler-20.03-LTS-SP1】flink命令执行失败
flink
sig-bigdata
I5IG1V
【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败
efl
sig-compat-winapp
I5IG6K
【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5JHX2
【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6AZZU
【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped)
gcc
Compiler
I6CBNA
【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6CKZE
【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault
gcc
Compiler
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
I6O19D
【20.03 sp1 udpate 0315 】irb-jruby命令执行报错
jruby
sig-ruby
openEuler-20.03-LTS-SP3 Update 20230322
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问4个,已知漏洞5个。目前版本分支剩余待修复缺陷 12个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6OCCO?from=project-i…
CVE修复:
需求类型
软件包
优先级
CVE-2020-10775
ovirt-engine
5.3
CVE-2022-27337
poppler
6.5
CVE-2023-1073
kernel
6.3
CVE-2023-1095
kernel
5.5
CVE-2023-1264
vim
5.5
Bugfix:
issue
仓库
#I6P8R2:udpate-20230322 json-c:enable DT
json-c
#I6E9D3:[openEuler-1.0-LTS] oom: decouple mems_allowed from oom_unkillable_task
kernel
#I6LJQB: 配置使用saslauthd+pam后鉴权长时间运行,saslauthd进程内打开文件失败
pam
#I6P8V4:update20230322 Minor fix in the compatibility library
gdbm
openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I4QV7S
【openEuler-20.03-LTS-SP3】flink run 命令执行失败
flink
sig-bigdata
I4UMEV
[openEuler 20.03-LTS SP3]openEuler开启crash_kexec_post_notifiers后,panic通知链无法完全遍历
kernel
Kernel
I5IGAS
【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5IGOR
【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败
fluidsynth
Application
I5KXUY
【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I5KY4S
【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功
vdsm
oVirt
I5LYJK
【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常
TCP_option_address
Kernel
I5XDXJ
openeuler:20.03-sp3下lua-lunit0.5和lua5.3不匹配
mugen
sig-QA
I613DI
【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败
openEuler-release
Base-service
I61LEV
【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错
tuna
Others
I66BBJ
[20.03-LTS-SP3]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源
openEuler-repos
Base-service
I6CBL7
【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
openEuler-22.03-LTS Update 20230322
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题6个,已知漏洞2个。目前版本分支剩余待修复缺陷8个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6OCCP?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2022-27337
poppler
6.5
CVE-2023-1264
vim
5.5
Bugfix:
issue
仓库
#I6DM2X:兼容-accel参数
stratovirt
#I6OFGK:例行分析python-urllib3补丁,需要补丁回合
python-urllib3
#I6LJQB: 配置使用saslauthd+pam后鉴权长时间运行,saslauthd进程内打开文件失败
pam
#I6P8V4:update20230322 Minor fix in the compatibility library
gdbm
#I5YM6P:openEuler 22.03 LTS Next版本python-chardet软件升级至5.0.0
python-chardet
#I6NVPT:[OLK-5.10] 产品长稳测试中出现热补丁相关的hungtask<https://gitee.com/open_euler/dashboard?issue_id=I6NVPT>
kernel
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
sig
I5JIA6
【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JPII
【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin
ovirt-engine
oVirt
I665SM
resize2fs出现csum不一致
kernel
Kernel
I66BDE
[22.03-LTS]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源
openEuler-repos
Base-service
I66KIH
【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败
openstack-ironic-inspector
sig-openstack
I677QX
【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误
opengauss-server
DB
I6CBPQ
【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6O1CK
【22.03 lts udpate 0315 】irb-jruby命令执行报错
jruby
sig-ruby
openEuler-22.03-LTS SP1 Update 20230322
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题8个,已知漏洞5个。目前版本分支剩余待修复缺陷14个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6OCCL?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2022-27337
poppler
6.5
CVE-2023-1264
vim
5.5
CVE-2023-1074
kernel
4.7
CVE-2023-1079
kernel
6.8
CVE-2023-1382
kernel
0
Bugfix:
issue
仓库
#I6P9BJ:update20230322-update iputils to version 20221126
iputils
#I6DM2X:兼容-accel参数
stratovirt
#I6ORHV:【22.03_LTS_SP1】jemalloc版本需要从5.2.1升级到5.3.0
jemalloc
#I6NY9Y:22.03-openEuler-LTS-SP1升级zbar,通过升级合入上游社区修复的一系列问题
zbar
#I6OFGK:例行分析python-urllib3补丁,需要补丁回合
python-urllib3
#I6LJQB: 配置使用saslauthd+pam后鉴权长时间运行,saslauthd进程内打开文件失败
pam
#I6P8V4:update20230322 Minor fix in the compatibility library
gdbm
#I6NVPT:[OLK-5.10] 产品长稳测试中出现热补丁相关的hungtask
kernel
openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
sig
I657VX
【22.03_LTS_SP1_RC2】【x86/arm】deepin-dbus-generator不存在安全的编译选项PIE、STRIP
deepin-dbus-generator
sig-DDE
I657W0
【22.03_LTS_SP1_RC2】【x86/arm】deepin-editor存在不安全的编译选项STRIP
deepin-editor
sig-DDE
I657W3
【22.03_LTS_SP1_RC2】【x86/arm】deepin-graphics-driver-manager存在不安全的编译选项STRIP
deepin-graphics-driver-manager
sig-DDE
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6AZZU
【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped)
gcc
Compiler
I6CBPN
【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6CKZE
【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault
gcc
Compiler
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE(3.25日数据):
漏洞编号
Issue ID
剩余天数
CVSS评分
软件包
责任SIG
CVE-2022-48423
I6OD4U
1.61
9.8
kernel
Kernel
CVE-2021-3329
I6HUIN
3.0
6.5
zephyr
CVE-2023-1076
I6I7UH
4.37
4.7
risc-v-kernel
sig-RISC-V
CVE-2023-1079
I6I7UE
4.37
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-1074
I6I7UD
4.37
4.7
risc-v-kernel
sig-RISC-V
CVE-2023-1075
I6I7U8
4.37
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-20860
I6PDX0
4.6
9.1
springframework
sig-Java
CVE-2023-28466
I6NIUR
4.61
7.0
kernel
Kernel
CVE-2023-28466
I6NIUL
4.61
7.0
risc-v-kernel
sig-RISC-V
CVE-2023-27781
I6NIU2
4.61
7.8
jpegoptim
Application
CVE-2023-1095
I6IK9V
5.25
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-1018
I6IKCI
5.5
5.5
libtpms
sig-security-facility
CVE-2020-12413
I6IKCQ
5.52
5.9
firefox
Application
CVE-2023-22997
I6IKXC
5.6
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-22998
I6IKWZ
5.6
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-22999
I6IKWS
5.6
5.5
kernel
Kernel
CVE-2023-22996
I6IKWQ
5.6
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-22997
I6IKWJ
5.6
5.5
kernel
Kernel
CVE-2023-22998
I6IKWF
5.6
5.5
kernel
Kernel
CVE-2023-22999
I6IKXV
5.61
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-25155
I6IRPL
5.87
6.5
redis
Others
CVE-2023-25155
I6IRP9
5.87
6.5
redis6
sig-bigdata
CVE-2023-25155
I6IROQ
5.87
6.5
redis5
sig-bigdata
CVE-2022-36021
I6IRS4
5.88
5.5
redis
Others
CVE-2022-36021
I6IRRY
5.88
5.5
redis6
sig-bigdata
CVE-2022-36021
I6IRRU
5.88
5.5
redis5
sig-bigdata
CVE-2019-14576
I6ISX4
5.92
0.0
edk2
Virt
CVE-2019-14561
I6ISWY
5.92
0.0
edk2
Virt
CVE-2023-22462
I6ITUB
5.95
5.4
grafana
Application
CVE-2023-27594
I6O472
6.19
7.3
cilium
sig-high-performance-network
CVE-2023-0594
I6IVYK
6.25
5.4
grafana
Application
CVE-2023-0507
I6IVYI
6.25
5.4
grafana
Application
CVE-2023-23004
I6IXRY
6.65
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-23006
I6IXRQ
6.65
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-23002
I6IXRB
6.65
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-23005
I6IXQX
6.65
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-23004
I6IXPT
6.65
5.5
kernel
Kernel
CVE-2023-23006
I6IXPJ
6.65
5.5
kernel
Kernel
CVE-2023-23002
I6IXOH
6.65
5.5
kernel
Kernel
CVE-2023-23005
I6IXO8
6.65
5.5
kernel
Kernel
CVE-2023-23001
I6IXNW
6.65
5.5
kernel
Kernel
CVE-2023-1161
I6JJJE
8.25
6.5
wireshark
Application
CVE-2022-48425
I6OD5R
8.61
7.8
kernel
Kernel
CVE-2022-48424
I6OD4P
8.61
7.8
kernel
Kernel
CVE-2023-1281
I6OP9S
9.51
7.8
kernel
Kernel
CVE-2023-27586
I6OW3B
9.87
7.1
python-cairosvg
CVE-2022-41725
I6OXZH
9.93
7.5
golang
sig-golang
CVE-2022-41724
I6OXZB
9.93
7.5
golang
sig-golang
CVE-2022-41723
I6OXYJ
9.93
7.5
golang
sig-golang
CVE-2019-10358
I6K7LN
10.87
6.5
maven2
sig-Java
CVE-2017-1000397
I6K7IR
10.87
5.9
maven2
sig-Java
CVE-2023-1194
I6KDP0
11.12
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-1195
I6KDOZ
11.12
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-1192
I6KDQD
11.13
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-1192
I6KDP1
11.13
0.0
kernel
Kernel
CVE-2023-1193
I6KEWP
11.25
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-1193
I6KEWO
11.25
6.5
kernel
Kernel
CVE-2023-1249
I6KT9F
12.12
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-1249
I6KT9C
12.12
4.1
kernel
Kernel
CVE-2023-1252
I6KTT3
12.25
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-1108
I6KVMO
12.63
0.0
undertow
sig-Java
CVE-2023-27478
I6KWN7
12.66
6.5
libmemcached
Programming-language
CVE-2022-39188
I5QVT3
13.81
4.7
kernel
Kernel
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
沐钰莹(openEuler release SIG)
Mobile: +86 15651995918
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail: muyuying1(a)huawei.com<mailto:muyuying1@huawei.com>
[cid:image002.png@01D95F4C.8C3691C0]Open Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件!
This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it
1
0
Dear all,
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。
本公示分为五部分:
1、openEuler-20.03-LTS-SP1 Update 20230315发布情况及待修复缺陷
2、openEuler-20.03-LTS-SP3 Update 20230315发布情况及待修复缺陷
3、openEuler-22.03-LTS Update 20230315发布情况及待修复缺陷
4、openEuler-22.03-LTS-SP1 Update 20230315发布情况及待修复缺陷
5、openEuler 关键组件待修复CVE 清单
6、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2023/03/26)提供 update_ 20230322 版本。
openEuler-20.03-LTS-SP1 Update 20230315
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题4个,已知漏洞23个。目前版本分支剩余待修复缺陷38个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6MFEQ?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2022-40899
future
7.5
CVE-2023-26253
glusterfs
7.5
CVE-2023-27522
httpd
5.9
CVE-2023-25690
httpd
7.5
CVE-2022-25857
snakeyaml
7.5
CVE-2022-38749
snakeyaml
6.5
CVE-2022-38750
snakeyaml
5.5
CVE-2022-38751
snakeyaml
6.5
CVE-2022-38752
snakeyaml
6.5
CVE-2022-41854
snakeyaml
6.5
CVE-2023-20938
kernel
8.8
CVE-2023-0461
kernel
7.8
CVE-2023-1074
kernel
4.7
CVE-2023-1078
kernel
7.8
CVE-2023-1076
kernel
4.7
CVE-2023-1118
kernel
7.8
CVE-2023-26604
systemd
7.8
CVE-2023-1170
vim
7.8
CVE-2023-1175
vim
7.3
CVE-2023-27371
libmicrohttpd
7.5
CVE-2023-26545
kernel
7.8
CVE-2023-20052
clamav
5.3
CVE-2023-20032
clamav
9.8
Bugfix:
issue
仓库
#I6LHB0:修复由于snakeyaml升级到1.32版本导致jruby编译失败
jruby
#I6LHBA:修复由于snakeyaml升级到1.32版本导致polyglot编译失败
polyglot
#I6561X:软件包参数问题
netsniff-ng
#I643OL:【openEuler 2003 LTS】【openEuler-1.0-LTS】 [内核] [kernfs] [block] 测试iscsi中blk层宕机
kernel
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I281C1
【fuzz】runtime error:
libsass
Base-service
I437CR
[SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错
obs-server
Others
I43OSX
[clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0
clamav
Others
I48GIM
【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I4G4A5
Undefine-shift in _bfd_safe_read_leb128
binutils
Compiler
I4G4B1
Integer overflow in print_vms_time
binutils
Compiler
I4G4VY
memleak in parse_gnu_debugaltlink
binutils
Compiler
I4G4WF
Heap-buffer-overflow in slurp_hppa_unwind_table
binutils
Compiler
I4G4WW
Use-after-free in make_qualified_name
binutils
Compiler
I4G4X6
memleak in byte_get_little_endian
binutils
Compiler
I4G4XF
memleak in process_mips_specific
binutils
Compiler
I4G4Y0
out-of-memory in vms_lib_read_index
binutils
Compiler
I4G4YJ
Heap-buffer-overflow in bfd_getl16
binutils
Compiler
I4G4YV
Floating point exception in _bfd_vms_slurp_etir
binutils
Compiler
I4J0OY
【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常
libdap
sig-recycle
I4JMG4
【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251
python-robotframework
sig-ROS
I4K6ES
stack-buffer-overflow in UINT32_Marshal
libtpms
sig-security-facility
I4K6FU
global-buffer-overflow in Array_Marshal
libtpms
sig-security-facility
I4O16Z
【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息
kernel
Kernel
I4QV6N
【openEuler-20.03-LTS-SP1】flink命令执行失败
flink
sig-bigdata
I5IG1V
【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败
efl
sig-compat-winapp
I5IG6K
【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5JHX2
【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6AZZU
【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped)
gcc
Compiler
I6CBNA
【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6CKZE
【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault
gcc
Compiler
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
I6ISTD
[22.03-sp1]执行iscsiadm -m node -p 127.0.0.1 -u命令失败,内核报错
kernel
Kernel
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
I6ISTD
[22.03-sp1]执行iscsiadm -m node -p 127.0.0.1 -u命令失败,内核报错
kernel
Kernel
openEuler-20.03-LTS-SP3 Update 20230315
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问4个,已知漏洞23个。目前版本分支剩余待修复缺陷 11个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6MFER?from=project-i…
CVE修复:
需求类型
软件包
优先级
CVE-2023-27371
libmicrohttpd
7.5
CVE-2022-40899
future
7.5
CVE-2023-27522
httpd
5.9
CVE-2023-25690
httpd
7.5
CVE-2022-25857
snakeyaml
7.5
CVE-2022-38749
snakeyaml
6.5
CVE-2022-38750
snakeyaml
5.5
CVE-2022-38751
snakeyaml
6.5
CVE-2022-38752
snakeyaml
6.5
CVE-2022-41854
snakeyaml
6.5
CVE-2023-20938
kernel
8.8
CVE-2023-0461
kernel
7.8
CVE-2023-1074
kernel
4.7
CVE-2023-1078
kernel
7.8
CVE-2023-1076
kernel
4.7
CVE-2023-1118
kernel
7.8
CVE-2023-26604
systemd
7.8
CVE-2023-1170
vim
7.8
CVE-2023-1175
vim
7.3
CVE-2023-26253
glusterfs
7.5
CVE-2023-26545
kernel
7.8
CVE-2023-20052
clamav
5.3
CVE-2023-20032
clamav
9.8
Bugfix:
issue
仓库
#I6LHB0:修复由于snakeyaml升级到1.32版本导致jruby编译失败
jruby
#I6LHBA:修复由于snakeyaml升级到1.32版本导致polyglot编译失败
polyglot
#I6561X:软件包参数问题
netsniff-ng
#I643OL:【openEuler 2003 LTS】【openEuler-1.0-LTS】 [内核] [kernfs] [block] 测试iscsi中blk层宕机
kernel
openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I4QV7S
【openEuler-20.03-LTS-SP3】flink run 命令执行失败
flink
sig-bigdata
I5IGAS
【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5IGOR
【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败
fluidsynth
Application
I5KXUY
【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I5KY4S
【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功
vdsm
oVirt
I5LYJK
【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常
TCP_option_address
Kernel
I5XDXJ
openeuler:20.03-sp3下lua-lunit0.5和lua5.3不匹配
mugen
sig-QA
I613DI
【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败
openEuler-release
Base-service
I61LEV
【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错
tuna
Others
I66BBJ
[20.03-LTS-SP3]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源
openEuler-repos
Base-service
I6CBL7
【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
openEuler-22.03-LTS Update 20230315
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题6个,已知漏洞24个。目前版本分支剩余待修复缺陷9个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6MFES?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2023-27320
sudo
1
CVE-2023-27371
libmicrohttpd
7.5
CVE-2022-40899
future
7.5
CVE-2023-1170
vim
7.8
CVE-2023-1175
vim
7.3
CVE-2022-25857
snakeyaml
7.5
CVE-2022-38749
snakeyaml
6.5
CVE-2022-38750
snakeyaml
5.5
CVE-2022-38752
snakeyaml
6.5
CVE-2022-41854
snakeyaml
6.5
CVE-2023-20938
kernel
8.8
CVE-2023-0461
kernel
7.8
CVE-2023-1075
kernel
2.5
CVE-2023-1078
kernel
7.8
CVE-2023-1076
kernel
4.7
CVE-2023-22995
kernel
7.8
CVE-2023-1118
kernel
7.8
CVE-2023-27522
httpd
5.9
CVE-2023-25690
httpd
7.5
CVE-2023-26253
glusterfs
7.5
CVE-2023-26545
kernel
7.8
CVE-2022-38751
snakeyaml
6.5
CVE-2023-20052
clamav
5.3
CVE-2023-20032
clamav
9.8
Bugfix:
issue
仓库
#I6LBTJ:2203LTS版本的python3-paramiko包,通过RSA秘钥远程ssh验证报错,请求升级至2.11.0或2.11.0以后版本
python-paramiko
#I6KPA0:postfix 安装后 postfix.pem 证书有效期小于1年
postfix
#I6LHB0:修复由于snakeyaml升级到1.32版本导致jruby编译失败
jruby
#I6LHBA:修复由于snakeyaml升级到1.32版本导致polyglot编译失败
polyglot
#I6LNLJ:例行分析dnf补丁,需要补丁回合
dnf
#I6561X:软件包参数问题
netsniff-ng
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I5JIA6
【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JPII
【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin
ovirt-engine
oVirt
I665SM
resize2fs出现csum不一致
kernel
Kernel
I66BDE
[22.03-LTS]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源
openEuler-repos
Base-service
I66KIH
【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败
openstack-ironic-inspector
sig-openstack
I677QX
【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误
opengauss-server
DB
I6AG88
【22.03-LTS】【arm/x86】nvwa第一次卸载时有异常报错信息
nvwa
sig-ops
I6AGEG
【22.03-LTS-SP1】【arm/x86】nvwa第一次卸载时有异常报错信息
nvwa
sig-ops
I6CBPQ
【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
openEuler-22.03-LTS SP1 Update 20230315
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题11个,已知漏洞26个。目前版本分支剩余待修复缺陷14个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6MFEP?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2023-26081
epiphany
7.5
CVE-2023-26253
glusterfs
7.5
CVE-2022-38749
snakeyaml
6.5
CVE-2022-38750
snakeyaml
5.5
CVE-2022-38751
snakeyaml
6.5
CVE-2022-38752
snakeyaml
6.5
CVE-2022-41854
snakeyaml
6.5
CVE-2023-27320
sudo
1
CVE-2023-27522
httpd
5.9
CVE-2023-25690
httpd
7.5
CVE-2022-3560
pesign
5.5
CVE-2023-20938
kernel
8.8
CVE-2023-0461
kernel
7.8
CVE-2023-26607
kernel
7.1
CVE-2023-1075
kernel
2.5
CVE-2023-1078
kernel
7.8
CVE-2023-1076
kernel
4.7
CVE-2023-22995
kernel
7.8
CVE-2023-1118
kernel
7.8
CVE-2023-1175
vim
7.3
CVE-2023-1170
vim
7.8
CVE-2023-27371
libmicrohttpd
7.5
CVE-2023-26545
kernel
7.8
CVE-2022-40899
future
7.5
CVE-2023-20052
clamav
5.3
CVE-2023-20032
clamav
9.8
Bugfix:
issue
仓库
#I6J86M:repo python-lit-15.0.7-1源码包
python-lit
#I6K0AO:gala-gopher升级到1.0.2版本
gala-gopher
#I6KPA0:postfix 安装后 postfix.pem 证书有效期小于1年
postfix
#I6MR9A:例行回合社区补丁
efibootmgr
#I6LNLJ:例行分析dnf补丁,需要补丁回合
dnf
#I6561X:软件包参数问题
netsniff-ng
#I6LHB0:修复由于snakeyaml升级到1.32版本导致jruby编译失败
jruby
#I6LHBA:修复由于snakeyaml升级到1.32版本导致polyglot编译失败
polyglot
#I6NF3Y:update_0315补充clang对c、c++代码编译功能,需要补充libcxx、libcxxabi、llvm-libunwind三款软件
libcxx
#I6NF4V:udapte-0315补充clang对c、c++代码编译功能,需要补充libcxx、libcxxabi、llvm-libunwind三款软件
libcxxabi
#I6NF5I:update-0315 补充clang对c、c++代码编译功能,需要补充libcxx、libcxxabi、llvm-libunwind三款软件
llvm-libunwind
openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6AGEG
【22.03-LTS-SP1】【arm/x86】nvwa第一次卸载时有异常报错信息
nvwa
sig-ops
I6AZZU
【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped)
gcc
Compiler
I6CBPN
【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6CKRQ
【22.03 SP1 update20230201】【arm/x86】ceph-selinux卸载过程中有异常打印信息
ceph
sig-ceph
I6CKZE
【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault
gcc
Compiler
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
I6ISTD
[22.03-sp1]执行iscsiadm -m node -p 127.0.0.1 -u命令失败,内核报错
kernel
Kernel
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE(3.19日数据):
漏洞编号
Issue ID
剩余天数
CVSS评分
软件包
责任SIG
CVE-2023-0662
I6FWA8
0.13
5.3
php
Base-service
CVE-2023-0567
I6FXSZ
0.2
6.2
php
Base-service
CVE-2019-17003
I6FZ58
0.45
6.1
thunderbird
sig-desktop-apps
CVE-2023-23039
I6H8H5
6.02
5.7
risc-v-kernel
sig-RISC-V
CVE-2021-33367
I6H8GO
6.02
5.5
freeimage
dev-utils
CVE-2023-26464
I6MI3U
7.87
7.5
log4j12
Application
CVE-2021-3329
I6HUIN
9.2
6.5
zephyr
CVE-2023-1055
I6I76Q
10.33
5.5
three-eight-nine-ds-base
Application
CVE-2023-1076
I6I7UH
10.58
4.7
risc-v-kernel
sig-RISC-V
CVE-2023-1079
I6I7UE
10.58
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-1074
I6I7UD
10.58
4.7
risc-v-kernel
sig-RISC-V
CVE-2023-1079
I6I7U9
10.58
6.8
kernel
Kernel
CVE-2023-1075
I6I7U8
10.58
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-1075
I6I7U2
10.58
2.5
kernel
Kernel
CVE-2023-24533
I6LIQ9
10.8
7.5
golang
sig-golang
CVE-2023-27781
I6NIU2
10.81
7.8
jpegoptim
Application
CVE-2023-1073
I6IFV4
11.12
6.3
kernel
Kernel
CVE-2023-1095
I6IK9V
11.45
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-1095
I6IK9U
11.45
5.5
kernel
Kernel
CVE-2023-1018
I6IKCI
11.7
5.5
libtpms
sig-security-facility
CVE-2020-12413
I6IKCQ
11.72
5.9
firefox
Application
CVE-2023-22999
I6IKXV
11.81
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-22997
I6IKXC
11.81
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-22998
I6IKWZ
11.81
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-22999
I6IKWS
11.81
5.5
kernel
Kernel
CVE-2023-22996
I6IKWQ
11.81
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-22997
I6IKWJ
11.81
5.5
kernel
Kernel
CVE-2023-22998
I6IKWF
11.81
5.5
kernel
Kernel
CVE-2023-22996
I6IKWB
11.81
5.5
kernel
Kernel
CVE-2022-36021
I6IRS4
12.08
5.5
redis
Others
CVE-2022-36021
I6IRRY
12.08
5.5
redis6
sig-bigdata
CVE-2022-36021
I6IRRU
12.08
5.5
redis5
sig-bigdata
CVE-2023-25155
I6IRPL
12.08
6.5
redis
Others
CVE-2023-25155
I6IRP9
12.08
6.5
redis6
sig-bigdata
CVE-2023-25155
I6IROQ
12.08
6.5
redis5
sig-bigdata
CVE-2019-14576
I6ISX4
12.12
0.0
edk2
Virt
CVE-2019-14561
I6ISWY
12.12
0.0
edk2
Virt
CVE-2023-22462
I6ITUB
12.16
5.4
grafana
Application
CVE-2023-0594
I6IVYK
12.45
5.4
grafana
Application
CVE-2023-0507
I6IVYI
12.45
5.4
grafana
Application
CVE-2023-23004
I6IXRY
12.85
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-23006
I6IXRQ
12.85
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-23002
I6IXRB
12.85
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-23005
I6IXQX
12.85
5.5
risc-v-kernel
sig-RISC-V
CVE-2023-23004
I6IXPT
12.85
5.5
kernel
Kernel
CVE-2023-23006
I6IXPJ
12.85
5.5
kernel
Kernel
CVE-2023-23002
I6IXOH
12.85
5.5
kernel
Kernel
CVE-2023-23005
I6IXO8
12.85
5.5
kernel
Kernel
CVE-2023-23001
I6IXNW
12.85
5.5
kernel
Kernel
CVE-2022-39188
I5QVT3
13.81
4.7
kernel
Kernel
CVE-2023-1161
I6JJJE
14.45
6.5
wireshark
Application
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
沐钰莹(openEuler release SIG)
Mobile: +86 15651995918
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail: muyuying1(a)huawei.com<mailto:muyuying1@huawei.com>
[cid:image004.png@01D95A6A.D96776D0]Open Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件!
This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it
1
0
Dear all,
经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。
本公示分为五部分:
1、openEuler-20.03-LTS-SP1 Update 20230308发布情况及待修复缺陷
2、openEuler-20.03-LTS-SP3 Update 20230308发布情况及待修复缺陷
3、openEuler-22.03-LTS Update 20230308发布情况及待修复缺陷
4、openEuler-22.03-LTS-SP1 Update 20230308发布情况及待修复缺陷
5、openEuler 关键组件待修复CVE 清单
6、openEuler 社区指导文档及开放平台链接
本次update版本发布后,下一个版本里程碑点(预计在2023/03/19)提供 update_ 20230315 版本。
openEuler-20.03-LTS-SP1 Update 20230308
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题2个,已知漏洞11个。目前版本分支剩余待修复缺陷36个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6JXVB?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2023-24998
apache-commons-fileupload
7.5
CVE-2022-37705
amanda
6.7
CVE-2022-37704
amanda
6.7
CVE-2023-0461
kernel
1
CVE-2023-1073
kernel
1
CVE-2023-1076
kernel
1
CVE-2023-1078
kernel
1
CVE-2023-1095
kernel
1
CVE-2023-1118
kernel
1
CVE-2023-23000
kernel
1
CVE-2023-26607
kernel
7.1
Bugfix:
issue
仓库
#I6L1MK:update_20230308 fix ipnetns attach failed
iproute
#I6KOXL:[openEuler-1.0-LTS] dhugetlb: use mutex lock in update_reserve_pages()
kernel
openEuler-20.03-LTS-SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol
openEuler-20.03-LTS-SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I281C1
【fuzz】runtime error:
libsass
Base-service
I437CR
[SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错
obs-server
Others
I43OSX
[clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0
clamav
Others
I48GIM
【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I4F8YQ
integer overflow in start_input_bmp
libjpeg-turbo
Desktop
I4F903
Unexpect-exit in start_input_tga
libjpeg-turbo
Desktop
I4F913
Timeout in tjDecompress2
libjpeg-turbo
Desktop
I4G4A5
Undefine-shift in _bfd_safe_read_leb128
binutils
Compiler
I4G4B1
Integer overflow in print_vms_time
binutils
Compiler
I4G4VY
memleak in parse_gnu_debugaltlink
binutils
Compiler
I4G4WF
Heap-buffer-overflow in slurp_hppa_unwind_table
binutils
Compiler
I4G4WW
Use-after-free in make_qualified_name
binutils
Compiler
I4G4X6
memleak in byte_get_little_endian
binutils
Compiler
I4G4XF
memleak in process_mips_specific
binutils
Compiler
I4G4Y0
out-of-memory in vms_lib_read_index
binutils
Compiler
I4G4YJ
Heap-buffer-overflow in bfd_getl16
binutils
Compiler
I4G4YV
Floating point exception in _bfd_vms_slurp_etir
binutils
Compiler
I4J0OY
【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常
libdap
sig-recycle
I4K6ES
stack-buffer-overflow in UINT32_Marshal
libtpms
sig-security-facility
I4K6FU
global-buffer-overflow in Array_Marshal
libtpms
sig-security-facility
I4O16Z
【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息
kernel
Kernel
I5IG1V
【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败
efl
sig-compat-winapp
I5IG6K
【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5JHX2
【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6AZZU
【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped)
gcc
Compiler
I6CBNA
【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6CKZE
【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault
gcc
Compiler
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
I6ISTD
[22.03-sp1]执行iscsiadm -m node -p 127.0.0.1 -u命令失败,内核报错
kernel
Kernel
openEuler-20.03-LTS-SP3 Update 20230308
经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问2个,已知漏洞12个。目前版本分支剩余待修复缺陷 10个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6JXVC?from=project-i…
CVE修复:
需求类型
软件包
优先级
CVE-2020-10775
ovirt-engine
5.3
CVE-2023-24998
apache-commons-fileupload
7.5
CVE-2022-37705
amanda
6.7
CVE-2022-37704
amanda
6.7
CVE-2023-0461
kernel
1
CVE-2023-1073
kernel
1
CVE-2023-1076
kernel
1
CVE-2023-1078
kernel
1
CVE-2023-1095
kernel
1
CVE-2023-1118
kernel
1
CVE-2023-23000
kernel
1
CVE-2023-26607
kernel
7.1
Bugfix:
issue
仓库
#I6L1MK:update_20230308 fix ipnetns attach failed
iproute
#I6KOXL:[openEuler-1.0-LTS] dhugetlb: use mutex lock in update_reserve_pages()
kernel
openEuler-20.03-LTS-SP3版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3
https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol
openEuler-20.03-LTS-SP3 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/
https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/
openEuler CVE 及 安全公告公示链接:
https://www.openeuler.org/zh/security/cve/
https://www.openeuler.org/zh/security/safety-bulletin/
https://repo.openeuler.org/security/data/cvrf/
openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I5IGAS
【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败
opencryptoki
dev-utils
I5IGOR
【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败
fluidsynth
Application
I5KXUY
【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败
ovirt-cockpit-sso
oVirt
I5KY4S
【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功
vdsm
oVirt
I5LYJK
【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常
TCP_option_address
Kernel
I5XDXJ
openeuler:20.03-sp3下lua-lunit0.5和lua5.3不匹配
mugen
sig-QA
I613DI
【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败
openEuler-release
Base-service
I61LEV
【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错
tuna
Others
I66BBJ
[20.03-LTS-SP3]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源
openEuler-repos
Base-service
I6CBL7
【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
openEuler-22.03-LTS Update 20230308
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题3个,已知漏洞4个。目前版本分支剩余待修复缺陷9个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6JXVD?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2022-37705
amanda
6.7
CVE-2022-37704
amanda
6.7
CVE-2023-24998
apache-commons-fileupload
7.5
CVE-2023-23009
libreswan
7.5
Bugfix:
issue
仓库
#I6JA8U:【22.03 LTS update20230301】【arm/x86】unbound安装过程中有异常打印信息
unbound
#I6L1MK:update_20230308 fix ipnetns attach failed
iproute
#I6L25Z:update_20230308 Multi-Version_OpenStack-Wallaby_openEuler-22.03-LTS分支修复openstack依赖问题
python-chardet
openEuler-22.03-LTS版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I5JIA6
【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败
ovirt-engine
oVirt
I5JPII
【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin
ovirt-engine
oVirt
I665SM
resize2fs出现csum不一致
kernel
Kernel
I66BDE
[22.03-LTS]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源
openEuler-repos
Base-service
I66KIH
【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败
openstack-ironic-inspector
sig-openstack
I677QX
【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误
opengauss-server
DB
I6AG88
【22.03-LTS】【arm/x86】nvwa第一次卸载时有异常报错信息
nvwa
sig-ops
I6AGEG
【22.03-LTS-SP1】【arm/x86】nvwa第一次卸载时有异常报错信息
nvwa
sig-ops
I6CBPQ
【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
openEuler-22.03-LTS SP1 Update 20230308
经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题3个,已知漏洞12个。目前版本分支剩余待修复缺陷21个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库
openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接:
https://gitee.com/openeuler/release-management/issues/I6JXVA?from=project-i…
CVE修复:
CVE
仓库
score
CVE-2023-22796
rubygem-activesupport
7.5
CVE-2022-37705
amanda
6.7
CVE-2022-37704
amanda
6.7
CVE-2022-3560
pesign
5.5
CVE-2023-0240
kernel
7.8
CVE-2023-0615
kernel
5.5
CVE-2023-0045
kernel
5.1
CVE-2023-20938
kernel
8.8
CVE-2023-23586
kernel
5.5
CVE-2022-47629
libksba
9.8
CVE-2023-23009
libreswan
7.5
CVE-2023-24998
apache-commons-fileupload
7.5
Bugfix:
issue
仓库
#I6IQTA:openldap开启build_cross宏支持交叉编译
openldap
#I6JA8U:【22.03 LTS update20230301】【arm/x86】unbound安装过程中有异常打印信息
unbound
#I6L1MK:update_20230308 fix ipnetns attach failed
iproute
openEuler-22.03-LTS SP1版本编译构建信息查询链接:
https://build.openeuler.org/project/show/openEuler:22.03:LTS
https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol
openEuler-22.03-LTS SP1 Update版本 发布源链接:
https://repo.openeuler.org/openEuler-22.03-LTS/update/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Op…
openEuler-22.03-LTS SP1 Update版本待修复问题清单公示:
任务ID
任务标题
关联仓库
SIG
I657VS
【22.03_LTS_SP1_RC2】【x86/arm】dde-api不存在安全的编译选项PIE、STRIP
dde-api
sig-DDE
I657VT
【22.03_LTS_SP1_RC2】【x86/arm】dde-daemon存在不安全的编译选项STRIP
dde-daemon
sig-DDE
I657VX
【22.03_LTS_SP1_RC2】【x86/arm】deepin-dbus-generator不存在安全的编译选项PIE、STRIP
deepin-dbus-generator
sig-DDE
I657W0
【22.03_LTS_SP1_RC2】【x86/arm】deepin-editor存在不安全的编译选项STRIP
deepin-editor
sig-DDE
I657W3
【22.03_LTS_SP1_RC2】【x86/arm】deepin-graphics-driver-manager存在不安全的编译选项STRIP
deepin-graphics-driver-manager
sig-DDE
I657W7
【22.03_LTS_SP1_RC2】【x86/arm】deepin-system-monitor存在不安全的编译选项STRIP
deepin-system-monitor
sig-DDE
I6583U
【22.03_LTS_SP1_RC2】【x86/arm】startdde不存在安全的编译选项PIE、STRIP
startdde
sig-DDE
I6975Y
【arm】--enable-bootstrap构建gcc失败
gcc
Compiler
I6AASB
【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc
gcc
Compiler
I6AGEG
【22.03-LTS-SP1】【arm/x86】nvwa第一次卸载时有异常报错信息
nvwa
sig-ops
I6AZZU
【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped)
gcc
Compiler
I6CBPN
【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败
netdata
Base-service
I6CKRQ
【22.03 SP1 update20230201】【arm/x86】ceph-selinux卸载过程中有异常打印信息
ceph
sig-ceph
I6CKZE
【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault
gcc
Compiler
I6DRDY
【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败
gcc
Compiler
I6DUTF
[22.03sp1lts][arm/x86] obsredis.service服务启动失败
obs-server
Others
I6EUHB
create_gcov在kernel6.1上执行报错
autofdo
Compiler
I6FQCO
【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof
opengauss-server
DB
I6I438
【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph'
gcc
Compiler
I6I47O
【x86】【deja】运行出现Segmentation fault
gcc
Compiler
I6ISTD
[22.03-sp1]执行iscsiadm -m node -p 127.0.0.1 -u命令失败,内核报错
kernel
Kernel
社区待修复漏洞:
openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。
严重等级(Severity Rating)
漏洞修复时长
致命(Critical)
7天
高(High)
14天
中(Medium)
30天
低(Low)
30天
可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE…
近14天将超期CVE:
漏洞编号
Issue ID
剩余天数
CVSS评分
软件包
责任SIG
CVE-2023-26607
I6HWPB
0.64
7.1
risc-v-kernel
sig-RISC-V
CVE-2023-26605
I6HWOX
0.64
7.8
risc-v-kernel
sig-RISC-V
CVE-2023-26606
I6HWOO
0.64
7.8
risc-v-kernel
sig-RISC-V
CVE-2023-1077
I6I7UG
1.39
7.0
risc-v-kernel
sig-RISC-V
CVE-2023-22995
I6IEHV
1.89
7.8
risc-v-kernel
sig-RISC-V
CVE-2023-22995
I6IEH4
1.89
7.8
kernel
Kernel
CVE-2022-41723
I6IKBL
2.35
7.5
perl-Net-HTTP
Programming-language
CVE-2023-27371
I6IKCF
2.51
7.5
libmicrohttpd
Application
CVE-2023-1017
I6IUP1
3.01
7.8
libtpms
sig-security-facility
CVE-2022-25937
I6EUG8
3.1
6.5
openstack-glance
sig-openstack
CVE-2023-1118
I6IW01
3.53
7.8
kernel
Kernel
CVE-2023-23003
I6IXRI
3.66
7.8
risc-v-kernel
sig-RISC-V
CVE-2023-23003
I6IXPB
3.66
7.8
kernel
Kernel
CVE-2023-25730
I6F4RP
4.41
0.0
firefox
Application
CVE-2023-25739
I6F4RO
4.41
0.0
firefox
Application
CVE-2023-25736
I6F4RN
4.41
0.0
firefox
Application
CVE-2023-25738
I6F4RM
4.41
0.0
firefox
Application
CVE-2023-25731
I6F4RL
4.41
0.0
firefox
Application
CVE-2023-25735
I6F4RK
4.41
0.0
firefox
Application
CVE-2023-25740
I6F4RJ
4.41
0.0
firefox
Application
CVE-2023-25744
I6F4RI
4.41
0.0
firefox
Application
CVE-2023-25746
I6F4RH
4.41
0.0
firefox
Application
CVE-2023-25742
I6F4RG
4.41
0.0
firefox
Application
CVE-2023-25728
I6F4RF
4.41
0.0
firefox
Application
CVE-2023-25737
I6F4RE
4.41
0.0
firefox
Application
CVE-2023-25734
I6F4RD
4.41
0.0
firefox
Application
CVE-2023-25745
I6F4RA
4.41
0.0
firefox
Application
CVE-2023-25743
I6F4R8
4.41
0.0
firefox
Application
CVE-2023-25741
I6F4R6
4.41
0.0
firefox
Application
CVE-2023-25729
I6F4R2
4.41
0.0
firefox
Application
CVE-2023-25732
I6F4QX
4.41
0.0
firefox
Application
CVE-2023-25733
I6F4QT
4.41
0.0
firefox
Application
CVE-2023-0767
I6F4QN
4.41
0.0
firefox
Application
CVE-2022-27672
I6FB6C
4.91
4.7
kernel
Kernel
CVE-2022-38090
I6FDF4
5.03
4.4
microcode_ctl
System-tool
CVE-2022-33196
I6FDF2
5.03
6.7
microcode_ctl
System-tool
CVE-2023-23934
I6FDE3
5.03
3.5
python-werkzeug
Programming-language
CVE-2023-23918
I6GFMC
5.23
7.5
nodejs
sig-nodejs
CVE-2023-0778
I6FEKK
5.28
0.0
podman
sig-CloudNative
CVE-2016-3092
I6JLSA
5.72
7.5
struts
sig-Java
CVE-2023-20052
I6FMJU
5.95
0.0
clamav
Others
CVE-2023-0616
I6FOOO
6.14
0.0
thunderbird
sig-desktop-apps
CVE-2023-0662
I6FWA8
6.94
5.3
php
Base-service
CVE-2023-0567
I6FXSZ
7.01
0.0
php
Base-service
CVE-2023-23586
I6FYP9
7.14
5.5
kernel
Kernel
CVE-2019-17003
I6FZ58
7.26
6.1
thunderbird
sig-desktop-apps
CVE-2019-17003
I6FZ57
7.26
6.1
mozjs78
Desktop
CVE-2019-17003
I6FZ56
7.26
6.1
firefox
Application
CVE-2023-26604
I6JZ81
7.63
7.8
systemd
Base-service
CVE-2022-36397
I6FZ5I
8.61
7.8
kernel
Kernel
CVE-2023-1220
I6KVOV
9.64
8.8
chromium
Application
CVE-2023-1227
I6KVOD
9.64
8.8
chromium
Application
CVE-2023-1219
I6KVLQ
9.64
8.8
chromium
Application
CVE-2023-1218
I6KVL8
9.64
8.8
chromium
Application
CVE-2023-1216
I6KVKV
9.64
8.8
chromium
Application
CVE-2023-1213
I6KYB7
9.76
8.8
chromium
Application
CVE-2023-1214
I6KYB6
9.76
8.8
chromium
Application
CVE-2023-23920
I6GGBS
10.08
4.2
nodejs
sig-nodejs
CVE-2021-33639
I6H235
12.02
0.0
risc-v-kernel
sig-RISC-V
CVE-2023-23039
I6H8HC
12.83
5.7
kernel
Kernel
CVE-2023-23039
I6H8H5
12.83
5.7
risc-v-kernel
sig-RISC-V
CVE-2021-33367
I6H8GO
12.83
5.5
freeimage
dev-utils
openEuler 社区指导文档及开放平台链接:
openEuler 版本分支维护规范:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%…
openEuler release-management 版本分支PR指导:
https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%…
社区QA 版本测试提单规范
https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d65…
社区QA 测试平台 radiates
https://radiatest.openeuler.org<https://radiatest.openeuler.org/>
沐钰莹(openEuler release SIG)
Mobile: +86 15651995918
中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心
HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China
E-mail: muyuying1(a)huawei.com<mailto:muyuying1@huawei.com>
[cid:image004.png@01D95511.7855BC70]Open Source OS for Digital Infrastructure
本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形
式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话
或邮件通知发件人并删除本邮件!
This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for
the person or entity whose address is listed above. Any use of the information contained herein in any way
(including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other
than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it
1
0