
Dear all, 经社区Release SIG、QA SIG及 CICD SIG 评估,openEuler-20.03-LTS-SP1、openEuler-20.03-LTS-SP3及openEuler-22.03-LTS update版本满足版本出口质量,现进行发布公示。 本公示分为五部分: 1、openEuler-20.03-LTS-SP1 Update 20230315发布情况及待修复缺陷 2、openEuler-20.03-LTS-SP3 Update 20230315发布情况及待修复缺陷 3、openEuler-22.03-LTS Update 20230315发布情况及待修复缺陷 4、openEuler-22.03-LTS-SP1 Update 20230315发布情况及待修复缺陷 5、openEuler 关键组件待修复CVE 清单 6、openEuler 社区指导文档及开放平台链接 本次update版本发布后,下一个版本里程碑点(预计在2023/03/26)提供 update_ 20230322 版本。 openEuler-20.03-LTS-SP1 Update 20230315 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP1修复版本已知问题4个,已知漏洞23个。目前版本分支剩余待修复缺陷38个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP1 Update版本CVE修复 及Bugfix list公示链接: https://gitee.com/openeuler/release-management/issues/I6MFEQ?from=project-is... CVE修复: CVE 仓库 score CVE-2022-40899 future 7.5 CVE-2023-26253 glusterfs 7.5 CVE-2023-27522 httpd 5.9 CVE-2023-25690 httpd 7.5 CVE-2022-25857 snakeyaml 7.5 CVE-2022-38749 snakeyaml 6.5 CVE-2022-38750 snakeyaml 5.5 CVE-2022-38751 snakeyaml 6.5 CVE-2022-38752 snakeyaml 6.5 CVE-2022-41854 snakeyaml 6.5 CVE-2023-20938 kernel 8.8 CVE-2023-0461 kernel 7.8 CVE-2023-1074 kernel 4.7 CVE-2023-1078 kernel 7.8 CVE-2023-1076 kernel 4.7 CVE-2023-1118 kernel 7.8 CVE-2023-26604 systemd 7.8 CVE-2023-1170 vim 7.8 CVE-2023-1175 vim 7.3 CVE-2023-27371 libmicrohttpd 7.5 CVE-2023-26545 kernel 7.8 CVE-2023-20052 clamav 5.3 CVE-2023-20032 clamav 9.8 Bugfix: issue 仓库 #I6LHB0:修复由于snakeyaml升级到1.32版本导致jruby编译失败 jruby #I6LHBA:修复由于snakeyaml升级到1.32版本导致polyglot编译失败 polyglot #I6561X:软件包参数问题 netsniff-ng #I643OL:【openEuler 2003 LTS】【openEuler-1.0-LTS】 [内核] [kernfs] [block] 测试iscsi中blk层宕机 kernel openEuler-20.03-LTS-SP1版本编译构建信息查询链接: https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1 https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP1:Epol openEuler-20.03-LTS-SP1 Update版本 发布源链接: https://repo.openeuler.org/openEuler-20.03-LTS-SP1/update/ https://repo.openeuler.org/openEuler-20.03-LTS-SP1/EPOL/update/ openEuler CVE 及 安全公告公示链接: https://www.openeuler.org/zh/security/cve/ https://www.openeuler.org/zh/security/safety-bulletin/ https://repo.openeuler.org/security/data/cvrf/ openEuler-20.03-LTS-SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I281C1 【fuzz】runtime error: libsass Base-service I437CR [SP1][arm/x86]obs-server包下11个服务启动关闭,出现报错 obs-server Others I43OSX [clamav] 执行clamscan --statistics pcre命令会出现error,但是最终返回码为0 clamav Others I48GIM 【20.03LTS SP1 update 210901】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I4G4A5 Undefine-shift in _bfd_safe_read_leb128 binutils Compiler I4G4B1 Integer overflow in print_vms_time binutils Compiler I4G4VY memleak in parse_gnu_debugaltlink binutils Compiler I4G4WF Heap-buffer-overflow in slurp_hppa_unwind_table binutils Compiler I4G4WW Use-after-free in make_qualified_name binutils Compiler I4G4X6 memleak in byte_get_little_endian binutils Compiler I4G4XF memleak in process_mips_specific binutils Compiler I4G4Y0 out-of-memory in vms_lib_read_index binutils Compiler I4G4YJ Heap-buffer-overflow in bfd_getl16 binutils Compiler I4G4YV Floating point exception in _bfd_vms_slurp_etir binutils Compiler I4J0OY 【20.03 SP1】【arm/x86】安装好libdap后,getdap4命令的-i和-k参数使用异常 libdap sig-recycle I4JMG4 【20.03 SP1】【arm/x86】robotframework包的三个命令:libdoc、rebot、robot执行--help/-h/-?/--version,查看帮助信息和版本信息,返回值为251 python-robotframework sig-ROS I4K6ES stack-buffer-overflow in UINT32_Marshal libtpms sig-security-facility I4K6FU global-buffer-overflow in Array_Marshal libtpms sig-security-facility I4O16Z 【SP1_update/arm】安装kernel-4.19.90-2108版本有错误提示信息 kernel Kernel I4QV6N 【openEuler-20.03-LTS-SP1】flink命令执行失败 flink sig-bigdata I5IG1V 【20.03-SP1】【x86/arm】epol源下的efl、efl-devel软件包安装报错,gpg检查失败 efl sig-compat-winapp I5IG6K 【20.03-SP1】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5JHX2 【20.03 SP1 update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I6975Y 【arm】--enable-bootstrap构建gcc失败 gcc Compiler I6AASB 【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc gcc Compiler I6AZZU 【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped) gcc Compiler I6CBNA 【20.03 sp1 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6CKZE 【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault gcc Compiler I6DRDY 【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败 gcc Compiler I6DUTF [22.03sp1lts][arm/x86] obsredis.service服务启动失败 obs-server Others I6EUHB create_gcov在kernel6.1上执行报错 autofdo Compiler I6FQCO 【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof opengauss-server DB I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler I6ISTD [22.03-sp1]执行iscsiadm -m node -p 127.0.0.1 -u命令失败,内核报错 kernel Kernel I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler I6ISTD [22.03-sp1]执行iscsiadm -m node -p 127.0.0.1 -u命令失败,内核报错 kernel Kernel openEuler-20.03-LTS-SP3 Update 20230315 经各SIG及社区开发者贡献,本周openEuler-20.03-LTS-SP3修复版本已知问4个,已知漏洞23个。目前版本分支剩余待修复缺陷 11个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-20.03-LTS-SP3 Update版本CVE修复 及Bugfix list公示链接: https://gitee.com/openeuler/release-management/issues/I6MFER?from=project-is... CVE修复: 需求类型 软件包 优先级 CVE-2023-27371 libmicrohttpd 7.5 CVE-2022-40899 future 7.5 CVE-2023-27522 httpd 5.9 CVE-2023-25690 httpd 7.5 CVE-2022-25857 snakeyaml 7.5 CVE-2022-38749 snakeyaml 6.5 CVE-2022-38750 snakeyaml 5.5 CVE-2022-38751 snakeyaml 6.5 CVE-2022-38752 snakeyaml 6.5 CVE-2022-41854 snakeyaml 6.5 CVE-2023-20938 kernel 8.8 CVE-2023-0461 kernel 7.8 CVE-2023-1074 kernel 4.7 CVE-2023-1078 kernel 7.8 CVE-2023-1076 kernel 4.7 CVE-2023-1118 kernel 7.8 CVE-2023-26604 systemd 7.8 CVE-2023-1170 vim 7.8 CVE-2023-1175 vim 7.3 CVE-2023-26253 glusterfs 7.5 CVE-2023-26545 kernel 7.8 CVE-2023-20052 clamav 5.3 CVE-2023-20032 clamav 9.8 Bugfix: issue 仓库 #I6LHB0:修复由于snakeyaml升级到1.32版本导致jruby编译失败 jruby #I6LHBA:修复由于snakeyaml升级到1.32版本导致polyglot编译失败 polyglot #I6561X:软件包参数问题 netsniff-ng #I643OL:【openEuler 2003 LTS】【openEuler-1.0-LTS】 [内核] [kernfs] [block] 测试iscsi中blk层宕机 kernel openEuler-20.03-LTS-SP3版本编译构建信息查询链接: https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3 https://build.openeuler.org/project/show/openEuler:20.03:LTS:SP3:Epol openEuler-20.03-LTS-SP3 Update版本 发布源链接: https://repo.openeuler.org/openEuler-20.03-LTS-SP3/update/ https://repo.openeuler.org/openEuler-20.03-LTS-SP3/EPOL/update/main/ openEuler CVE 及 安全公告公示链接: https://www.openeuler.org/zh/security/cve/ https://www.openeuler.org/zh/security/safety-bulletin/ https://repo.openeuler.org/security/data/cvrf/ openEuler-20.03-LTS-SP3 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I4QV7S 【openEuler-20.03-LTS-SP3】flink run 命令执行失败 flink sig-bigdata I5IGAS 【20.03-SP3】【x86/arm】epol源下的opencryptoki、opencryptoki-devel软件包安装报错,gpg检查失败 opencryptoki dev-utils I5IGOR 【20.03-SP3】【x86/arm】epol源下的fluidsynth、fluidsynth-devel、fluidsynth-help软件包安装报错,gpg检查失败 fluidsynth Application I5KXUY 【20.03 LTS SP3 update 20220803】【arm/x86】ovirt-cockpit-sso.service服务启动失败 ovirt-cockpit-sso oVirt I5KY4S 【20.03 LTS SP3 update 20220803】【arm/x86】vdsmd.service服务启动失败,导致mom-vdsm.service服务无法启动成功 vdsm oVirt I5LYJK 【20.03-sp3_update20220801】【x86】对内核版进行升级后,TCP_option_address安装异常 TCP_option_address Kernel I5XDXJ openeuler:20.03-sp3下lua-lunit0.5和lua5.3不匹配 mugen sig-QA I613DI 【20.03 SP3】当前最新版本的kernel、 oec-hardware、 openEuler-release三个包同时安装,虚拟机启动失败 openEuler-release Base-service I61LEV 【20.03 LTS SP3】【arm/x86】安装oscilloscope,然后执行oscilloscope -h报错 tuna Others I66BBJ [20.03-LTS-SP3]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源 openEuler-repos Base-service I6CBL7 【20.03 sp3 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service openEuler-22.03-LTS Update 20230315 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题6个,已知漏洞24个。目前版本分支剩余待修复缺陷9个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS Update版本CVE修复 及Bugfix list公示链接: https://gitee.com/openeuler/release-management/issues/I6MFES?from=project-is... CVE修复: CVE 仓库 score CVE-2023-27320 sudo 1 CVE-2023-27371 libmicrohttpd 7.5 CVE-2022-40899 future 7.5 CVE-2023-1170 vim 7.8 CVE-2023-1175 vim 7.3 CVE-2022-25857 snakeyaml 7.5 CVE-2022-38749 snakeyaml 6.5 CVE-2022-38750 snakeyaml 5.5 CVE-2022-38752 snakeyaml 6.5 CVE-2022-41854 snakeyaml 6.5 CVE-2023-20938 kernel 8.8 CVE-2023-0461 kernel 7.8 CVE-2023-1075 kernel 2.5 CVE-2023-1078 kernel 7.8 CVE-2023-1076 kernel 4.7 CVE-2023-22995 kernel 7.8 CVE-2023-1118 kernel 7.8 CVE-2023-27522 httpd 5.9 CVE-2023-25690 httpd 7.5 CVE-2023-26253 glusterfs 7.5 CVE-2023-26545 kernel 7.8 CVE-2022-38751 snakeyaml 6.5 CVE-2023-20052 clamav 5.3 CVE-2023-20032 clamav 9.8 Bugfix: issue 仓库 #I6LBTJ:2203LTS版本的python3-paramiko包,通过RSA秘钥远程ssh验证报错,请求升级至2.11.0或2.11.0以后版本 python-paramiko #I6KPA0:postfix 安装后 postfix.pem 证书有效期小于1年 postfix #I6LHB0:修复由于snakeyaml升级到1.32版本导致jruby编译失败 jruby #I6LHBA:修复由于snakeyaml升级到1.32版本导致polyglot编译失败 polyglot #I6LNLJ:例行分析dnf补丁,需要补丁回合 dnf #I6561X:软件包参数问题 netsniff-ng openEuler-22.03-LTS版本编译构建信息查询链接: https://build.openeuler.org/project/show/openEuler:22.03:LTS https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol openEuler-22.03-LTS Update版本 发布源链接: https://repo.openeuler.org/openEuler-22.03-LTS/update/ https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/ https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Ope... https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Ope... openEuler-22.03-LTS Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I5JIA6 【22.03 LTS update 20220727】ovirt-engine在update 20220727版本安装失败 ovirt-engine oVirt I5JPII 【22.03_update20220727】【x86/arm】ovirt-engine源码包本地自编译失败,缺少编译依赖ovirt-jboss-modules-maven-plugin ovirt-engine oVirt I665SM resize2fs出现csum不一致 kernel Kernel I66BDE [22.03-LTS]/etc/yum.repos.d/openEuler.repo源中默认没有update的source源 openEuler-repos Base-service I66KIH 【22.03 LTS update 20221214】【arm/x86】openstack-ironic-inspector.service服务stop失败 openstack-ironic-inspector sig-openstack I677QX 【22.03-LTS】【x86/arm】安装opengauss-server时报未找不着lsof命令错误 opengauss-server DB I6AG88 【22.03-LTS】【arm/x86】nvwa第一次卸载时有异常报错信息 nvwa sig-ops I6AGEG 【22.03-LTS-SP1】【arm/x86】nvwa第一次卸载时有异常报错信息 nvwa sig-ops I6CBPQ 【22.03 lts udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service openEuler-22.03-LTS SP1 Update 20230315 经各SIG及社区开发者贡献,本周openEuler-22.03-LTS修复版本已知问题11个,已知漏洞26个。目前版本分支剩余待修复缺陷14个,缺陷/漏洞统计详见清单,缺陷/漏洞问题详见各软件包源码仓库 openEuler-22.03-LTS SP1 Update版本CVE修复 及Bugfix list公示链接: https://gitee.com/openeuler/release-management/issues/I6MFEP?from=project-is... CVE修复: CVE 仓库 score CVE-2023-26081 epiphany 7.5 CVE-2023-26253 glusterfs 7.5 CVE-2022-38749 snakeyaml 6.5 CVE-2022-38750 snakeyaml 5.5 CVE-2022-38751 snakeyaml 6.5 CVE-2022-38752 snakeyaml 6.5 CVE-2022-41854 snakeyaml 6.5 CVE-2023-27320 sudo 1 CVE-2023-27522 httpd 5.9 CVE-2023-25690 httpd 7.5 CVE-2022-3560 pesign 5.5 CVE-2023-20938 kernel 8.8 CVE-2023-0461 kernel 7.8 CVE-2023-26607 kernel 7.1 CVE-2023-1075 kernel 2.5 CVE-2023-1078 kernel 7.8 CVE-2023-1076 kernel 4.7 CVE-2023-22995 kernel 7.8 CVE-2023-1118 kernel 7.8 CVE-2023-1175 vim 7.3 CVE-2023-1170 vim 7.8 CVE-2023-27371 libmicrohttpd 7.5 CVE-2023-26545 kernel 7.8 CVE-2022-40899 future 7.5 CVE-2023-20052 clamav 5.3 CVE-2023-20032 clamav 9.8 Bugfix: issue 仓库 #I6J86M:repo python-lit-15.0.7-1源码包 python-lit #I6K0AO:gala-gopher升级到1.0.2版本 gala-gopher #I6KPA0:postfix 安装后 postfix.pem 证书有效期小于1年 postfix #I6MR9A:例行回合社区补丁 efibootmgr #I6LNLJ:例行分析dnf补丁,需要补丁回合 dnf #I6561X:软件包参数问题 netsniff-ng #I6LHB0:修复由于snakeyaml升级到1.32版本导致jruby编译失败 jruby #I6LHBA:修复由于snakeyaml升级到1.32版本导致polyglot编译失败 polyglot #I6NF3Y:update_0315补充clang对c、c++代码编译功能,需要补充libcxx、libcxxabi、llvm-libunwind三款软件 libcxx #I6NF4V:udapte-0315补充clang对c、c++代码编译功能,需要补充libcxx、libcxxabi、llvm-libunwind三款软件 libcxxabi #I6NF5I:update-0315 补充clang对c、c++代码编译功能,需要补充libcxx、libcxxabi、llvm-libunwind三款软件 llvm-libunwind openEuler-22.03-LTS SP1版本编译构建信息查询链接: https://build.openeuler.org/project/show/openEuler:22.03:LTS https://build.openeuler.org/project/show/openEuler:22.03:LTS:Epol openEuler-22.03-LTS SP1 Update版本 发布源链接: https://repo.openeuler.org/openEuler-22.03-LTS/update/ https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/main/ https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Ope... https://repo.openeuler.org/openEuler-22.03-LTS/EPOL/update/multi_version/Ope... openEuler-22.03-LTS SP1 Update版本待修复问题清单公示: 任务ID 任务标题 关联仓库 SIG I6975Y 【arm】--enable-bootstrap构建gcc失败 gcc Compiler I6AASB 【arm】【codedb】-O3 -fipa-struct-reorg=2编译AmberToolsICE: lto1: internal compiler error: rewrite failed for realloc gcc Compiler I6AGEG 【22.03-LTS-SP1】【arm/x86】nvwa第一次卸载时有异常报错信息 nvwa sig-ops I6AZZU 【arm】【codedb】-O3 -fipa-struct-reorg=3运行bcftools应用Segmentation fault (core dumped) gcc Compiler I6CBPN 【22.03 lts sp1 udpate 0131 】netdata -W createdataset=10命令执行失败 netdata Base-service I6CKRQ 【22.03 SP1 update20230201】【arm/x86】ceph-selinux卸载过程中有异常打印信息 ceph sig-ceph I6CKZE 【arm】【deja】使用22.03 LTS-SP1发布源gcc 出现编译ICE:during GIMPLE pass: reassoc:internal compiler error: Segmentation fault gcc Compiler I6DRDY 【x86】【spec2017】-O3 -fipa-struct-reorg=5编译子项失败 gcc Compiler I6DUTF [22.03sp1lts][arm/x86] obsredis.service服务启动失败 obs-server Others I6EUHB create_gcov在kernel6.1上执行报错 autofdo Compiler I6FQCO 【22.03-LTS-SP1】【x86/arm】opengauss缺少安装依赖lsof opengauss-server DB I6I438 【x86】【deja】汇编失败:unsupported masking for `vcvtps2ph' gcc Compiler I6I47O 【x86】【deja】运行出现Segmentation fault gcc Compiler I6ISTD [22.03-sp1]执行iscsiadm -m node -p 127.0.0.1 -u命令失败,内核报错 kernel Kernel 社区待修复漏洞: openEuler社区根据漏洞严重等级采取差异化的修复策略,请各个SIG 关注涉及CVE组件的修复情况。 严重等级(Severity Rating) 漏洞修复时长 致命(Critical) 7天 高(High) 14天 中(Medium) 30天 低(Low) 30天 可参考社区安全委员会漏洞:https://gitee.com/openeuler/security-committee/wikis/%E7%A4%BE%E5%8C%BA%E6%B... 近14天将超期CVE(3.19日数据): 漏洞编号 Issue ID 剩余天数 CVSS评分 软件包 责任SIG CVE-2023-0662 I6FWA8 0.13 5.3 php Base-service CVE-2023-0567 I6FXSZ 0.2 6.2 php Base-service CVE-2019-17003 I6FZ58 0.45 6.1 thunderbird sig-desktop-apps CVE-2023-23039 I6H8H5 6.02 5.7 risc-v-kernel sig-RISC-V CVE-2021-33367 I6H8GO 6.02 5.5 freeimage dev-utils CVE-2023-26464 I6MI3U 7.87 7.5 log4j12 Application CVE-2021-3329 I6HUIN 9.2 6.5 zephyr CVE-2023-1055 I6I76Q 10.33 5.5 three-eight-nine-ds-base Application CVE-2023-1076 I6I7UH 10.58 4.7 risc-v-kernel sig-RISC-V CVE-2023-1079 I6I7UE 10.58 0.0 risc-v-kernel sig-RISC-V CVE-2023-1074 I6I7UD 10.58 4.7 risc-v-kernel sig-RISC-V CVE-2023-1079 I6I7U9 10.58 6.8 kernel Kernel CVE-2023-1075 I6I7U8 10.58 0.0 risc-v-kernel sig-RISC-V CVE-2023-1075 I6I7U2 10.58 2.5 kernel Kernel CVE-2023-24533 I6LIQ9 10.8 7.5 golang sig-golang CVE-2023-27781 I6NIU2 10.81 7.8 jpegoptim Application CVE-2023-1073 I6IFV4 11.12 6.3 kernel Kernel CVE-2023-1095 I6IK9V 11.45 5.5 risc-v-kernel sig-RISC-V CVE-2023-1095 I6IK9U 11.45 5.5 kernel Kernel CVE-2023-1018 I6IKCI 11.7 5.5 libtpms sig-security-facility CVE-2020-12413 I6IKCQ 11.72 5.9 firefox Application CVE-2023-22999 I6IKXV 11.81 5.5 risc-v-kernel sig-RISC-V CVE-2023-22997 I6IKXC 11.81 5.5 risc-v-kernel sig-RISC-V CVE-2023-22998 I6IKWZ 11.81 5.5 risc-v-kernel sig-RISC-V CVE-2023-22999 I6IKWS 11.81 5.5 kernel Kernel CVE-2023-22996 I6IKWQ 11.81 5.5 risc-v-kernel sig-RISC-V CVE-2023-22997 I6IKWJ 11.81 5.5 kernel Kernel CVE-2023-22998 I6IKWF 11.81 5.5 kernel Kernel CVE-2023-22996 I6IKWB 11.81 5.5 kernel Kernel CVE-2022-36021 I6IRS4 12.08 5.5 redis Others CVE-2022-36021 I6IRRY 12.08 5.5 redis6 sig-bigdata CVE-2022-36021 I6IRRU 12.08 5.5 redis5 sig-bigdata CVE-2023-25155 I6IRPL 12.08 6.5 redis Others CVE-2023-25155 I6IRP9 12.08 6.5 redis6 sig-bigdata CVE-2023-25155 I6IROQ 12.08 6.5 redis5 sig-bigdata CVE-2019-14576 I6ISX4 12.12 0.0 edk2 Virt CVE-2019-14561 I6ISWY 12.12 0.0 edk2 Virt CVE-2023-22462 I6ITUB 12.16 5.4 grafana Application CVE-2023-0594 I6IVYK 12.45 5.4 grafana Application CVE-2023-0507 I6IVYI 12.45 5.4 grafana Application CVE-2023-23004 I6IXRY 12.85 5.5 risc-v-kernel sig-RISC-V CVE-2023-23006 I6IXRQ 12.85 5.5 risc-v-kernel sig-RISC-V CVE-2023-23002 I6IXRB 12.85 5.5 risc-v-kernel sig-RISC-V CVE-2023-23005 I6IXQX 12.85 5.5 risc-v-kernel sig-RISC-V CVE-2023-23004 I6IXPT 12.85 5.5 kernel Kernel CVE-2023-23006 I6IXPJ 12.85 5.5 kernel Kernel CVE-2023-23002 I6IXOH 12.85 5.5 kernel Kernel CVE-2023-23005 I6IXO8 12.85 5.5 kernel Kernel CVE-2023-23001 I6IXNW 12.85 5.5 kernel Kernel CVE-2022-39188 I5QVT3 13.81 4.7 kernel Kernel CVE-2023-1161 I6JJJE 14.45 6.5 wireshark Application openEuler 社区指导文档及开放平台链接: openEuler 版本分支维护规范: https://gitee.com/openeuler/release-management/blob/master/openEuler%E7%89%8... openEuler release-management 版本分支PR指导: https://gitee.com/openeuler/release-management/blob/master/openEuler%E5%BC%8... 社区QA 版本测试提单规范 https://gitee.com/openeuler/QA/blob/839f952696f271f83c018ccf3218cf493b92d651... 社区QA 测试平台 radiates https://radiatest.openeuler.org<https://radiatest.openeuler.org/> 沐钰莹(openEuler release SIG) Mobile: +86 15651995918 中国(China)-杭州(Hangzhou)-滨江区江淑路360号华为杭州研发中心 HUAWEI , Jiangshu Road., Binjiang District, Hangzhou, P.R.China E-mail: muyuying1@huawei.com<mailto:muyuying1@huawei.com> [cid:image004.png@01D95A6A.D96776D0]Open Source OS for Digital Infrastructure 本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁止任何其他人以任何形 式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话 或邮件通知发件人并删除本邮件! This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for the person or entity whose address is listed above. Any use of the information contained herein in any way (including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by phone or email immediately and delete it